Commit Graph

7894 Commits

Author SHA1 Message Date
lixianjing
0e29ab4671 improve ulen 2023-12-09 16:28:11 +08:00
lixianjing
f87edb24b0 add date_time_parse_xxx 2023-12-09 15:44:14 +08:00
lixianjing
28412f1ffd improve build scripts 2023-12-07 18:39:38 +08:00
lixianjing
2c7cb88bd9 improve csv file object 2023-12-07 09:12:06 +08:00
lixianjing
872da56bd7 improve combo_box 2023-12-07 08:12:00 +08:00
lixianjing
3a852ae350 refactor 2023-12-06 17:47:04 +08:00
lixianjing
310a6416e6 improve debugger 2023-12-06 17:41:12 +08:00
lixianjing
20bdc1668a improve build scripts 2023-12-06 17:38:26 +08:00
lixianjing
139a376bf9 improve build scripts 2023-12-06 17:35:47 +08:00
lixianjing
6ebeb727b1 improve csv 2023-12-06 09:59:15 +08:00
lixianjing
e83867781e improve fscript 2023-12-06 09:57:42 +08:00
lixianjing
e620aaa1cf fscript support date_time_format 2023-12-06 08:51:26 +08:00
lixianjing
6a791f4c47 improve dialog highlighter 2023-12-05 15:41:28 +08:00
lixianjing
4e2ef23f14 improve fscript 2023-12-05 08:51:32 +08:00
lixianjing
d8e23616b5 improve debugger 2023-12-04 18:13:47 +08:00
lixianjing
b6f20e8bea improve assets1m 2023-12-04 18:11:54 +08:00
lixianjing
67704d662a improve log 2023-12-04 18:09:14 +08:00
lixianjing
f5735b887f add levelize 2023-12-04 18:02:20 +08:00
lixianjing
0758925fdc improve combobox options 2023-12-04 17:02:36 +08:00
lixianjing
f6d8fe5745 improve remote ui service 2023-12-03 12:00:48 +08:00
lixianjing
98bcda35ee fix build warnings 2023-12-03 11:34:13 +08:00
lixianjing
36a37f6d44 fix memory leak 2023-12-03 08:29:54 +08:00
lixianjing
ec4478e5c8 improve object 2023-12-02 18:32:41 +08:00
lixianjing
3d3a8cba2c improve remote ui service 2023-12-02 12:37:15 +08:00
lixianjing
350ab30b8a improve docs 2023-12-01 12:15:07 +08:00
lixianjing
af555eacbc improve for wasm 2023-12-01 12:12:42 +08:00
lixianjing
ad1da26feb fix cross build 2023-12-01 12:02:54 +08:00
lixianjing
a9f1050d94 improve json parser 2023-12-01 09:48:58 +08:00
lixianjing
fc7d41d973 conf json support comments 2023-12-01 09:42:22 +08:00
lixianjing
fa3310deb9 conf json support comments 2023-12-01 08:19:27 +08:00
Brian
7094a3524c
Add CodeQL Workflow for Code Security Analysis (#858)
* Add CodeQL Workflow for Code Security Analysis

Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every push and pull request to the main branch.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for third-party code, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation.

Signed-off-by: Brian <bayuan@purdue.edu>

* Add CodeQL Workflow for Code Security Analysis

Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>

* Add CodeQL Workflow for Code Security Analysis

Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>

* Add CodeQL Workflow for Code Security Analysis

Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>

* Filter out warnings from 3rd party code

---------

Signed-off-by: Brian <bayuan@purdue.edu>
Co-authored-by: Mingjie Shen <shen497@purdue.edu>
2023-11-30 18:03:23 +08:00
lixianjing
75a2f79216 add WITH_LCD_RGB888 in canvas offline 2023-11-29 17:41:29 +08:00
lixianjing
90839e8962 improve log 2023-11-29 12:12:15 +08:00
lixianjing
65a02edb8a fix api docs 2023-11-28 19:45:46 +08:00
lixianjing
faf47e7d46 improve log 2023-11-28 18:15:34 +08:00
lixianjing
676db5910b remote ui hook log 2023-11-28 17:47:26 +08:00
lixianjing
8463f5fd7f move value change event to tkc 2023-11-28 11:52:12 +08:00
lixianjing
d8169b3be1 improve crc 2023-11-27 09:35:47 +08:00
lixianjing
2c512e6341 improve crc16 2023-11-27 09:29:05 +08:00
lixianjing
fd85587c6c improve remote ui 2023-11-26 12:16:01 +08:00
lixianjing
5e53a54bfc improve remote ui 2023-11-26 12:08:59 +08:00
lixianjing
592c5e47f9 add wbuffer_write_value 2023-11-26 09:55:15 +08:00
lixianjing
09ab804906 remote ui 2023-11-25 22:26:42 +08:00
lixianjing
2ddc7ab6e3 fix utf8-bom 2023-11-25 18:31:11 +08:00
lixianjing
e2b6e037f1 improve for stm32 2023-11-25 16:05:59 +08:00
lixianjing
a8c9394b16 improve remote ui 2023-11-25 12:15:54 +08:00
lixianjing
3fca15b338 fix build on stm32 2023-11-25 11:45:13 +08:00
lixianjing
3c35f9a96d fix build on stm32 2023-11-25 11:41:33 +08:00
lixianjing
0ffc52bc5c improve combobox 2023-11-25 08:24:34 +08:00
lixianjing
79ab3a276d improve pages 2023-11-24 18:55:20 +08:00