You must install a git-lfs client before cloning this repository, that are used here to store large font files.
$ # some installing-git-lfs commands
$ git lfs installMake sure the filters set up in your .gitconfig.
$ git config -l
...
filter.lfs.clean=git-lfs clean -- %f
filter.lfs.smudge=git-lfs smudge -- %f
filter.lfs.process=git-lfs filter-process
filter.lfs.required=true
...
If you forgot to install or initialize git-lfs before cloning, you can fetch Git LFS data by git lfs pull.
MEMO
$ git lfs track "assets/fonts/**/complete/**/*.woff"
$ git lfs track "assets/fonts/**/complete/**/*.woff2"$ yarn installMake sure patch-package has run to apply patches to:
@chakra-ui/nuxt
Patching is automatically done after installation via postinstall script. See the repo for the details.
# serve with hot reload at localhost:3000
# Uncomment the code below if you want to enable APPLICATION DEBUG
# APP_DEBUG=1
NOTION_DATABASE_CONFIG=#<configuration table id>
NOTION_DATABASE_NEWS=#<news table id>
NOTION_DATABASE_MEETLINKS=#<meetlinks table id>
yarn devNOTION_DATABASE_CONFIG=#<configuration table id>
NOTION_DATABASE_NEWS=#<news table id>
NOTION_DATABASE_MEETLINKS=#<meetlinks table id>
yarn generateAfter generated the code:
yarn startOr you can run yarn generate && yarn start at once.
For detailed explanation on how things work, check out Nuxt.js docs.
To enable APPLICATION DEBUG (in-app logging), set APP_DEBUG=1
"@chakra-ui/nuxt/chakra-loader/module/lodash.template": "^4.5.0"- CVE-2019-10744"@chakra-ui/nuxt/chakra-loader/module/concat-stream": "^1.5.2"- GHSA-g74r-ffvr-5q9f"**/glob-parent": "^5.1.2"- CVE-2020-28469"**/axios": "^0.21.2"- CVE-2021-3749"**/follow-redirects": "^1.14.8"- CVE-2022-0536^1.14.7- CVE-2022-0155
"@chakra-ui/nuxt/chakra-loader/module/yargs/yargs-parser": "^5.0.1"- CVE-2020-7608"**/nth-check": "^2.0.1"- CVE-2021-3803"**/ansi-regex": "^5.0.1"- CVE-2021-3807"@chakra-ui/nuxt/chakra-loader/module/vinyl-fs/glob-stream/micromatch/braces": "^2.3.1"- GHSA-g95f-p29q-9xw4"**/parse-url": "^6.0.1"- CVE-2022-2216"**/protobufjs": "^6.11.3"- CVE-2022-25878"**/parse-url/parse-path": "^5.0.0"- CVE-2022-0624"**/shell-quote": "^1.7.3"- CVE-2021-42740"**/minimist": "^1.2.6"- CVE-2021-44906"**/async": "^3.2.2"- CVE-2021-43138"**/ansi-html": "^0.0.8"- CVE-2021-23424"**/node-fetch": "^2.6.7"- CVE-2022-0235"**/node-forge": "^1.3.0"- CVE-2022-24771, CVE-2022-24772, CVE-2022-24773, CVE-2022-0122, GHSA-5rrq-pxf6-6jx5, GHSA-gf8q-jrpm-jvxq"**/sharp": "^0.30.5"- CVE-2022-29256"**/nanoid": "^3.1.31"- CVE-2021-23566