-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #58 from juni-b-queer/beta
Release 2.0.0
- Loading branch information
Showing
138 changed files
with
7,990 additions
and
3,911 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,161 @@ | ||
name: Package CICD | ||
on: | ||
push: | ||
branches: | ||
- '*' | ||
|
||
jobs: | ||
## | ||
# Testing | ||
## | ||
test: | ||
name: Run Tests | ||
runs-on: ubuntu-latest | ||
env: | ||
TZ: "America/Chicago" | ||
steps: | ||
- name: checkout | ||
uses: actions/checkout@v4 | ||
|
||
- name: setup Node | ||
uses: actions/setup-node@v3 | ||
with: | ||
node-version: 20 | ||
registry-url: 'https://npm.pkg.github.com' | ||
- name: Cache node modules | ||
id: cache-nodemodules | ||
uses: actions/cache@v3 | ||
env: | ||
cache-name: cache-node-modules-test | ||
with: | ||
# caching node_modules | ||
path: node_modules | ||
key: ${{ runner.os }}-build-${{ env.cache-name }}-${{ hashFiles('**/package-lock.json') }} | ||
restore-keys: | | ||
${{ runner.os }}-build-${{ env.cache-name }}- | ||
${{ runner.os }}-build- | ||
${{ runner.os }}- | ||
- name: Install Dependencies | ||
if: steps.cache-nodemodules.outputs.cache-hit != 'true' | ||
run: npm ci | ||
- name: Test | ||
run: npm run coverage | ||
- name: Upload coverage reports to Codecov | ||
uses: codecov/codecov-action@v3 | ||
env: | ||
CODECOV_TOKEN: ${{ secrets.CODECOV_TOKEN }} | ||
|
||
lint: | ||
name: Linting | ||
runs-on: ubuntu-latest | ||
steps: | ||
- name: checkout | ||
uses: actions/checkout@v3 | ||
- name: setup Node | ||
uses: actions/setup-node@v3 | ||
with: | ||
node-version: 20 | ||
registry-url: 'https://npm.pkg.github.com' | ||
- name: Cache node modules | ||
id: cache-nodemodules | ||
uses: actions/cache@v3 | ||
env: | ||
cache-name: cache-node-modules-lint | ||
with: | ||
# caching node_modules | ||
path: node_modules | ||
key: ${{ runner.os }}-build-${{ env.cache-name }}-${{ hashFiles('**/package-lock.json') }} | ||
restore-keys: | | ||
${{ runner.os }}-build-${{ env.cache-name }}- | ||
${{ runner.os }}-build- | ||
${{ runner.os }}- | ||
- name: Install Dependencies | ||
if: steps.cache-nodemodules.outputs.cache-hit != 'true' | ||
run: npm ci | ||
- name: Run lining | ||
run: npm run lint | ||
|
||
## | ||
# Code analysis | ||
## | ||
analyze: | ||
name: Analyze | ||
runs-on: ubuntu-latest | ||
needs: [test, lint] | ||
permissions: | ||
actions: read | ||
contents: read | ||
security-events: write | ||
|
||
strategy: | ||
fail-fast: false | ||
matrix: | ||
language: ['javascript'] | ||
# CodeQL supports [ 'cpp', 'csharp', 'go', 'java', 'javascript', 'python' ] | ||
# Learn more: | ||
# https://docs.github.com/en/free-pro-team@latest/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#changing-the-languages-that-are-analyzed | ||
|
||
steps: | ||
- name: Checkout repository | ||
uses: actions/checkout@v4 | ||
|
||
# Initializes the CodeQL tools for scanning. | ||
- name: Initialize CodeQL | ||
uses: github/codeql-action/init@v3 | ||
with: | ||
languages: ${{ matrix.language }} | ||
# If you wish to specify custom queries, you can do so here or in a config file. | ||
# By default, queries listed here will override any specified in a config file. | ||
# Prefix the list here with "+" to use these queries and those in the config file. | ||
# queries: ./path/to/local/query, your-org/your-repo/queries@main | ||
|
||
# Autobuild attempts to build any compiled languages (C/C++, C#, or Java). | ||
# If this step fails, then you should remove it and run the build manually (see below) | ||
- name: Autobuild | ||
uses: github/codeql-action/autobuild@v3 | ||
|
||
# ℹ️ Command-line programs to run using the OS shell. | ||
# 📚 https://git.io/JvXDl | ||
|
||
# ✏️ If the Autobuild fails above, remove it and uncomment the following three lines | ||
# and modify them (or add more) to build your code if your project | ||
# uses a compiled language | ||
|
||
#- run: | | ||
# make bootstrap | ||
# make release | ||
|
||
- name: Perform CodeQL Analysis | ||
uses: github/codeql-action/analyze@v3 | ||
|
||
|
||
## | ||
# Release | ||
## | ||
release: | ||
if: contains(' | ||
refs/heads/main | ||
refs/heads/beta | ||
refs/heads/next | ||
', github.ref) | ||
