-
-
Notifications
You must be signed in to change notification settings - Fork 6
pip: bump lcov-cobertura from 2.0.2 to 2.1.1 #211
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
dependabot
wants to merge
403
commits into
dasharo
Choose a base branch
from
dependabot/pip/lcov-cobertura-2.1.1
base: dasharo
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Signed-off-by: Michał Żygowski <[email protected]>
Signed-off-by: Michał Żygowski <[email protected]>
…turesStrings.uni: fix incorrect min timeout in helptext Signed-off-by: Michał Kopeć <[email protected]>
…ch other Signed-off-by: Michał Kopeć <[email protected]>
Signed-off-by: Michał Żygowski <[email protected]>
Signed-off-by: Michał Żygowski <[email protected]>
Signed-off-by: Michał Żygowski <[email protected]>
… name Signed-off-by: Michał Żygowski <[email protected]>
…n NETWORK_ENABLE Signed-off-by: Michał Żygowski <[email protected]>
Signed-off-by: Michał Żygowski <[email protected]>
MdeModulePkg: * add defines * add PcdDetectPs2KbOnCmdAck DasharoPayloadPkg: * detect PS/2 keyboard by sending it an "echo" command if Dasharo/Ps2Controller is enabled or doesn't exist * remove PS/2 from ConIn if the variable exists and the keyboard is not connected or is disabled
…c: refresh logo after popup Signed-off-by: Michał Żygowski <[email protected]>
Signed-off-by: Michał Żygowski <[email protected]>
Signed-off-by: Michał Żygowski <[email protected]>
Fixing one confusing debug message in DasharoPayloadPkg/Library/SmmStoreLib/SmmStore.c in the process. Signed-off-by: Michał Żygowski <[email protected]> Signed-off-by: Sergii Dmytruk <[email protected]>
Signed-off-by: Patrick Rudolph <[email protected]>
Signed-off-by: Michał Żygowski <[email protected]>
…row for selected item and better contrast Signed-off-by: Michał Żygowski <[email protected]>
…vars are not populated but network boot is enabled Signed-off-by: Michał Żygowski <[email protected]>
Signed-off-by: Michał Żygowski <[email protected]>
Signed-off-by: Kacper Stojek <[email protected]>
…ticatedVariableGuid as header Signed-off-by: Michał Kopeć <[email protected]>
Signed-off-by: Michał Żygowski <[email protected]>
Signed-off-by: Karol Zmyslowski <[email protected]> Signed-off-by: Michał Kopeć <[email protected]> Signed-off-by: Michał Żygowski <[email protected]>
…c: add more debug logs Signed-off-by: Michał Żygowski <[email protected]>
…c: reorganize Boot Manager registration Signed-off-by: Michał Żygowski <[email protected]>
…2 detection Signed-off-by: Michał Żygowski <[email protected]>
Signed-off-by: Michał Kopeć <[email protected]>
Signed-off-by: Michał Żygowski <[email protected]>
Signed-off-by: Michał Żygowski <[email protected]>
Such strings include, for example, coreboot version information. Signed-off-by: Sergii Dmytruk <[email protected]>
Part of functions of the library are left unimplemented (return EFI_UNSUPPORTED) the rest use information about current firmware obtained from CBMEM and SMMSTOREv2 to perform flashing. Flashing is slightly optimized: FmpDeviceSetImageWithStatus() first reads a block and checks that it differs from the new contents before initiating erase and write. Signed-off-by: Sergii Dmytruk <[email protected]>
…s HAP-disabled HAP-disabled ME doesn't do anything, including writing to system flash, which is what we need for a firmware update that relies on a warm reset. coreboot assumes that HECI/soft-disabled state of ME isn't as good as HMRFPO and switches to HMRFPO doing a global reset which loses in-RAM capsules. Checking variable's value should be enough, if somebody manually set it to an invalid value, the update there will be a reboot without a capsule update. A more reliable solution would be to pass this information from coreboot. Signed-off-by: Sergii Dmytruk <[email protected]>
…psules Signed-off-by: Sergii Dmytruk <[email protected]>
coreboot flash map data parsing library. There is a small amount of code, so modify it to mostly look like EDK code. Signed-off-by: Sergii Dmytruk <[email protected]>
This is a preparation for moving data from current image. Signed-off-by: Sergii Dmytruk <[email protected]>
Introduce and integrate MergeFirmwareImages() which will perform the migration. Signed-off-by: Sergii Dmytruk <[email protected]>
Signed-off-by: Sergii Dmytruk <[email protected]>
Signed-off-by: Sergii Dmytruk <[email protected]>
Signed-off-by: Sergii Dmytruk <[email protected]>
The code is imported in its essentially unchanged form (although large chunks of unused code were removed). There is a header which maps C symbols to their equivalents in EDK2 to make the code work without modifications. Signed-off-by: Sergii Dmytruk <[email protected]>
