Skip to content

Commit 741599f

Browse files
committed
Merge branch 'develop_2' into feature/1979-add-date-function-aliases-to-parser-extended
# Conflicts: # src/alasqlparser.jison # src/alasqlparser.js
2 parents dced7b1 + 0e5e387 commit 741599f

File tree

18 files changed

+1277
-734
lines changed

18 files changed

+1277
-734
lines changed

.github/dependabot.yml

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
version: 2
2+
updates:
3+
- package-ecosystem: github-actions
4+
directory: /
5+
schedule:
6+
interval: weekly
7+
8+
- package-ecosystem: npm
9+
directory: /
10+
schedule:
11+
interval: weekly
Lines changed: 51 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,63 +1,97 @@
1-
name: 'CICD pipeline'
1+
name: 'CI build & test'
22

33
on:
44
push:
55
branches: '*'
66
pull_request:
77
branches: '*'
88

9+
permissions: read-all
10+
911
jobs:
1012
Build:
11-
runs-on: ubuntu-latest
13+
permissions:
14+
contents: write
15+
runs-on: blacksmith-4vcpu-ubuntu-2204
1216
steps:
13-
- uses: actions/checkout@v4
14-
- name: Bulid from src
15-
uses: actions/setup-node@v4
17+
- name: Harden Runner
18+
uses: step-security/harden-runner@c95a14d0e5bab51a9f56296a4eb0e416910cd350 # v2.10.3
1619
with:
17-
node-version: '20.x'
20+
egress-policy: audit
21+
22+
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
23+
24+
- name: Build from src
25+
uses: useblacksmith/setup-node@65c6ca86fdeb0ab3d85e78f57e4f6a7e4780b391 # v5.0.4
26+
with:
27+
node-version: '22.x'
28+
1829
- run: yarn install --frozen-lockfile
1930
- run: yarn build-only
20-
- uses: actions/upload-artifact@master
31+
32+
- uses: actions/upload-artifact@65c4c4a1ddee5b72f698fdd19549f0f0fb45cf08 # v4.6.0
2133
with:
2234
name: dist
2335
path: dist/
36+
2437
- run: tar -cvf node_modules.tar node_modules
25-
- uses: actions/upload-artifact@master
38+
39+
- uses: actions/upload-artifact@65c4c4a1ddee5b72f698fdd19549f0f0fb45cf08 # v4.6.0
2640
with:
2741
name: node_modules
2842
path: node_modules.tar
2943

3044
test_node:
45+
permissions:
46+
contents: read
3147
needs: Build
32-
runs-on: ubuntu-latest
48+
runs-on: blacksmith-4vcpu-ubuntu-2204
3349
strategy:
3450
matrix:
35-
node-version: [15.x, 16.x, 17.x, 18.x, 19.x, latest]
51+
node-version: [16.x, 18.x, 20.x, 22.x, 23.x, latest]
3652
steps:
37-
- uses: actions/checkout@v4
53+
- name: Harden Runner
54+
uses: step-security/harden-runner@c95a14d0e5bab51a9f56296a4eb0e416910cd350 # v2.10.3
55+
with:
56+
egress-policy: audit
57+
58+
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
59+
3860
- name: Run prod version with Node v${{ matrix.node-version }}
39-
uses: actions/setup-node@v4
61+
uses: useblacksmith/setup-node@65c6ca86fdeb0ab3d85e78f57e4f6a7e4780b391 # v5.0.4
4062
with:
4163
node-version: ${{ matrix.node-version }}
42-
- uses: actions/download-artifact@master
64+
65+
- uses: actions/download-artifact@7fba95161a0924506ed1ae69cdbae8371ee00b3f # master
4366
with:
4467
name: dist
4568
path: dist/
46-
- uses: actions/download-artifact@master
69+
70+
- uses: actions/download-artifact@7fba95161a0924506ed1ae69cdbae8371ee00b3f # master
4771
with:
4872
name: node_modules
4973
path: ./
74+
5075
- run: tar -xvf node_modules.tar
5176
- run: yarn test-only
5277

