[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[lwip-commits] [SCM] lwIP - A Lightweight TCPIP stack branch, master, up
From: |
Simon Goldschmidt |
Subject: |
[lwip-commits] [SCM] lwIP - A Lightweight TCPIP stack branch, master, updated. STABLE-2_2_0_RELEASE-76-ge799c266 |
Date: |
Mon, 19 Feb 2024 14:59:30 -0500 (EST) |
This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "lwIP - A Lightweight TCPIP stack".
The branch, master has been updated
via e799c266facc3c70190676eccad49d6c2db2caac (commit)
via cb511019b0c5532152173f646a8eef789822c535 (commit)
via 9004e7bd77cb58797445446c96f8a5e8b56b4c70 (commit)
via 17b1f5d382ba9bbd818563e8c22f6101bcdd2c8f (commit)
via 10dc9b7eb3d1710d2e6ca9f2e61c27eb7a1e8d75 (commit)
via c3d6fe9d722604f9cdcf28b975232fcde4175177 (commit)
from 93821fc437d7755b657499b4356e8c5454e62bf7 (commit)
Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.
- Log -----------------------------------------------------------------
commit e799c266facc3c70190676eccad49d6c2db2caac
Author: Krzysztof Mazur <krzmazur1@gmail.com>
Date: Sun Aug 14 12:03:50 2022 +0200
makefsdata: extend file type matching with .shtml and .shtm
[Problem]
When using makefsdata perl script to convert shtml files with SSI tags
the shtml files get generated with text/plain content type, making
browsers not render them correctly
[Solution]
Extend the regex to generate text/html content type for any of:
.htm, .html, .shtm, .shtml extensions
commit cb511019b0c5532152173f646a8eef789822c535
Author: Brian <89487381+b4yuan@users.noreply.github.com>
Date: Mon Nov 27 11:36:47 2023 -0500
Update codeql-buildscript.sh
Adding install dependencies step
commit 9004e7bd77cb58797445446c96f8a5e8b56b4c70
Author: Brian <bayuan@purdue.edu>
Date: Sun Oct 29 15:29:29 2023 -0400
Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis
This pull request introduces a CodeQL workflow to enhance the security
analysis of our repository. CodeQL is a powerful static analysis tool that
helps identify and mitigate security vulnerabilities in our codebase. By
integrating this workflow into our GitHub Actions, we can proactively identify
and address potential issues before they become security threats.
We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main
branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own
codebase.
Testing:
To validate the functionality of this workflow, we have run several test
scans on the codebase and reviewed the results. The workflow successfully
compiles the project, identifies issues, and provides actionable insights while
reducing noise by excluding certain queries and third-party code.
Deployment:
Once this pull request is merged, the CodeQL workflow will be active and
automatically run on every push and pull request to the main branch. To view
the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.
Additional Information:
- You can further customize the workflow to adapt to your specific needs by
modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to
the GitHub documentation and the CodeQL documentation
(https://codeql.github.com/ and https://codeql.github.com/docs/).
Signed-off-by: Brian <bayuan@purdue.edu>
commit 17b1f5d382ba9bbd818563e8c22f6101bcdd2c8f
Author: Brian <bayuan@purdue.edu>
Date: Fri Oct 20 01:03:46 2023 -0400
Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis
This pull request introduces a CodeQL workflow to enhance the security
analysis of our repository. CodeQL is a powerful static analysis tool that
helps identify and mitigate security vulnerabilities in our codebase. By
integrating this workflow into our GitHub Actions, we can proactively identify
and address potential issues before they become security threats.
We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main
branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own
codebase.
Testing:
To validate the functionality of this workflow, we have run several test
scans on the codebase and reviewed the results. The workflow successfully
compiles the project, identifies issues, and provides actionable insights while
reducing noise by excluding certain queries and third-party code.
Deployment:
Once this pull request is merged, the CodeQL workflow will be active and
automatically run on every push and pull request to the main branch. To view
the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.
Additional Information:
- You can further customize the workflow to adapt to your specific needs by
modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to
the GitHub documentation and the CodeQL documentation
(https://codeql.github.com/ and https://codeql.github.com/docs/).
Signed-off-by: Brian <bayuan@purdue.edu>
commit 10dc9b7eb3d1710d2e6ca9f2e61c27eb7a1e8d75
Author: Brian <bayuan@purdue.edu>
Date: Wed Oct 18 16:53:26 2023 -0400
Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis
This pull request introduces a CodeQL workflow to enhance the security
analysis of our repository. CodeQL is a powerful static analysis tool that
helps identify and mitigate security vulnerabilities in our codebase. By
integrating this workflow into our GitHub Actions, we can proactively identify
and address potential issues before they become security threats.
We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main
branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own
codebase.
Testing:
To validate the functionality of this workflow, we have run several test
scans on the codebase and reviewed the results. The workflow successfully
compiles the project, identifies issues, and provides actionable insights while
reducing noise by excluding certain queries and third-party code.
Deployment:
Once this pull request is merged, the CodeQL workflow will be active and
automatically run on every push and pull request to the main branch. To view
the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.
Additional Information:
- You can further customize the workflow to adapt to your specific needs by
modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to
the GitHub documentation and the CodeQL documentation
(https://codeql.github.com/ and https://codeql.github.com/docs/).
Signed-off-by: Brian <bayuan@purdue.edu>
commit c3d6fe9d722604f9cdcf28b975232fcde4175177
Author: Brian <bayuan@purdue.edu>
Date: Wed Oct 11 20:49:19 2023 -0400
Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis
This pull request introduces a CodeQL workflow to enhance the security
analysis of our repository. CodeQL is a powerful static analysis tool that
helps identify and mitigate security vulnerabilities in our codebase. By
integrating this workflow into our GitHub Actions, we can proactively identify
and address potential issues before they become security threats.
We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every push and pull request to the main branch.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for third-party code, focusing only on our own
codebase.
Testing:
To validate the functionality of this workflow, we have run several test
scans on the codebase and reviewed the results. The workflow successfully
compiles the project, identifies issues, and provides actionable insights while
reducing noise by excluding certain queries and third-party code.
Deployment:
Once this pull request is merged, the CodeQL workflow will be active and
automatically run on every push and pull request to the main branch. To view
the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.
Additional Information:
- You can further customize the workflow to adapt to your specific needs by
modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to
the GitHub documentation and the CodeQL documentation.
Signed-off-by: Brian <bayuan@purdue.edu>
-----------------------------------------------------------------------
Summary of changes:
.github/workflows/codeql-buildscript.sh | 6 ++
.github/workflows/codeql.yml | 126 ++++++++++++++++++++++++++++++++
.github/workflows/fail_on_error.py | 34 +++++++++
src/apps/http/makefsdata/makefsdata | 2 +-
4 files changed, 167 insertions(+), 1 deletion(-)
create mode 100644 .github/workflows/codeql-buildscript.sh
create mode 100644 .github/workflows/codeql.yml
create mode 100755 .github/workflows/fail_on_error.py
hooks/post-receive
--
lwIP - A Lightweight TCPIP stack
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- [lwip-commits] [SCM] lwIP - A Lightweight TCPIP stack branch, master, updated. STABLE-2_2_0_RELEASE-76-ge799c266,
Simon Goldschmidt <=