needs: [test, lint, analyze] | ||
permissions: write-all | ||
runs-on: ubuntu-latest | ||
steps: | ||
- name: Checkout | ||
uses: actions/checkout@v4 | ||
with: | ||
fetch-depth: 0 | ||
- name: Setup Node.js | ||
uses: actions/setup-node@v3 | ||
with: | ||
node-version: 20 | ||
- name: Install dependencies | ||
run: npm clean-install | ||
- name: Verify the integrity of provenance attestations and registry signatures for installed dependencies | ||
run: npm audit signatures | ||
- name: Release | ||
env: | ||
GITHUB_TOKEN: ${{ secrets.PAT }} | ||
NPM_TOKEN: ${{ secrets.NPM_TOKEN }} | ||
run: npx semantic-release |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,54 +1,54 @@ | ||
name: Analyze Code | ||
on: | ||
push: | ||
branches: | ||
- '*' | ||
jobs: | ||
analyze: | ||
name: Analyze | ||
runs-on: ubuntu-latest | ||
permissions: | ||
actions: read | ||
contents: read | ||
security-events: write | ||
|
||
strategy: | ||
fail-fast: false | ||
matrix: | ||
language: ['javascript'] | ||
# CodeQL supports [ 'cpp', 'csharp', 'go', 'java', 'javascript', 'python' ] | ||
# Learn more: | ||
# https://docs.github.com/en/free-pro-team@latest/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#changing-the-languages-that-are-analyzed | ||
|
||
steps: | ||
- name: Checkout repository | ||
uses: actions/checkout@v4 | ||
|
||
# Initializes the CodeQL tools for scanning. | ||
- name: Initialize CodeQL | ||
uses: github/codeql-action/init@v2 | ||
with: | ||
languages: ${{ matrix.language }} | ||
# If you wish to specify custom queries, you can do so here or in a config file. | ||
# By default, queries listed here will override any specified in a config file. | ||
# Prefix the list here with "+" to use these queries and those in the config file. | ||
# queries: ./path/to/local/query, your-org/your-repo/queries@main | ||
|
||
# Autobuild attempts to build any compiled languages (C/C++, C#, or Java). | ||
# If this step fails, then you should remove it and run the build manually (see below) | ||
- name: Autobuild | ||
uses: github/codeql-action/autobuild@v2 | ||
|
||
# ℹ️ Command-line programs to run using the OS shell. | ||
# 📚 https://git.io/JvXDl | ||
|
||
# ✏️ If the Autobuild fails above, remove it and uncomment the following three lines | ||
# and modify them (or add more) to build your code if your project | ||
# uses a compiled language | ||
|
||
#- run: | | ||
# make bootstrap | ||
# make release | ||
|
||
- name: Perform CodeQL Analysis | ||
uses: github/codeql-action/analyze@v2 | ||
#name: Analyze Code | ||
#on: | ||
# push: | ||
# branches: | ||
# - '*' | ||
#jobs: | ||
# analyze: | ||
# name: Analyze | ||
# runs-on: ubuntu-latest | ||
# permissions: | ||
# actions: read | ||
# contents: read | ||
# security-events: write | ||
# | ||
# strategy: | ||
# fail-fast: false | ||
# matrix: | ||
# language: ['javascript'] | ||
# # CodeQL supports [ 'cpp', 'csharp', 'go', 'java', 'javascript', 'python' ] | ||
# # Learn more: | ||
# # https://docs.github.com/en/free-pro-team@latest/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#changing-the-languages-that-are-analyzed | ||
# | ||
# steps: | ||
# - name: Checkout repository | ||
# uses: actions/checkout@v4 | ||
# | ||
# # Initializes the CodeQL tools for scanning. | ||
# - name: Initialize CodeQL | ||
# uses: github/codeql-action/init@v2 | ||
# with: | ||
# languages: ${{ matrix.language }} | ||
# # If you wish to specify custom queries, you can do so here or in a config file. | ||
# # By default, queries listed here will override any specified in a config file. | ||
# # Prefix the list here with "+" to use these queries and those in the config file. | ||
# # queries: ./path/to/local/query, your-org/your-repo/queries@main | ||
# | ||
# # Autobuild attempts to build any compiled languages (C/C++, C#, or Java). | ||
# # If this step fails, then you should remove it and run the build manually (see below) | ||
# - name: Autobuild | ||
# uses: github/codeql-action/autobuild@v2 | ||
# | ||
# # ℹ️ Command-line programs to run using the OS shell. | ||
# # 📚 https://git.io/JvXDl | ||
# | ||
# # ✏️ If the Autobuild fails above, remove it and uncomment the following three lines | ||
# # and modify them (or add more) to build your code if your project | ||
# # uses a compiled language | ||
# | ||
# #- run: | | ||
# # make bootstrap | ||
# # make release | ||
# | ||
# - name: Perform CodeQL Analysis | ||
# uses: github/codeql-action/analyze@v2 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,55 +1,55 @@ | ||
name: Semantic release versioning | ||
