Gathering detailed insights and metrics for @commitlint/config-angular
Gathering detailed insights and metrics for @commitlint/config-angular
Gathering detailed insights and metrics for @commitlint/config-angular
Gathering detailed insights and metrics for @commitlint/config-angular
@commitlint/config-angular-type-enum
Shareable commitlint config enforcing the angular commit convention types
@commitlint/prompt-cli
commit prompt using commitlint.config.js
@commitlint/config-conventional
Shareable commitlint config enforcing conventional commits
commitlint-config-angular
Shareable commitlint config enforcing the angular commit convention
npm install @commitlint/config-angular
99.8
Supply Chain
97.3
Quality
90.8
Maintenance
100
Vulnerability
100
License
Module System
Min. Node Version
Typescript Support
Node Version
NPM Version
16,931 Stars
2,800 Commits
912 Forks
68 Watching
23 Branches
266 Contributors
Updated on 28 Nov 2024
Minified
Minified + Gzipped
TypeScript (91.48%)
JavaScript (8.52%)
Cumulative downloads
Total Downloads
Last day
6.3%
34,972
Compared to previous day
Last week
10.6%
232,173
Compared to previous week
Last month
44.9%
787,972
Compared to previous month
Last year
29.3%
5,608,649
Compared to previous year
1
2
Lint commit messages
Demo generated with svg-term-cli
cat docs/assets/commitlint.json | svg-term --out docs/public/assets/commitlint.svg --frame --profile=Seti --height=20 --width=80
commitizen
npm
conventional-changelog
commitlint checks if your commit messages meet the conventional commit format.
In general the pattern mostly looks like this:
1type(scope?): subject #scope is optional; multiple scopes are supported (current delimiter options: "/", "\" and ",")
Real world examples can look like this:
1chore: run tests on travis ci
1fix(server): send cors headers
1feat(blog): add comment section
Common types according to commitlint-config-conventional (based on the Angular convention) can be:
These can be modified by your own configuration.
npm install --save-dev @commitlint/cli
.commitlintrc
.commitlintrc.json
.commitlintrc.yaml
.commitlintrc.yml
.commitlintrc.js
.commitlintrc.cjs
.commitlintrc.mjs
.commitlintrc.ts
.commitlintrc.cts
commitlint.config.js
commitlint.config.cjs
commitlint.config.mjs
commitlint.config.ts
commitlint.config.cts
commitlint
field in package.json
commitlint
field in package.yaml
A number of shared configurations are available to install and use with commitlint
:
⚠️ If you want to publish your own shareable config then make sure it has a name aligning with the pattern
commitlint-config-emoji-log
orcommitlint-config-your-config-name
— then in extend all you have to write isemoji-log
oryour-config-name
.
Check the main website.
commitlint
commitlint
is considered stable and is used in various projects as a development tool.
>= 18
>= 2.13.2
Security patches will be applied to versions which are not yet EOL.
Features will only be applied to the current main version.
Release | Initial release |
---|---|
v19 | 02/2024 |
v18 | 10/2023 |
EOL is usually after around a year.
We're not a sponsored OSS project. Therefore we can't promise that we will release patch versions for older releases in a timely manner.
If you are stuck on an older version and need a security patch we're happy if you can provide a PR.
Copyright by @marionebl. All commitlint
packages are released under the MIT license.
commitlint
is developed in a mono repository.
1git clone git@github.com:conventional-changelog/commitlint.git 2cd commitlint 3yarn 4yarn run build # run build tasks 5yarn start # run tests, again on change 6yarn run commitlint # run CLI
For more information on how to contribute please take a look at our contribution guide.
No vulnerabilities found.
Reason
no dangerous workflow patterns detected
Reason
30 commit(s) and 12 issue activity found in the last 90 days -- score normalized to 10
Reason
no binaries found in the repo
Reason
license file detected
Details
Reason
packaging workflow detected
Details
Reason
Found 9/11 approved changesets -- score normalized to 8
Reason
2 existing vulnerabilities detected
Details
Reason
detected GitHub workflow tokens with excessive permissions
Details
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
security policy file not detected
Details
Reason
project is not fuzzed
Details
Reason
dependency not pinned by hash detected -- score normalized to 0
Details
Reason
SAST tool is not run on all commits -- score normalized to 0
Details
Score
Last Scanned on 2024-11-25
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn More