Commit Graph

5525 Commits

Author SHA1 Message Date
Friedrich Wilckens
512e63915b PostgreSQL: when connecting, free old bad connection if there is one. 2023-10-30 14:00:15 -07:00
Friedrich Wilckens
9fcc2fd54d PostgresSQL: make sure session is freed when disconnecting even if its status is not OK. 2023-10-30 13:50:45 -07:00
Friedrich Wilckens
0024f3621b PostgreSQL failed connection test: cleanup. 2023-10-30 13:28:09 -07:00
Friedrich Wilckens
148affed30 PostgreSQL: added test case for failed connection attempt. 2023-10-30 13:23:18 -07:00
Friedrich Wilckens
c7b6fa17be Poco::Data::PostGreSQL::SessionHandle: free _pConnection when connection attempt fails. 2023-10-29 13:53:11 -07:00
Günter Obiltschnig
3da8ee633e
Merge pull request #4232 from IVOES/devel
Add CodeQL Workflow for Code Security Analysis
2023-10-28 08:18:59 +02:00
Alex Fabijanic
bd06526ee0 fix(Data::Session): Set autoCommit to false in Session #4167 #4143 2023-10-25 22:44:27 +02:00
Alex Fabijanic
e47b92d641 fix(PollSetTest): avoid looping #1320 2023-10-25 13:19:01 +02:00
Alex Fabijanic
b9e5446a6e add last fix to CHANGLEOG 2023-10-24 21:04:16 +02:00
cunj123
0d696eaf57 fix: make POSIX event thread safe 2023-10-24 21:00:58 +02:00
Alex Fabijanic
efd0878664 fix(build): Util samples Makefile 2023-10-24 21:00:33 +02:00
Alex Fabijanic
5e01472359 upgrade: double-conversion to 3.3.0 #4218 2023-10-24 21:00:20 +02:00
Alex Fabijanic
076958eb1a 1.12.5 ReleaseNotes 2023-10-24 21:00:08 +02:00
Aleksandar Fabijanic
68400efe83 update CHANGELOG date 2023-10-24 00:13:01 +02:00
Aleksandar Fabijanic
d15388cdc4 update CHANGELOG 2023-10-24 00:11:01 +02:00
Alex Fabijanic
cd12420495 fix(Foundation): use after free warnings #4189 2023-10-23 23:47:56 +02:00
Aleksandar Fabijanic
47ddacd004 fix(SocketReactor): Protect stop() and wakeUp() from reentrance #4217 2023-10-23 22:42:28 +02:00
Alex Fabijanic
c163237221 fix(Thread): Fix pthread_setname not declared #4210 2023-10-23 18:02:35 +02:00
Aleksandar Fabijanic
e40f07099d
fix(Net): Add Unix socket support on windows #4208 (#4209)
* fix(Net): Add Unix socket support on windows #4208

* feat(Net): add abstract local socket support #4208

* fix(PollSet): use localhost socket in PollSet on windows when available #4208

* fix(PollSetTest): comment checking unconnected sockets status (Linux epoll signals them as readable/writable)
2023-10-23 13:33:46 +02:00
Pavle Dragisic
c918c70e68
Fix pthread_setname not declared (#4210)
* Fix pthread_setname not declared #4063

* Fix include prctl.h for specific OS #4063

* Fix getThreadName for specific OS #4063

---------

Co-authored-by: root <root@debian-gnu-linux-11.localdomain>
Co-authored-by: Pavle <pavle@debian-gnu-linux-11.localdomain>
2023-10-23 08:17:51 +02:00
Aleksandar Fabijanic
5131fe1c15
fix(Poco::Data): fixes and improvements #4198 (#4199)
* fix(Poco::Data): fixes and improvements #4198

* chore: remove inadvertently commited garbage file

* fix(SQLite): SQLChannel tests #4198

* fix(Data::SessionPool): Improve Data::SessionPool thread safety #4206
2023-10-22 12:53:54 +02:00
Aleksandar Fabijanic
de04b9eac7 fix(ci): PollSetTest::testPollNoServer() #4205 2023-10-21 19:35:47 +02:00
Aleksandar Fabijanic
c0f7257ccd chore: eliminate some compile warnings 2023-10-21 19:15:57 +02:00
Aleksandar Fabijanic
d640c659a2 PollSet filters out some events #4194 2023-10-21 17:46:45 +02:00
Aleksandar Fabijanic
39e2da88d5 fix(ci): PollSetTest::testPollClosedServer() intermittently fails #4205 2023-10-21 17:44:26 +02:00
omerbrandis
3793c0a515
added new memeber SqlState to PostgreSQLException and made use of it. (#4099)
* added new memeber SqlState to PostgreSQLException and made use of it in StatementExecutor

