Thanks to visit codestin.com
Credit goes to github.com

Skip to content
This repository was archived by the owner on Nov 18, 2022. It is now read-only.
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
73 commits
Select commit Hold shift + click to select a range
a5c04db
Changed the progress-block class to use a calculated width of 8.5rem …
acidDrain Dec 1, 2020
f9aa86d
Update nzbget-setup.nsi
ThioJoe Aug 21, 2021
7a4a517
#785: added native support for Apple Silicon Macs by letting Xcode bu…
nehalvpatel Oct 2, 2021
f76e855
daemon:connect: don't use FIPS_mode_set with OpenSSL 3
schopin-pro Dec 7, 2021
ee2eb8c
Download time with empty minutes and seconds
p00chie Jan 25, 2022
87d0711
fix 2 typos
paul-chambers Jun 8, 2022
52fd51e
unmangle the deliberately-malformed subject from WtF release group
paul-chambers Jun 8, 2022
b90d914
Merge pull request #1 from schopin-pro/openssl3
satmandu Jul 16, 2022
3f66c7d
Make the pattern matching a little more flexible to deal with variati…
paul-chambers Jul 19, 2022
e68cda9
Merge pull request #2 from paul-chambers/develop
satmandu Jul 19, 2022
acfb9ff
Merge pull request #1 from satmandu/develop
paul-chambers Nov 19, 2022
cae3aca
Merge pull request #2 from acidDrain/progress-block-responsive-better…
paul-chambers Nov 19, 2022
22961eb
Merge pull request #3 from p00chie/patch-1
paul-chambers Nov 19, 2022
a8515cb
Merge pull request #4 from nehalvpatel/develop
paul-chambers Nov 19, 2022
9be4339
Merge pull request #5 from ThioJoe/winVer
paul-chambers Nov 19, 2022
4af1bd7
Update README.md
paul-chambers Nov 29, 2022
7f546c9
Update README.md
paul-chambers Nov 29, 2022
291c5f9
add sonarqube action
paul-chambers Jan 3, 2023
872108a
Add CI action
paul-chambers Jan 3, 2023
4c11e0f
Scan with SonarCloud
paul-chambers Jan 3, 2023
942f8a7
Delete sonarqube.yml
paul-chambers Jan 3, 2023
bfc68a4
Add config option for the read buffer size of the NNTP connection
Jan 5, 2023
54fd79d
Rename new config option for chunk size when reading article data fro…
Jan 11, 2023
50fda0f
Use yaml provided by Sonarcloud
paul-chambers Feb 1, 2023
d5686f3
build modifications for sonarcube
paul-chambers Feb 1, 2023
8a6ed51
Merge branch 'develop' of github.com:/paul-chambers/nzbget into develop
paul-chambers Feb 1, 2023
378f21d
properties for sonarcube
paul-chambers Feb 2, 2023
9ad0b10
properties for sonarcube
paul-chambers Feb 2, 2023
68adb6f
Update sonarcloud.yml
paul-chambers Feb 2, 2023
05c5d4e
Remove and ignore various intermediate autotools artifacts generated …
paul-chambers Feb 2, 2023
d819b5f
Merge remote-tracking branch 'origin/develop' into develop
paul-chambers Feb 2, 2023
d39a22c
also ignore configure~
paul-chambers Feb 2, 2023
f44d650
Update c-cpp.yml
paul-chambers Feb 2, 2023
9e59855
Set Version Number from the most recent git tag (using 'git describe')
paul-chambers Feb 4, 2023
2042ff2
Merge pull request #13 from Batunga/add-config-connectionbuffer
paul-chambers Feb 5, 2023
6adf902
pull tags, too
paul-chambers Feb 5, 2023
43833e8
Merge remote-tracking branch 'origin/develop' into develop
paul-chambers Feb 5, 2023
