Security News
cURL Project and Go Security Teams Reject CVSS as Broken
cURL and Go security teams are publicly rejecting CVSS as flawed for assessing vulnerabilities and are calling for more accurate, context-aware approaches.
@logdna/commitlint-config-mezmo
Advanced tools
Commitlint configuration to enforce commit message best practices
Commitlint Configuration to enforce commit message best practices on public repositories
$ npm install commitlint @logdna/commitlint-config-mezmo
To enable commit linting, you need two things in package.json
npm
script exposing commitlintcommitlint
configuration that extends the logdna base configuration
Adding a script to expose commitlint
in the package.json scripts
.
Below is an example of linting all commits on the active branch that have not been merged into main"commitlint": {
"extends": "@logdna/commitlint-config-mezmo"
},
"scripts": {
"commitlint": "commitlint --from=origin/main --to=HEAD",
"pretest": "npm run commitlint"
}
This package may additionally be installed globally as a command lint tool (commitlint-mezmo
)
$ npm install -g @logdna/commitlint-config-mezmo
$ commitlint-mezmo <options>
or executed immediately with npx
$ npx @logdna/commitlint-config-mezmo -f origin/master
-h, --help show help and usage
-v, --version show version
-f, --from [origin/main] the git ref where linting should begin
-t, --to [HEAD] the git ref where linting should end
-p, --pwd <path> set the root directory
--config <path> path to an alternate commitlint config module
Commit message should follow the Conventional Commit Standard, and be be written in imperative form.
BREAKING CHANGE:
(case-sensitive) in the footer to indicate a major
changeFixes:
tag at the bottom of the body to associate the changes with an open issueExample:
fix(test): Add tests for component XYZ
The component for XYZ was missing a test which resulted in a
production bug. There was an unchecked reference that caused
a `TypeError`. This change adds the reference fix and a
corresponding test.
Fixes: #35
The first bit of the commit message is the type
, which has a finite list
of acceptable values:
build
ci
chore
doc
feat
fix
lib
perf
refactor
style
test
The scope
is required, but is not validated.
Example:
pkg(initial): The first commit of this package
This is the initial commit for the project scaffolding and code.
Fixes: #1
There are certain commits formats that will be ingored by the linter. These tend to be commits that are generated by known tools we use or commits that we have determined should not be linted in the sake of developer performance.
doc(wiki)
wip:
chore(deps):
, that are non-breakingExamples:
Documentation commit only:
doc(wiki): Adding additional clarifying documentation
Adding some additional documentation that should make using this
more obvious to the casual contributor
Commits denoting something is still a work in progress
wip: this will be ignored
A minor
or patch
dependency update
chore(deps): Bump some-package@1.2.3
FAQs
Commitlint configuration to enforce commit message best practices
The npm package @logdna/commitlint-config-mezmo receives a total of 0 weekly downloads. As such, @logdna/commitlint-config-mezmo popularity was classified as not popular.
We found that @logdna/commitlint-config-mezmo demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 4 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
cURL and Go security teams are publicly rejecting CVSS as flawed for assessing vulnerabilities and are calling for more accurate, context-aware approaches.
Security News
Bun 1.2 enhances its JavaScript runtime with 90% Node.js compatibility, built-in S3 and Postgres support, HTML Imports, and faster, cloud-first performance.
Security News
Biden's executive order pushes for AI-driven cybersecurity, software supply chain transparency, and stronger protections for federal and open source systems.