-
Notifications
You must be signed in to change notification settings - Fork 49
Documentation - Collision detection - add boundary option (HDS-5092) #3431
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Documentation - Collision detection - add boundary option (HDS-5092) #3431
Conversation
|
The latest updates on your projects. Learn more about Vercel for GitHub.
|
|
I documented the API but didn't add code examples since I'm not sure how important/useful the new |
@KristinLBradley we can always add it later, if we discover is needed (for some realistic use case) |
2db2c99 to
e224ca3
Compare
e224ca3 to
a7a72c0
Compare
|
I rebased onto (I won't merge though as this shouldn't go out until the next release.) |
|
Converted to draft to avoid accidental merge before next release. |
Ready to merge after next release.
📌 Summary
If merged, this PR adds documentation for the
boundaryoption for components usinghds-anchored-positionmodifier, including thePopoverPrimitive,Dropdown, andRichTooltip.Web docs previews:
PopoverPrimitive: https://hds-website-git-kristin-hds-5092-boundary-opti-89ed59-hashicorp.vercel.app/utilities/popover-primitive#component-apiDropdown: https://hds-website-git-kristin-hds-5092-boundary-opti-89ed59-hashicorp.vercel.app/components/dropdown?tab=code#component-apiRichTooltip: https://hds-website-git-kristin-hds-5092-boundary-opti-89ed59-hashicorp.vercel.app/components/rich-tooltip?tab=code#component-api🔗 External links
👀 Component checklist
[ ] Percy was checked for any visual regression[ ] A changelog entry was added via Changesets if needed (see templates here)💬 Please consider using conventional comments when reviewing this PR.
📋 PCI review checklist
Examples of changes to controls include access controls, encryption, logging, etc.
Examples include changes to operating systems, ports, protocols, services, cryptography-related components, PII processing code, etc.