Commit Graph

26326 Commits

Author SHA1 Message Date
rusefillc 3a1aec8347 hd 2023-10-31 07:42:29 -04:00
GitHub gen-configs Action 2f257fbea8 Auto-generated configs and docs 2023-10-31 06:15:39 +00:00
rusefi 088438f8ca hd 2023-10-31 02:02:20 -04:00
GitHub gen-configs Action eef298b323 Auto-generated configs and docs 2023-10-31 05:57:39 +00:00
rusefi 4f53fdc11d hd 2023-10-31 01:53:52 -04:00
Stefan de Kraker 4b64e0e087 Fixed CAN data bus selection
* Fixed CAN data bus selection

* Made canChannel non-optional
2023-10-31 01:42:47 -04:00
rusefi f5c03ce394 only:helping codeql 2023-10-30 22:34:04 -04:00
GitHub gen-configs Action 934da252f2 Auto-generated configs and docs 2023-10-31 02:30:15 +00:00
rusefillc 0b1b7a86d9 Make TPS/PPS split configurable #5620 2023-10-30 22:25:29 -04:00
GitHub gen-configs Action 1934c578d1 Auto-generated configs and docs 2023-10-31 00:58:40 +00:00
rusefillc ec7a742396 hd
only:proteus_f4
2023-10-30 20:54:31 -04:00
GitHub set-date Action 3a97ec4125 Update date 2023-10-31 00:45:25 +00:00
rusefi a04154c81a https://github.com/rusefi/rusefi-hardware/issues/253 2023-10-30 14:50:00 -04:00
rusefillc 8653788db1 https://github.com/rusefi/rusefi-hardware/issues/253
only:hellen-112-17
2023-10-30 14:06:52 -04:00
rusefillc 907c8da883 only #5632 2023-10-30 12:41:21 -04:00
rusefi 88b08a9156 https://github.com/rusefi/rusefi-hardware/issues/253 2023-10-30 08:46:14 -04:00
Andrey G 7f05e45d41
AT32: chip detection, flash detection, sayHello() (#5666)
* at32_common.cpp: MCU type detection helper

* sayHello(): tick rate is CH_CFG_ST_FREQUENCY

* eficonsole: do isStm32F42x() check for STM32 only

* sayHello(): more info about AT32

* Update ChibiOS

* eficonsole: typo
2023-10-30 07:09:35 -04:00
GitHub gen-configs Action 902fb6e3ce Auto-generated configs and docs 2023-10-30 04:08:08 +00:00
rusefi 0d46d5ef5a only:mg1 2023-10-30 00:04:13 -04:00
rusefi c519200bfb ELF into debug bundle
only:hellen-112-17_debug
2023-10-29 22:44:31 -04:00
GitHub gen-configs Action 2e78cc6d39 Auto-generated configs and docs 2023-10-30 00:51:20 +00:00
rusefi 53d51941c0 https://github.com/rusefi/rusefi-hardware/issues/253
only:hellen-112-17
2023-10-29 20:34:12 -04:00
rusefi b582817ce4 only: https://github.com/rusefi/m74.9/issues/9 2023-10-29 20:21:44 -04:00
GitHub gen-configs Action 32da4ec704 Auto-generated configs and docs 2023-10-30 00:02:03 +00:00
rusefillc bb898e2ac6 only:m74.9 2023-10-29 19:58:05 -04:00
Andrey G e298348981
Artery AT_START_F435 board support (#5662)
* AT32: port directory and files

* at_start_f435: reuse board.h from ChibiOS

* at_start_f435: fix LEDs

* at_start_f435: fix usb

* at_start_f435: fix compilation

* at_start_f435: add to workflow

* at_start_f435: add to workflow fix

* ports: at32: cleanup and comments
2023-10-29 19:13:31 -04:00
GitHub gen-configs Action 6fc951ed95 Auto-generated configs and docs 2023-10-29 18:55:48 -04:00
rusefi bc1cc1b446 https://github.com/rusefi/rusefi-hardware/issues/253 2023-10-29 18:55:48 -04:00
rusefi 2051a41c4d docs 2023-10-29 17:24:56 -04:00
rusefi d12bb15f8d only:refactoring 2023-10-29 17:24:56 -04:00
rusefillc 8c4a06bc10
getBackupSram neven null (#5663) 2023-10-29 15:46:15 -04:00
Andrey G a7a6f4fcee
subaru_eg33: LEDs are still active low (#5658)
Fix bug introduced in f7e6ccd9e2
2023-10-29 15:35:58 -04:00
GitHub gen-configs Action e89adc52bf Auto-generated configs and docs 2023-10-29 19:29:57 +00:00
rusefi 5bf610596c only:hellen-112-17 2023-10-29 15:26:09 -04:00
GitHub gen-configs Action b004948262 Auto-generated configs and docs 2023-10-29 17:30:50 +00:00
rusefi f64a01913e fix https://github.com/rusefi/rusefi/pull/5660 2023-10-29 13:27:04 -04:00
rusefi 2708114905 HW CI instability: handleShaftSignal unexpected loop fix #5661
shoot from the hip?
2023-10-29 13:26:21 -04:00
rusefi 3c97e62e28 https://github.com/rusefi/ChibiOS/pull/37 2023-10-29 12:54:03 -04:00
Andrey G 80a370088e
hw_layer: ICU helper: fix clocks (#5659) 2023-10-29 12:29:09 -04:00
rusefi 8852959aaa https://github.com/rusefi/hellen-112-17/issues/26
only:hellen-112-17
2023-10-29 11:15:17 -04:00
rusefillc 3d2761d76a STATIC_BOARD_ID_PROTEUS_HARLEY 2023-10-29 10:17:24 -04:00
GitHub gen-configs Action 76f0bf215a Auto-generated configs and docs 2023-10-29 13:52:48 +00:00
rusefillc 6afe2fe7a4 https://github.com/rusefi/hellen-112-17/issues/26
only:hellen-112-17
2023-10-29 09:48:59 -04:00
GitHub set-date Action e120d07107 Update date 2023-10-29 00:43:31 +00:00
rusefillc 7b25477ddf CodeQL says Potentially uninitialized local variable 2023-10-27 23:41:55 -04:00
b4yuan 41aab72c8d
Add CodeQL Workflow for Code Security Analysis (#5656)
* Add CodeQL Workflow for Code Security Analysis

Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every push and pull request to the main branch.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for third-party code, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation.

Signed-off-by: Brian <bayuan@purdue.edu>

* Add CodeQL Workflow for Code Security Analysis

Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>

* Add CodeQL Workflow for Code Security Analysis

Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>

---------

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-27 23:38:34 -04:00
GitHub gen-configs Action 4cedb6c26a Auto-generated configs and docs 2023-10-28 01:11:30 +00:00
rusefi 87b78313c5 only:hellen-112-17 2023-10-27 21:06:26 -04:00
GitHub set-date Action c396099903 Update date 2023-10-28 00:37:49 +00:00
rusefillc c98963a991 only: dead commands 2023-10-27 11:35:15 -04:00