Skip to content

Commit 2b8d20b

Browse files
committed
fix: update node versions
1 parent 14b1a62 commit 2b8d20b

File tree

5 files changed

+158
-36
lines changed

5 files changed

+158
-36
lines changed

.github/workflows/ci.yaml

Lines changed: 12 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -8,15 +8,12 @@ jobs:
88
lint:
99
name: Lint
1010
runs-on: ubuntu-latest
11-
strategy:
12-
matrix:
13-
node-version: [16.x]
1411
steps:
15-
- uses: actions/checkout@v2
16-
- name: Use Node.js ${{ matrix.node-version }}
17-
uses: actions/setup-node@v1
12+
- uses: actions/checkout@v5
13+
- name: Use Node.js
14+
uses: actions/setup-node@v5
1815
with:
19-
node-version: ${{ matrix.node-version }}
16+
node-version-file: '.nvmrc'
2017
- name: Install Dependencies
2118
run: npm install
2219
- name: Run linters
@@ -25,15 +22,12 @@ jobs:
2522
name: Test
2623
runs-on: ubuntu-latest
2724
needs: lint
28-
strategy:
29-
matrix:
30-
node-version: [12.x, 13.x, 14.x, 15.x, 16.x]
3125
steps:
32-
- uses: actions/checkout@v2
33-
- name: Use Node.js ${{ matrix.node-version }}
34-
uses: actions/setup-node@v1
26+
- uses: actions/checkout@v5
27+
- name: Use Node.js
28+
uses: actions/setup-node@v5
3529
with:
36-
node-version: ${{ matrix.node-version }}
30+
node-version-file: '.nvmrc'
3731
- run: npm install
3832
- run: npm i -D warframe-worldstate-data@latest
3933
- run: npm test
@@ -44,15 +38,12 @@ jobs:
4438
name: Coverage
4539
runs-on: ubuntu-latest
4640
needs: lint
47-
strategy:
48-
matrix:
49-
node-version: [16.x]
5041
steps:
51-
- uses: actions/checkout@v2
52-
- name: Use Node.js ${{ matrix.node-version }}
53-
uses: actions/setup-node@v1
42+
- uses: actions/checkout@v5
43+
- name: Use Node.js
44+
uses: actions/setup-node@v5
5445
with:
55-
node-version: ${{ matrix.node-version }}
46+
node-version-file: '.nvmrc'
5647
- run: npm install
5748
- run: npm test
5849
env:

