You must install a git-lfs client before cloning this repository, that are used here to store large font files.
$ # some installing-git-lfs commands
$ git lfs install
Make sure the filters set up in your .gitconfig
.
$ git config -l
...
filter.lfs.clean=git-lfs clean -- %f
filter.lfs.smudge=git-lfs smudge -- %f
filter.lfs.process=git-lfs filter-process
filter.lfs.required=true
...
If you forgot to install or initialize git-lfs before cloning, you can fetch Git LFS data by git lfs pull
.
MEMO
$ git lfs track "assets/fonts/**/complete/**/*.woff"
$ git lfs track "assets/fonts/**/complete/**/*.woff2"
$ yarn install
Make sure patch-package
has run to apply patches to:
@chakra-ui/nuxt
Patching is automatically done after installation via postinstall
script. See the repo for the details.
# serve with hot reload at localhost:3000
# Uncomment the code below if you want to enable APPLICATION DEBUG
# APP_DEBUG=1
NOTION_DATABASE_CONFIG=#<configuration table id>
NOTION_DATABASE_NEWS=#<news table id>
NOTION_DATABASE_MEETLINKS=#<meetlinks table id>
yarn dev
NOTION_DATABASE_CONFIG=#<configuration table id>
NOTION_DATABASE_NEWS=#<news table id>
NOTION_DATABASE_MEETLINKS=#<meetlinks table id>
yarn generate
After generate
d the code:
yarn start
Or you can run yarn generate && yarn start
at once.
For detailed explanation on how things work, check out Nuxt.js docs.
To enable APPLICATION DEBUG (in-app logging), set APP_DEBUG=1
"@chakra-ui/nuxt/chakra-loader/module/lodash.template": "^4.5.0"
- CVE-2019-10744"@chakra-ui/nuxt/chakra-loader/module/concat-stream": "^1.5.2"
- GHSA-g74r-ffvr-5q9f"**/glob-parent": "^5.1.2"
- CVE-2020-28469"**/axios": "^0.21.2"
- CVE-2021-3749"**/follow-redirects": "^1.14.8"
- CVE-2022-0536^1.14.7
- CVE-2022-0155
"@chakra-ui/nuxt/chakra-loader/module/yargs/yargs-parser": "^5.0.1"
- CVE-2020-7608"**/nth-check": "^2.0.1"
- CVE-2021-3803"**/ansi-regex": "^5.0.1"
- CVE-2021-3807"@chakra-ui/nuxt/chakra-loader/module/vinyl-fs/glob-stream/micromatch/braces": "^2.3.1"
- GHSA-g95f-p29q-9xw4"**/parse-url": "^6.0.1"
- CVE-2022-2216"**/protobufjs": "^6.11.3"
- CVE-2022-25878"**/parse-url/parse-path": "^5.0.0"
- CVE-2022-0624"**/shell-quote": "^1.7.3"
- CVE-2021-42740"**/minimist": "^1.2.6"
- CVE-2021-44906"**/async": "^3.2.2"
- CVE-2021-43138"**/ansi-html": "^0.0.8"
- CVE-2021-23424"**/node-fetch": "^2.6.7"
- CVE-2022-0235"**/node-forge": "^1.3.0"
- CVE-2022-24771, CVE-2022-24772, CVE-2022-24773, CVE-2022-0122, GHSA-5rrq-pxf6-6jx5, GHSA-gf8q-jrpm-jvxq"**/sharp": "^0.30.5"
- CVE-2022-29256"**/nanoid": "^3.1.31"
- CVE-2021-23566