* Added test case testSqlState

* fixed nameing convention errors. fixed bug in PostgreSQLException::PostgreSQLException regarding null termination of _sqlState data member
2023-10-20 17:44:04 +02:00
Matej Kenda
542b814f27
CMake: Use CMAKE_INSTALL_* variables from GNUInstallDirs to install libraries, binaries and other files according to GNUInstallDirs rules. (#4190) 2023-10-20 17:21:13 +02:00
Brian
11e72ca083 Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-20 01:02:05 -04:00
Andrey Masloboev
feee1650e4
fixed infinite loops (#4200)
- fixed infinite loops in config utils operation with broken streams
- added tests

Co-authored-by: Andrey Masloboev <amasloboev@topcon.com>
2023-10-19 13:26:44 +02:00
Brian
0931badc8b Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-18 16:49:28 -04:00
Aleksandar Fabijanic
701c8dae2d
Build and dev system improvements (#4193)
* fix shellcheck warnings; add some ci ignore test entries

* fix(make): Redirect build stderr to a file #4112

* enh(dev): add vscode run script and launch items for tests
2023-10-18 18:48:20 +02:00
Günter Obiltschnig
8a268d4413 #4195: Poco::File::created() on macOS should use birthtime 2023-10-18 08:01:07 +02:00
Alex Fabijanic
69fd22c4e0 fix a couple of g++ warnings 2023-10-16 22:05:33 +02:00
Alex Fabijanic
1e0fbb8657 fix(Crypto::EvpPKey): separate bignums and free them after parameter build 2023-10-16 20:21:25 +02:00
Alex Fabijanic
cdd783a9f0 fix(FileChannel): setRotation overflow #3786 2023-10-16 17:59:09 +02:00
Alex Fabijanic
83a928967d fix(Crypto::EVPPKey): leak 2023-10-16 17:46:02 +02:00
Alex Fabijanic
92b3bb5455 fix(Crypto): some ASAN errors (still probem with bignum alloc) 2023-10-16 15:28:56 +02:00
Alex Fabijanic
a16950aee3 fix(make): make clean and distclean should not trigger dependencies creation #4129 2023-10-16 12:28:19 +02:00
Alex Fabijanic
5fd6a45ea7 fix(MD*Engine) g++ array-bounds warning 2023-10-16 12:12:10 +02:00
Aleksandar Fabijanic
22379ff9c1 fix: MongoDB deleted copy constructor #4187 2023-10-16 00:47:42 +02:00
Aleksandar Fabijanic
5e1904b5f8 fix: Sync 1.11.-1.12-devel(1.13) #4187 2023-10-16 00:16:06 +02:00
Aleksandar Fabijanic
5103d46e9e chore(build): add missing distclean 2023-10-15 17:56:48 +02:00
Günter Obiltschnig
53b57c36eb fix sending trailer: HTTPOutputStream actually shuts down socket, so final \r\n would not be sent. May be related to #4180 2023-10-15 11:20:47 +02:00
Günter Obiltschnig
6385a3c86e UDPHandler: don't use SpinlockMutex, due to poor performance on single-core systems; make Mutex class a template param instead 2023-10-15 10:19:00 +02:00
Günter Obiltschnig
06a03d1ada Poco::TemporaryFile: fix possible naming collisions due to random zero increment 2023-10-14 11:35:43 +02:00
Günter Obiltschnig
ed43543113 #4184: Poco::TemporaryFile: make filenames less predictable 2023-10-13 14:31:01 +02:00
Günter Obiltschnig
9248d4195f updated changelog 2023-10-12 12:21:33 +02:00
Günter Obiltschnig
33d5d9c083 #4182: Util: Make load()/save()/clear() operations on configurations thread-safe 2023-10-12 10:38:41 +02:00
Brian
a8885296df Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every push and pull request to the main branch.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for third-party code, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation.

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-11 19:52:29 -04:00
Günter Obiltschnig
cb58e09304 #4177: Upgrade bundled pcre2 to 10.42 2023-10-07 09:22:47 +02:00