86b18f1
remove the generation of code_revision.cpp
paul-chambers Feb 5, 2023
5a2dc01
Update c-cpp.yml
paul-chambers Feb 5, 2023
299d4a6
Update c-cpp.yml
paul-chambers Feb 5, 2023
37d8189
Convert source docs to Markdown syntax
paul-chambers Feb 7, 2023
30e6ff3
Add Codacy analysis and security scans
paul-chambers Feb 7, 2023
5ef7678
update distcheck target for readme file renames
paul-chambers Feb 9, 2023
04daaf3
ignore tarballs generated by distcheck
paul-chambers Feb 9, 2023
172ae9b
updated for renamed readme file
paul-chambers Feb 9, 2023
f02141a
Sonarr parses the version string it retrieves via jsonrpc. Switching …
paul-chambers Feb 19, 2023
5fabf75
Fix autoconf warnings by updating configure.ac to autoconf v2.71
paul-chambers Feb 28, 2023
c052dc3
use an initial Makefile to bootstrap autotools, just type 'make'
paul-chambers Mar 1, 2023
a9979c0
Move variable outside while loop. Found by `scan-build`
bket Dec 6, 2022
ff5216f
Merge pull request #30 from bket/fix-variable
paul-chambers Mar 1, 2023
73bb23b
change to match new 'bootstrap' Makefile
paul-chambers Mar 1, 2023
492bf67
Use posix capabilities to check if UID & GID can be set.
paul-chambers Mar 2, 2023
c8f2fc4
use realpath() to convert a path into an absolute path
paul-chambers Mar 2, 2023
0fe34b2
use realpath() to convert a path into an absolute path
paul-chambers Mar 2, 2023
8ca0364
fix minor compiler warnings, code cleanup
paul-chambers Mar 2, 2023
7785265
fix typo
paul-chambers Mar 2, 2023
53de515
Update to the OpenSSL 3.0 API
paul-chambers Mar 4, 2023
a70a383
Nuke duplicated includes, add string.h
paul-chambers Mar 4, 2023
2517e83
The --dirty flag is no longer meaningful, so remove it.
paul-chambers Mar 4, 2023
7a44c3d
empty() is a test if there are no elements (ieEmpty), what's needed h…
paul-chambers Mar 4, 2023
8fbbbfb
Fix buffer overflow in AppendFmtV
KenMacD Aug 1, 2023
f30a5d6
Merge pull request #43 from KenMacD/appendfmtv-buffer-overflow
paul-chambers Aug 2, 2023
9db5504
Merge fix for overflow in CString::appendFmtV
paul-chambers Aug 2, 2023
6ddacdb
minor code simplification after overflow bug fix.
paul-chambers Aug 2, 2023
339f7f5
Replace nzbget.net with nzbget-ng.github.io omitting ChangeLog &
Oct 4, 2023
0a88bda
Replace raw.githubusercontent.com and linux build instructions
Oct 4, 2023
c6db0ec
Merge pull request #44 from lainedfles/develop
paul-chambers Oct 5, 2023
ae088f3
Add a nzbget.service file, for repos with the accursed systemd.
paul-chambers Oct 5, 2023
f2faf80
Explicitly install the packages that the build requires. apt-specific…
paul-chambers Oct 5, 2023
8bb2900
Sonarr expects a dotted-decimal version number, which the tag-based v…
paul-chambers Oct 7, 2023
45e94ca
Fix stuck script execution
B4dM4n Dec 19, 2023
adb0662
Merge pull request #48 from B4dM4n/fix-scripts
paul-chambers Dec 24, 2023
3674bde
transition to nzbgetcom/nzbget
paul-chambers Jan 5, 2024
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
28 changes: 28 additions & 0 deletions .github/workflows/c-cpp.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,28 @@
name: C/C++ CI

