Commit Graph

571 Commits

Author SHA1 Message Date
dependabot[bot] ccdda75ced Bump actions/upload-artifact from 3 to 4
Bumps [actions/upload-artifact](https://github.com/actions/upload-artifact) from 3 to 4.
- [Release notes](https://github.com/actions/upload-artifact/releases)
- [Commits](https://github.com/actions/upload-artifact/compare/v3...v4)

---
updated-dependencies:
- dependency-name: actions/upload-artifact
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
2023-12-15 07:49:35 -05:00
rusefillc 7d425e41c1 hellen154hyundai_f7 2023-12-14 09:25:44 -05:00
dependabot[bot] feab584efd Bump github/codeql-action from 2 to 3
Bumps [github/codeql-action](https://github.com/github/codeql-action) from 2 to 3.
- [Release notes](https://github.com/github/codeql-action/releases)
- [Changelog](https://github.com/github/codeql-action/blob/main/CHANGELOG.md)
- [Commits](https://github.com/github/codeql-action/compare/v2...v3)

---
updated-dependencies:
- dependency-name: github/codeql-action
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
2023-12-14 07:11:59 -05:00
rusefi 68b3a1993e only:no reason to reset? 2023-12-12 02:07:59 -05:00
rusefillc 6315a9014e only:no reason to reset? 2023-12-11 00:04:52 -05:00
rusefillc 9cf88e65e0 only:no reason to reset? 2023-12-10 18:28:20 -05:00
rusefillc 30272b6fb7 only:no reason to reset? 2023-12-10 15:09:49 -05:00
rusefillc 30dc25db19 only:moved to https://github.com/rusefi/fw-custom-core8 2023-12-04 11:18:28 -05:00
rusefillc 6c8affb655 only:handling Connectors: looks like nothing to commit 2023-12-04 10:21:07 -05:00
rusefillc dd11acec3f only:handling Connectors: looks like nothing to commit 2023-12-04 10:15:17 -05:00
dependabot[bot] 838dc9baa7 build(deps): bump chuckwagoncomputing/interactive-pinout
Bumps [chuckwagoncomputing/interactive-pinout](https://github.com/chuckwagoncomputing/interactive-pinout) from 2.10 to 2.11.
- [Release notes](https://github.com/chuckwagoncomputing/interactive-pinout/releases)
- [Commits](https://github.com/chuckwagoncomputing/interactive-pinout/compare/2.10...2.11)

---
updated-dependencies:
- dependency-name: chuckwagoncomputing/interactive-pinout
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
2023-12-04 08:41:02 -05:00
dependabot[bot] 2c758dbcb6 build(deps): bump actions/checkout from 3 to 4
Bumps [actions/checkout](https://github.com/actions/checkout) from 3 to 4.
- [Release notes](https://github.com/actions/checkout/releases)
- [Changelog](https://github.com/actions/checkout/blob/main/CHANGELOG.md)
- [Commits](https://github.com/actions/checkout/compare/v3...v4)

---
updated-dependencies:
- dependency-name: actions/checkout
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
2023-12-04 07:29:25 -05:00
rusefillc e331ef9cdb only:Build Custom Board Firmware 2023-12-03 13:31:28 -05:00
rusefillc 45c71ed884 only:Build Custom Board Firmware 2023-12-02 00:30:20 -05:00
rusefillc 14d4e2ddeb only:Build Custom Board Firmware 2023-12-01 23:50:41 -05:00
rusefillc ae7c7bc400 only:Build Custom Board Firmware 2023-12-01 23:46:24 -05:00
rusefillc bb5b4c74fb only:Build Custom Board Firmware 2023-12-01 21:37:33 -05:00
rusefi a0ec5daa64 only: dead 2023-12-01 12:48:55 -05:00
rusefillc c24e5b2206 only:uaefi 2023-11-30 14:54:40 -05:00
dependabot[bot] 03a48a9d8a build(deps): bump actions/setup-java from 3 to 4
Bumps [actions/setup-java](https://github.com/actions/setup-java) from 3 to 4.
- [Release notes](https://github.com/actions/setup-java/releases)
- [Commits](https://github.com/actions/setup-java/compare/v3...v4)

