Commit Graph

547 Commits

Author SHA1 Message Date
rusefillc e3c787419c only:windows compilation seems broken #5703
reproducing issue at GHA
2023-11-09 18:17:25 -05:00
rusefillc d013c2e784 no activity on those 2023-11-08 09:32:04 -05:00
rusefi ab88650f2e only:alphax-8chan_debug 2023-11-05 12:22:01 -05:00
rusefillc 23fbc3f8f4 only:Unit Tests on Windows 2023-11-04 13:18:55 -04:00
rusefillc f3611894aa only:Unit Tests on Windows 2023-11-04 09:15:17 -04:00
rusefillc dd628ead12 only:Print bash version on windows 2023-11-03 22:43:12 -04:00
rusefi c1d3e93b9e only:Unit Tests on Windows 2023-11-03 22:09:58 -04:00
rusefillc 3cf7b6ee88 only:Unit Tests on Windows 2023-11-03 21:20:30 -04:00
rusefillc f07a21e37d Unit Tests on Windows 2023-11-03 21:08:24 -04:00
rusefillc 0e81c5cf10 Unit Tests on Windows 2023-11-03 20:54:02 -04:00
rusefillc 3b6c9feea5
require LEDs (#5643)
* require all boards to define LED functions (#272)

* require all boards to define LED functions

* f429 nucleo

* small can

* small can

* add to header

* LEDs

---------

Co-authored-by: Matthew Kennedy <matthewkennedy@outlook.com>
Co-authored-by: rusefillc <sdfsdfqsf2334234234>
2023-11-03 12:56:59 -04:00
dependabot[bot] 8066ad987d
Bump actions/checkout from 3 to 4 (#5665)
Bumps [actions/checkout](https://github.com/actions/checkout) from 3 to 4.
- [Release notes](https://github.com/actions/checkout/releases)
- [Changelog](https://github.com/actions/checkout/blob/main/CHANGELOG.md)
- [Commits](https://github.com/actions/checkout/compare/v3...v4)

---
updated-dependencies:
- dependency-name: actions/checkout
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2023-11-01 16:50:26 -04:00
Andreika 50acf4438e
Upload hwci rusefi.bin (#5677) 2023-11-01 16:27:34 -04:00
rusefi 4cb67f0f5e only:proteus uses better QC process 2023-10-31 13:06:26 -04:00
rusefi f5c03ce394 only:helping codeql 2023-10-30 22:34:04 -04:00
rusefillc 0b1b7a86d9 Make TPS/PPS split configurable #5620 2023-10-30 22:25:29 -04:00
Andrey G e298348981
Artery AT_START_F435 board support (#5662)
* AT32: port directory and files

* at_start_f435: reuse board.h from ChibiOS

* at_start_f435: fix LEDs

* at_start_f435: fix usb

* at_start_f435: fix compilation

* at_start_f435: add to workflow

* at_start_f435: add to workflow fix

* ports: at32: cleanup and comments
2023-10-29 19:13:31 -04:00
b4yuan 41aab72c8d
Add CodeQL Workflow for Code Security Analysis (#5656)
* Add CodeQL Workflow for Code Security Analysis

Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every push and pull request to the main branch.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for third-party code, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation.

Signed-off-by: Brian <bayuan@purdue.edu>

* Add CodeQL Workflow for Code Security Analysis

Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>

* Add CodeQL Workflow for Code Security Analysis

Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>

---------

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-27 23:38:34 -04:00
rusefillc b9e7453b0f EMI kills USB and causes a FATAL on the ECU #4310
only:hellen-honda-k_debug
2023-10-21 15:00:04 -04:00
rusefillc a31b8ba49f EMI kills USB and causes a FATAL on the ECU #4310
only:small-can-board_debug
2023-10-21 14:48:34 -04:00
rusefi 03aee89119 only:small-can-board 2023-10-20 15:54:55 -04:00
rusefi 2f0299832f EMI kills USB and causes a FATAL on the ECU #4310
only:proteus_f4_debug
2023-10-19 23:42:26 -04:00
rusefillc 1eacdbd025 only:SimulatorFunctionalTestLauncher explicit gradle task 2023-10-16 14:51:50 -04:00
rusefillc 7cebe4115e only:any new java file means something was generated 2023-10-12 16:25:53 -04:00
andrey 8d6c593432 only:f407-discovery_debug 2023-10-06 20:34:10 -04:00
rusefi 20983f7e2f automated testing
only: hellen154hyundai
2023-09-30 01:06:15 -04:00
rusefi 696af792a8 does not fit in flash :( turning off for now 2023-09-29 20:51:18 -04:00
andrey 48838f4a09 hellen-112-17_debug 2023-09-29 14:29:44 -04:00
rusefi 34517e2fc4 smarter condition for android build 2023-09-28 00:44:49 -04:00
rusefillc 21e89b2b28 only:more focused gradle invocation 2023-09-27 16:07:55 -04:00
Andrey 0151e87c1c proper order of operations 2023-09-25 21:18:56 -04:00
rusefi 01372c9bb6 java 11 time! 2023-09-25 17:08:23 -04:00
dependabot[bot] 2253af84f6
Bump mukunku/tag-exists-action from 1.3.0 to 1.4.0 (#5570)
Bumps [mukunku/tag-exists-action](https://github.com/mukunku/tag-exists-action) from 1.3.0 to 1.4.0.
- [Release notes](https://github.com/mukunku/tag-exists-action/releases)
- [Commits](https://github.com/mukunku/tag-exists-action/compare/v1.3.0...v1.4.0)

