
Security News
vlt Launches "reproduce": A New Tool Challenging the Limits of Package Provenance
vlt's new "reproduce" tool verifies npm packages against their source code, outperforming traditional provenance adoption in the JavaScript ecosystem.
CookieAlert will add an alert to your webpage informing your visitor that your website uses Cookies. It can be configured to display the Alert for a fixed number of views, or display it constantly until the visitor 'accepts' the alert. It:
Update Gemfile
to add
gem "cookie_alert"
Run bundle
bundle install
Install the configuration & view files
rails g cookie_alert:install
Update your app/helpers/application_helper.rb
file to include the CookieAlert module:
include CookieAlert
Update your config/routes.rb
file to add the CookieAlert route:
mount CookieAlert::Engine => "/cookie-alert"
Update your Asset Manifest files to add the JavaScript and CSS files:
in application.js add
//= require cookie_alert
in application.css add
*= require cookie_alert
To remove the installed files run rails g cookie_alert:uninstall
To display the Cookie Alerts, simply call the following method from your layout <%= display_cookie_alert %>
When a visitor first comes to your site CookieAlert will set an encrypted Cookie that keeps track of how many pages the visitor has viewed and display a Primary Alert notifying the visitor that your site uses Cookies. By default this Primary Alert is a large banner fixed at the foot of the screen.
After the Primary Alert has been displayed a number of times (5 by default) it is replaced by a Secondary Alert. By default this is a smaller box fixed to the bottom-left of the screen which transforms back to the the large banner when moused-over.
The visitor can click a link to 'hide the banner', thereby accepting the notice, and the Alerts will no longer be displayed for the remainder of the session.
CookieAlert can be configured to:
Please check the WIKI for a full list of the configuration options available.
The default Alerts use JQuery to allow a server-side response and to add effects. You can easily change this to use a different JavaScript framework (or none at all!). Check the WIKI to see how.
If you are using CookieAlert to address the EU Cookie Law, then within the Alert message you should also include a link to a Cookie Policy page where your visitors can view a description of the cookies used by your site. See KatanaCode.com for an example.
Note that CookieAlert is designed to allow you to display alerts - the content and wording of the alert is entirely your own responsibility. KatanaCode do not warrant in any way that the default message, operation or usage of this Gem will make you compliant with the EU Cookie Law. It is up to you to ensure compliance!
All we can say is that we use it ourselves.
If you discover a problem with CookieAlert, please let us know about it.
Remember to search the issues list first in case your issue has already been raised by another Githuber
Full documentation is available here: http://rubydoc.info/gems/cookie_alert
You're welcome to contribute to CookieAlert. Please consult the contribution guidelines for more info.
Copyright 2013 Katana Code Ltd.
See MIT-LICENSE for full details.
Developed by CodeMeister at Katana Code Ltd
Katana Code are iPhone app and Ruby on Rails Developers in Edinburgh, Scotland.
FAQs
Unknown package
We found that cookie_alert demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
vlt's new "reproduce" tool verifies npm packages against their source code, outperforming traditional provenance adoption in the JavaScript ecosystem.
Research
Security News
Socket researchers uncovered a malicious PyPI package exploiting Deezer’s API to enable coordinated music piracy through API abuse and C2 server control.
Research
The Socket Research Team discovered a malicious npm package, '@ton-wallet/create', stealing cryptocurrency wallet keys from developers and users in the TON ecosystem.