Product
Introducing SSO
Streamline your login process and enhance security by enabling Single Sign-On (SSO) on the Socket platform, now available for all customers on the Enterprise plan, supporting 20+ identity providers.
@datawrapper/polyfills
Advanced tools
Readme
Cached per-useragent polyfills from polyfills.io
All polyfills will get deployed to AWS S3 when pushing a version tag to Github and increasing the version number in package.json
. This is done with the following commands:
# update version and create git tag
> npm version {major|minor|patch}
#push new version with tag to Github
> git push --follow-tags
These 2 commands will tell CircleCI to publish the new version to npm and deploy the polyfills to the Datawrapper CDN. By doing this with CircleCI the npm package and versions on AWS will always stay in sync.
There is no need to set up the aws
CLI and deploy manually. It is still possible if needed! To manually deploy polyfills run make upload
. Make sure the aws
CLI is properly configured.
FAQs
> Cached per-useragent polyfills from polyfills.io
We found that @datawrapper/polyfills demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 19 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Product
Streamline your login process and enhance security by enabling Single Sign-On (SSO) on the Socket platform, now available for all customers on the Enterprise plan, supporting 20+ identity providers.
Security News
Tea.xyz, a crypto project aimed at rewarding open source contributions, is once again facing backlash due to an influx of spam packages flooding public package registries.
Security News
As cyber threats become more autonomous, AI-powered defenses are crucial for businesses to stay ahead of attackers who can exploit software vulnerabilities at scale.