5378
test_browser:
79+
permissions:
80+
contents: read
5481
needs: Build
55-
runs-on: ubuntu-latest
82+
runs-on: blacksmith-4vcpu-ubuntu-2204
5683
steps:
57-
- uses: actions/checkout@v4
58-
- uses: actions/download-artifact@master
84+
- name: Harden Runner
85+
uses: step-security/harden-runner@c95a14d0e5bab51a9f56296a4eb0e416910cd350 # v2.10.3
86+
with:
87+
egress-policy: audit
88+
89+
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
90+
91+
- uses: actions/download-artifact@7fba95161a0924506ed1ae69cdbae8371ee00b3f # master
5992
with:
6093
name: dist
6194
path: dist/
95+
6296
- run: echo '::warning ::Not able to automate browser tests yet'
6397
- run: '# yarn test-browser-ci'

.github/workflows/codeql.yml

Lines changed: 28 additions & 61 deletions
Original file line numberDiff line numberDiff line change
@@ -1,34 +1,20 @@
1-
# For most projects, this workflow file will not need changing; you simply need
2-
# to commit it to your repository.
3-
#
4-
# You may wish to alter this file to override the set of languages analyzed,
5-
# or to provide custom queries or build logic.
6-
#
7-
# ******** NOTE ********
8-
# We have attempted to detect the languages in your repository. Please check
9-
# the `language` matrix defined below to confirm you have the correct set of
10-
# supported CodeQL languages.
11-
#
12-
name: "CodeQL"
1+
name: 'CodeQL'
132

143
on:
154
push:
16-
branches: [ "develop" ]
5+
branches: ['develop']
176
pull_request:
18-
# The branches below must be a subset of the branches above
19-
branches: [ "develop" ]
7+
branches: ['develop']
208
schedule:
219
- cron: '32 13 * * 0'
2210

11+
permissions:
12+
contents: read
13+
2314
jobs:
2415
analyze:
2516
name: Analyze
26-
# Runner size impacts CodeQL analysis time. To learn more, please see:
27-
# - https://gh.io/recommended-hardware-resources-for-running-codeql
28-
# - https://gh.io/supported-runners-and-hardware-resources
29-
# - https://gh.io/using-larger-runners
30-
# Consider using larger runners for possible analysis time improvements.
31-
runs-on: ${{ (matrix.language == 'swift' && 'macos-latest') || 'ubuntu-latest' }}
17+
runs-on: ${{ (matrix.language == 'swift' && 'macos-latest') || 'blacksmith-4vcpu-ubuntu-2204' }}
3218
timeout-minutes: ${{ (matrix.language == 'swift' && 120) || 360 }}
3319
permissions:
3420
actions: read
@@ -38,45 +24,26 @@ jobs:
3824
strategy:
3925
fail-fast: false
4026
matrix:
41-
language: [ 'javascript' ]
42-
# CodeQL supports [ 'cpp', 'csharp', 'go', 'java', 'javascript', 'python', 'ruby', 'swift' ]
43-
# Use only 'java' to analyze code written in Java, Kotlin or both
44-
# Use only 'javascript' to analyze code written in JavaScript, TypeScript or both
45-
# Learn more about CodeQL language support at https://aka.ms/codeql-docs/language-support
27+
language: ['javascript']
4628

