Gathering detailed insights and metrics for @womorg/omnis-laborum-asperiores
Gathering detailed insights and metrics for @womorg/omnis-laborum-asperiores
Gathering detailed insights and metrics for @womorg/omnis-laborum-asperiores
Gathering detailed insights and metrics for @womorg/omnis-laborum-asperiores
npm install @womorg/omnis-laborum-asperiores
Typescript
Module System
Node Version
NPM Version
66.6
Supply Chain
79.7
Quality
85.9
Maintenance
100
Vulnerability
99.6
License
JavaScript (100%)
Love this project? Help keep it running — sponsor us today! 🚀
Total Downloads
505
Last Day
142
Last Week
149
Last Month
340
Last Year
505
MIT License
2,609 Commits
1 Forks
1 Branches
1 Contributors
Updated on Feb 16, 2025
Latest Version
5.11.128
Package Id
@womorg/omnis-laborum-asperiores@5.11.128
Unpacked Size
237.28 kB
Size
125.37 kB
File Count
677
NPM Version
10.8.2
Node Version
20.17.0
Published on
Sep 22, 2024
Cumulative downloads
Total Downloads
Last Day
0%
142
Compared to previous day
Last Week
4.2%
149
Compared to previous week
Last Month
150%
340
Compared to previous month
Last Year
0%
505
Compared to previous year
36
Shared code for central services
We use audit-ci
along with npm audit
to check dependencies for node vulnerabilities, and keep track of resolved dependencies with an audit-ci.jsonc
file.
To start a new resolution process, run:
1npm run audit:fix
You can then check to see if the CI will pass based on the current dependencies with:
1npm run audit:check
The audit-ci.jsonc contains any audit-exceptions that cannot be fixed to ensure that CircleCI will build correctly.
As part of our CI/CD process, we use a combination of CircleCI, standard-version npm package and github-release CircleCI orb to automatically trigger our releases and image builds. This process essentially mimics a manual tag and release.
On a merge to main, CircleCI is configured to use the mojaloopci github account to push the latest generated CHANGELOG and package version number.
Once those changes are pushed, CircleCI will pull the updated main, tag and push a release triggering another subsequent build that also publishes a docker image.
There is a case where the merge to main workflow will resolve successfully, triggering a release. Then that tagged release workflow subsequently failing due to the image scan, audit check, vulnerability check or other "live" checks.
This will leave main without an associated published build. Fixes that require a new merge will essentially cause a skip in version number or require a clean up of the main branch to the commit before the CHANGELOG and bump.
This may be resolved by relying solely on the previous checks of the merge to main workflow to assume that our tagged release is of sound quality. We are still mulling over this solution since catching bugs/vulnerabilities/etc earlier is a boon.
It is unknown if a race condition might occur with multiple merges with main in quick succession, but this is a suspected edge case.
No vulnerabilities found.
No security vulnerabilities found.