on:
push:
branches: [ "develop" ]
pull_request:
branches: [ "develop" ]

jobs:
build:

runs-on: ubuntu-latest

steps:
- uses: actions/checkout@v3
with:
fetch-depth: 0
ref: develop
- name: automake
run: autoreconf --install
- name: configure
run: ./configure
- name: make
run: make
- name: make check
run: make check
- name: make distcheck
run: make distcheck
14 changes: 14 additions & 0 deletions .github/workflows/codacy-analysis.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
name: Codacy Analysis CLI

on: ["push"]

jobs:
codacy-analysis-cli:
name: Codacy Analysis CLI
runs-on: ubuntu-latest
steps:
- name: Checkout code
uses: actions/checkout@v3

- name: Run Codacy Analysis CLI
uses: codacy/codacy-analysis-cli-action@master
28 changes: 28 additions & 0 deletions .github/workflows/codacy-security.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,28 @@
name: Codacy Security Scan

on: [ "push", "pull-request" ]

jobs:
codacy-security-scan:
name: Codacy Security Scan
runs-on: ubuntu-latest
steps:
- name: Checkout code
uses: actions/checkout@v3

- name: Run Codacy Analysis CLI
uses: codacy/codacy-analysis-cli-action@master
with:
output: results.sarif
format: sarif
# Adjust severity of non-security issues
gh-code-scanning-compat: true
# Force 0 exit code to allow SARIF file generation
# This will hand over control about PR rejection to the GitHub side
max-allowed-issues: 2147483647

# Upload the SARIF file generated in the previous step
- name: Upload SARIF results file
uses: github/codeql-action/upload-sarif@main
with:
sarif_file: results.sarif
56 changes: 56 additions & 0 deletions .github/workflows/sonarcloud.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,56 @@
# This workflow uses actions that are not certified by GitHub.
# They are provided by a third-party and are governed by
# separate terms of service, privacy policy, and support
# documentation.

# This workflow helps you trigger a SonarCloud analysis of your code and populates
# GitHub Code Scanning alerts with the vulnerabilities found.
# Free for open source project.

# 1. Login to SonarCloud.io using your GitHub account

# 2. Import your project on SonarCloud
# * Add your GitHub organization first, then add your repository as a new project.
# * Please note that many languages are eligible for automatic analysis,
# which means that the analysis will start automatically without the need to set up GitHub Actions.
# * This behavior can be changed in Administration > Analysis Method.
#
# 3. Follow the SonarCloud in-product tutorial
# * a. Copy/paste the Project Key and the Organization Key into the args parameter below
# (You'll find this information in SonarCloud. Click on "Information" at the bottom left)
#
# * b. Generate a new token and add it to your Github repository's secrets using the name SONAR_TOKEN
# (On SonarCloud, click on your avatar on top-right > My account > Security
# or go directly to https://sonarcloud.io/account/security/)

# Feel free to take a look at our documentation (https://docs.sonarcloud.io/getting-started/github/)
# or reach out to our community forum if you need some help (https://community.sonarsource.com/c/help/sc/9)

name: SonarCloud
on:
push:
branches:
- develop
pull_request:
types: [opened, synchronize, reopened]
jobs:
build:
name: Build and analyze
runs-on: ubuntu-latest
env:
BUILD_WRAPPER_OUT_DIR: build_wrapper_output_directory # Directory where build-wrapper output will be placed
steps:
- uses: actions/checkout@v3
with:
fetch-depth: 0 # Shallow clones should be disabled for a better relevancy of analysis
- name: Install sonar-scanner and build-wrapper
uses: SonarSource/sonarcloud-github-c-cpp@v1
- name: Run build-wrapper
run: |
build-wrapper-linux-x86-64 --out-dir ${{ env.BUILD_WRAPPER_OUT_DIR }} make rebuild
- name: Run sonar-scanner
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }}
run: |
sonar-scanner --define sonar.cfamily.build-wrapper-output="${{ env.BUILD_WRAPPER_OUT_DIR }}"
25 changes: 19 additions & 6 deletions .gitignore
Original file line number Diff line number Diff line change
Expand Up @@ -24,16 +24,26 @@
*.out

# GNU Autotools
*.o-*
.deps/
.dirstamp
configure.mk
configure.mk.in
aclocal.m4
autom4te.cache/
config.guess
config.h
config.h.in
config.h.in~
config.log
config.status
Makefile
config.sub
configure
configure~
depcomp
install-sh
missing
stamp-h1
autom4te.cache/
.dirstamp
*.o-*

# Visual Studio User-specific files
*.suo
Expand All @@ -48,7 +58,6 @@ ipch/
*.sdf
*.cachefile
*.ilk
*.pch
*.pdb
*.pgc
*.pgd
Expand All @@ -71,4 +80,8 @@ code_revision.cpp
*.temp
*.pyc
pytest.ini
.cache
.cache
nzbget-v*.tar.gz
/confdefs.h
/Makefile.bootstrap
/Makefile.in
1 change: 1 addition & 0 deletions Makefile
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
include rebuild.mk
65 changes: 6 additions & 59 deletions Makefile.am
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
#
# This file is part of nzbget. See <http://nzbget.net>.
# This file is part of nzbget. See <https://nzbget-ng.github.io>.
#
# Copyright (C) 2008-2019 Andrey Prygunkov <[email protected]>
#
Expand Down Expand Up @@ -169,8 +169,7 @@ nzbget_SOURCES = \
daemon/nserv/NzbGenerator.h \
daemon/nserv/NzbGenerator.cpp \
daemon/nserv/YEncoder.h \
daemon/nserv/YEncoder.cpp \
code_revision.cpp
daemon/nserv/YEncoder.cpp