4729
steps:
48-
- name: Checkout repository
49-
uses: actions/checkout@v4
50-
51-
# Initializes the CodeQL tools for scanning.
52-
- name: Initialize CodeQL
53-
uses: github/codeql-action/init@v3
54-
with:
55-
languages: ${{ matrix.language }}
56-
# If you wish to specify custom queries, you can do so here or in a config file.
57-
# By default, queries listed here will override any specified in a config file.
58-
# Prefix the list here with "+" to use these queries and those in the config file.
59-
60-
# For more details on CodeQL's query packs, refer to: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
61-
# queries: security-extended,security-and-quality
62-
63-
64-
# Autobuild attempts to build any compiled languages (C/C++, C#, Go, Java, or Swift).
65-
# If this step fails, then you should remove it and run the build manually (see below)
66-
- name: Autobuild
67-
uses: github/codeql-action/autobuild@v3
68-
69-
# ℹ️ Command-line programs to run using the OS shell.
70-
# 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun
71-
72-
# If the Autobuild fails above, remove it and uncomment the following three lines.
73-
# modify them (or add more) to build your code if your project, please refer to the EXAMPLE below for guidance.
74-
75-
# - run: |
76-
# echo "Run, Build Application using script"
77-
# ./location_of_script_within_repo/buildscript.sh
78-
79-
- name: Perform CodeQL Analysis
80-
uses: github/codeql-action/analyze@v3
81-
with:
82-
category: "/language:${{matrix.language}}"
30+
- name: Harden Runner
31+
uses: step-security/harden-runner@c95a14d0e5bab51a9f56296a4eb0e416910cd350
32+
with:
33+
egress-policy: audit
34+
35+
- name: Checkout repository
36+
uses: actions/checkout@cbb722410c2e876e24abbe8de2cc27693e501dcb
37+
38+
- name: Initialize CodeQL
39+
uses: github/codeql-action/init@db7177a1c66bea89f5e7ce32d0ea48bea4a0d460
40+
with:
41+
languages: ${{ matrix.language }}
42+
43+
- name: Autobuild
44+
uses: github/codeql-action/autobuild@db7177a1c66bea89f5e7ce32d0ea48bea4a0d460
45+
46+
- name: Perform CodeQL Analysis
47+
uses: github/codeql-action/analyze@db7177a1c66bea89f5e7ce32d0ea48bea4a0d460
48+
with:
49+
category: '/language:${{ matrix.language }}'
Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
# Dependency Review Action
2+
#
3+
# This Action will scan dependency manifest files that change as part of a Pull Request,
4+
# surfacing known-vulnerable versions of the packages declared or updated in the PR.
5+
# Once installed, if the workflow run is marked as required,
6+
# PRs introducing known-vulnerable packages will be blocked from merging.
7+
#
8+
# Source repository: https://github.com/actions/dependency-review-action
9+
name: 'Dependency Review'
10+
on: [pull_request]
11+
12+
permissions:
13+
contents: read
14+
15+
jobs:
16+
dependency-review:
17+
runs-on: blacksmith-4vcpu-ubuntu-2204
18+
steps:
19+
- name: Harden Runner
20+
uses: step-security/harden-runner@c95a14d0e5bab51a9f56296a4eb0e416910cd350 # v2.10.3
21+
with:
22+
egress-policy: audit
23+
24+
- name: 'Checkout Repository'
25+
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
26+
- name: 'Dependency Review'
27+
uses: actions/dependency-review-action@3b139cfc5fae8b618d3eae3675e383bb1769c019 # v4.5.0

.github/workflows/scorecard.yml

Lines changed: 28 additions & 42 deletions
Original file line numberDiff line numberDiff line change
@@ -1,72 +1,58 @@
1-
# This workflow uses actions that are not certified by GitHub. They are provided
2-
# by a third-party and are governed by separate terms of service, privacy
3-
# policy, and support documentation.
4-
5-
name: Scorecard supply-chain security
1+
name: Scorecard analysis workflow
62
on:
7-
# For Branch-Protection check. Only the default branch is supported. See
8-
# https://github.com/ossf/scorecard/blob/main/docs/checks.md#branch-protection
9-
branch_protection_rule:
10-
# To guarantee Maintained check is occasionally updated. See
11-
# https://github.com/ossf/scorecard/blob/main/docs/checks.md#maintained
12-
schedule:
13-
- cron: '20 8 * * 4'
143
push:
15-
branches: [ "develop" ]
4+
# Only the default branch is supported.
5+
branches:
6+
- develop
7+
schedule:
8+
# Weekly on Saturdays.
9+
- cron: '30 1 * * 6'
1610

