1
0
mirror of https://github.com/rafagafe/tiny-json.git synced 2025-03-15 04:15:30 +00:00
Commit Graph

85 Commits

Author SHA1 Message Date
Brian
1f0a277963 Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-20 01:14:53 -04:00
Brian
099b5e1ea6 Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-18 17:17:39 -04:00
Brian
2af9dbad9a Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every push and pull request to the main branch.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for third-party code, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation.

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-11 21:09:27 -04:00
Rafa García
025cdde5f2
Merge pull request from void256/master
fix typos and improve readability of the README.md
2021-06-18 22:42:25 +02:00
void256
6aa1f3bf5b fix typos and improve readability of the README.md 2021-06-09 00:12:46 +02:00
Rafa García
3d91fc49dc
Merge pull request from ibortolazzi/remove-atoll
Remove atoll and atof to avoid cert-c violations
2021-04-21 01:12:59 +02:00
Ignacio Bortolazzi
e27abb714a Remove atoll and atof to avoid cert-c violations 2021-03-02 19:37:16 +01:00
Rafa García
6eb4a6c072
Update README.md 2021-02-06 16:54:14 +01:00
Rafa García
08a32cacbd
Merge pull request from namazso/array
allow arrays be root objects
2021-02-03 11:20:09 +01:00
Rafa García
4f65c9598a
Merge pull request from namazso/doxygen-fixes
fix doxygen problems
2021-02-03 11:18:40 +01:00
Rafa García
4c00c836d5
Merge pull request from namazso/cpp-example
add a non-compiled c++ version of example 3
2021-02-03 11:17:13 +01:00
namazso
e84f6fc83c forgot this one 2020-12-01 23:28:29 +01:00
namazso
604df6d7ad add a non-compiled c++ version of example 2020-12-01 21:40:04 +01:00
namazso
985722a3c3 fix doxygen problems 2020-12-01 21:32:15 +01:00
namazso
46e9fb710e allow arrays be root objects 2020-12-01 21:31:24 +01:00
Rafa García
1c62646c71
Merge pull request from jesko42/fix_vs_warnings
Fix vs warnings
2020-04-17 23:03:00 +02:00
Jesko (Cetus)
4007925344 Merge branch 'fix_vs_warnings' of github.com:jesko42/tiny-json into fix_vs_warnings 2020-03-28 19:40:53 +01:00
Jesko (Cetus)
68f36c736f tiny-json.c(84): warning C4204: Nicht dem Standard entsprechende Erweiterung: Initialisierung für zusammengesetzten Typ ist keine Konstante
tiny-json.c(296): warning C4244: "Initialisierung": Konvertierung von "__int64" in "const unsigned int", möglicher Datenverlust
2020-03-28 19:39:54 +01:00
Jesko (Cetus)
72f015286d tiny-json.c(84): warning C4204: Nicht dem Standard entsprechende Erweiterung: Initialisierung für zusammengesetzten Typ ist keine Konstante
tiny-json.c(296): warning C4244: "Initialisierung": Konvertierung von "__int64" in "const unsigned int", möglicher Datenverlust
2020-03-28 19:35:44 +01:00
Rafa García
1fe46ee557
Merge pull request from AlamyLiu/fix_from_Alamy
Fix from alamy
2020-03-14 00:55:26 +01:00
Alamy Liu
bc67e17024 Fix ArmClang compiling error: isdigit()
Signed-off-by: Alamy Liu <alamy.liu@gmail.com>
2020-02-28 14:17:57 -08:00
Alamy Liu
6d3025be56 Allow escape/special character in string
Consider the case of PEM certificate.
This modification give it a chance to scan over those
escape characters. e.g.:
  '\t': 0x09
  '\n': 0x0A

Signed-off-by: Alamy Liu <alamy.liu@gmail.com>
2020-02-27 12:01:25 -08:00
Rafa García
fdb66f1037
Update FUNDING.yml 2020-02-01 23:52:38 +01:00
Rafa García
d88e5c8b5b
Create FUNDING.yml 2020-02-01 23:51:55 +01:00
Rafa García
c5bedcc136
Update README.md 2019-07-06 01:46:12 +02:00
rafagafe
58200fff5c folder refactor 2019-03-28 01:24:37 +01:00
Rafa García
93f3b61eb0
Merge pull request from jurgen178/jurgen178-patch-1
Jurgen178 patch 1
2018-12-28 22:54:18 +01:00
Jürgen Eidt
f59ab0a051
Update tiny-json.h
Replaced keyword in struct jsonPool_s to fix error in Visual Studio
2018-12-26 13:05:35 -08:00
Jürgen Eidt
1d599e855b
Update tiny-json.c
Replaced keyword in struct jsonPool_s to fix error in Visual Studio
2018-12-26 13:03:45 -08:00
Rafa García
34eb191ba0
Create CODE_OF_CONDUCT.md 2018-11-30 16:19:59 +01:00
rafagafe
8a225f7ac1 Workaround makefile 2018-11-17 01:21:12 +01:00
rafagafe
03ca43a55f Workaround makefile 2018-11-15 01:08:21 +01:00
rafagafe
a087bcabb5 Remove GNU extensions and some refactors are made. 2018-11-15 00:43:30 +01:00
Rafa García
2b1bdd791d
Merge pull request from themiron/master
Implement custom pool API
2018-11-12 12:50:48 +01:00
Vladislav Grishenko
b3804dcf50 Implement custom pool API
Now it's poosible to use any custom pool allocation, i.e
preallocated pools or dymamic allocation on fly.
2018-11-10 23:37:33 +05:00
rafagafe
9052ef2473 Use standard library. 2018-09-24 00:42:03 +02:00
rafagafe
6eb10abcb3
Update README.md 2018-09-19 00:44:55 +02:00
rafagafe
d03d55013f Merge branch 'master' of https://github.com/rafagafe/tiny-json 2018-09-01 01:25:18 +02:00
rafagafe
555eeeee15 Fix license date and refactor test. 2018-09-01 01:25:10 +02:00
rafagafe
2876ec9636
Add build status to readme file 2018-08-29 18:32:26 +02:00
rafagafe
4333bf4489 Set C99 compile flag 2018-08-29 18:24:34 +02:00
rafagafe
35a79f7d67 Add travis yml 2018-08-29 18:20:27 +02:00
rafagafe
e9026cf18e
Delete README-FIX.md 2018-08-29 17:57:36 +02:00
rafagafe
e9dff44aaa
Create license 2018-08-29 17:55:04 +02:00
rafagafe
22b6651a30 License banners workaround 2018-08-29 17:53:04 +02:00
rafagafe
65a8d22861 A unused function is removed. 2018-05-14 13:01:35 +02:00
rafagafe
af3ee3adfe The warning all flag is added. 2018-05-14 13:01:12 +02:00
rafagafe
dbb92f7c14
Merge pull request from PetersSharp/master
update warnings about differ in signedness
2018-05-14 12:55:49 +02:00
PetersSharp
dc69989b99
update warnings about differ in signedness
- tiny-json.c: In function 'parseString':
- tiny-json.c:124:13: warning: pointer targets in return differ in signedness [-Wpointer-sign]
- tiny-json.c:128:17: warning: pointer targets in passing argument 1 of 'getCharFromUnicode' differ in signedness [-Wpointer-sign]
- tiny-json.c:105:13: note: expected 'const char *' but argument is of type 'unsigned char *'
2018-05-14 02:32:02 +03:00
rafagafe
848cf48c08 Update read me file 2018-05-13 23:12:38 +02:00