6200 Commits

Author SHA1 Message Date
lyon1998
fc437ae518 fix kvdb on libc_file port 2023-12-07 18:53:30 +08:00
lyon1998
0b9ed2b8d1 fix libc read/write for flashdb 2023-12-07 01:45:29 +08:00
lyon1998
eea7dbd0fc fix mem lack, get_blob for default_kvs not work 2023-12-06 23:57:48 +08:00
lyon
c8b0ffb220 fix port for flashdb pkg 2023-12-06 23:16:31 +08:00
lyon
fc63ab8e6a fix getcwd on win32 2023-12-03 14:55:29 +08:00
Brian
fba5e0b8ae
Add CodeQL Workflow for Code Security Analysis (#331)
* Add CodeQL Workflow for Code Security Analysis

Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every push and pull request to the main branch.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for third-party code, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation.

Signed-off-by: Brian <bayuan@purdue.edu>

* Add CodeQL Workflow for Code Security Analysis

Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>

* Add CodeQL Workflow for Code Security Analysis

Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>

* Add CodeQL Workflow for Code Security Analysis

Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>

* Remove failing on error and clean up codeql.yml

---------

Signed-off-by: Brian <bayuan@purdue.edu>
2023-12-03 01:51:52 +08:00
lyon1998
429adcef77 fix file size align in pya (v7) 2023-12-03 01:49:05 +08:00
lyon
83aa2aa805 fix pikafs_fread 2023-12-01 01:33:54 +08:00
lyon
7e3c589c48 fix win32 2023-12-01 01:33:03 +08:00
lyon
a14baffbc4 patch for win32 2023-12-01 01:04:18 +08:00
Lyon
c9bcde45ec sync random and socket pkg 2023-11-27 16:19:26 +08:00
Lyon
3636317542 fix for socket and mqtt 2023-11-27 16:18:48 +08:00
lyon1998
df95c5bd2f fix pack_flose 2023-11-19 14:45:31 +08:00
lyon
399fd1d115 fix errno symbel on win32 2023-11-18 20:10:52 +08:00
lyon
16c91ede68 add test for packread 2023-11-18 19:47:27 +08:00
Lyon
ec8ddf1423 support invalid literal check for int() 2023-11-17 18:25:34 +08:00
lyon
9f1cf1320c fix link 2023-11-15 19:06:19 +08:00
lyon
7ea34f917a clear machine.pyi and replace with StdDevice 2023-11-10 23:22:31 +08:00
lyon
c3986f5f03 support mul for str/bytes/obj 2023-11-08 21:22:39 +08:00
lyon
4ca642c48b clear runbytecode for fn0 and fn1 2023-11-08 20:21:42 +08:00
lyon
51b3d49b5c add runMethod0/1 and use in VM 2023-11-08 01:32:39 +08:00
lyon
7222f804ea clean old PikaStdDevice port 2023-11-07 19:25:07 +08:00
lyon
0a11a979b0 clean old porting package 2023-11-07 18:44:08 +08:00
lyon
9c39429200 use reallocn inner kernal 2023-11-04 23:40:23 +08:00
lyon
ae967604c8 add file for test 2023-11-04 00:23:40 +08:00
Lyon
661fbe2bc7 raise when a.b = xxx but a is not defined 2023-11-03 16:37:17 +08:00
李昂
181982e333
update tools/pika-patch-tool.py.
Signed-off-by: 李昂 <liang6516@outlook.com>
2023-11-01 06:47:56 +00:00
lyon
a0c16abe1f Merge branch 'master' of https://gitee.com/lyon1998/pikascript 2023-11-01 14:47:05 +08:00
lyon
5890efc763 fix os for v0.1.3 2023-11-01 14:46:34 +08:00
lyon
7cf37a8bdc fix os_path.c 2023-11-01 14:45:59 +08:00
Lyon
661f8191c4 release v1.13.0 v1.13.0 2023-11-01 11:15:49 +08:00
Lyon
f034821173 release pkgs 2023-11-01 11:14:05 +08:00
lyon
c7621827d9 support binder scan for subdir, fix for AC5 2023-10-31 23:45:53 +08:00
lyon
7e3679d72a sync cross 2023-10-31 22:53:40 +08:00
lyon
eb6f89ed0c Merge branch 'master' of https://gitee.com/lyon1998/pikascript 2023-10-31 22:40:01 +08:00
lyon
3ba403f9d5 fix from subsrc import module 2023-10-31 22:39:30 +08:00
Lyon
7b27d3169b clear STM32F1 and STM32F4 package ref 2023-10-31 19:33:19 +08:00
lyon
ff831cd9c7 redirect fixing 2023-10-31 15:35:18 +08:00
Lyon
01c906403e sync package 2023-10-30 19:01:10 +08:00
Lyon
b272e9faad add sg nobloking, add unittest exit_on_err 2023-10-30 18:57:14 +08:00
lyon
ae1b774e6b fix valgrind 2023-10-30 03:03:05 +08:00
lyon
4608bc8d28 fix cross-build 2023-10-30 02:05:15 +08:00
lyon
ebd5b01549 support from subdir import module 2023-10-30 01:30:10 +08:00
Lyon
1b4a0f126b
Merge pull request #332 from HelloDuoLA/master
增加BAS、HR的Profile,修改已知BUG
2023-10-29 20:39:07 +08:00
HelloDuoLA
d700abc52a
Merge branch 'pikasTech:master' into master 2023-10-29 16:11:48 +08:00
Xzc
45cb286857 增加BAS、HR的Profile, 修改一些bug 2023-10-29 16:09:30 +08:00
Lyon
d3a2ef5fab support import subsrc.mod 2023-10-27 22:18:38 +08:00
Lyon
8ab5aab04b format and sync 2023-10-26 21:37:00 +08:00
Lyon
f4b4e77a8d fatfs and os tested on STM32 2023-10-26 21:35:57 +08:00
Lyon
3ac4595153 Apply patches 2023-10-26 21:06:12 +08:00