
Product
Introducing Webhook Events for Pull Request Scans
Add real-time Socket webhook events to your workflows to automatically receive pull request scan results and security alerts in real time.
hig-react
Advanced tools
React components for the HIG
This project uses node and npm. Go check them out if you don't have them locally installed.
$ npm install --save @hig/hig-react
Then with a module bundler like rollup or webpack, use as you would anything else:
// using ES6 modules
import { Button } from '@hig/hig-react';
// Styles
import '@hig/hig-react/lib/hig-react.css';
// using CommonJS modules
var ReactHIG = require('@hig/hig-react');
var Button = ReactHIG.Button;
The UMD build is also available on unpkg:
<script src="https://unpkg.com/@hig/hig-react/lib/hig-react.umd.js"></script>
You can find the library on window.ReactHIG
.
import React from 'react';
import ReactDOM from 'react-dom';
import { Button } from '@hig/hig-react';
import '@hig/hig-react/lib/hig-react.css';
class App extends React.Component {
render() {
return (
<div>
<Button title="Hello World!" />
</div>
)
}
}
FAQs
HIG components in React
The npm package hig-react receives a total of 6,320 weekly downloads. As such, hig-react popularity was classified as popular.
We found that hig-react demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 5 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Product
Add real-time Socket webhook events to your workflows to automatically receive pull request scan results and security alerts in real time.
Research
The Socket Threat Research Team uncovered malicious NuGet packages typosquatting the popular Nethereum project to steal wallet keys.
Product
A single platform for static analysis, secrets detection, container scanning, and CVE checks—built on trusted open source tools, ready to run out of the box.