vscode-cpptools
Advanced tools
+70
| name: $(date:yyyyMMdd)$(rev:.r) | ||
| trigger: | ||
| branches: | ||
| include: | ||
| - main | ||
| schedules: | ||
| - cron: 30 5 * * 0 | ||
| branches: | ||
| include: | ||
| - main | ||
| always: true | ||
| resources: | ||
| repositories: | ||
| - repository: MicroBuildTemplate | ||
| type: git | ||
| name: 1ESPipelineTemplates/MicroBuildTemplate | ||
| ref: refs/tags/release | ||
| extends: | ||
| template: azure-pipelines/MicroBuild.1ES.Official.yml@MicroBuildTemplate | ||
| parameters: | ||
| pool: | ||
| name: AzurePipelines-EO | ||
| image: AzurePipelinesWindows2022compliantGPT | ||
| os: windows | ||
| sdl: | ||
| sourceAnalysisPool: | ||
| name: AzurePipelines-EO | ||
| image: AzurePipelinesWindows2022compliantGPT | ||
| os: windows | ||
| policheck: | ||
| enabled: true | ||
| tsa: | ||
| enabled: false | ||
| featureFlags: | ||
| autoBaseline: false | ||
| stages: | ||
| - stage: build | ||
| jobs: | ||
| - job: Phase_1 | ||
| displayName: Build | ||
| timeoutInMinutes: 60 | ||
| cancelTimeoutInMinutes: 1 | ||
| templateContext: | ||
| outputs: | ||
| - output: pipelineArtifact | ||
| displayName: 'output' | ||
| condition: succeeded() | ||
| targetPath: out | ||
| artifactName: out | ||
| steps: | ||
| - checkout: self | ||
| - task: UseNode@1 | ||
| displayName: Use Node 18.x | ||
| inputs: | ||
| version: 18.x | ||
| - task: Npm@1 | ||
| displayName: 'npm install' | ||
| - task: Npm@1 | ||
| displayName: 'npm run compile' | ||
| inputs: | ||
| command: custom | ||
| customCommand: 'run compile' |
+41
| <!-- BEGIN MICROSOFT SECURITY.MD V0.0.7 BLOCK --> | ||
| ## Security | ||
| Microsoft takes the security of our software products and services seriously, which includes all source code repositories managed through our GitHub organizations, which include [Microsoft](https://github.com/Microsoft), [Azure](https://github.com/Azure), [DotNet](https://github.com/dotnet), [AspNet](https://github.com/aspnet), [Xamarin](https://github.com/xamarin), and [our GitHub organizations](https://opensource.microsoft.com/). | ||
| If you believe you have found a security vulnerability in any Microsoft-owned repository that meets [Microsoft's definition of a security vulnerability](https://aka.ms/opensource/security/definition), please report it to us as described below. | ||
| ## Reporting Security Issues | ||
| **Please do not report security vulnerabilities through public GitHub issues.** | ||
| Instead, please report them to the Microsoft Security Response Center (MSRC) at [https://msrc.microsoft.com/create-report](https://aka.ms/opensource/security/create-report). | ||
| If you prefer to submit without logging in, send email to [secure@microsoft.com](mailto:secure@microsoft.com). If possible, encrypt your message with our PGP key; please download it from the [Microsoft Security Response Center PGP Key page](https://aka.ms/opensource/security/pgpkey). | ||
| You should receive a response within 24 hours. If for some reason you do not, please follow up via email to ensure we received your original message. Additional information can be found at [microsoft.com/msrc](https://aka.ms/opensource/security/msrc). | ||
| Please include the requested information listed below (as much as you can provide) to help us better understand the nature and scope of the possible issue: | ||
| * Type of issue (e.g. buffer overflow, SQL injection, cross-site scripting, etc.) | ||
| * Full paths of source file(s) related to the manifestation of the issue | ||
| * The location of the affected source code (tag/branch/commit or direct URL) | ||
| * Any special configuration required to reproduce the issue | ||
| * Step-by-step instructions to reproduce the issue | ||
| * Proof-of-concept or exploit code (if possible) | ||
| * Impact of the issue, including how an attacker might exploit the issue | ||
| This information will help us triage your report more quickly. | ||
| If you are reporting for a bug bounty, more complete reports can contribute to a higher bounty award. Please visit our [Microsoft Bug Bounty Program](https://aka.ms/opensource/security/bounty) page for more details about our active programs. | ||
| ## Preferred Languages | ||
| We prefer all communications to be in English. | ||
| ## Policy | ||
| Microsoft follows the principle of [Coordinated Vulnerability Disclosure](https://aka.ms/opensource/security/cvd). | ||
| <!-- END MICROSOFT SECURITY.MD BLOCK --> |
+2
-1
@@ -45,3 +45,4 @@ import { CppToolsApi, CppToolsExtension, Version } from './api'; | ||
| IntelliSenseCompiling = 3, | ||
| IntelliSenseReady = 4 | ||
| IntelliSenseReady = 4, | ||
| Idle = 5 | ||
| } | ||
@@ -48,0 +49,0 @@ /** |
+1
-0
@@ -28,2 +28,3 @@ /* -------------------------------------------------------------------------------------------- | ||
| Status[Status["IntelliSenseReady"] = 4] = "IntelliSenseReady"; | ||
| Status[Status["Idle"] = 5] = "Idle"; | ||
| })(Status = exports.Status || (exports.Status = {})); | ||
@@ -30,0 +31,0 @@ function isCppToolsTestExtension(extension) { |
+1
-1
| { | ||
| "name": "vscode-cpptools", | ||
| "version": "6.1.0", | ||
| "version": "6.2.0", | ||
| "description": "Public API for vscode-cpptools", | ||
@@ -5,0 +5,0 @@ "typings": "./out/api.d.ts", |
+1
-0
@@ -85,1 +85,2 @@ # Public API for the ms-vscode.cpptools VS Code extension | ||
| contact [opencode@microsoft.com](mailto:opencode@microsoft.com) with any additional questions or comments. | ||
+2
-1
@@ -56,3 +56,4 @@ /* -------------------------------------------------------------------------------------------- | ||
| IntelliSenseCompiling = 3, | ||
| IntelliSenseReady = 4 | ||
| IntelliSenseReady = 4, | ||
| Idle = 5 | ||
| } | ||
@@ -59,0 +60,0 @@ |
+0
-0
@@ -0,0 +0,0 @@ { |
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
57730
8.36%12
20%975
0.31%86
1.18%