---
updated-dependencies:
- dependency-name: mukunku/tag-exists-action
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2023-09-18 07:48:29 -04:00
rusefillc 213f08bfbd temporary bump 2023-09-17 11:29:36 -04:00
rusefillc debea23523 testability: bench test commands should have automated coverage using simulator #5562
trying to improve multi-threading
2023-09-13 12:28:01 -04:00
Andrey 2c59859e1f testability: bench test commands should have automated coverage using simulator #5562 2023-09-12 09:59:18 -04:00
rusefillc 2449d588ae only:hellen-112-17 2023-09-10 12:45:40 -04:00
dependabot[bot] 227fd27556
build(deps): bump mikepenz/action-junit-report from 3 to 4 (#5553)
Bumps [mikepenz/action-junit-report](https://github.com/mikepenz/action-junit-report) from 3 to 4.
- [Release notes](https://github.com/mikepenz/action-junit-report/releases)
- [Commits](https://github.com/mikepenz/action-junit-report/compare/v3...v4)

---
updated-dependencies:
- dependency-name: mikepenz/action-junit-report
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2023-09-07 07:04:06 -04:00
dependabot[bot] 8d7a06a8ac
build(deps): bump ncipollo/release-action from 1.12.0 to 1.13.0 (#5543)
Bumps [ncipollo/release-action](https://github.com/ncipollo/release-action) from 1.12.0 to 1.13.0.
- [Release notes](https://github.com/ncipollo/release-action/releases)
- [Commits](https://github.com/ncipollo/release-action/compare/v1.12.0...v1.13.0)

---
updated-dependencies:
- dependency-name: ncipollo/release-action
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2023-09-05 16:59:31 -04:00
dependabot[bot] 8b51a4ef75
Bump actions/checkout from 3 to 4 (#5548)
Bumps [actions/checkout](https://github.com/actions/checkout) from 3 to 4.
- [Release notes](https://github.com/actions/checkout/releases)
- [Changelog](https://github.com/actions/checkout/blob/main/CHANGELOG.md)
- [Commits](https://github.com/actions/checkout/compare/v3...v4)

---
updated-dependencies:
- dependency-name: actions/checkout
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2023-09-05 09:09:12 -04:00
Andrey 4317ce6170 export board-specific macro for stm32 pins based on board yaml #3298 2023-09-04 21:33:02 -04:00
rusefillc b1f5612b58
helping PRs (#5529) 2023-08-21 17:02:52 -04:00
dependabot[bot] 1031e1eeea
build(deps): bump chuckwagoncomputing/interactive-pinout (#5526)
Bumps [chuckwagoncomputing/interactive-pinout](https://github.com/chuckwagoncomputing/interactive-pinout) from 2.9 to 2.10.
- [Release notes](https://github.com/chuckwagoncomputing/interactive-pinout/releases)
- [Commits](https://github.com/chuckwagoncomputing/interactive-pinout/compare/2.9...2.10)

---
updated-dependencies:
- dependency-name: chuckwagoncomputing/interactive-pinout
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2023-08-21 07:32:10 -04:00
rusefillc e28442da0b maybe helping simulator job 2023-08-19 20:53:34 -04:00
David Holdeman 712b0b55d6
use template (#5523) 2023-08-19 15:52:03 -04:00
mi-hol 9dd1144edf replace outdated Jenkins build documentation (#224)
* Update readme.md

* fix typo

Co-authored-by: Nathan Schulte <8540239+nmschulte@users.noreply.github.com>

---------

Co-authored-by: Nathan Schulte <8540239+nmschulte@users.noreply.github.com>
2023-08-16 21:19:37 -04:00
rusefillc 317989093e defect was introduced while upgrading stuff 259223cd29 2023-08-15 13:47:29 -04:00
rusefillc 454781b63c maybe reducing red builds for lame reason 2023-08-15 13:46:52 -04:00
dependabot[bot] 3073966010
build(deps): bump mukunku/tag-exists-action from 1.2.0 to 1.3.0 (#5508)
Bumps [mukunku/tag-exists-action](https://github.com/mukunku/tag-exists-action) from 1.2.0 to 1.3.0.
- [Release notes](https://github.com/mukunku/tag-exists-action/releases)
- [Commits](https://github.com/mukunku/tag-exists-action/compare/v1.2.0...v1.3.0)

---
updated-dependencies:
- dependency-name: mukunku/tag-exists-action
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2023-08-15 08:42:08 -04:00
dependabot[bot] 2cb98c59ab
build(deps): bump chuckwagoncomputing/interactive-pinout from 2.8 to 2.9 (#5499)
Bumps [chuckwagoncomputing/interactive-pinout](https://github.com/chuckwagoncomputing/interactive-pinout) from 2.8 to 2.9.
- [Release notes](https://github.com/chuckwagoncomputing/interactive-pinout/releases)
- [Commits](https://github.com/chuckwagoncomputing/interactive-pinout/compare/2.8...2.9)

---
updated-dependencies:
- dependency-name: chuckwagoncomputing/interactive-pinout
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2023-08-07 06:17:42 -04:00