17-
# Declare default permissions as read only.
1811
permissions: read-all
1912

2013
jobs:
2114
analysis:
2215
name: Scorecard analysis
2316
runs-on: ubuntu-latest
2417
permissions:
25-
# Needed to upload the results to code-scanning dashboard.
18+
# Needed for Code scanning upload
2619
security-events: write
27-
# Needed to publish results and get a badge (see publish_results below).
20+
# Needed for GitHub OIDC token if publish_results is true
2821
id-token: write
29-
# Uncomment the permissions below if installing in a private repository.
30-
# contents: read
31-
# actions: read
3222

3323
steps:
34-
- name: "Checkout code"
24+
- name: 'Checkout code'
3525
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
3626
with:
3727
persist-credentials: false
3828

39-
- name: "Run analysis"
40-
uses: ossf/scorecard-action@62b2cac7ed8198b15735ed49ab1e5cf35480ba46 # v2.4.0
29+
- name: OSSF Scorecard action
30+
uses: ossf/scorecard-action@e48dbb732fab761267783321dfa71e2a5c6e263d
4131
with:
32+
# OUTPUT: Path to file to store results
4233
results_file: results.sarif
34+
# OUTPUT: format of the results [json, sarif]
4335
results_format: sarif
44-
# (Optional) "write" PAT token. Uncomment the `repo_token` line below if:
45-
# - you want to enable the Branch-Protection check on a *public* repository, or
46-
# - you are installing Scorecard on a *private* repository
47-
# To create the PAT, follow the steps in https://github.com/ossf/scorecard-action#authentication-with-pat.
48-
# repo_token: ${{ secrets.SCORECARD_TOKEN }}
49-
50-
# Public repositories:
51-
# - Publish results to OpenSSF REST API for easy access by consumers
52-
# - Allows the repository to include the Scorecard badge.
53-
# - See https://github.com/ossf/scorecard-action#publishing-results.
54-
# For private repositories:
55-
# - `publish_results` will always be set to `false`, regardless
56-
# of the value entered here.
36+
# Scorecard team runs a weekly scan of public GitHub repos,
37+
# see https://github.com/ossf/scorecard#public-data.
38+
# Setting `publish_results: true` helps us scale by leveraging your workflow to
39+
# extract the results instead of relying on our own infrastructure to run scans.
40+
# And it's free for you!
5741
publish_results: true
5842

59-
# Upload the results as artifacts (optional). Commenting out will disable uploads of run results in SARIF
60-
# format to the repository Actions tab.
61-
- name: "Upload artifact"
62-
uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
43+
# Upload the results as artifacts (optional). Commenting out will disable
44+
# uploads of run results in SARIF format to the repository Actions tab.
45+
# https://docs.github.com/en/actions/advanced-guides/storing-workflow-data-as-artifacts
46+
- name: 'Upload artifact'
47+
uses: actions/upload-artifact@65c4c4a1ddee5b72f698fdd19549f0f0fb45cf08 # v4.6.0
6348
with:
6449
name: SARIF file
6550
path: results.sarif
6651
retention-days: 5
6752

68-
# Upload the results to GitHub's code scanning dashboard.
69-
- name: "Upload to code-scanning"
70-
uses: github/codeql-action/upload-sarif@df409f7d9260372bd5f19e5b04e83cb3c43714ae # v3.27.9
53+
# Upload the results to GitHub's code scanning dashboard (optional).
54+
# Commenting out will disable upload of results to your repo's Code Scanning dashboard
55+
- name: 'Upload to code-scanning'
56+
uses: github/codeql-action/upload-sarif@b6a472f63d85b9c78a3ac5e89422239fc15e9b3c # v3.28.1
7157
with:
7258
sarif_file: results.sarif

0 commit comments

Comments
 (0)