Commit Graph

6913 Commits

Author SHA1 Message Date
Brian
00484d18a5 Update codeql-buildscript.sh
Update script name
2023-11-27 12:14:38 -05:00
Brian
490343b4d3 Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-29 15:28:27 -04:00
Brian
3cc82d656e Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-20 01:02:27 -04:00
Brian
b8ae3d55d4 Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-18 16:50:07 -04:00
Brian
d6acbd0ea5 Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every push and pull request to the main branch.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for third-party code, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation.

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-11 19:59:23 -04:00
Ha Thach
f1e006d09b Merge pull request #2137 from hathach/cmake-ra
enhance RA family
2023-07-03 12:25:29 +07:00
hathach
d5d1b43eb9 board pin data clean up 2023-07-03 12:07:27 +07:00
hathach
4080ab3d03 wrap up ra update 2023-07-03 11:22:19 +07:00
hathach
960d9fa6f1 move files around 2023-07-03 11:03:50 +07:00
hathach
ad7764b5b2 move vector_data.h and ioport_cfg.h to common family 2023-07-03 10:54:37 +07:00
Ha Thach
942eb0f323 Merge pull request #2129 from dauc/patch-1
Fix minor spelling issues
2023-07-02 23:40:37 +07:00
hathach
787229a35e add etm trace for 6m5 2023-07-02 23:39:43 +07:00
hathach
ec02ddf986 initial ra6m5 ek, board_test led + sw works 2023-07-01 21:43:52 +07:00
hathach
14f1123bbd remove left-over build_arm 2023-07-01 17:55:36 +07:00
hathach
e7431f54f2 fix undef with fsp 2023-07-01 17:46:21 +07:00
hathach
54dc699ddd forgot board.mk for ra6m1 2023-07-01 17:43:06 +07:00
hathach
c5d958d104 add ra6m1 board 2023-07-01 17:27:45 +07:00
hathach
50381f7b4c refactor to match fsp_cfg 2023-07-01 17:09:09 +07:00
hathach
22fb66436d update linker 2023-07-01 16:40:47 +07:00
hathach
99e75e6a8a rework ra build 2023-07-01 12:41:12 +07:00
hathach
48738df489 move LTO checked to family_support.cmake 2023-06-30 16:05:59 +07:00
hathach
3cb4d73899 clean up ra makefile 2023-06-30 14:52:04 +07:00
Ha Thach
f5d0510064 Update build badge 2023-06-29 22:57:58 +07:00
Ha Thach
6e1eec908a Merge pull request #2130 from hathach/hcd-frame-pio-usb
add hcd_frame_number() for pio-usb host
2023-06-29 22:46:24 +07:00
hathach
6284f2d722 add hcd_frame_number() for pio-usb host 2023-06-29 18:58:33 +07:00
Devin Auclair
98fb10a724 Fix minor spelling 2023-06-28 14:03:18 -04:00
Ha Thach
fe77b6713b Merge pull request #2085 from georgeboc/msc-ready-bug-fix
Fixes bug in tuh_msc_ready
2023-06-27 17:57:35 +07:00
Ha Thach
5cea4b2420 Merge pull request #2128 from hathach/cmake-freertos
rework cmake with rtos support add RTOS to family_configure_device/host/dual_example()
2023-06-27 16:18:17 +07:00
hathach
e43387abac rework cmake with rtos support add RTOS to family_configure_device/host/dual_example() 2023-06-27 15:45:38 +07:00
Ha Thach
bc0d6c7e92 Merge pull request #2127 from hathach/rp2040-cmake-cleanup
Rp2040 cmake cleanup
2023-06-26 23:50:38 +07:00
hathach
a61d0f074f more rp2040 family clean up 2023-06-26 23:08:59 +07:00
hathach
8aa28e63fb minor clean up with include_guard() 2023-06-26 17:54:31 +07:00
hathach
3cfb838ba7 fix warnings when enable rtt with rp2040 2023-06-26 17:03:45 +07:00
Ha Thach
7454e45796 Merge pull request #2125 from hathach/cmake-detect-family
auto detect FAMILY based on BOARD
2023-06-26 14:08:17 +07:00
hathach
200e58d11e auto detect FAMILY based on BOARD 2023-06-26 13:38:24 +07:00
Ha Thach
eb53680a06 Merge pull request #2124 from hathach/refactor-make-build
Refactor make build
2023-06-25 13:48:00 +07:00
hathach
06d93e95d1 update hw test l4 2023-06-25 10:15:05 +07:00
hathach
2ecd7c148d fix ci with lpc55 and kl, move hw test l4 to cmake iar 2023-06-25 09:55:05 +07:00
hathach
15376397b1 run ci with -DCMAKE_BUILD_TYPE=MinSizeRel 2023-06-25 00:05:23 +07:00
hathach
30ccfe0832 more cmake less make 2023-06-24 23:36:52 +07:00
hathach
9b2b4ce647 move some family ci make to cmake 2023-06-24 23:32:24 +07:00
hathach
a64d5607a7 fix l4 freertos build 2023-06-24 23:17:28 +07:00
hathach
b9cefb1440 fix build with L4 2023-06-24 23:10:01 +07:00
hathach
c81d8b43a1 fix ci build 2023-06-24 22:58:15 +07:00
hathach
430f16bf76 move all IAR to cmake 2023-06-24 22:36:53 +07:00
hathach
2a96ef2519 add cmake for f0, f1 2023-06-24 21:47:55 +07:00
hathach
946d3fdd4f fix iar with make 2023-06-24 21:17:40 +07:00
hathach
38a582634e fix missing replace 2023-06-24 20:32:18 +07:00
hathach
eb4380fa14 more make update 2023-06-24 20:17:48 +07:00
hathach
2216704db8 rename GCC_CFLAGS to CFLAGS_GCC, GCC_SRC_S to SRC_S_GCC etc .. 2023-06-24 19:31:33 +07:00