Commit Graph

5743 Commits

Author SHA1 Message Date
Alex Fabijanic
73e191f185 chore: add missing header path, revert inadvertent db server address dev change 2023-11-02 22:29:27 +01:00
Alex Fabijanic
596bd0ef23 enh(Data): move SQLExecutor to a library in Poco::Data testsuite #4230 2023-11-02 22:27:17 +01:00
Alex Fabijanic
46728024f7 chore(CppUnit): fix comment 2023-11-02 22:13:23 +01:00
Alex Fabijanic
8b620e7476 enh(poco): std::string literals #4216 2023-11-02 22:12:23 +01:00
Günter Obiltschnig
743da564eb #4241: Poco::FileInputStream broken in 1.12.5 and 1.11.8. 2023-11-02 12:10:21 +01:00
Alex Fabijanic
4f0315aeb0 feat(Data::Statement): make statementsCount() Optional 230 2023-11-02 00:28:18 +01:00
Alex Fabijanic
afd9c8c408 feat(Data::Session): add 'sqlParse' feature #4230 2023-11-02 00:04:10 +01:00
Alex Fabijanic
79e54d88ba chore: fix local test run script 2023-11-01 19:21:20 +01:00
Alex Fabijanic
757fc32199 fix(build): add missing include path 2023-11-01 16:29:49 +01:00
Alex Fabijanic
3d9bcd9553 fix(build): add missing include path 2023-11-01 12:11:16 +01:00
Alex Fabijanic
dd514d599f fix(build): add missing include path 2023-11-01 11:53:15 +01:00
Aleksandar Fabijanic
b1e7b9ff3b fix(Data::SQLChannel): remove SQLChannel::close() parameter (hides virtual from parent) #4230 2023-11-01 11:26:29 +01:00
Aleksandar Fabijanic
8de0033591 fix(dev): prevent set environment vars accumulation over multiple runs 2023-11-01 11:23:27 +01:00
Alex Fabijanic
6dad8502d3 fix(Data):
* make bool Session::isTransaction() return Poco::Optional
* move parsing to Statement
* SQLParser make build
* other fixes and improvemets #4230
2023-11-01 00:25:46 +01:00
Friedrich Wilckens
512e63915b PostgreSQL: when connecting, free old bad connection if there is one. 2023-10-30 14:00:15 -07:00
Friedrich Wilckens
9fcc2fd54d PostgresSQL: make sure session is freed when disconnecting even if its status is not OK. 2023-10-30 13:50:45 -07:00
Friedrich Wilckens
0024f3621b PostgreSQL failed connection test: cleanup. 2023-10-30 13:28:09 -07:00
Friedrich Wilckens
148affed30 PostgreSQL: added test case for failed connection attempt. 2023-10-30 13:23:18 -07:00
Friedrich Wilckens
c7b6fa17be Poco::Data::PostGreSQL::SessionHandle: free _pConnection when connection attempt fails. 2023-10-29 13:53:11 -07:00
Aleksandar Fabijanic
e174be8660 feat(SQLParser): add POCO::Data::SQLParser #4230 2023-10-29 15:03:26 +01:00
Aleksandar Fabijanic
8c4b166737 fix(LinearHashTable): fix std::iterator deprecated warnings; test warnings #4235 2023-10-29 14:44:15 +01:00
Günter Obiltschnig
3da8ee633e
Merge pull request #4232 from IVOES/devel
Add CodeQL Workflow for Code Security Analysis
2023-10-28 08:18:59 +02:00
Alex Fabijanic
439acf1924 fix(Data): transactions are not handled properly #4230 2023-10-27 17:45:39 +02:00
Alex Fabijanic
efd9b2ca1d feat(Data::ODBC) add MARS support #4230 2023-10-27 16:01:33 +02:00
Alex Fabijanic
bd06526ee0 fix(Data::Session): Set autoCommit to false in Session #4167 #4143 2023-10-25 22:44:27 +02:00
Alex Fabijanic
e47b92d641 fix(PollSetTest): avoid looping #1320 2023-10-25 13:19:01 +02:00
Alex Fabijanic
b9e5446a6e add last fix to CHANGLEOG 2023-10-24 21:04:16 +02:00
cunj123
0d696eaf57 fix: make POSIX event thread safe 2023-10-24 21:00:58 +02:00
Alex Fabijanic
efd0878664 fix(build): Util samples Makefile 2023-10-24 21:00:33 +02:00
Alex Fabijanic
5e01472359 upgrade: double-conversion to 3.3.0 #4218 2023-10-24 21:00:20 +02:00
Alex Fabijanic
076958eb1a 1.12.5 ReleaseNotes 2023-10-24 21:00:08 +02:00
Aleksandar Fabijanic
68400efe83 update CHANGELOG date 2023-10-24 00:13:01 +02:00
Aleksandar Fabijanic
d15388cdc4 update CHANGELOG 2023-10-24 00:11:01 +02:00
Alex Fabijanic
cd12420495 fix(Foundation): use after free warnings #4189 2023-10-23 23:47:56 +02:00
Aleksandar Fabijanic
47ddacd004 fix(SocketReactor): Protect stop() and wakeUp() from reentrance #4217 2023-10-23 22:42:28 +02:00
Alex Fabijanic
c163237221 fix(Thread): Fix pthread_setname not declared #4210 2023-10-23 18:02:35 +02:00
Aleksandar Fabijanic
e40f07099d
fix(Net): Add Unix socket support on windows #4208 (#4209)
* fix(Net): Add Unix socket support on windows #4208

