
Product
Announcing Bun and vlt Support in Socket
Bringing supply chain security to the next generation of JavaScript package managers
@conclurer/edel-elements
Advanced tools
Documentation can be found at Github.io Page.
A new, no UI element which could handle the context for an edel-element. There are some edel-elements (like the viewers) which need a context (endpoint/jwt/etc.). There are two options: Provide the context directly to every element, or using the context element.
The edel-context element is an HTML tag which accept endpoint and jwt as property and also triggers an event on every update of these properties. So if you want to listen to context updates, simply subscribe to the contextUpdated event.
Sample usage:
<edel-context endpoint="http://localhost:3000/graphql" jwt="eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJleHBpcnkiOiIyMDE5LTAxLTE1VDEzOjU1OjI0LjQ2NloiLCJvcmdJZGVudGlmaWVyIjoiY29uY2x1cmVyIiwiZnFuIjoiYWFyb24uY3ppY2hvbkBjb25jbHVyZXIuY29tIiwidXNlcklkIjoiNjg0YTQ3MmUtZDQwMy00YzkzLWI3ZWMtMTUyYWJhZWE5NDdiIiwiaWF0IjoxNTQ3NDc0MTI0fQ.YGVTny5HCpDrzFIyZf_1yhKkyx1SfA8TfGbXzLf9gOQ"></edel-context>
The jwt property is also optional. If the edel-context element could find a jwt inside the localStorage this is also fine.
FAQs
Edel-Elements: UI-Elemente für das Edelog Framework
We found that @conclurer/edel-elements demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Product
Bringing supply chain security to the next generation of JavaScript package managers

Product
A safer, faster way to eliminate vulnerabilities without updating dependencies

Product
Reachability analysis for Ruby is now in beta, helping teams identify which vulnerabilities are truly exploitable in their applications.