Added dependencies. Updated readme.

This commit is contained in:
Lucid Kobold
2022-04-08 11:43:48 -05:00
parent dc8aa5cd20
commit 1969cb7161
314 changed files with 4103 additions and 2986 deletions

View File

@@ -1,3 +0,0 @@
{
"extends": "next"
}

25
.eslintrc.json Normal file
View File

@@ -0,0 +1,25 @@
{
"rules": {
"comma-dangle": [
"error",
{
"arrays": "never",
"objects": "never",
"imports": "never",
"exports": "never",
"functions": "never"
}
]
},
"extends": [
"next",
"next/core-web-vitals",
"plugin:jsx-a11y/strict",
"prettier",
"eslint:recommended",
"plugin:@typescript-eslint/recommended",
"plugin:react/recommended",
"plugin:react-hooks/recommended"
],
"plugins": ["@typescript-eslint", "react-hooks", "jsx-a11y"]
}

70
.github/workflows/codeql-analysis.yml vendored Normal file
View File

@@ -0,0 +1,70 @@
# For most projects, this workflow file will not need changing; you simply need
# to commit it to your repository.
#
# You may wish to alter this file to override the set of languages analyzed,
# or to provide custom queries or build logic.
#
# ******** NOTE ********
# We have attempted to detect the languages in your repository. Please check
# the `language` matrix defined below to confirm you have the correct set of
# supported CodeQL languages.
#
name: "CodeQL"
on:
push:
branches: [ main ]
pull_request:
# The branches below must be a subset of the branches above
branches: [ main ]
schedule:
- cron: '21 19 * * 4'
jobs:
analyze:
name: Analyze
runs-on: ubuntu-latest
permissions:
actions: read
contents: read
security-events: write
strategy:
fail-fast: false
matrix:
language: [ 'javascript' ]
# CodeQL supports [ 'cpp', 'csharp', 'go', 'java', 'javascript', 'python', 'ruby' ]
# Learn more about CodeQL language support at https://git.io/codeql-language-support
steps:
- name: Checkout repository
uses: actions/checkout@v2
# Initializes the CodeQL tools for scanning.
- name: Initialize CodeQL
uses: github/codeql-action/init@v1
with:
languages: ${{ matrix.language }}
# If you wish to specify custom queries, you can do so here or in a config file.
# By default, queries listed here will override any specified in a config file.
# Prefix the list here with "+" to use these queries and those in the config file.
# queries: ./path/to/local/query, your-org/your-repo/queries@main
# Autobuild attempts to build any compiled languages (C/C++, C#, or Java).
# If this step fails, then you should remove it and run the build manually (see below)
- name: Autobuild
uses: github/codeql-action/autobuild@v1
# Command-line programs to run using the OS shell.
# 📚 https://git.io/JvXDl
# ✏️ If the Autobuild fails above, remove it and uncomment the following three lines
# and modify them (or add more) to build your code if your project
# uses a compiled language
#- run: |
# make bootstrap
# make release
- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@v1

View File

@@ -7,11 +7,11 @@ on:
# Trigger the workflow on push or pull request,
push:
branches:
# Only on the main branch
- main
# All branches
- 'main'
pull_request:
# These types of PRs
types: [assigned, opened, synchronize, reopened]
types: [opened, synchronize, reopened]
jobs:
build:
@@ -30,12 +30,12 @@ jobs:
#- uses: borales/actions-yarn@v2.3.0
# with:
# cmd: test # will run `yarn test` command
- uses: borales/actions-yarn@v2.3.0
with:
cmd: type-check # will run `yarn type-check` command
#- uses: borales/actions-yarn@v2.3.0
# with:
# cmd: lint # will run `yarn lint` command
# cmd: type-check # will run `yarn type-check` command
- uses: borales/actions-yarn@v2.3.0
with:
cmd: lint # will run `yarn lint` command
- uses: borales/actions-yarn@v2.3.0
with:
cmd: build # will run `yarn build` command

35
.github/workflows/njsscan-analysis.yml vendored Normal file
View File

@@ -0,0 +1,35 @@
# This workflow uses actions that are not certified by GitHub.
# They are provided by a third-party and are governed by
# separate terms of service, privacy policy, and support
# documentation.
# This workflow integrates njsscan with GitHub's Code Scanning feature
# nodejsscan is a static security code scanner that finds insecure code patterns in your Node.js applications
name: njsscan sarif
on:
push:
branches: [ main ]
pull_request:
# The branches below must be a subset of the branches above
branches: [ main ]
schedule:
- cron: '15 15 * * 5'
jobs:
njsscan:
runs-on: ubuntu-latest
name: njsscan code scanning
steps:
- name: Checkout the code
uses: actions/checkout@v2
- name: nodejsscan scan
id: njsscan
uses: ajinabraham/njsscan-action@7237412fdd36af517e2745077cedbf9d6900d711
with:
args: '. --sarif --output results.sarif || true'
- name: Upload njsscan report
uses: github/codeql-action/upload-sarif@v1
with:
sarif_file: results.sarif

13
.gitignore vendored
View File

@@ -1,8 +1,13 @@
# See https://help.github.com/articles/ignoring-files/ for more about ignoring files.
# dependencies
/node_modules
/.pnp
.pnp.js
# testing
/coverage
# next.js
/.next/
/out/
@@ -20,4 +25,10 @@ yarn-debug.log*
yarn-error.log*
# local env files
.env*
.env*
# yarn
.yarn/*
!.yarn/releases
!.yarn/plugins
.pnp.*

17
.prettierignore Normal file
View File

@@ -0,0 +1,17 @@
# Ignore artifacts:
build
coverage
.next
out
.yarn
.github
.env*
.eslintrc.json
.gitignore
.yarnrc.yml
next-env.d.ts
next-env.d
package*
tsconfig.json
yarn.lock
next.config.js

5
.prettierrc Normal file
View File

@@ -0,0 +1,5 @@
{
"trailingComma": "none",
"tabWidth": 2,
"bracketSameLine": false
}

Some files were not shown because too many files have changed in this diff Show More