on: | ||
push: | ||
branches: | ||
- main | ||
- next | ||
- beta | ||
jobs: | ||
release: | ||
permissions: write-all | ||
runs-on: ubuntu-latest | ||
steps: | ||
- name: Checkout | ||
uses: actions/checkout@v4 | ||
with: | ||
fetch-depth: 0 | ||
- name: Setup Node.js | ||
uses: actions/setup-node@v3 | ||
with: | ||
node-version: 18 | ||
- name: Install dependencies | ||
run: npm clean-install | ||
- name: Verify the integrity of provenance attestations and registry signatures for installed dependencies | ||
run: npm audit signatures | ||
- name: Release | ||
env: | ||
GITHUB_TOKEN: ${{ secrets.PAT }} | ||
NPM_TOKEN: ${{ secrets.NPM_TOKEN }} | ||
run: npx semantic-release | ||
# - name: Zip artifact for release | ||
# id: zip-dist | ||
# run: zip dist.zip ./dist/* -r | ||
# | ||
# - name: Create Release | ||
# id: create_release | ||
# uses: actions/create-release@v1 | ||
# env: | ||
# GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} # This token is provided by Actions, you do not need to create your own token | ||
# with: | ||
# tag_name: ${{ github.ref_name }} | ||
# release_name: Release ${{ github.ref_name }} | ||
# body: Todo, get release notes! | ||
# draft: false | ||
# prerelease: false | ||
# | ||
# - name: Upload Release Build | ||
# id: upload-release-build | ||
# uses: actions/upload-release-asset@v1 | ||
# env: | ||
# GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} | ||
# with: | ||
# upload_url: ${{ steps.create_release.outputs.upload_url }} # This pulls from the CREATE RELEASE step above, referencing it's ID to get its outputs object, which include a `upload_url`. See this blog post for more info: https://jasonet.co/posts/new-features-of-github-actions/#passing-data-to-future-steps | ||
# asset_path: ./dist.zip | ||
# asset_name: dist.zip | ||
# asset_content_type: application/zip | ||
#name: Semantic release versioning | ||
#on: | ||
# push: | ||
# branches: | ||
# - main | ||
# - next | ||
# - beta | ||
#jobs: | ||
# release: | ||
# permissions: write-all | ||
# runs-on: ubuntu-latest | ||
# steps: | ||
# - name: Checkout | ||
# uses: actions/checkout@v4 | ||
# with: | ||
# fetch-depth: 0 | ||
# - name: Setup Node.js | ||
# uses: actions/setup-node@v3 | ||
# with: | ||
# node-version: 18 | ||
# - name: Install dependencies | ||
# run: npm clean-install | ||
# - name: Verify the integrity of provenance attestations and registry signatures for installed dependencies | ||
# run: npm audit signatures | ||
# - name: Release | ||
# env: | ||
# GITHUB_TOKEN: ${{ secrets.PAT }} | ||
# NPM_TOKEN: ${{ secrets.NPM_TOKEN }} | ||
# run: npx semantic-release | ||
## - name: Zip artifact for release | ||
## id: zip-dist | ||
## run: zip dist.zip ./dist/* -r | ||
## | ||
## - name: Create Release | ||
## id: create_release | ||
## uses: actions/create-release@v1 | ||
## env: | ||
## GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} # This token is provided by Actions, you do not need to create your own token | ||
## with: | ||
## tag_name: ${{ github.ref_name }} | ||
## release_name: Release ${{ github.ref_name }} | ||
## body: Todo, get release notes! | ||
## draft: false | ||
## prerelease: false | ||
## | ||
## - name: Upload Release Build | ||
## id: upload-release-build | ||
## uses: actions/upload-release-asset@v1 | ||
## env: | ||
## GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} | ||
## with: | ||
## upload_url: ${{ steps.create_release.outputs.upload_url }} # This pulls from the CREATE RELEASE step above, referencing it's ID to get its outputs object, which include a `upload_url`. See this blog post for more info: https://jasonet.co/posts/new-features-of-github-actions/#passing-data-to-future-steps | ||
## asset_path: ./dist.zip | ||
## asset_name: dist.zip | ||
## asset_content_type: application/zip |
Oops, something went wrong.