Installations
npm install @semabit/release-it-bumper
Developer Guide
Typescript
No
Module System
CommonJS
Min. Node Version
>=8
Node Version
12.20.1
NPM Version
6.14.10
Score
61.7
Supply Chain
90.3
Quality
73.6
Maintenance
50
Vulnerability
97.1
License
Releases
Contributors
Unable to fetch Contributors
Languages
JavaScript (96.4%)
Handlebars (3.6%)
Developer
semabit
Download Statistics
Total Downloads
10,983
Last Day
4
Last Week
41
Last Month
288
Last Year
2,630
GitHub Statistics
38 Commits
1 Forks
2 Watching
1 Branches
2 Contributors
Package Meta Information
Latest Version
2.1.0
Package Id
@semabit/release-it-bumper@2.1.0
Unpacked Size
21.57 kB
Size
6.21 kB
File Count
9
NPM Version
6.14.10
Node Version
12.20.1
Publised On
06 Nov 2023
Total Downloads
Cumulative downloads
Total Downloads
10,983
Last day
-73.3%
4
Compared to previous day
Last week
-43.1%
41
Compared to previous week
Last month
50%
288
Compared to previous month
Last year
-11.1%
2,630
Compared to previous year
Daily Downloads
Weekly Downloads
Monthly Downloads
Yearly Downloads
Dev Dependencies
4
Version read/write plugin for release-it
This plugin reads and/or writes version/manifest files.
# npm
npm install --save-dev @semabit/release-it-bumper
# yarn
yarn add --dev @semabit/release-it-bumper
In release-it config:
1"plugins": { 2 "@semabit/release-it-bumper": { 3 "out": "manifest.json" 4 } 5}
for .yaml
file:
1"plugins": { 2 "@semabit/release-it-bumper": { 3 "out": { "file": "version.yaml", "type": "application/x-yaml" } 4 } 5}
In case the in
option is used, the version from this file will take precedence over the version
from package.json
or the latest Git tag (which release-it uses by default).
The default type
is application/json
, but text/plain
and application/x-yaml
are also supported.
In that case the whole file is used to read and/or write the version.
1"plugins": { 2 "@semabit/release-it-bumper": { 3 "in": { "file": "VERSION", "type": "text/plain" }, 4 "out": { "file": "VERSION", "type": "text/plain" } 5 } 6}
1"plugins": { 2 "@semabit/release-it-bumper": { 3 "in": { "file": "version.yaml", "type": "application/x-yaml" }, 4 "out": { "file": "version.yaml", "type": "application/x-yaml" } 5 } 6}
The out
option can also be an array of files:
1"plugins": { 2 "@semabit/release-it-bumper": { 3 "out": ["manifest.json", "bower.json", { "file": "version.yaml", "type": "application/x-yaml" }] 4 } 5}
The path
option (default: "version"
) can be used to change a different property. the following example will set the
deeper.current
property to the new version in manifest.json
. Also possible to define the path for yaml
files:
1"plugins": { 2 "@semabit/release-it-bumper": { 3 "out": [ 4 { "file": "manifest.json", "path": "deeper.current" }, 5 { "file": "version.yaml", "type": "application/x-yaml", "path": "parameters['app.version']" } 6 ] 7 } 8}
No vulnerabilities found.
