
Security News
Another Round of TEA Protocol Spam Floods npm, But It’s Not a Worm
Recent coverage mislabels the latest TEA protocol spam as a worm. Here’s what’s actually happening.
@aligov/bops-site-select
Advanced tools
@aligov/bops-site-select
站点选择
返回所有选择的子节点的 value。
如果一个节点下的所有子节点都已选择,那么展示父节点,返回的 value 依然是所有选择的子节点的 value。
import SiteSelect from '@aligov/bops-site-select';
<SiteSelect />
基于基础的功能又做了下面的定制。
import { SingleSiteSelect } from '@aligov/bops-site-select';
<SingleSiteSelect />
import { ServiceRange } from '@aligov/bops-site-select';
<ServiceRange />
import { CurSiteSelect } from '@aligov/bops-site-select';
<CurSiteSelect />
{ site, changeSite } 的 value| 参数名 | 说明 | 必填 | 类型 | 默认值 | 备注 |
|---|---|---|---|---|---|
| rootId | 根结点 id | string | |||
| value | 选择的值 | array | 添加该属性表示受控 | ||
| queryService | 数据加载服务 | (rootId) => Promise<K[]> | bops 默认服务 | 用来查询树数据 | |
| onChange | 选择变更后触发的函数 | (value) => void | 一般搭配 value 来做受控 | ||
| multiple | 是否多选 | boolean | true | ||
| returnLeafValue | 多选时是否返回叶子结点的值而非使用父节点替代 | boolean | true | ||
| className | 扩展 treeSelect 的 className | string | mod-bops-site-select | ||
| popupClassName | 扩展 treeSelect 下拉的 className | string | mod-bops-site-select-poup |
queryService 需要返回一个数组,数组元素类型是 K,其至少需要包括 key, value,label 和 parentId (父结点的 vlaue,无则为 null)属性。
基于 TreeSelect 组件,具体参考该组件的文档。
FAQs
We found that @aligov/bops-site-select demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 16 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Recent coverage mislabels the latest TEA protocol spam as a worm. Here’s what’s actually happening.

Security News
PyPI adds Trusted Publishing support for GitLab Self-Managed as adoption reaches 25% of uploads

Research
/Security News
A malicious Chrome extension posing as an Ethereum wallet steals seed phrases by encoding them into Sui transactions, enabling full wallet takeover.