70 Commits

Author SHA1 Message Date
Lyon
a261d614a4
fix TEST.yaml pkg install 2024-01-16 16:25:49 +08:00
Brian
fba5e0b8ae
Add CodeQL Workflow for Code Security Analysis (#331)
* Add CodeQL Workflow for Code Security Analysis

Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every push and pull request to the main branch.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for third-party code, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation.

Signed-off-by: Brian <bayuan@purdue.edu>

* Add CodeQL Workflow for Code Security Analysis

Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>

* Add CodeQL Workflow for Code Security Analysis

Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>

* Add CodeQL Workflow for Code Security Analysis

Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>

* Remove failing on error and clean up codeql.yml

---------

Signed-off-by: Brian <bayuan@purdue.edu>
2023-12-03 01:51:52 +08:00
Lyon
2d73ccc149 Update CI.yml 2023-09-17 11:14:11 +08:00
Lyon
d6ba156cf4 Update TEST.yml 2023-09-17 11:14:11 +08:00
Lyon
1f92b8135c using clang-tidy and add format.py to auto-format 2023-07-09 23:12:21 +08:00
lyon
65d1920469 try to fix codecov 2023-06-18 11:25:44 +08:00
Lyon
7c96f17c81 Update CI.yml 2023-05-24 01:04:56 +08:00
Renzhihan
6c8d7b9e29 add codecov in CI 2023-04-06 17:29:27 +08:00
lyon
87417b294a add libmbedtils-dev to docker and github CI 2022-11-18 19:13:43 +08:00
pikastech
a29fa66117 add upx to .github 2022-10-01 20:28:39 +08:00
pikastech
8cc5a5a844 install valgrind in CI, fix valgrind err in CV 2022-07-21 21:51:48 +08:00
pikastech
6ae8bf0c15 add valgrind to CI 2022-07-21 21:28:56 +08:00
李昂
b5da16e285 !29 add pika_lua package
* fix Dockerfile
* add liblua5.3 to package
* support pika_lua.evalLine()
* create pika_lua package
* install and include lua5.3
* add lua5.4 lib
2022-06-16 02:52:07 +00:00
lyon
80f2b172d1 add wine32 to docker 2022-05-04 23:56:38 +08:00
Lyon
55bf7fae59
Update CI.yml 2022-04-29 00:26:34 +08:00
Lyon
860dfcd99a
Update CI.yml 2022-04-15 15:02:32 +08:00
lyon1998
fd576e5b99 install ninja-build in CI 2022-04-08 11:26:38 +08:00
Lyon
f4b1b5fbd8
Update CI.yml 2022-03-24 17:53:51 +08:00
Lyon
52077c0d88
Update CI.yml 2022-03-24 17:49:35 +08:00
Lyon
8a20258c76
Update CI.yml 2022-03-24 17:42:46 +08:00
Lyon
c615a745a5
Update CI.yml 2022-03-24 17:34:22 +08:00
Lyon
b782994826
Update TEST.yml 2022-02-14 19:16:55 +08:00
Lyon
78d6f8a218
Update CI.yml 2022-02-14 19:16:09 +08:00
Lyon
7d5d934f89
Update CI.yml 2022-02-14 19:15:10 +08:00
Lyon
1dbf662667
Update TEST.yml 2022-02-14 19:13:37 +08:00
Lyon
d07d4ad391 Update CI.yml 2022-02-11 07:01:23 +08:00
Lyon
a13a43953d Update CI.yml 2022-02-11 07:01:23 +08:00
Lyon
709657b313 Update CI.yml 2022-02-11 07:01:23 +08:00
Lyon
ba5b61b024 test filter.py 2022-02-11 07:01:23 +08:00
Lyon
b57c3b6351
Update TEST.yml 2022-01-06 23:13:17 +08:00
Lyon
6eb39fcbd3
Create TEST.yml 2022-01-06 23:11:47 +08:00
Lyon
8dde296cf5
Update CI.yml 2022-01-06 23:10:12 +08:00
Lyon
ec67894bab
Update CI.yml 2022-01-05 10:30:01 +08:00
Lyon
1501e7ccf4
Update CI.yml 2022-01-04 09:10:59 +08:00
Lyon
29fae00549
Update CI.yml 2022-01-04 02:13:42 +08:00
Lyon
1c7120d4fb
Update CI.yml 2022-01-04 01:55:59 +08:00
Lyon
6e2db3750e
Update CI.yml 2022-01-04 01:06:35 +08:00
Lyon
d0f5d75298
Update CI.yml 2022-01-04 01:02:29 +08:00
Lyon
a057b128ac
Update CI.yml 2022-01-04 00:56:04 +08:00
Lyon
8533517317
Update CI.yml 2022-01-04 00:39:30 +08:00
Lyon
5067d81c08
Update CI.yml 2021-12-12 18:26:50 +08:00
Lyon
57a58c2536
Update CI.yml 2021-12-11 19:06:30 +08:00
Lyon
3bab3be572
Update CI.yml 2021-11-24 11:10:16 +08:00
Lyon
58338191d6
Update CI.yml 2021-11-06 19:44:22 +08:00
lyon1998
faed5a9ff6 change test.sh to gtest.sh 2021-10-17 18:27:46 +08:00
Lyon
3261a847fd
Update CI.yml 2021-10-10 12:17:54 +08:00
Lyon
464d63ed36
Rename cmake.yml to CI.yml 2021-10-10 12:16:29 +08:00
Lyon
7067daf986
Update cmake.yml 2021-10-09 10:39:02 +08:00
Lyon
862f6f4527
Update cmake.yml 2021-10-09 10:13:47 +08:00
Lyon
0618604caf
add ci for g07 2021-10-09 10:12:41 +08:00