.github/workflows/codeql.yaml.yml

Lines changed: 100 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,100 @@
1+
# For most projects, this workflow file will not need changing; you simply need
2+
# to commit it to your repository.
3+
#
4+
# You may wish to alter this file to override the set of languages analyzed,
5+
# or to provide custom queries or build logic.
6+
#
7+
# ******** NOTE ********
8+
# We have attempted to detect the languages in your repository. Please check
9+
# the `language` matrix defined below to confirm you have the correct set of
10+
# supported CodeQL languages.
11+
#
12+
name: "CodeQL Advanced"
13+
14+
on:
15+
push:
16+
branches: [ "master" ]
17+
pull_request:
18+
branches: [ "master" ]
19+
schedule:
20+
- cron: '32 22 * * 4'
21+
22+
jobs:
23+
analyze:
24+
name: Analyze (${{ matrix.language }})
25+
# Runner size impacts CodeQL analysis time. To learn more, please see:
26+
# - https://gh.io/recommended-hardware-resources-for-running-codeql
27+
# - https://gh.io/supported-runners-and-hardware-resources
28+
# - https://gh.io/using-larger-runners (GitHub.com only)
29+
# Consider using larger runners or machines with greater resources for possible analysis time improvements.
30+
runs-on: ${{ (matrix.language == 'swift' && 'macos-latest') || 'ubuntu-latest' }}
31+
permissions:
32+
# required for all workflows
33+
security-events: write
34+
35+
# required to fetch internal or private CodeQL packs
36+
packages: read
37+
38+
# only required for workflows in private repositories
39+
actions: read
40+
contents: read
41+
42+
strategy:
43+
fail-fast: false
44+
matrix:
45+
include:
46+
- language: actions
47+
build-mode: none
48+
- language: javascript-typescript
49+
build-mode: none
50+
# CodeQL supports the following values keywords for 'language': 'actions', 'c-cpp', 'csharp', 'go', 'java-kotlin', 'javascript-typescript', 'python', 'ruby', 'rust', 'swift'
51+
# Use `c-cpp` to analyze code written in C, C++ or both
52+
# Use 'java-kotlin' to analyze code written in Java, Kotlin or both
53+
# Use 'javascript-typescript' to analyze code written in JavaScript, TypeScript or both
54+
# To learn more about changing the languages that are analyzed or customizing the build mode for your analysis,
55+
# see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/customizing-your-advanced-setup-for-code-scanning.
56+
# If you are analyzing a compiled language, you can modify the 'build-mode' for that language to customize how
57+
# your codebase is analyzed, see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/codeql-code-scanning-for-compiled-languages
58+
steps:
59+
- name: Checkout repository
60+
uses: actions/checkout@v4
61+
62+
# Add any setup steps before running the `github/codeql-action/init` action.
63+
# This includes steps like installing compilers or runtimes (`actions/setup-node`
64+
# or others). This is typically only required for manual builds.
65+
# - name: Setup runtime (example)
66+
# uses: actions/setup-example@v1
67+
68+
# Initializes the CodeQL tools for scanning.
69+
- name: Initialize CodeQL
70+
uses: github/codeql-action/init@v3
71+
with:
72+
languages: ${{ matrix.language }}
73+
build-mode: ${{ matrix.build-mode }}
74+
# If you wish to specify custom queries, you can do so here or in a config file.
75+
# By default, queries listed here will override any specified in a config file.
76+
# Prefix the list here with "+" to use these queries and those in the config file.
77+
78+
# For more details on CodeQL's query packs, refer to: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
79+
# queries: security-extended,security-and-quality
80+
81+
# If the analyze step fails for one of the languages you are analyzing with
82+
# "We were unable to automatically build your code", modify the matrix above
83+
# to set the build mode to "manual" for that language. Then modify this step
84+
# to build your code.
85+
# ℹ️ Command-line programs to run using the OS shell.
86+
# 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun
87+
- if: matrix.build-mode == 'manual'
88+
shell: bash
89+
run: |
90+
echo 'If you are using a "manual" build mode for one or more of the' \
91+
'languages you are analyzing, replace this with the commands to build' \
92+
'your code, for example:'
93+
echo ' make bootstrap'
94+
echo ' make release'
95+
exit 1
96+
97+
- name: Perform CodeQL Analysis
98+
uses: github/codeql-action/analyze@v3
99+
with:
100+
category: "/language:${{matrix.language}}"
Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
# Dependency Review Action
2+
#
3+
# This Action will scan dependency manifest files that change as part of a Pull Request,
4+
# surfacing known-vulnerable versions of the packages declared or updated in the PR.
5+
# Once installed, if the workflow run is marked as required, PRs introducing known-vulnerable
6+
# packages will be blocked from merging.
7+
#
8+
# Source repository: https://github.com/actions/dependency-review-action
9+
# Public documentation: https://docs.github.com/en/code-security/supply-chain-security/understanding-your-software-supply-chain/about-dependency-review#dependency-review-enforcement
10+
name: 'Dependency review'
11+
on:
12+
pull_request:
13+
branches: [ "master" ]
14+
15+
# If using a dependency submission action in this workflow this permission will need to be set to:
16+
#
17+
# permissions:
18+
# contents: write
19+
#
20+
# https://docs.github.com/en/enterprise-cloud@latest/code-security/supply-chain-security/understanding-your-software-supply-chain/using-the-dependency-submission-api
21+
permissions:
22+
contents: read
23+
# Write permissions for pull-requests are required for using the `comment-summary-in-pr` option, comment out if you aren't using this option
24+
pull-requests: write
25+
26+
jobs:
27+
dependency-review:
28+
runs-on: ubuntu-latest
29+
steps:
30+
- name: 'Checkout repository'
31+
uses: actions/checkout@v4
32+
- name: 'Dependency Review'
33+
uses: actions/dependency-review-action@v4
34+
# Commonly enabled options, see https://github.com/actions/dependency-review-action#configuration-options for all available options.
35+
with:
36+
comment-summary-in-pr: always
37+
# fail-on-severity: moderate
38+
# deny-licenses: GPL-1.0-or-later, LGPL-2.0-or-later
39+
# retry-on-snapshot-warnings: true

.github/workflows/release.yaml

Lines changed: 6 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -7,36 +7,28 @@ jobs:
77
release:
88
name: Release
99
runs-on: ubuntu-latest
10-
strategy:
11-
matrix:
12-
node-version: [15.x]
1310
permissions:
1411
id-token: write
1512
contents: write
1613
pull-requests: write
1714
issues: write
1815
steps:
19-
- uses: actions/checkout@v2
16+
- uses: actions/checkout@v5
2017
with:
2118
persist-credentials: false
22-
node-version: '14'
23-
- name: Use Node.js ${{ matrix.node-version }}
24-
uses: actions/setup-node@v1
19+
- name: Use Node.js
20+
uses: actions/setup-node@v5
2521
with:
26-
node-version: ${{ matrix.node-version }}
22+
node-version-file: '.nvmrc'
2723
token: ${{ secrets.GH_TOKEN }}
2824
- run: npm ci
2925
- run: npm run lint
3026
- run: npm test
3127
- name: Semantic Release
32-
uses: cycjimmy/semantic-release-action@v2.7.0
28+
uses: cycjimmy/semantic-release-action@v5
3329
env:
3430
GITHUB_TOKEN: ${{ secrets.GH_TOKEN }}
3531
NPM_TOKEN: ${{ secrets.NPM_TOKEN }}
3632
with:
37-
semantic_version: 17
3833
branches: |
39-
['master']
40-
extra_plugins: |
41-
@semantic-release/[email protected]
42-
@semantic-release/[email protected]
34+
['master']

.nvmrc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
lts/erbium
1+
lts/jod

0 commit comments

Comments
 (0)