Installations
npm install rollup-plugin-manifest-json
Developer Guide
Typescript
Yes
Module System
CommonJS
Node Version
16.15.0
NPM Version
8.5.5
Score
67.1
Supply Chain
95.3
Quality
75.7
Maintenance
100
Vulnerability
100
License
Releases
Unable to fetch releases
Contributors
Unable to fetch Contributors
Languages
JavaScript (67.49%)
TypeScript (32.51%)
Developer
Download Statistics
Total Downloads
26,009
Last Day
1
Last Week
277
Last Month
1,081
Last Year
6,295
GitHub Statistics
13 Stars
45 Commits
3 Forks
1 Watching
2 Branches
3 Contributors
Bundle Size
768.00 B
Minified
477.00 B
Minified + Gzipped
Package Meta Information
Latest Version
1.7.0
Package Id
rollup-plugin-manifest-json@1.7.0
Unpacked Size
6.71 kB
Size
3.21 kB
File Count
6
NPM Version
8.5.5
Node Version
16.15.0
Total Downloads
Cumulative downloads
Total Downloads
26,009
Last day
-95.5%
1
Compared to previous day
Last week
-11.8%
277
Compared to previous week
Last month
-29.8%
1,081
Compared to previous month
Last year
73.8%
6,295
Compared to previous year
Daily Downloads
Weekly Downloads
Monthly Downloads
Yearly Downloads
rollup-plugin-manifest-json
Rollup plugin that generates a web application manifest file. This file contains the startup parameters and application defaults when a web application is launched.
Install
1# NPM 2npm i --save-dev rollup-plugin-manifest-json 3 4# Yarn 5yarn add -D rollup-plugin-manifest-json
Usage
1import manifestJSON from "rollup-plugin-manifest-json"; 2 3export default { 4 input: "main.js", 5 plugins: [ 6 ... 7 manifestJSON({ 8 input: "public/manifest.json", // Required 9 // minify: true 10 // output: "public/manifest.webmanifest" 11 manifest: { 12 short_name: "different-short-name" 13 } 14 }) 15 ] 16}
Options
input
Required
Type: string
Default: ""
The web application manifest file location that will be either cloned or modified and moved into the Rollup build directory.
minify
Optional
Type: boolean
Default: true
Whether or not to mangle the output file, it's recommended to minify the file as it will reduce the file size.
manifest
Optional
Type: object
Default: {}
The key values you wish to add or modify given the existing web application manifest file. For a full list of key values to use see here.
output
Optional
Type: string
Default: public/manifest.json
Output directory to write the manifest file to, useful for building your app outside of the root rollup folder.
Contributors
Don't be scared to raise an issue or a pull request!
Any contributions, no matter how big or small will land your picture here and be greatly appreciated ❤️
No vulnerabilities found.
Reason
no dangerous workflow patterns detected
Reason
no binaries found in the repo
Reason
license file detected
Details
- Info: project has a license file: LICENSE:0
- Info: FSF or OSI recognized license: MIT License: LICENSE:0
Reason
6 existing vulnerabilities detected
Details
- Warn: Project is vulnerable to: GHSA-67hx-6x53-jw92
- Warn: Project is vulnerable to: GHSA-grv7-fg5c-xmjg
- Warn: Project is vulnerable to: GHSA-9c47-m6qq-7p4h
- Warn: Project is vulnerable to: GHSA-mwcw-c2x4-8c55
- Warn: Project is vulnerable to: GHSA-gcx4-mw62-g8wm
- Warn: Project is vulnerable to: GHSA-c2qf-rxjj-qqgw
Reason
Found 3/29 approved changesets -- score normalized to 1
Reason
0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0
Reason
detected GitHub workflow tokens with excessive permissions
Details
- Warn: no topLevel permission defined: .github/workflows/CI.yml:1
- Info: no jobLevel write permissions found
Reason
dependency not pinned by hash detected -- score normalized to 0
Details
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/CI.yml:12: update your workflow using https://app.stepsecurity.io/secureworkflow/azerella/rollup-plugin-manifest-json/CI.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/CI.yml:14: update your workflow using https://app.stepsecurity.io/secureworkflow/azerella/rollup-plugin-manifest-json/CI.yml/master?enable=pin
- Info: 0 out of 2 GitHub-owned GitHubAction dependencies pinned
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
security policy file not detected
Details
- Warn: no security policy file detected
- Warn: no security file to analyze
- Warn: no security file to analyze
- Warn: no security file to analyze
Reason
project is not fuzzed
Details
- Warn: no fuzzer integrations found
Reason
branch protection not enabled on development/release branches
Details
- Warn: branch protection not enabled for branch 'master'
Reason
SAST tool is not run on all commits -- score normalized to 0
Details
- Warn: 0 commits out of 6 are checked with a SAST tool
Score
3
/10
Last Scanned on 2024-12-16
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn More