Skip to content

fix: activate without teapot #2645

fix: activate without teapot

fix: activate without teapot #2645

Workflow file for this run

name: unit_tests
permissions:
contents: read
on:
workflow_dispatch:
push:
branches:
- trunk
pull_request:
branches:
- trunk
- release-v*.*.*
jobs:
cli_tags:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
- uses: ./.github/composite/verify_cli_tags
noports_core-unit_tests:
runs-on: ubuntu-latest
strategy:
fail-fast: false
matrix:
dart-channel: [stable,beta]
steps:
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
- uses: dart-lang/setup-dart@e630b99d28a3b71860378cafdc2a067c71107f94 # v1.7.0
with:
sdk: ${{ matrix.dart-channel}}
- uses: actions/setup-go@41dfa10bad2bb2ae585af6ee5bb4d7d973ad74ed # v5.1.0
with:
go-version: "stable"
cache-dependency-path: tools/osv-scanner/go.sum
- name: dart pub get
working-directory: packages/dart/noports_core
run: dart pub get
- name: dart analyze
working-directory: packages/dart/noports_core
run: dart analyze
- name: dart test
working-directory: packages/dart/noports_core
run: dart test
# Runs osv-scanner to find any vulnerable Dart dependencies
# It needs to look at pubspec.lock files, which is why it's
# placed here, as the `dart pub get` above will create them
- name: Run osv-scanner
working-directory: packages/dart
run: |
go install github.com/google/osv-scanner/cmd/osv-scanner@6316373e47d7e3e4b4fd3630c4bbc10987738de6 # v1.4.3
osv-scanner --lockfile=./sshnoports/pubspec.lock
osv-scanner --lockfile=./sshnp_flutter/pubspec.lock
osv-scanner --lockfile=./noports_core/pubspec.lock