Commit Graph

536 Commits

Author SHA1 Message Date
dependabot[bot] 8066ad987d
Bump actions/checkout from 3 to 4 (#5665)
Bumps [actions/checkout](https://github.com/actions/checkout) from 3 to 4.
- [Release notes](https://github.com/actions/checkout/releases)
- [Changelog](https://github.com/actions/checkout/blob/main/CHANGELOG.md)
- [Commits](https://github.com/actions/checkout/compare/v3...v4)

---
updated-dependencies:
- dependency-name: actions/checkout
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2023-11-01 16:50:26 -04:00
Andreika 50acf4438e
Upload hwci rusefi.bin (#5677) 2023-11-01 16:27:34 -04:00
rusefi 4cb67f0f5e only:proteus uses better QC process 2023-10-31 13:06:26 -04:00
rusefi f5c03ce394 only:helping codeql 2023-10-30 22:34:04 -04:00
rusefillc 0b1b7a86d9 Make TPS/PPS split configurable #5620 2023-10-30 22:25:29 -04:00
Andrey G e298348981
Artery AT_START_F435 board support (#5662)
* AT32: port directory and files

* at_start_f435: reuse board.h from ChibiOS

* at_start_f435: fix LEDs

* at_start_f435: fix usb

* at_start_f435: fix compilation

* at_start_f435: add to workflow

* at_start_f435: add to workflow fix

* ports: at32: cleanup and comments
2023-10-29 19:13:31 -04:00
b4yuan 41aab72c8d
Add CodeQL Workflow for Code Security Analysis (#5656)
* Add CodeQL Workflow for Code Security Analysis

Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every push and pull request to the main branch.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for third-party code, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation.

Signed-off-by: Brian <bayuan@purdue.edu>

* Add CodeQL Workflow for Code Security Analysis

Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>

* Add CodeQL Workflow for Code Security Analysis

Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>

---------

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-27 23:38:34 -04:00
rusefillc b9e7453b0f EMI kills USB and causes a FATAL on the ECU #4310
only:hellen-honda-k_debug
2023-10-21 15:00:04 -04:00
rusefillc a31b8ba49f EMI kills USB and causes a FATAL on the ECU #4310
only:small-can-board_debug
2023-10-21 14:48:34 -04:00
rusefi 03aee89119 only:small-can-board 2023-10-20 15:54:55 -04:00
rusefi 2f0299832f EMI kills USB and causes a FATAL on the ECU #4310
only:proteus_f4_debug
2023-10-19 23:42:26 -04:00
rusefillc 1eacdbd025 only:SimulatorFunctionalTestLauncher explicit gradle task 2023-10-16 14:51:50 -04:00
rusefillc 7cebe4115e only:any new java file means something was generated 2023-10-12 16:25:53 -04:00
andrey 8d6c593432 only:f407-discovery_debug 2023-10-06 20:34:10 -04:00
rusefi 20983f7e2f automated testing
only: hellen154hyundai
2023-09-30 01:06:15 -04:00
rusefi 696af792a8 does not fit in flash :( turning off for now 2023-09-29 20:51:18 -04:00
andrey 48838f4a09 hellen-112-17_debug 2023-09-29 14:29:44 -04:00
rusefi 34517e2fc4 smarter condition for android build 2023-09-28 00:44:49 -04:00
rusefillc 21e89b2b28 only:more focused gradle invocation 2023-09-27 16:07:55 -04:00
Andrey 0151e87c1c proper order of operations 2023-09-25 21:18:56 -04:00
rusefi 01372c9bb6 java 11 time! 2023-09-25 17:08:23 -04:00
dependabot[bot] 2253af84f6
Bump mukunku/tag-exists-action from 1.3.0 to 1.4.0 (#5570)
Bumps [mukunku/tag-exists-action](https://github.com/mukunku/tag-exists-action) from 1.3.0 to 1.4.0.
- [Release notes](https://github.com/mukunku/tag-exists-action/releases)
- [Commits](https://github.com/mukunku/tag-exists-action/compare/v1.3.0...v1.4.0)

---
updated-dependencies:
- dependency-name: mukunku/tag-exists-action
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2023-09-18 07:48:29 -04:00
rusefillc 213f08bfbd temporary bump 2023-09-17 11:29:36 -04:00
rusefillc debea23523 testability: bench test commands should have automated coverage using simulator #5562
trying to improve multi-threading
2023-09-13 12:28:01 -04:00
Andrey 2c59859e1f testability: bench test commands should have automated coverage using simulator #5562 2023-09-12 09:59:18 -04:00
rusefillc 2449d588ae only:hellen-112-17 2023-09-10 12:45:40 -04:00
dependabot[bot] 227fd27556
build(deps): bump mikepenz/action-junit-report from 3 to 4 (#5553)
Bumps [mikepenz/action-junit-report](https://github.com/mikepenz/action-junit-report) from 3 to 4.
- [Release notes](https://github.com/mikepenz/action-junit-report/releases)
- [Commits](https://github.com/mikepenz/action-junit-report/compare/v3...v4)

