lwip-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[lwip-commits] [SCM] lwIP - A Lightweight TCPIP stack branch, master, up


From: Simon Goldschmidt
Subject: [lwip-commits] [SCM] lwIP - A Lightweight TCPIP stack branch, master, updated. STABLE-2_2_0_RELEASE-76-ge799c266
Date: Mon, 19 Feb 2024 14:59:30 -0500 (EST)

This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "lwIP - A Lightweight TCPIP stack".

The branch, master has been updated
       via  e799c266facc3c70190676eccad49d6c2db2caac (commit)
       via  cb511019b0c5532152173f646a8eef789822c535 (commit)
       via  9004e7bd77cb58797445446c96f8a5e8b56b4c70 (commit)
       via  17b1f5d382ba9bbd818563e8c22f6101bcdd2c8f (commit)
       via  10dc9b7eb3d1710d2e6ca9f2e61c27eb7a1e8d75 (commit)
       via  c3d6fe9d722604f9cdcf28b975232fcde4175177 (commit)
      from  93821fc437d7755b657499b4356e8c5454e62bf7 (commit)

Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.

- Log -----------------------------------------------------------------
commit e799c266facc3c70190676eccad49d6c2db2caac
Author: Krzysztof Mazur <krzmazur1@gmail.com>
Date:   Sun Aug 14 12:03:50 2022 +0200

    makefsdata: extend file type matching with .shtml and .shtm
    
    [Problem]
    When using makefsdata perl script to convert shtml files with SSI tags
    the shtml files get generated with text/plain content type, making
    browsers not render them correctly
    
    [Solution]
    Extend the regex to generate text/html content type for any of:
    .htm, .html, .shtm, .shtml extensions

commit cb511019b0c5532152173f646a8eef789822c535
Author: Brian <89487381+b4yuan@users.noreply.github.com>
Date:   Mon Nov 27 11:36:47 2023 -0500

    Update codeql-buildscript.sh
    
    Adding install dependencies step

commit 9004e7bd77cb58797445446c96f8a5e8b56b4c70
Author: Brian <bayuan@purdue.edu>
Date:   Sun Oct 29 15:29:29 2023 -0400

    Add CodeQL Workflow for Code Security Analysis
    
    Add CodeQL Workflow for Code Security Analysis
    
    This pull request introduces a CodeQL workflow to enhance the security 
analysis of our repository. CodeQL is a powerful static analysis tool that 
helps identify and mitigate security vulnerabilities in our codebase. By 
integrating this workflow into our GitHub Actions, we can proactively identify 
and address potential issues before they become security threats.
    
    We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
    - Runs on every pull request (functionality to run on every push to main 
branches is included as a comment for convenience).
    - Runs daily.
    - Excludes queries with a high false positive rate or low-severity findings.
    - Does not display results for git submodules, focusing only on our own 
codebase.
    
    Testing:
    To validate the functionality of this workflow, we have run several test 
scans on the codebase and reviewed the results. The workflow successfully 
compiles the project, identifies issues, and provides actionable insights while 
reducing noise by excluding certain queries and third-party code.
    
    Deployment:
    Once this pull request is merged, the CodeQL workflow will be active and 
automatically run on every push and pull request to the main branch. To view 
the results of these code scans, please follow these steps:
    1. Under the repository name, click on the Security tab.
    2. In the left sidebar, click Code scanning alerts.
    
    Additional Information:
    - You can further customize the workflow to adapt to your specific needs by 
modifying the workflow file.
    - For more information on CodeQL and how to interpret its results, refer to 
the GitHub documentation and the CodeQL documentation 
(https://codeql.github.com/ and https://codeql.github.com/docs/).
    
    Signed-off-by: Brian <bayuan@purdue.edu>

commit 17b1f5d382ba9bbd818563e8c22f6101bcdd2c8f
Author: Brian <bayuan@purdue.edu>
Date:   Fri Oct 20 01:03:46 2023 -0400

    Add CodeQL Workflow for Code Security Analysis
    
    Add CodeQL Workflow for Code Security Analysis
    
    This pull request introduces a CodeQL workflow to enhance the security 
analysis of our repository. CodeQL is a powerful static analysis tool that 
helps identify and mitigate security vulnerabilities in our codebase. By 
integrating this workflow into our GitHub Actions, we can proactively identify 
and address potential issues before they become security threats.
    
    We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
    - Runs on every pull request (functionality to run on every push to main 
branches is included as a comment for convenience).
    - Runs daily.
    - Excludes queries with a high false positive rate or low-severity findings.
    - Does not display results for git submodules, focusing only on our own 
codebase.
    
    Testing:
    To validate the functionality of this workflow, we have run several test 
scans on the codebase and reviewed the results. The workflow successfully 
compiles the project, identifies issues, and provides actionable insights while 
reducing noise by excluding certain queries and third-party code.
    
