Skip to content

Release: 3 fixes, 1 perf, 1 chore → Main#7809

Merged
h0lybyte merged 5 commits intomainfrom
dev
Mar 9, 2026
Merged

Release: 3 fixes, 1 perf, 1 chore → Main#7809
h0lybyte merged 5 commits intomainfrom
dev

Conversation

@github-actions
Copy link
Contributor

@github-actions github-actions bot commented Mar 9, 2026

Release: Dev → Main

5 atomic commits ready for main

Bug Fixes

Performance

Chores


This PR is automatically maintained by CI — KBVE Studio

* perf(isometric): switch WASM to WebGPU backend and batch per-chunk meshes

Switch Bevy WASM backend from WebGL2 to WebGPU for better GPU utilization.
Combine 512 per-tile meshes into 2 per-chunk combined meshes with vertex
colors and compound Rapier colliders, reducing draw calls ~256x and
doubling FPS from 30 to 60 on WASM.

* fix(isometric): restore hover highlighting on WASM with Rapier raycast

Add WASM-specific Rapier raycast hover detection since MeshPickingPlugin
cannot work with the offscreen render target camera. Also add
Pickable::IGNORE to chunk mesh entities so they don't block picking.

* fix(isometric): correct Z-face winding, stable camera axes, unbatch trees

- Fix +Z and -Z face vertex order in push_cuboid and push_terrain_body
  (wrong winding made cliff "left face" invisible from isometric camera)
- Add face culling for body columns to eliminate interior z-fighting
- Precompute camera axes via LazyLock to prevent pixel-snap drift
- Remove sub-pixel display quad offset (causes texel swimming at 2x)
- Unbatch trees into individual entities for hover/select support
- Add cap Y offset (+0.001) and vegetation Y offset (+0.002) for z-fighting
- Remove dead GrassPlugin from mod.rs
h0lybyte added 2 commits March 9, 2026 01:52
- Change raycast hover filter from Occludable to HoverOutline so trees
  are selectable again (trees no longer have Occludable)
- Remove Occludable/OriginalEmissive from trees to prevent shared-material
  bugs (occlusion/hover modifying chunk_body_mat affected all trees)
- Increase cap Y offset from 0.001 to 0.005 to reduce body-cap z-fighting
- Guard hover highlight and occlusion systems with change detection to
  avoid unnecessary GPU material re-uploads every frame
* fix(dashboard): add timeouts and diagnostic details to ArgoCD proxy 502

- Add connect_timeout(5s) and timeout(15s) to both Grafana and ArgoCD
  reqwest clients to prevent indefinite hangs
- Enhanced 502 error response with reason (connection failed / timed out /
  request error) and detail fields for diagnostic visibility
- Frontend ReactArgoDashboard now parses the diagnostic 502 response and
  shows contextual error messages (service unreachable vs timeout)

* fix(dashboard): remove redundant ternary flagged by CodeQL

The color ternary inside the `errorReason &&` guard was always truthy.
Simplified to use the amber color directly.
@github-actions
Copy link
Contributor Author

github-actions bot commented Mar 9, 2026

Dependency Review

The following issues were found:
  • ✅ 0 vulnerable package(s)
  • ✅ 0 package(s) with incompatible licenses
  • ✅ 0 package(s) with invalid SPDX license definitions
  • ⚠️ 1 package(s) with unknown licenses.
See the Details below.