Returning an error from this function can disable useful functionality like capsule updates because progress bar treats such errors as fatal... Signed-off-by: Sergii Dmytruk <[email protected]>
The information is stored in CBFS files with known names. Signed-off-by: Sergii Dmytruk <[email protected]>
Simple EFI variables driver as a library. Signed-off-by: Sergii Dmytruk <[email protected]>
Instead of copying whole SMMSTORE region. Signed-off-by: Sergii Dmytruk <[email protected]>
…s bar Position and size of progress bar produced by DisplayUpdateProgressLibGraphics depends on the size of boot logo. As the logo can be customized by users, a dummy logo with determinable dimensions, depending on the size of current GOP mode, is created to make progress bar appear always in the same place. Signed-off-by: Krystian Hebel <[email protected]>
Project page: https://gitlab.com/bztsrc/scalable-font2 Signed-off-by: Krystian Hebel <[email protected]>
Signed-off-by: Krystian Hebel <[email protected]>
…errors Reasoning for ignoring errors is that this driver gives only informational output, and failure to do so shouldn't abort the update process. Signed-off-by: Krystian Hebel <[email protected]>
Previously, the code chose the highest non-reserved RAM region below 4G mark, regardless of its size. If the memory is fragmented, this may result in failed memory allocation further down the line. Skip regions smaller than PeiMemSize as defined in BlPeiEntryPoint. In some cases, it isn't possible to differentiate between structures in RAM (e.g. coreboot tables) and memory reserved by System Agent (e.g. TSEG, GSM) based on memory region type. Both are reported as reserved memory and they may even be combined into one region, but their caching methods must be different. Because of that, MTRR setting code is no longer called at this point. This depends on coreboot setting memory caching attributes properly, which it already does. Signed-off-by: Krystian Hebel <[email protected]>
This is required for initializing capsule update process from Linux's capsule_loader. It also fixes the possibility for putting the device in infinite FUM loop by creating the variable with runtime access. SetVariable() in WarnIfFirmwareUpdateMode() used to remove the variable failed because of mismatched attributes. According to UEFI specification, > If a preexisting variable is rewritten with no access attributes > specified, the variable will be deleted. This is exactly what is needed. The other way to delete a variable is to specify matching attributes and set the size of a variable as 0. Signed-off-by: Krystian Hebel <[email protected]>
The MTRRs have already been programmed by FSB (coreboot). Change-Id: I8c6e7657b789edac8ee83a89318209a598712db8 Signed-off-by: Patrick Rudolph <[email protected]> Signed-off-by: Sergii Dmytruk <[email protected]>
…version Signed-off-by: Michał Żygowski <[email protected]>
Signed-off-by: Michał Żygowski <[email protected]>
…reshold For some reason the CPU Throttling Threshold dsiplayed negative value when user changed CPU throttling, exited Power Management Options menu, went back to front page and then entered Power Management Options menu again. Always calculate the threshold based on PCD and current throttling offset value. Add interactive flag to the options and patch the value in the callback. Signed-off-by: Michał Żygowski <[email protected]>
Bumps [lcov-cobertura](https://eriwen.github.io/lcov-to-cobertura-xml/) from 2.0.2 to 2.1.1. --- updated-dependencies: - dependency-name: lcov-cobertura dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <[email protected]>
Dependabot tried to add
|
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
dependencies
Pull requests that update a dependency file
python
Pull requests that update Python code
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Bumps lcov-cobertura from 2.0.2 to 2.1.1.
You can trigger a rebase of this PR by commenting
@dependabot rebase
.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebase
will rebase this PR@dependabot recreate
will recreate this PR, overwriting any edits that have been made to it@dependabot merge
will merge this PR after your CI passes on it@dependabot squash and merge
will squash and merge this PR after your CI passes on it@dependabot cancel merge
will cancel a previously requested merge and block automerging@dependabot reopen
will reopen this PR if it is closed@dependabot close
will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot show <dependency name> ignore conditions
will show all of the ignore conditions of the specified dependency@dependabot ignore this major version
will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor version
will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependency
will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)