Skip to content

[GSOC23] - A - Implement a fully functional CVE auditing feature based on OVAL data #1970

[GSOC23] - A - Implement a fully functional CVE auditing feature based on OVAL data

[GSOC23] - A - Implement a fully functional CVE auditing feature based on OVAL data #1970

name: Javascript build
on:
push:
branches:
- master
paths:
- 'web/html/src/**'
- '.github/workflows/javascript-build.yml'
pull_request:
paths:
- 'web/html/src/**'
- '.github/workflows/javascript-build.yml'
jobs:
javascript_build:
runs-on: ubuntu-latest
strategy:
matrix:
node-version: [16.x]
steps:
- uses: actions/checkout@v3
- name: Use Node.js ${{ matrix.node-version }}
uses: actions/setup-node@v3
with:
node-version: ${{ matrix.node-version }}
- name: Get Yarn cache directory
id: yarn-cache-dir-path
run: echo "::set-output name=dir::$(yarn cache dir)"
- name: Use Yarn cache
uses: actions/cache@v3
id: yarn-cache
with:
path: ${{ steps.yarn-cache-dir-path.outputs.dir }}
key: ${{ runner.os }}-yarn-${{ matrix.node-version }}-${{ hashFiles('**/yarn.lock') }}
# We only install production dependencies here to simulate a situation similar to OBS/IBS
- name: Install production dependencies
run: yarn --cwd web/html/src install --force --ignore-optional --production=true --frozen-lockfile --prefer-offline
- name: Build application
run: yarn --cwd web/html/src build