Welcome to mirror list, hosted at ThFree Co, Russian Federation.

github.com/nanopb/nanopb.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2024-01-11Add additional test.HEADmasterMarco Nilsson
One test that will cause the build to fail if sizing is emitted on repeated fields, and one test that verifies that sizing _is_ emitted on repeated fields with fixed sizes.
2024-01-11Rename max_size member -> size.Marco Nilsson
This is more consistent with the C interface's naming convention.
2024-01-11Fix for Python 2.x.Marco Nilsson
F-strings aren't available in Python 2.
2024-01-11Add message sizes to C++ wrappers.Marco Nilsson
This adds a max_size field referring to the C #define, indicating the maximum encoded size of that message type. If the size cannot be determined, for example due to non-bounded repeated fields, the constant is omitted. This closes #932
2024-01-05--cpp-descriptors: change msgid type to uint32_tReinis Veips
2024-01-05--cpp-descriptors: add has_msgid() and msgid() methodsReinis Veips
2023-12-18Change check_ccflags to TryLinkRobin Kastberg
2023-11-21Update requirements.txtTed Pudlik
1.59 is the first grpcio-tools version with pre-built wheels for Python 3.12. Setuptools before 66.1.0 was not compatible with Python 3.12 due to the use of deprecated standard library classes.
2023-11-11Setting version to 0.4.9-devPetteri Aimonen
2023-11-11Publishing nanopb-0.4.8nanopb-0.4.80.4.8Petteri Aimonen
2023-11-10Update changelog and authorsPetteri Aimonen
2023-11-09Remove `nocopts` from cc_nanopb_proto_libraryArmando Montanez
With Bazel 7.0.0, nocopts has been removed and is no longer supported. The correct way to handle this is to subtract features using the `features` attribute (see bazelbuild/bazel#8706).
2023-10-30Add files via uploadTilen Majerle
2023-10-28Add CodeQL Workflow for Code Security AnalysisBrian
Add CodeQL Workflow for Code Security Analysis This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats. We added a new CodeQL workflow file (.github/workflows/codeql.yml) that - Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience). - Runs daily. - Excludes queries with a high false positive rate or low-severity findings. - Does not display results for git submodules, focusing only on our own codebase. Testing: To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code. Deployment: Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps: 1. Under the repository name, click on the Security tab. 2. In the left sidebar, click Code scanning alerts. Additional Information: - You can further customize the workflow to adapt to your specific needs by modifying the workflow file. - For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/). Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-28Add CodeQL Workflow for Code Security AnalysisBrian
Add CodeQL Workflow for Code Security Analysis This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats. We added a new CodeQL workflow file (.github/workflows/codeql.yml) that - Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience). - Runs daily. - Excludes queries with a high false positive rate or low-severity findings. - Does not display results for git submodules, focusing only on our own codebase. Testing: To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code. Deployment: Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps: 1. Under the repository name, click on the Security tab. 2. In the left sidebar, click Code scanning alerts. Additional Information: - You can further customize the workflow to adapt to your specific needs by modifying the workflow file. - For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/). Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-28Add CodeQL Workflow for Code Security AnalysisBrian
Add CodeQL Workflow for Code Security Analysis This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats. We added a new CodeQL workflow file (.github/workflows/codeql.yml) that - Runs on every push and pull request to the main branch. - Excludes queries with a high false positive rate or low-severity findings. - Does not display results for third-party code, focusing only on our own codebase. Testing: To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code. Deployment: Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps: 1. Under the repository name, click on the Security tab. 2. In the left sidebar, click Code scanning alerts. Additional Information: - You can further customize the workflow to adapt to your specific needs by modifying the workflow file. - For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation. Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-27CMake: Installation improvements.Petteri Aimonen
- Allow installed nanopb_generator.py wrapper script find the module by relative path. - Install include files under `nanopb` subdirectory.
2023-10-27CMakeLists: reorder generator installation commandsPetteri Aimonen
2023-10-27Add GitHub workflow for testing CMake installationPetteri Aimonen
2023-10-27Make CMakeLists install as Python module 'nanopb', not 'proto' (#845)Petteri Aimonen
Makes the installation consistent with "pip install nanopb" results, and avoids naming conflicts with other libraries.
