
Security News
The Hidden Blast Radius of the Axios Compromise
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.
ide-lib-base-component
Advanced tools
ide-lib-base-component
npm 包方式:
npm install --save ide-lib-base-component
web 方式:
<script src="https://unpkg.com/ide-lib-base-component@1.0.0/dist/index.umd.js"></script>
引入之后将会暴露全局变量 ideBaseComponent.
如果你想要在 webpack 中 external 该库,可以使用以下配置:
{
externals: {
"ide-lib-base-component": {
"commonjs": "ide-lib-base-component",
"commonjs2": "ide-lib-base-component",
"amd": "ide-lib-base-component",
"root": "ideBaseComponent"
}
}
}
首先从 git 仓库拉取代码,安装依赖项:
git clone https://github.com/common-ide/ide-kit/tree/master/packages/ide-lib-base-component
npm install
## 安装 peerDependencies 依赖包
npm run install:all
运行以下命令后,访问 demo 地址: http://localhost:9000
npm run dev
如果遇到无法启动、报错的情况,将
ide.config.js中的 proxyLibs 字段注释掉(这字段是方便本地不同组件之间联调的)
也可访问 storybook 参考具体的使用案例:http://localhost:9001/
npm run storybook
使用 jest 进行测试,执行:
npm test
普通的 npm 发布即可,记得发布前需要手动打包:
npm run build && npm publish
FAQs
base component for ide
The npm package ide-lib-base-component receives a total of 5 weekly downloads. As such, ide-lib-base-component popularity was classified as not popular.
We found that ide-lib-base-component demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.

Research
A supply chain attack on Axios introduced a malicious dependency, plain-crypto-js@4.2.1, published minutes earlier and absent from the project’s GitHub releases.

Research
Malicious versions of the Telnyx Python SDK on PyPI delivered credential-stealing malware via a multi-stage supply chain attack.