* feat(Net): add abstract local socket support #4208

* fix(PollSet): use localhost socket in PollSet on windows when available #4208

* fix(PollSetTest): comment checking unconnected sockets status (Linux epoll signals them as readable/writable)
2023-10-23 13:33:46 +02:00
Pavle Dragisic
c918c70e68
Fix pthread_setname not declared (#4210)
* Fix pthread_setname not declared #4063

* Fix include prctl.h for specific OS #4063

* Fix getThreadName for specific OS #4063

---------

Co-authored-by: root <root@debian-gnu-linux-11.localdomain>
Co-authored-by: Pavle <pavle@debian-gnu-linux-11.localdomain>
2023-10-23 08:17:51 +02:00
Aleksandar Fabijanic
5131fe1c15
fix(Poco::Data): fixes and improvements #4198 (#4199)
* fix(Poco::Data): fixes and improvements #4198

* chore: remove inadvertently commited garbage file

* fix(SQLite): SQLChannel tests #4198

* fix(Data::SessionPool): Improve Data::SessionPool thread safety #4206
2023-10-22 12:53:54 +02:00
Aleksandar Fabijanic
de04b9eac7 fix(ci): PollSetTest::testPollNoServer() #4205 2023-10-21 19:35:47 +02:00
Aleksandar Fabijanic
c0f7257ccd chore: eliminate some compile warnings 2023-10-21 19:15:57 +02:00
Aleksandar Fabijanic
d640c659a2 PollSet filters out some events #4194 2023-10-21 17:46:45 +02:00
Aleksandar Fabijanic
39e2da88d5 fix(ci): PollSetTest::testPollClosedServer() intermittently fails #4205 2023-10-21 17:44:26 +02:00
omerbrandis
3793c0a515
added new memeber SqlState to PostgreSQLException and made use of it. (#4099)
* added new memeber SqlState to PostgreSQLException and made use of it in StatementExecutor

* Added test case testSqlState

* fixed nameing convention errors. fixed bug in PostgreSQLException::PostgreSQLException regarding null termination of _sqlState data member
2023-10-20 17:44:04 +02:00
Matej Kenda
542b814f27
CMake: Use CMAKE_INSTALL_* variables from GNUInstallDirs to install libraries, binaries and other files according to GNUInstallDirs rules. (#4190) 2023-10-20 17:21:13 +02:00
Brian
11e72ca083 Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-20 01:02:05 -04:00
Andrey Masloboev
feee1650e4
fixed infinite loops (#4200)
- fixed infinite loops in config utils operation with broken streams
- added tests

Co-authored-by: Andrey Masloboev <amasloboev@topcon.com>
2023-10-19 13:26:44 +02:00
Brian
0931badc8b Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-18 16:49:28 -04:00
Aleksandar Fabijanic
701c8dae2d
Build and dev system improvements (#4193)
* fix shellcheck warnings; add some ci ignore test entries

* fix(make): Redirect build stderr to a file #4112

* enh(dev): add vscode run script and launch items for tests
2023-10-18 18:48:20 +02:00
Günter Obiltschnig
8a268d4413 #4195: Poco::File::created() on macOS should use birthtime 2023-10-18 08:01:07 +02:00