Image of an arrow

Introducing the v2.6 Release of the Yocto Project Extension for VS Code

Avatar

zwang

What’s new?

We’re happy to announce the release of v2.6.0, which includes which a few new features, improvements to user experience, and minor bug fixes. Check out the summarized changelog below:

  • Handle completion on bash simple variable expansion
  • Handle keywords import, require and inherit in Bash/Python context
  • Add SPDX license suggestions
  • Show license description on hover
  • Add support for Pylint and Flake8
  • Various bug fixes and improvements

Please check out the full release notes to see all the changes made in this release.

Show license description on hover

It now shows the description of the LICENSE when hovering on the value.

SPDX license suggestions

The extension now provides license suggestions as you type.

Links and resources

 

Leave a comment

Your email address will not be published. Required fields are marked *


Similar articles

Image of an arrow

Optimizing YOLO Training for Real-Time Detection on a LiDAR system This is the second of a three-part series on real-time YOLO detection on a LiDAR system for Edge AI. Find Article 1 on generating synthetic depth and NIR datasets here. Currently, new low-resolution embedded LiDAR such as the VL53L9CX, are emerging as a highly suitable […]

Enable Real-time Detection with Synthetic LiDAR Data Generation This series of articles will cover the essential components required to build real-time detection on a system with a dToF 3D LiDAR module. This first article is focused on synthetic LiDAR data generation. Synthetic LiDAR data generation for real-time detection Real-time Detection on a LiDAR System: Training […]

Accelerating early Linux boot with Yocto multiconfig By Paul Le Guen de Kerneizon Introduction In embedded products, cutting seconds, or even hundreds of milliseconds, from power‑on to application readiness is often critical. In this article, I will present a practical workflow to measure, compare, and iteratively reduce the early boot window of a Linux embedded […]

In today’s world, where everything from coffee machines to industrial equipment is connected to the network, knowing and assessing the security of your software and its dependencies has never been more important. Most vulnerabilities originate from small bugs in software components, and more recently (and thankfully less frequently) from sophisticated supply chain attacks. But with […]