License Issues

Cargo.lock

PackageVersionLicenseIssue Type
webbrowser1.2.0NullUnknown License

OpenSSF Scorecard

Scorecard details
PackageVersionScoreDetails
cargo/jni 0.22.3 🟢 4.2
Details
CheckScoreReason
Code-Review⚠️ 0Found 2/28 approved changesets -- score normalized to 0
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Maintained🟢 1030 commit(s) and 23 issue activity found in the last 90 days -- score normalized to 10
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
Packaging⚠️ -1packaging workflow not detected
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Binary-Artifacts🟢 10no binaries found in the repo
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
Security-Policy⚠️ 0security policy file not detected
Fuzzing⚠️ 0project is not fuzzed
License🟢 10license file detected
Signed-Releases⚠️ -1no releases found
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
SAST⚠️ 0SAST tool is not run on all commits -- score normalized to 0
cargo/jni-macros 0.22.2 🟢 4.2
Details
CheckScoreReason
Code-Review⚠️ 0Found 2/28 approved changesets -- score normalized to 0
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Maintained🟢 1030 commit(s) and 23 issue activity found in the last 90 days -- score normalized to 10
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
Packaging⚠️ -1packaging workflow not detected
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Binary-Artifacts🟢 10no binaries found in the repo
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
Security-Policy⚠️ 0security policy file not detected
Fuzzing⚠️ 0project is not fuzzed
License🟢 10license file detected
Signed-Releases⚠️ -1no releases found
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
SAST⚠️ 0SAST tool is not run on all commits -- score normalized to 0
cargo/jni-sys 0.4.1 UnknownUnknown
cargo/jni-sys-macros 0.4.1 UnknownUnknown
cargo/libc 0.2.183 🟢 5.9
Details
CheckScoreReason
Code-Review🟢 8Found 18/21 approved changesets -- score normalized to 8
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Maintained🟢 1030 commit(s) and 2 issue activity found in the last 90 days -- score normalized to 10
Packaging⚠️ -1packaging workflow not detected
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
Binary-Artifacts🟢 10no binaries found in the repo
License🟢 10license file detected
Fuzzing⚠️ 0project is not fuzzed
Signed-Releases⚠️ -1no releases found
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
Security-Policy🟢 10security policy file detected
SAST⚠️ 0SAST tool is not run on all commits -- score normalized to 0
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
cargo/proc-macro-crate 2.0.2 🟢 3.8
Details
CheckScoreReason
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Code-Review🟢 6Found 6/10 approved changesets -- score normalized to 6
Binary-Artifacts🟢 10no binaries found in the repo
Maintained⚠️ 00 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
Packaging⚠️ -1packaging workflow not detected
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Security-Policy⚠️ 0security policy file not detected
Fuzzing⚠️ 0project is not fuzzed
License🟢 10license file detected
Signed-Releases⚠️ -1no releases found
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
SAST⚠️ 0SAST tool is not run on all commits -- score normalized to 0
cargo/simd_cesu8 1.1.1 UnknownUnknown
cargo/simdutf8 0.1.5 🟢 3.9
Details
CheckScoreReason
Maintained🟢 56 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 5
Packaging⚠️ -1packaging workflow not detected
Code-Review⚠️ 0Found 0/30 approved changesets -- score normalized to 0
Binary-Artifacts🟢 10no binaries found in the repo
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
Security-Policy⚠️ 0security policy file not detected
License🟢 9license file detected
Fuzzing🟢 10project is fuzzed
Signed-Releases⚠️ -1no releases found
Branch-Protection⚠️ 0branch protection not enabled on development/release branches
SAST⚠️ 0SAST tool is not run on all commits -- score normalized to 0
cargo/toml_datetime 0.6.3 🟢 6.9
Details
CheckScoreReason
Packaging⚠️ -1packaging workflow not detected
Maintained🟢 1030 commit(s) and 15 issue activity found in the last 90 days -- score normalized to 10
Code-Review⚠️ 0Found 0/11 approved changesets -- score normalized to 0
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Token-Permissions🟢 10GitHub workflow tokens follow principle of least privilege
Security-Policy⚠️ 0security policy file not detected
