
Research
/Security News
Weaponizing Discord for Command and Control Across npm, PyPI, and RubyGems.org
Socket researchers uncover how threat actors weaponize Discord across the npm, PyPI, and RubyGems ecosystems to exfiltrate sensitive data.
@appsignal/stimulus
Advanced tools
- [AppSignal.com website][appsignal] - [Documentation][docs] - [Support][contact]
@appsignal/stimulus
The @appsignal/javascript
integration for Stimulus v1.1+.
See also the mono repo README for more information.
Add the @appsignal/stimulus
and @appsignal/javascript
packages to your package.json
. Then, run yarn install
/npm install
.
You can also add these packages to your package.json
on the command line:
yarn add @appsignal/javascript @appsignal/stimulus
npm install --save @appsignal/javascript @appsignal/stimulus
Application.handleError
The default Stimulus integration is a function that binds to the Application.handleError
property. In a new app created using rails new $APP_NAME --webpack=stimulus
, for example, your javascript/controllers/index.js
file would look something like this:
import { Application } from "stimulus"
import { definitionsFromContext } from "stimulus/webpack-helpers"
import Appsignal from "@appsignal/javascript"
import { installErrorHandler } from "@appsignal/stimulus"
const appsignal = new Appsignal({
key: "YOUR FRONTEND API KEY"
})
const application = Application.start()
installErrorHandler(appsignal, application)
const context = require.context("controllers", true, /_controller\.js$/)
application.load(definitionsFromContext(context))
Make sure mono is installed and bootstrapped, see the project README's development section for more information.
You can then run the following to start the compiler in watch mode in this sub directory. This automatically compiles both the ES Module and CommonJS variants:
yarn build:watch
You can also build the library without watching the directory:
yarn build # build both CJS and ESM
yarn build:cjs # just CJS
yarn build:esm # just ESM
The tests for this library use Jest as the test runner. Once you've installed the dependencies, you can run the following command in the root of this repository to run the tests for all packages, or in the directory of a package to run only the tests pertaining to that package:
yarn test
This repo uses Semantic Versioning (often referred to as semver). Each package in the repository is versioned independently from one another.
@TODO: define how this works once we know more about releasing
Thinking of contributing to this repo? Awesome! 🚀
Please follow our Contributing guide in our documentation and follow our Code of Conduct.
Also, we would be very happy to send you Stroopwafles. Have look at everyone we send a package to so far on our Stroopwafles page.
Contact us and speak directly with the engineers working on AppSignal. They will help you get set up, tweak your code and make sure you get the most out of using AppSignal.
FAQs
- [AppSignal.com website][appsignal] - [Documentation][docs] - [Support][contact]
The npm package @appsignal/stimulus receives a total of 4,701 weekly downloads. As such, @appsignal/stimulus popularity was classified as popular.
We found that @appsignal/stimulus demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 7 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
/Security News
Socket researchers uncover how threat actors weaponize Discord across the npm, PyPI, and RubyGems ecosystems to exfiltrate sensitive data.
Security News
Socket now integrates with Bun 1.3’s Security Scanner API to block risky packages at install time and enforce your organization’s policies in local dev and CI.
Research
The Socket Threat Research Team is tracking weekly intrusions into the npm registry that follow a repeatable adversarial playbook used by North Korean state-sponsored actors.