Skip to content

Bumped deps

Bumped deps #435

Workflow file for this run

name: Run Tests
on:
push:
pull_request:
concurrency:
group: ${{ github.workflow }}-${{ github.ref }}
cancel-in-progress: true
jobs:
license_check:
name: License Compliance Check
runs-on: ubuntu-latest
# Service containers to run with `container-job`
steps:
- uses: actions/checkout@v4
- name: Use Node.js 20
uses: actions/setup-node@v4
with:
node-version: 20
- run: npm install
- name: Run License Checks
run: |
npm run licenses
fluidAttacksScan:
name: Fluid Attacks SAST Scan
runs-on: ubuntu-latest
permissions:
# Give the default GITHUB_TOKEN write permission to commit and push the
# added or changed files to the repository.
contents: write
steps:
- name: Checkout repository
uses: actions/checkout@v4
with:
ref: ${{ github.head_ref }}
# Ensure that Node.js is available
- name: Use Node.js 20
uses: actions/setup-node@v4
with:
node-version: 20
- name: Fluid-Attacks scan
continue-on-error: true
uses: docker://ghcr.io/fluidattacks/makes/amd64
with:
args: m gitlab:fluidattacks/universe@trunk /skims scan ./fascan.yml
- name: Show Scan Results
run: |
cat Fluid-Attacks-Results.csv
node -e 'require("fs").readFileSync("Fluid-Attacks-Results.csv","utf-8").indexOf("No vulnerabilities were found in your targets")<0 && process.exit(1)'
test:
name: Test Suite
strategy:
matrix:
node: [18.x, 20.x]
os: [ubuntu-20.04]
runs-on: ${{ matrix.os }}
# Service containers to run with `container-job`
services:
# Label used to access the service container
redis:
# Docker Hub image
image: redis
# Set health checks to wait until redis has started
options: >-
--health-cmd "redis-cli ping"
--health-interval 10s
--health-timeout 5s
--health-retries 5
ports:
- 6379:6379
steps:
- uses: actions/checkout@v4
- name: Use Node.js ${{ matrix.node }}
uses: actions/setup-node@v4
with:
node-version: ${{ matrix.node }}
- run: npm install
- name: Run tests
run: |
npm test
env:
EENGINE_REDIS: redis://127.0.0.1:6379/1