if WITH_PAR2
nzbget_SOURCES += \
Expand Down Expand Up @@ -297,7 +296,7 @@ windows_FILES = \
nzbget.vcxproj \
windows/nzbget-command-shell.bat \
windows/install-update.bat \
windows/README-WINDOWS.txt \
windows/README.md \
windows/package-info.json \
windows/resources/mainicon.ico \
windows/resources/nzbget.rc \
Expand Down Expand Up @@ -344,7 +343,7 @@ linux_FILES = \
linux/installer.sh \
linux/install-update.sh \
linux/package-info.json \
linux/build-info.txt \
linux/README.md \
linux/build-nzbget \
linux/build-unpack \
linux/build-toolchain-android \
Expand Down Expand Up @@ -457,7 +456,7 @@ nobase_dist_scripts_SCRIPTS = $(scripts_FILES)

# Note about "sed":
# We need to make some changes in installed files.
# On Linux "sed" has option "-i" for in-place-edit. Unfortunateley the BSD version of "sed"
# On Linux "sed" has option "-i" for in-place-edit. Unfortunately the BSD version of "sed"
# has incompatible syntax. To solve the problem we perform in-place-edit in three steps:
# 1) copy the original file to original.temp (delete existing original.temp, if any);
# 2) sed < original.temp > original
Expand Down Expand Up @@ -486,59 +485,6 @@ install-conf:
uninstall-conf:
rm -f "$(DESTDIR)$(sysconfdir)/nzbget.conf"

# Determining git revision:
# 1) If directory ".git" exists we take revision from git log.
# File is recreated only if revision number was changed.
# 2) If directory ".git" doesn't exists we keep and reuse file "code_revision.cpp",
# which was possibly created early.
# 3) If neither directory ".git" nor file "code_revision.cpp" are available
# we create new file "code_revision.c" with empty revision number.
code_revision.cpp: FORCE
@ if test -d ./.git ; then \
B=`git branch | sed -n -e 's/^\* \(.*\)/\1/p'`; \
M=`git status --porcelain` ; \
if test "$$M" != "" ; then \
M="M" ; \
fi ; \
if test "$$B" = "master" ; then \
V="$$M" ; \
elif test "$$B" = "develop" ; then \
V=`git rev-list HEAD | wc -l | xargs` ; \
V="$${V}$$M" ; \
else \
V=`git rev-list HEAD | wc -l | xargs` ; \
V="$${V}$$M ($$B)" ; \
fi ; \
H=`test -f ./code_revision.cpp && head -n 1 code_revision.cpp`; \
if test "/* $$V */" != "$$H" ; then \
( \
echo "/* $$V */" ;\
echo "/* This file is automatically regenerated on each build. Do not edit it. */" ;\
echo "#include \"nzbget.h\"" ;\
echo "const char* code_revision(void)" ;\
echo "{" ;\
echo " const char* revision = \"$$V\";" ;\
echo " return revision;" ;\
echo "}" ;\
) > code_revision.cpp ; \
fi \
elif test -f ./code_revision.cpp ; then \
test "ok, reuse existing file"; \
else \
( \
echo "/* */" ;\
echo "/* This file is automatically regenerated on each build. Do not edit it. */" ;\
echo "#include \"nzbget.h\"" ;\
echo "const char* code_revision(void)" ;\
echo "{" ;\
echo " const char* revision = \"\";" ;\
echo " return revision;" ;\
echo "}" ;\
) > code_revision.cpp ; \
fi
FORCE:

# Ignore "code_revision.cpp" in distcleancheck
distcleancheck_listfiles = \
find . -type f -exec sh -c 'test -f $(srcdir)/$$1 || echo $$1' \
sh '{}' ';'
Expand All @@ -552,3 +498,4 @@ dist-hook:
find $(distdir)/lib -type f -print -exec chmod -x {} \;
find $(distdir)/tests -type f -print -exec chmod -x {} \;

include rebuild.mk
Loading