---
updated-dependencies:
- dependency-name: actions/setup-java
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
2023-11-30 09:05:39 -05:00
Andrey 44db3b9297 disable for now 2023-11-25 20:36:24 -05:00
Andrey 768334f70d only:EPIC: Improve toolset for default tune canned tune generation #4871 2023-11-25 19:09:42 -05:00
Andrey 13a5e60024 only:EPIC: Improve toolset for default tune canned tune generation #4871 2023-11-25 18:27:24 -05:00
rusefillc e5a823d290 let's see at least one at_start_f435 2023-11-19 18:23:06 -05:00
rusefillc e3c787419c only:windows compilation seems broken #5703
reproducing issue at GHA
2023-11-09 18:17:25 -05:00
rusefillc d013c2e784 no activity on those 2023-11-08 09:32:04 -05:00
rusefi ab88650f2e only:alphax-8chan_debug 2023-11-05 12:22:01 -05:00
rusefillc 23fbc3f8f4 only:Unit Tests on Windows 2023-11-04 13:18:55 -04:00
rusefillc f3611894aa only:Unit Tests on Windows 2023-11-04 09:15:17 -04:00
rusefillc dd628ead12 only:Print bash version on windows 2023-11-03 22:43:12 -04:00
rusefi c1d3e93b9e only:Unit Tests on Windows 2023-11-03 22:09:58 -04:00
rusefillc 3cf7b6ee88 only:Unit Tests on Windows 2023-11-03 21:20:30 -04:00
rusefillc f07a21e37d Unit Tests on Windows 2023-11-03 21:08:24 -04:00
rusefillc 0e81c5cf10 Unit Tests on Windows 2023-11-03 20:54:02 -04:00
rusefillc 3b6c9feea5
require LEDs (#5643)
* require all boards to define LED functions (#272)

* require all boards to define LED functions

* f429 nucleo

* small can

* small can

* add to header

* LEDs

---------

Co-authored-by: Matthew Kennedy <matthewkennedy@outlook.com>
Co-authored-by: rusefillc <sdfsdfqsf2334234234>
2023-11-03 12:56:59 -04:00
dependabot[bot] 8066ad987d
Bump actions/checkout from 3 to 4 (#5665)
Bumps [actions/checkout](https://github.com/actions/checkout) from 3 to 4.
- [Release notes](https://github.com/actions/checkout/releases)
- [Changelog](https://github.com/actions/checkout/blob/main/CHANGELOG.md)
- [Commits](https://github.com/actions/checkout/compare/v3...v4)

---
updated-dependencies:
- dependency-name: actions/checkout
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2023-11-01 16:50:26 -04:00
Andreika 50acf4438e
Upload hwci rusefi.bin (#5677) 2023-11-01 16:27:34 -04:00
rusefi 4cb67f0f5e only:proteus uses better QC process 2023-10-31 13:06:26 -04:00
rusefi f5c03ce394 only:helping codeql 2023-10-30 22:34:04 -04:00
rusefillc 0b1b7a86d9 Make TPS/PPS split configurable #5620 2023-10-30 22:25:29 -04:00
Andrey G e298348981
Artery AT_START_F435 board support (#5662)
* AT32: port directory and files

* at_start_f435: reuse board.h from ChibiOS

* at_start_f435: fix LEDs

* at_start_f435: fix usb

* at_start_f435: fix compilation

* at_start_f435: add to workflow

* at_start_f435: add to workflow fix

* ports: at32: cleanup and comments
2023-10-29 19:13:31 -04:00
b4yuan 41aab72c8d
Add CodeQL Workflow for Code Security Analysis (#5656)
* Add CodeQL Workflow for Code Security Analysis

Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every push and pull request to the main branch.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for third-party code, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation.

Signed-off-by: Brian <bayuan@purdue.edu>

* Add CodeQL Workflow for Code Security Analysis

Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>

* Add CodeQL Workflow for Code Security Analysis

Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>

---------

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-27 23:38:34 -04:00
rusefillc b9e7453b0f EMI kills USB and causes a FATAL on the ECU #4310
only:hellen-honda-k_debug
2023-10-21 15:00:04 -04:00
rusefillc a31b8ba49f EMI kills USB and causes a FATAL on the ECU #4310
only:small-can-board_debug
2023-10-21 14:48:34 -04:00
rusefi 03aee89119 only:small-can-board 2023-10-20 15:54:55 -04:00
rusefi 2f0299832f EMI kills USB and causes a FATAL on the ECU #4310
only:proteus_f4_debug
2023-10-19 23:42:26 -04:00
rusefillc 1eacdbd025 only:SimulatorFunctionalTestLauncher explicit gradle task 2023-10-16 14:51:50 -04:00
rusefillc 7cebe4115e only:any new java file means something was generated 2023-10-12 16:25:53 -04:00
andrey 8d6c593432 only:f407-discovery_debug 2023-10-06 20:34:10 -04:00
rusefi 20983f7e2f automated testing
only: hellen154hyundai
2023-09-30 01:06:15 -04:00