6339 Commits

Author SHA1 Message Date
lyon
bef27d8ab1 improve lvgl, tested on ac5 ,fix mutex port on FreeRTOS 2024-01-03 22:30:02 +08:00
Lyon
89f46e6e15 fix ci 2024-01-02 17:08:24 +08:00
Lyon
5e48de6a66 sync time package 2024-01-02 16:57:53 +08:00
Lyon
c72702fce6 asctime() return str, tick port win32 2024-01-02 16:22:21 +08:00
Lyon
bf917e356a support keyboard wegit for lvgl 2024-01-02 15:33:06 +08:00
lyon1998
c52e180975 fix attr.XX.YY cause mem lack 2024-01-01 19:22:21 +08:00
lyon
35767e2a77 support meter for lvgl 2023-12-31 04:10:47 +08:00
lyon
a83cad3404 Merge branch 'master' of https://github.com/pikastech/pikapython 2023-12-30 09:33:32 +08:00
lyon
acfb5daadf support tabview for pika_lvgl and add example 2023-12-30 09:33:04 +08:00
Lyon
814e01aa30 Merge branch 'master' of https://gitee.com/lyon1998/pikascript 2023-12-28 14:31:11 +08:00
Lyon
fa9a36c502 add repl_recv port for timeout support 2023-12-28 14:30:16 +08:00
李昂
edf3f0d226
fix patch tool for utf-8 encode 2023-12-27 16:17:27 +00:00
lyon1998
2a90b21d35 sync LAN support for network 2023-12-28 00:14:01 +08:00
lyon1998
07065ac3cf sync to package 2023-12-27 22:37:26 +08:00
lyon
0ce3e4c7a4 sync pika_hal 2023-12-27 22:35:04 +08:00
lyon
d317da20c2 patch for modbus network lvgl 2023-12-27 22:28:48 +08:00
Lyon
a4c85cc305 support |= &= ^= >>= <<= 2023-12-26 10:36:22 +08:00
lyon1998
bbe04c7d93 more check for fuzzypid 2023-12-18 02:35:10 +08:00
lyon1998
8131137b2c update readme for fuzzypid 2023-12-18 02:21:40 +08:00
lyon1998
ea37db682c fuzzy pid tested OK 2023-12-18 02:17:24 +08:00
lyon1998
2f72510ced release pika_hal 2023-12-17 23:20:13 +08:00
lyon
9d60257782 add circlequeue support for pika_hal 2023-12-17 23:01:00 +08:00
lyon1998
7b8bd13927 fix pika_debug issue for vm 2023-12-17 20:24:56 +08:00
lyon1998
6c48ec34be fix str_void issue 2023-12-17 20:17:36 +08:00
lyon1998
2cec7c47cc Merge branch 'master' of https://github.com/pikastech/pikascript 2023-12-16 23:38:49 +08:00
lyon1998
0d1ffcaa73 fix v1.13.1 release 2023-12-16 23:25:43 +08:00
lyon1998
758a80dd8d fix version num for v1.13.1 2023-12-16 23:25:22 +08:00
Lyon
b0a856a7b9
Merge pull request #334 from GorgonMeducer/update-cmsis-pack
Update cmsis pack
2023-12-16 23:23:00 +08:00
Gabriel Wang
a89e6ac793 update cmsis-pack 2023-12-16 15:11:54 +00:00
lyon1998
a02ed0feb9 release kernal v1.13.1 2023-12-16 22:48:34 +08:00
lyon1998
911b86d218 support macro control for obj_newObj 2023-12-16 22:47:20 +08:00
Gabriel Wang
ce750ae5da Update clean.bat 2023-12-16 13:46:59 +00:00
Gabriel Wang
dc256effc1 update script and pdsc 2023-12-16 13:46:49 +00:00
Gabriel Wang
1a4bf78ce5 Update gen_pack.sh 2023-12-16 13:39:19 +00:00
Gabriel Wang
bf7f237878 Update PikaTech.PikaScript.xml 2023-12-16 13:36:43 +00:00
lyon1998
0a02e54ae0 update pdsc for v1.13.0 2023-12-16 21:24:05 +08:00
lyon1998
a6f9a6c893 fix FDB_config and fwrite size check 2023-12-07 23:30:54 +08:00
lyon1998
be098b033c fix flashdb test assert 2023-12-07 23:03:01 +08:00
lyon1998
3efc448859 rename FDB to KVDB 2023-12-07 22:22:42 +08:00
lyon1998
fc437ae518 fix kvdb on libc_file port 2023-12-07 18:53:30 +08:00
lyon1998
0b9ed2b8d1 fix libc read/write for flashdb 2023-12-07 01:45:29 +08:00
lyon1998
eea7dbd0fc fix mem lack, get_blob for default_kvs not work 2023-12-06 23:57:48 +08:00
lyon
c8b0ffb220 fix port for flashdb pkg 2023-12-06 23:16:31 +08:00
lyon
fc63ab8e6a fix getcwd on win32 2023-12-03 14:55:29 +08:00
Brian
fba5e0b8ae
Add CodeQL Workflow for Code Security Analysis (#331)
* Add CodeQL Workflow for Code Security Analysis

Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every push and pull request to the main branch.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for third-party code, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation.

Signed-off-by: Brian <bayuan@purdue.edu>

* Add CodeQL Workflow for Code Security Analysis

Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>

* Add CodeQL Workflow for Code Security Analysis

Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>

* Add CodeQL Workflow for Code Security Analysis

Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>

* Remove failing on error and clean up codeql.yml

---------

Signed-off-by: Brian <bayuan@purdue.edu>
2023-12-03 01:51:52 +08:00
lyon1998
429adcef77 fix file size align in pya (v7) 2023-12-03 01:49:05 +08:00
lyon
83aa2aa805 fix pikafs_fread 2023-12-01 01:33:54 +08:00
lyon
7e3c589c48 fix win32 2023-12-01 01:33:03 +08:00
lyon
a14baffbc4 patch for win32 2023-12-01 01:04:18 +08:00
Lyon
c9bcde45ec sync random and socket pkg 2023-11-27 16:19:26 +08:00