6112 Commits

Author SHA1 Message Date
Lyon
b0a856a7b9
Merge pull request #334 from GorgonMeducer/update-cmsis-pack
Update cmsis pack
2023-12-16 23:23:00 +08:00
Gabriel Wang
a89e6ac793 update cmsis-pack 2023-12-16 15:11:54 +00:00
lyon1998
a02ed0feb9 release kernal v1.13.1 2023-12-16 22:48:34 +08:00
lyon1998
911b86d218 support macro control for obj_newObj 2023-12-16 22:47:20 +08:00
Gabriel Wang
ce750ae5da Update clean.bat 2023-12-16 13:46:59 +00:00
Gabriel Wang
dc256effc1 update script and pdsc 2023-12-16 13:46:49 +00:00
Gabriel Wang
1a4bf78ce5 Update gen_pack.sh 2023-12-16 13:39:19 +00:00
Gabriel Wang
bf7f237878 Update PikaTech.PikaScript.xml 2023-12-16 13:36:43 +00:00
lyon1998
0a02e54ae0 update pdsc for v1.13.0 2023-12-16 21:24:05 +08:00
lyon1998
a6f9a6c893 fix FDB_config and fwrite size check 2023-12-07 23:30:54 +08:00
lyon1998
be098b033c fix flashdb test assert 2023-12-07 23:03:01 +08:00
lyon1998
3efc448859 rename FDB to KVDB 2023-12-07 22:22:42 +08:00
lyon1998
fc437ae518 fix kvdb on libc_file port 2023-12-07 18:53:30 +08:00
lyon1998
0b9ed2b8d1 fix libc read/write for flashdb 2023-12-07 01:45:29 +08:00
lyon1998
eea7dbd0fc fix mem lack, get_blob for default_kvs not work 2023-12-06 23:57:48 +08:00
lyon
c8b0ffb220 fix port for flashdb pkg 2023-12-06 23:16:31 +08:00
lyon
fc63ab8e6a fix getcwd on win32 2023-12-03 14:55:29 +08:00
Brian
fba5e0b8ae
Add CodeQL Workflow for Code Security Analysis (#331)
* Add CodeQL Workflow for Code Security Analysis

Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every push and pull request to the main branch.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for third-party code, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation.

Signed-off-by: Brian <bayuan@purdue.edu>

* Add CodeQL Workflow for Code Security Analysis

Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>

* Add CodeQL Workflow for Code Security Analysis

Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>

* Add CodeQL Workflow for Code Security Analysis

Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>

* Remove failing on error and clean up codeql.yml

---------

Signed-off-by: Brian <bayuan@purdue.edu>
2023-12-03 01:51:52 +08:00
lyon1998
429adcef77 fix file size align in pya (v7) 2023-12-03 01:49:05 +08:00
lyon
83aa2aa805 fix pikafs_fread 2023-12-01 01:33:54 +08:00
lyon
7e3c589c48 fix win32 2023-12-01 01:33:03 +08:00
lyon
a14baffbc4 patch for win32 2023-12-01 01:04:18 +08:00
Lyon
c9bcde45ec sync random and socket pkg 2023-11-27 16:19:26 +08:00
Lyon
3636317542 fix for socket and mqtt 2023-11-27 16:18:48 +08:00
lyon1998
df95c5bd2f fix pack_flose 2023-11-19 14:45:31 +08:00
lyon
399fd1d115 fix errno symbel on win32 2023-11-18 20:10:52 +08:00
lyon
16c91ede68 add test for packread 2023-11-18 19:47:27 +08:00
Lyon
ec8ddf1423 support invalid literal check for int() 2023-11-17 18:25:34 +08:00
lyon
9f1cf1320c fix link 2023-11-15 19:06:19 +08:00
lyon
7ea34f917a clear machine.pyi and replace with StdDevice 2023-11-10 23:22:31 +08:00
lyon
c3986f5f03 support mul for str/bytes/obj 2023-11-08 21:22:39 +08:00
lyon
4ca642c48b clear runbytecode for fn0 and fn1 2023-11-08 20:21:42 +08:00
lyon
51b3d49b5c add runMethod0/1 and use in VM 2023-11-08 01:32:39 +08:00
lyon
7222f804ea clean old PikaStdDevice port 2023-11-07 19:25:07 +08:00
lyon
0a11a979b0 clean old porting package 2023-11-07 18:44:08 +08:00
lyon
9c39429200 use reallocn inner kernal 2023-11-04 23:40:23 +08:00
lyon
ae967604c8 add file for test 2023-11-04 00:23:40 +08:00
Lyon
661fbe2bc7 raise when a.b = xxx but a is not defined 2023-11-03 16:37:17 +08:00
李昂
181982e333
update tools/pika-patch-tool.py.
Signed-off-by: 李昂 <liang6516@outlook.com>
2023-11-01 06:47:56 +00:00
lyon
a0c16abe1f Merge branch 'master' of https://gitee.com/lyon1998/pikascript 2023-11-01 14:47:05 +08:00
lyon
5890efc763 fix os for v0.1.3 2023-11-01 14:46:34 +08:00
lyon
7cf37a8bdc fix os_path.c 2023-11-01 14:45:59 +08:00
Lyon
661f8191c4 release v1.13.0 v1.13.0 2023-11-01 11:15:49 +08:00
Lyon
f034821173 release pkgs 2023-11-01 11:14:05 +08:00
lyon
c7621827d9 support binder scan for subdir, fix for AC5 2023-10-31 23:45:53 +08:00
lyon
7e3679d72a sync cross 2023-10-31 22:53:40 +08:00
lyon
eb6f89ed0c Merge branch 'master' of https://gitee.com/lyon1998/pikascript 2023-10-31 22:40:01 +08:00
lyon
3ba403f9d5 fix from subsrc import module 2023-10-31 22:39:30 +08:00
Lyon
7b27d3169b clear STM32F1 and STM32F4 package ref 2023-10-31 19:33:19 +08:00
lyon
ff831cd9c7 redirect fixing 2023-10-31 15:35:18 +08:00