355 Commits

Author SHA1 Message Date
Brian
00484d18a5
Update codeql-buildscript.sh
Update script name
2023-11-27 12:14:38 -05:00
Brian
490343b4d3 Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-29 15:28:27 -04:00
Brian
3cc82d656e Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-20 01:02:27 -04:00
Brian
b8ae3d55d4 Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-18 16:50:07 -04:00
Brian
d6acbd0ea5 Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every push and pull request to the main branch.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for third-party code, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation.

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-11 19:59:23 -04:00
hathach
14f1123bbd
remove left-over build_arm 2023-07-01 17:55:36 +07:00
hathach
99e75e6a8a
rework ra build 2023-07-01 12:41:12 +07:00
hathach
06d93e95d1
update hw test l4 2023-06-25 10:15:05 +07:00
hathach
2ecd7c148d
fix ci with lpc55 and kl, move hw test l4 to cmake iar 2023-06-25 09:55:05 +07:00
hathach
15376397b1
run ci with -DCMAKE_BUILD_TYPE=MinSizeRel 2023-06-25 00:05:23 +07:00
hathach
30ccfe0832
more cmake less make 2023-06-24 23:36:52 +07:00
hathach
9b2b4ce647
move some family ci make to cmake 2023-06-24 23:32:24 +07:00
hathach
430f16bf76
move all IAR to cmake 2023-06-24 22:36:53 +07:00
hathach
2a96ef2519
add cmake for f0, f1 2023-06-24 21:47:55 +07:00
hathach
7d0ce5605a
allow to skip CPU_CORE 2023-06-24 19:08:37 +07:00
hathach
b59b65d2ed
rename to kinetis_k32l2, rename OPT_MCU_KINETIS_K32 to OPT_MCU_KINETIS_K32L 2023-06-24 18:26:51 +07:00
hathach
268ce0287f
correct cmake iar build 2023-06-16 19:39:03 +07:00
hathach
1419091923
update h7 to cmake, and move iar build to cmake 2023-06-16 16:47:32 +07:00
hathach
e754795d3a
fix build warnings 2023-06-16 15:29:34 +07:00
hathach
1a37777f59
fix ci with win/mac 2023-06-15 13:11:21 +07:00
hathach
11fb837b51
fix ci 2023-06-02 16:15:26 +07:00
hathach
c2bc363f06
build g0 g4 iar cmake 2023-06-02 16:11:00 +07:00
hathach
e7090c7514
cmake refactor 2023-06-02 11:42:17 +07:00
hathach
c750030f7a
add freertosconfig for g0, add cmake stlink, add g0 to cmake ci 2023-06-01 17:09:00 +07:00
hathach
59ad5c59df
fix artifacts location 2023-05-26 18:58:21 +07:00
hathach
4bd02fb04d
more test 2023-05-26 18:54:14 +07:00
hathach
c88e7481be
retry hw test 2023-05-26 17:15:54 +07:00
hathach
7fb74a33a1
forgot to move hw test 2023-05-26 16:44:29 +07:00
hathach
7ac85d08c7
move lpc18 and rp2040 to cmake workflow since rp2040 often failed randomly with make 2023-05-26 16:37:47 +07:00
hathach
05cc342dfa
update deps, rename kinetis_k32 to k32l 2023-05-26 15:45:55 +07:00
hathach
1d857605b7
use get_deps.py 2023-05-26 15:25:55 +07:00
hathach
26d05d7fc9
fix issue with ftdi host driver with status bytes
add workflow_dispatch to all ci workflow
2023-05-25 16:53:32 +07:00
hathach
625c27ca58
add workflow_dispatch for manual trigger 2023-05-25 16:20:58 +07:00
hathach
5a0c2bd638
update get_deps.py to support geting family as argument 2023-05-25 16:11:57 +07:00
Ha Thach
1ef820ecfe
Enhance chipidea (#2075)
* update chipidea dcd, remove manual ep_count and use DCCPARAMS to get number of endpoint instead
* add dcd dcache for chipidea
* add cmake for lpc18
* add makefile build for mcx
* use fork of mcu sdk
* fix ci build with nrf
* flash rp2040 with openocd
2023-05-23 21:45:00 +07:00
hathach
1e91fc97e2 remove imxrt from makebuild 2023-05-10 14:59:23 +07:00
hathach
c4b2fed8bd forgot sudo 2023-05-10 13:51:45 +07:00
hathach
c3770019cb install ninja 2023-05-10 13:50:24 +07:00
hathach
8e3bdd2391 add python script to help building cmake, build all imxrt boards with ci 2023-05-10 13:09:15 +07:00
hathach
4c796b89d8 try to build with cmake on ci 2023-05-10 11:20:26 +07:00
Ha Thach
5f327dd49f
Merge pull request #2006 from hathach/cmake
Cmake
2023-04-06 00:39:39 +07:00
Ha Thach
44fab77c3d
Update bug_report.yml 2023-04-04 11:02:20 +07:00
hathach
5ef260d5fc fix build for esp32 2023-04-03 17:44:05 +07:00
hathach
f58da31145
clean up 2023-03-19 18:12:03 +07:00
hathach
f75a019732
bsp lpc17 2023-03-19 18:10:26 +07:00
hathach
934baae9b8
bsp lpc51 2023-03-19 17:58:20 +07:00
hathach
64c6b715ce
bsp lpc13 2023-03-19 17:27:45 +07:00
hathach
80be1aa13d
bsp lpc11 2023-03-19 17:19:33 +07:00
hathach
1867ba0bc1
fix l4 hw testing ci 2023-03-19 16:43:59 +07:00
hathach
b46632ba07
bsp for f2 f3 2023-03-19 13:11:41 +07:00