Binary-Artifacts🟢 10no binaries found in the repo
License🟢 10license file detected
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
Signed-Releases⚠️ -1no releases found
Fuzzing🟢 10project is fuzzed
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
SAST🟢 10SAST tool is run on all commits
cargo/webbrowser 1.2.0 🟢 4.9
Details
CheckScoreReason
Code-Review🟢 3Found 8/21 approved changesets -- score normalized to 3
Maintained🟢 34 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 3
Security-Policy🟢 10security policy file detected
Binary-Artifacts🟢 10no binaries found in the repo
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
Fuzzing⚠️ 0project is not fuzzed
License🟢 10license file detected
Packaging🟢 10packaging workflow detected
Signed-Releases⚠️ -1no releases found
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
SAST⚠️ 0SAST tool is not run on all commits -- score normalized to 0
cargo/zerocopy 0.8.41 🟢 8.1
Details
CheckScoreReason
Binary-Artifacts🟢 10no binaries found in the repo
Branch-Protection🟢 5branch protection is not maximal on development and all release branches
CI-Tests🟢 1030 out of 30 merged PRs checked by a CI test -- score normalized to 10
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Code-Review🟢 10all changesets reviewed
Contributors🟢 10project has 10 contributing companies or organizations
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Dependency-Update-Tool🟢 10update tool detected
Fuzzing⚠️ 0project is not fuzzed
License🟢 10license file detected
Maintained🟢 1030 commit(s) and 16 issue activity found in the last 90 days -- score normalized to 10
Packaging⚠️ -1packaging workflow not detected
Pinned-Dependencies🟢 8dependency not pinned by hash detected -- score normalized to 8
SAST⚠️ 0SAST tool is not run on all commits -- score normalized to 0
Security-Policy🟢 10security policy file detected
Signed-Releases⚠️ -1no releases found
Token-Permissions🟢 10GitHub workflow tokens follow principle of least privilege
Vulnerabilities🟢 100 existing vulnerabilities detected
cargo/zerocopy-derive 0.8.41 🟢 8.1
Details
CheckScoreReason
Binary-Artifacts🟢 10no binaries found in the repo
Branch-Protection🟢 5branch protection is not maximal on development and all release branches
CI-Tests🟢 1030 out of 30 merged PRs checked by a CI test -- score normalized to 10
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Code-Review🟢 10all changesets reviewed
Contributors🟢 10project has 10 contributing companies or organizations
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Dependency-Update-Tool🟢 10update tool detected
Fuzzing⚠️ 0project is not fuzzed
License🟢 10license file detected
Maintained🟢 1030 commit(s) and 16 issue activity found in the last 90 days -- score normalized to 10
Packaging⚠️ -1packaging workflow not detected
Pinned-Dependencies🟢 8dependency not pinned by hash detected -- score normalized to 8
SAST⚠️ 0SAST tool is not run on all commits -- score normalized to 0
Security-Policy🟢 10security policy file detected
Signed-Releases⚠️ -1no releases found
Token-Permissions🟢 10GitHub workflow tokens follow principle of least privilege
Vulnerabilities🟢 100 existing vulnerabilities detected

Scanned Files

  • Cargo.lock

@github-actions github-actions bot changed the title Release: 1 perf → Main Release: 2 fixes, 1 perf → Main Mar 9, 2026
…7822)

- Left-align card content instead of centering for cleaner layout
- Add top accent bar (color-coded by threshold) replacing left border
- Increase grid min-width from 160px to 190px to prevent value wrapping
- Add icon + label header row for better visual hierarchy
- Add hover lift effect with shadow on clickable cards
- Set whiteSpace: nowrap on values to prevent "104.5 KB/s" wrapping
- Increase sparkline height from 30px to 36px for better visibility
- Set consistent minHeight on cards for uniform grid rows
@github-actions github-actions bot changed the title Release: 2 fixes, 1 perf → Main Release: 3 fixes, 1 perf → Main Mar 9, 2026
@github-actions github-actions bot changed the title Release: 3 fixes, 1 perf → Main Release: 3 fixes, 1 perf, 1 chore → Main Mar 9, 2026
@h0lybyte h0lybyte merged commit 16ba214 into main Mar 9, 2026
19 checks passed
@github-project-automation github-project-automation bot moved this from Review to Done in KBVE Mar 9, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

Status: Done

Development

Successfully merging this pull request may close these issues.

1 participant