---
updated-dependencies:
- dependency-name: mikepenz/action-junit-report
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2023-09-07 07:04:06 -04:00
dependabot[bot] 8d7a06a8ac
build(deps): bump ncipollo/release-action from 1.12.0 to 1.13.0 (#5543)
Bumps [ncipollo/release-action](https://github.com/ncipollo/release-action) from 1.12.0 to 1.13.0.
- [Release notes](https://github.com/ncipollo/release-action/releases)
- [Commits](https://github.com/ncipollo/release-action/compare/v1.12.0...v1.13.0)

---
updated-dependencies:
- dependency-name: ncipollo/release-action
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2023-09-05 16:59:31 -04:00
dependabot[bot] 8b51a4ef75
Bump actions/checkout from 3 to 4 (#5548)
Bumps [actions/checkout](https://github.com/actions/checkout) from 3 to 4.
- [Release notes](https://github.com/actions/checkout/releases)
- [Changelog](https://github.com/actions/checkout/blob/main/CHANGELOG.md)
- [Commits](https://github.com/actions/checkout/compare/v3...v4)

---
updated-dependencies:
- dependency-name: actions/checkout
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2023-09-05 09:09:12 -04:00
Andrey 4317ce6170 export board-specific macro for stm32 pins based on board yaml #3298 2023-09-04 21:33:02 -04:00
rusefillc b1f5612b58
helping PRs (#5529) 2023-08-21 17:02:52 -04:00
dependabot[bot] 1031e1eeea
build(deps): bump chuckwagoncomputing/interactive-pinout (#5526)
Bumps [chuckwagoncomputing/interactive-pinout](https://github.com/chuckwagoncomputing/interactive-pinout) from 2.9 to 2.10.
- [Release notes](https://github.com/chuckwagoncomputing/interactive-pinout/releases)
- [Commits](https://github.com/chuckwagoncomputing/interactive-pinout/compare/2.9...2.10)

---
updated-dependencies:
- dependency-name: chuckwagoncomputing/interactive-pinout
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2023-08-21 07:32:10 -04:00
rusefillc e28442da0b maybe helping simulator job 2023-08-19 20:53:34 -04:00
David Holdeman 712b0b55d6
use template (#5523) 2023-08-19 15:52:03 -04:00
mi-hol 9dd1144edf replace outdated Jenkins build documentation (#224)
* Update readme.md

* fix typo

Co-authored-by: Nathan Schulte <8540239+nmschulte@users.noreply.github.com>

---------

Co-authored-by: Nathan Schulte <8540239+nmschulte@users.noreply.github.com>
2023-08-16 21:19:37 -04:00
rusefillc 317989093e defect was introduced while upgrading stuff 259223cd29 2023-08-15 13:47:29 -04:00
rusefillc 454781b63c maybe reducing red builds for lame reason 2023-08-15 13:46:52 -04:00
dependabot[bot] 3073966010
build(deps): bump mukunku/tag-exists-action from 1.2.0 to 1.3.0 (#5508)
Bumps [mukunku/tag-exists-action](https://github.com/mukunku/tag-exists-action) from 1.2.0 to 1.3.0.
- [Release notes](https://github.com/mukunku/tag-exists-action/releases)
- [Commits](https://github.com/mukunku/tag-exists-action/compare/v1.2.0...v1.3.0)

---
updated-dependencies:
- dependency-name: mukunku/tag-exists-action
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2023-08-15 08:42:08 -04:00
dependabot[bot] 2cb98c59ab
build(deps): bump chuckwagoncomputing/interactive-pinout from 2.8 to 2.9 (#5499)
Bumps [chuckwagoncomputing/interactive-pinout](https://github.com/chuckwagoncomputing/interactive-pinout) from 2.8 to 2.9.
- [Release notes](https://github.com/chuckwagoncomputing/interactive-pinout/releases)
- [Commits](https://github.com/chuckwagoncomputing/interactive-pinout/compare/2.8...2.9)

---
updated-dependencies:
- dependency-name: chuckwagoncomputing/interactive-pinout
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2023-08-07 06:17:42 -04:00
Andrey 511d9f1fab only:debug build ratio 2023-08-05 12:44:45 -04:00
rusefillc 449d20c7cb one step back 2023-08-05 10:59:36 -04:00
rusefillc 6492c56328 one step back 2023-08-05 02:01:33 -04:00
Andrey 25e7750b01 official discovery debug build 2023-08-05 00:46:46 -04:00
rusefi a6f1a6ee02 it's not 100% reliable, looks loke something around OpenOCD :( 2023-08-01 21:29:17 -04:00
David Holdeman 48a777feec
remove leading ./ (#5476) 2023-07-31 18:53:08 -04:00
rusefillc d1990678a3 Revert "build(deps): bump chuckwagoncomputing/interactive-pinout from 2.7 to 2.8 (#5412)"
This reverts commit cf1acd5ee1.
2023-07-29 15:49:56 -04:00
rusefillc aec7c5fd45 only: verbose firmware build 2023-07-26 15:34:26 -04:00
David Holdeman 259223cd29
Replace deprecated commands (#5470)
* fix set-output

* fix set-env

* fix add-path
2023-07-26 09:29:32 -04:00
rusefillc a23d92e441
only: HW CI flash erase progress (#5445)
Co-authored-by: rusefillc <sdfsdfqsf2334234234>
2023-07-25 12:42:14 -04:00
AndreyB 33658e4d02 only:adding F7 runner 2023-07-23 23:03:49 -04:00