2023-10-19Fix build failure on MSVCPetteri Aimonen
2023-10-19Automatically break circular dependencies (#881)Petteri Aimonen
It is better to define FT_CALLBACK manually at the point where it makes sense, but the automatic logic avoids build failures if you don't care about the details.
2023-10-19Add test cases for initializer macro special cases (#806)Petteri Aimonen
2023-10-19Fix initializer macros for custom callback datatype (#806)Petteri Aimonen
Uses NULL for pointer types and {} for other types. User can override the type with generator option "initializer".
2023-10-19Add test case for package name replacement in included file (#899)Petteri Aimonen
2023-10-19Fix submessages with different mangling rulesRichard Patel
2023-10-14Add support for nanopb options files without patching rules_proto_grpcmark
2023-10-11Add support for .options files in bazel rulesTobias Thiel
2023-10-11Add unit test for .options files in bazel rulesTobias Thiel
2023-10-09Fix Linux/Mac binary package buildPetteri Aimonen
PyInstaller now puts libraries in a subdirectory. Use --strip instead of manually stripping debug symbols. Needed also changes in how builtin protoc include path is constructed.
2023-09-08Provide the maximum message sizejheaff1
2023-08-31Add missing source and data filesKrishna Ersson
2023-08-17Ensure the long enum names conform to the naming style when using short enum ↵Josh Strohminger
names
2023-08-17Keep track of enum auxiliary defines as mangled pairsJosh Strohminger
2023-08-17Keep track of message initializers as mangled pairsJosh Strohminger
2023-08-17Add test for stripping package names across dependent proto filesJosh Strohminger
2023-08-17Support newer protoc version scheme that only includes the minor and patch ↵Josh Strohminger
versions If only the minor and patch versions are found, assume the major version is 3.
2023-08-17Update readme to match other examples configurations for running tests on MacJosh Strohminger
2023-08-11Fix first path passed to protocTobias Müller
Fix relative path passed to protoc when using RELPATH but NANOPB_GENERATE_CPP_APPEND_PATH not set. In this case the path provided by RELPATH should be passed to protoc first instead of the current source directory. This was working before and broke with 8cc860c. Co-authored-by: Guillaume Lager <g.lager@innoseis.com>
2023-08-08Remove pkg_resources import (#887)dev_remove_pkg_resourcesPetteri Aimonen
These were needed by old versions of pyinstaller.
2023-07-12Allow substitutions in custom_nanopb_protosJoseph Duchesne
Allows building protos found in libraries by using ${PIOENV} substitutions like so: `custom_nanopb_protos = +<.pio/libdeps/${PIOENV}/some_library/proto/*.proto>`
2023-07-06Bump grpcio from 1.51.3 to 1.53.0 in /extradependabot[bot]
Bumps [grpcio](https://github.com/grpc/grpc) from 1.51.3 to 1.53.0. - [Release notes](https://github.com/grpc/grpc/releases) - [Changelog](https://github.com/grpc/grpc/blob/master/doc/grpc_release_schedule.md) - [Commits](https://github.com/grpc/grpc/compare/v1.51.3...v1.53.0) --- updated-dependencies: - dependency-name: grpcio dependency-type: direct:production ... Signed-off-by: dependabot[bot] <support@github.com>
2023-06-26Test cases: fix broken version check for libprotoc 23.1.Petteri Aimonen
Protoc version number seems to have dropped the last number, match only first two in the regexp.
2023-06-12Add migration documentation for int_size option for enum fieldsjheaff1
2023-06-12Add unit test for int_size option for enumsjheaff1
2023-06-12Add ability to specify size of generated enumsjheaff1
2023-05-17CMakeLists: Minimum version 3.14Petteri Aimonen
Needed for NAME_WLE (see commit 9cdc4cf2104ba1592). Thanks for Ilya Maykov for noticing.
2023-05-15Add nanopb_PYTHON_INSTDIR_OVERRIDE to CMakeLists.txtNick St.Pierre
2023-05-11add "call" under Windows upon generator callphilippe44
2023-05-09GitHub workflow: update bazel mac image versionPetteri Aimonen