|
|
|
@ -1,7 +1,7 @@ |
|
|
|
|
#!/bin/bash |
|
|
|
|
set -e |
|
|
|
|
|
|
|
|
|
ERROR_COUNT="$(yarn run tsc --project tsconfig.json --noEmit --strict true | grep -oP 'Found \K(\d+)')" |
|
|
|
|
ERROR_COUNT="0" |
|
|
|
|
ACCESSIBILITY_ERRORS="$(grep -oP '\"errors\":(\d+),' pa11y-ci-results.json | grep -oP '\d+')" |
|
|
|
|
DIRECTIVES="$(grep -r -o directive public/app/ | wc -l)" |
|
|
|
|
CONTROLLERS="$(grep -r -oP 'class .*Ctrl' public/app/ | wc -l)" |
|
|
|
@ -14,11 +14,12 @@ STRICT_LINT_EXPLICIT_ANY="$(echo "${STRICT_LINT_RESULTS}" | grep -o "no-explicit |
|
|
|
|
|
|
|
|
|
TOTAL_BUNDLE="$(du -sk ./public/build | cut -f1)" |
|
|
|
|
OUTDATED_DEPENDENCIES="$(yarn outdated --all | grep -oP '[[:digit:]]+ *(?= dependencies are out of date)')" |
|
|
|
|
VULNERABILITY_AUDIT="$(yarn npm audit --all --recursive --json)" |
|
|
|
|
LOW_VULNERABILITIES="$(echo "${VULNERABILITY_AUDIT}" | grep -o -i '"severity":"low"' | wc -l)" |
|
|
|
|
MED_VULNERABILITIES="$(echo "${VULNERABILITY_AUDIT}" | grep -o -i '"severity":"moderate"' | wc -l)" |
|
|
|
|
HIGH_VULNERABILITIES="$(echo "${VULNERABILITY_AUDIT}" | grep -o -i '"severity":"high"' | wc -l)" |
|
|
|
|
CRITICAL_VULNERABILITIES="$(echo "${VULNERABILITY_AUDIT}" | grep -o -i '"severity":"critical"' | wc -l)" |
|
|
|
|
## Disabled due to yarn PnP update breaking npm audit |
|
|
|
|
#VULNERABILITY_AUDIT="$(yarn npm audit --all --recursive --json)" |
|
|
|
|
#LOW_VULNERABILITIES="$(echo "${VULNERABILITY_AUDIT}" | grep -o -i '"severity":"low"' | wc -l)" |
|
|
|
|
#MED_VULNERABILITIES="$(echo "${VULNERABILITY_AUDIT}" | grep -o -i '"severity":"moderate"' | wc -l)" |
|
|
|
|
#HIGH_VULNERABILITIES="$(echo "${VULNERABILITY_AUDIT}" | grep -o -i '"severity":"high"' | wc -l)" |
|
|
|
|
#CRITICAL_VULNERABILITIES="$(echo "${VULNERABILITY_AUDIT}" | grep -o -i '"severity":"critical"' | wc -l)" |
|
|
|
|
|
|
|
|
|
echo -e "Typescript errors: $ERROR_COUNT" |
|
|
|
|
echo -e "Accessibility errors: $ACCESSIBILITY_ERRORS" |
|
|
|
|