
Product
Introducing Module Reachability: Focus on the Vulnerabilities That Matter
Module Reachability filters out unreachable CVEs so you can focus on vulnerabilities that actually matter to your application.
Wire up the Clockpicker assets for your Rails applications.
If you're using Bundler, you can add clockpicker-rails to your Gemfile:
gem 'clockpicker-rails'
Or manually install the clockpicker-rails gem:
gem install clockpicker-rails
All of the assets from the most latest stable Clockpicker::Rails release are vendored so that you can use them with the asset pipeline. You will want the following in your application.js and application.css:
//= require jquery/clockpicker
// or...
//= require jquery/clockpicker.min
// or...
//= require bootstrap/clockpicker
// or...
//= require bootstrap/clockpicker.min
*= require jquery/clockpicker
// or...
*= require jquery/clockpicker.min
// or...
*= require bootstrap/clockpicker
// or...
*= require bootstrap/clockpicker.min
Find a mistake? New version of Clockpicker::Rails? Submit a pull request!
Copyright (c) 2015 Dale Stevens, released under the MIT license
FAQs
Unknown package
We found that clockpicker-rails demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Product
Module Reachability filters out unreachable CVEs so you can focus on vulnerabilities that actually matter to your application.
Company News
Socket is bringing best-in-class reachability analysis into the platform — cutting false positives, accelerating triage, and cementing our place as the leader in software supply chain security.
Product
Socket is introducing a new way to organize repositories and apply repository-specific security policies.