    Deployment:
    Once this pull request is merged, the CodeQL workflow will be active and 
automatically run on every push and pull request to the main branch. To view 
the results of these code scans, please follow these steps:
    1. Under the repository name, click on the Security tab.
    2. In the left sidebar, click Code scanning alerts.
    
    Additional Information:
    - You can further customize the workflow to adapt to your specific needs by 
modifying the workflow file.
    - For more information on CodeQL and how to interpret its results, refer to 
the GitHub documentation and the CodeQL documentation 
(https://codeql.github.com/ and https://codeql.github.com/docs/).
    
    Signed-off-by: Brian <bayuan@purdue.edu>

commit 10dc9b7eb3d1710d2e6ca9f2e61c27eb7a1e8d75
Author: Brian <bayuan@purdue.edu>
Date:   Wed Oct 18 16:53:26 2023 -0400

    Add CodeQL Workflow for Code Security Analysis
    
    Add CodeQL Workflow for Code Security Analysis
    
    This pull request introduces a CodeQL workflow to enhance the security 
analysis of our repository. CodeQL is a powerful static analysis tool that 
helps identify and mitigate security vulnerabilities in our codebase. By 
integrating this workflow into our GitHub Actions, we can proactively identify 
and address potential issues before they become security threats.
    
    We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
    - Runs on every pull request (functionality to run on every push to main 
branches is included as a comment for convenience).
    - Runs daily.
    - Excludes queries with a high false positive rate or low-severity findings.
    - Does not display results for git submodules, focusing only on our own 
codebase.
    
    Testing:
    To validate the functionality of this workflow, we have run several test 
scans on the codebase and reviewed the results. The workflow successfully 
compiles the project, identifies issues, and provides actionable insights while 
reducing noise by excluding certain queries and third-party code.
    
    Deployment:
    Once this pull request is merged, the CodeQL workflow will be active and 
automatically run on every push and pull request to the main branch. To view 
the results of these code scans, please follow these steps:
    1. Under the repository name, click on the Security tab.
    2. In the left sidebar, click Code scanning alerts.
    
    Additional Information:
    - You can further customize the workflow to adapt to your specific needs by 
modifying the workflow file.
    - For more information on CodeQL and how to interpret its results, refer to 
the GitHub documentation and the CodeQL documentation 
(https://codeql.github.com/ and https://codeql.github.com/docs/).
    
    Signed-off-by: Brian <bayuan@purdue.edu>

commit c3d6fe9d722604f9cdcf28b975232fcde4175177
Author: Brian <bayuan@purdue.edu>
Date:   Wed Oct 11 20:49:19 2023 -0400

    Add CodeQL Workflow for Code Security Analysis
    
    Add CodeQL Workflow for Code Security Analysis
    
    This pull request introduces a CodeQL workflow to enhance the security 
analysis of our repository. CodeQL is a powerful static analysis tool that 
helps identify and mitigate security vulnerabilities in our codebase. By 
integrating this workflow into our GitHub Actions, we can proactively identify 
and address potential issues before they become security threats.
    
    We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
    - Runs on every push and pull request to the main branch.
    - Excludes queries with a high false positive rate or low-severity findings.
    - Does not display results for third-party code, focusing only on our own 
codebase.
    
    Testing:
    To validate the functionality of this workflow, we have run several test 
scans on the codebase and reviewed the results. The workflow successfully 
compiles the project, identifies issues, and provides actionable insights while 
reducing noise by excluding certain queries and third-party code.
    
    Deployment:
    Once this pull request is merged, the CodeQL workflow will be active and 
automatically run on every push and pull request to the main branch. To view 
the results of these code scans, please follow these steps:
    1. Under the repository name, click on the Security tab.
    2. In the left sidebar, click Code scanning alerts.
    
    Additional Information:
    - You can further customize the workflow to adapt to your specific needs by 
modifying the workflow file.
    - For more information on CodeQL and how to interpret its results, refer to 
the GitHub documentation and the CodeQL documentation.
    
    Signed-off-by: Brian <bayuan@purdue.edu>

-----------------------------------------------------------------------

Summary of changes:
 .github/workflows/codeql-buildscript.sh |   6 ++
 .github/workflows/codeql.yml            | 126 ++++++++++++++++++++++++++++++++
 .github/workflows/fail_on_error.py      |  34 +++++++++
 src/apps/http/makefsdata/makefsdata     |   2 +-
 4 files changed, 167 insertions(+), 1 deletion(-)
 create mode 100644 .github/workflows/codeql-buildscript.sh
 create mode 100644 .github/workflows/codeql.yml
 create mode 100755 .github/workflows/fail_on_error.py


hooks/post-receive
-- 
lwIP - A Lightweight TCPIP stack



reply via email to

[Prev in Thread] Current Thread [Next in Thread]