Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
@commercetools-uikit/tag
Advanced tools
A tag is often used for items that need to be labeled or categorized. This might apply to search terms or categories of a product. Tags can also have a "remove" button.
import Tag from '@commercetools-uikit/tag';
<Tag
type="normal"
isDisabled={false}
to="/project-key/products/foo"
onRemove={() => {}}
>
Icecream
</Tag>;
Props | Type | Required | Values | Default | Description |
---|---|---|---|---|---|
type | string | - | normal , warning | normal | Indicates color scheme of the tag |
styles.body | object | - | - | - | Styles spread onto the tag body |
linkTo | string | - | - | - | Location the tag links to when enabled |
isDisabled | bool | - | - | false | Disables the tag and the option to remove |
onRemove | func | - | - | - | Called when remove is clicked |
onClick | func | - | - | - | Called when tag is clicked (but not when remove button is clicked) |
horizontalConstraint | object | - | xs , s , m , l , xl , scale | scale | Horizontal size limit of the input field. |
children | node | ✅ | - | - | Content rendered within the tag |
Main Functions and use cases are:
Adding something to a set example: Adding products to categories
Remove from a set example: Removing products from categories
Showing a set example: List of categories a product is in
FAQs
A tag is often used for items that need to be labeled or categorized.
The npm package @commercetools-uikit/tag receives a total of 2,961 weekly downloads. As such, @commercetools-uikit/tag popularity was classified as popular.
We found that @commercetools-uikit/tag demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.