Product
Introducing SSO
Streamline your login process and enhance security by enabling Single Sign-On (SSO) on the Socket platform, now available for all customers on the Enterprise plan, supporting 20+ identity providers.
@gooddata/indigo-visualizations
Advanced tools
Readme
Visualization library for GoodData visualizations built using React.js and HighCharts
This repository uses Storybook for React
yarn storybook
and see the examplesyarn test
Visual regression testing for Storybook is provided by @gooddata/test-storybook package.
git checkout master
git tag -l | xargs git tag -d; git fetch upstream; git reset --hard upstream/master
npm version [major|minor|patch] -m "Release v%s"
npm publish --access=public
git push --tags upstream master
Report bugs and features on our issues page.
(C) 2007-2018 GoodData Corporation
For more information, please see LICENSE
FAQs
Indigo Visualizations library
The npm package @gooddata/indigo-visualizations receives a total of 11 weekly downloads. As such, @gooddata/indigo-visualizations popularity was classified as not popular.
We found that @gooddata/indigo-visualizations demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 38 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Product
Streamline your login process and enhance security by enabling Single Sign-On (SSO) on the Socket platform, now available for all customers on the Enterprise plan, supporting 20+ identity providers.
Security News
Tea.xyz, a crypto project aimed at rewarding open source contributions, is once again facing backlash due to an influx of spam packages flooding public package registries.
Security News
As cyber threats become more autonomous, AI-powered defenses are crucial for businesses to stay ahead of attackers who can exploit software vulnerabilities at scale.