Reason
no binaries found in the repo
Reason
license file detected
Details
- Info: project has a license file: LICENSE:0
- Info: FSF or OSI recognized license: MIT License: LICENSE:0
Reason
Found 0/30 approved changesets -- score normalized to 0
Reason
no SAST tool detected
Details
- Warn: no pull requests merged into dev branch
Reason
0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
security policy file not detected
Details
- Warn: no security policy file detected
- Warn: no security file to analyze
- Warn: no security file to analyze
- Warn: no security file to analyze
Reason
project is not fuzzed
Details
- Warn: no fuzzer integrations found
Reason
branch protection not enabled on development/release branches
Details
- Warn: branch protection not enabled for branch 'master'
Reason
46 existing vulnerabilities detected
Details
- Warn: Project is vulnerable to: GHSA-67hx-6x53-jw92
- Warn: Project is vulnerable to: GHSA-93q8-gq69-wqmw
- Warn: Project is vulnerable to: GHSA-grv7-fg5c-xmjg
- Warn: Project is vulnerable to: GHSA-3xgq-45jj-v275
- Warn: Project is vulnerable to: GHSA-gxpj-cx7g-858c
- Warn: Project is vulnerable to: GHSA-ff7x-qrg7-qggm
- Warn: Project is vulnerable to: GHSA-ww39-953v-wcq6
- Warn: Project is vulnerable to: GHSA-pfrx-2q88-qq97
- Warn: Project is vulnerable to: GHSA-w457-6q6x-cgp9
- Warn: Project is vulnerable to: GHSA-62gr-4qp9-h98f
- Warn: Project is vulnerable to: GHSA-f52g-6jhx-586p
- Warn: Project is vulnerable to: GHSA-2cf5-4w76-r9qv
- Warn: Project is vulnerable to: GHSA-3cqr-58rm-57f8
- Warn: Project is vulnerable to: GHSA-g9r4-xpmj-mj65
- Warn: Project is vulnerable to: GHSA-q2c6-c6pm-g3gh
- Warn: Project is vulnerable to: GHSA-765h-qjxv-5f44
- Warn: Project is vulnerable to: GHSA-f2jv-r9rf-7988
- Warn: Project is vulnerable to: GHSA-43f8-2h32-f4cj
- Warn: Project is vulnerable to: GHSA-rc47-6667-2j5j
- Warn: Project is vulnerable to: GHSA-qqgx-2p2h-9c37
- Warn: Project is vulnerable to: GHSA-9c47-m6qq-7p4h
- Warn: Project is vulnerable to: GHSA-p6mc-m468-83gw
- Warn: Project is vulnerable to: GHSA-29mw-wpgm-hmr9
- Warn: Project is vulnerable to: GHSA-35jh-r3h4-6jhm
- Warn: Project is vulnerable to: GHSA-952p-6rrq-rcjv
- Warn: Project is vulnerable to: GHSA-f8q6-p94x-37v3
- Warn: Project is vulnerable to: GHSA-vh95-rmgr-6w4m / GHSA-xvch-5gv4-984h
- Warn: Project is vulnerable to: GHSA-w7rc-rwvf-8q5r
- Warn: Project is vulnerable to: GHSA-r683-j2x4-v87g
- Warn: Project is vulnerable to: GHSA-px4h-xg32-q955
- Warn: Project is vulnerable to: GHSA-3j8f-xvm3-ffx4
- Warn: Project is vulnerable to: GHSA-4p35-cfcx-8653
- Warn: Project is vulnerable to: GHSA-7f3x-x4pr-wqhj
- Warn: Project is vulnerable to: GHSA-jpp7-7chh-cf67
- Warn: Project is vulnerable to: GHSA-q6wq-5p59-983w
- Warn: Project is vulnerable to: GHSA-j9fq-vwqv-2fm2
- Warn: Project is vulnerable to: GHSA-pqw5-jmp5-px4v
- Warn: Project is vulnerable to: GHSA-hj48-42vr-x3v9
- Warn: Project is vulnerable to: GHSA-9wv6-86v2-598j
- Warn: Project is vulnerable to: GHSA-c2qf-rxjj-qqgw
- Warn: Project is vulnerable to: GHSA-4rq4-32rv-6wp6
- Warn: Project is vulnerable to: GHSA-64g7-mvw6-v9qj
- Warn: Project is vulnerable to: GHSA-7p7h-4mm5-852v
- Warn: Project is vulnerable to: GHSA-38fc-wpqx-33j7
- Warn: Project is vulnerable to: GHSA-776f-qx25-q3cc
- Warn: Project is vulnerable to: GHSA-p9pc-299p-vxgp
Score
1.7
/10
Last Scanned on 2024-12-16
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn More