
Product
Announcing Bun and vlt Support in Socket
Bringing supply chain security to the next generation of JavaScript package managers
merchii-placeholder_image
Advanced tools

Generate generic placeholder vector images - just like placehold.it, but native.
Command-line:
$ placeholder_image 150x100 /tmp/placeholder.png
$ placeholder_image 300x300 /tmp/placeholder.png --text "Hello" --bgcolor "#dddddd" --color "#bbbbbb"
Code:
generator = PlaceholderImage::Generator.new('150x100')
generator.generate!("/tmp/placeholder.png")
generator = PlaceholderImage::Generator.new('300x300', background_color: "#dddddd", text_color: "#bbbbbb")
generator.generate!("/tmp/placeholder.png")
Command-line:
$ placeholder_image help generate
Code:
background_color - render background using this color. Default: '#000000'.text_color - render text using this color. Default: '#ffffff'.text - the text rendered centered within the image. Default: '#{WIDTH} x #{HEIGHT}'.No JRuby support, because of RMagick-clash.
This gem was developed for our own requirements at Merchii, so feel free to send pull-requests with enhancements of any kind (features, bug-fixes, documentation, tests, etc.) to make it better or useful for you as well.
Released under the MIT license.
Copyright (c) Jonas Grimfelt, Merchii
FAQs
Unknown package
We found that merchii-placeholder_image demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Product
Bringing supply chain security to the next generation of JavaScript package managers

Product
A safer, faster way to eliminate vulnerabilities without updating dependencies

Product
Reachability analysis for Ruby is now in beta, helping teams identify which vulnerabilities are truly exploitable in their applications.