Research
Security News
Quasar RAT Disguised as an npm Package for Detecting Vulnerabilities in Ethereum Smart Contracts
Socket researchers uncover a malicious npm package posing as a tool for detecting vulnerabilities in Etherium smart contracts.
d3-force-attract
Advanced tools
Modular force for use with D3's forceSimulation
.
Pulls nodes toward a specified ⟨x, y⟩ target point.
npm install d3-force-attract
<script>
<script src="https://wzrd.in/standalone/d3-force-attract@latest"></script>
<script>
Download the latest release
<script src="./d3-force-attract.min.js"></script>
<script src="https://unpkg.com/d3-force-attract@latest"></script>
The install method you use determines the syntax for accessing the module in your code:
Import the forceAttract()
method and use it in a forceSimulation
.
import { forceAttract } from 'd3-force-attract'
// ...
d3.forceSimulation
.force('attract', forceAttract());
<script>
, UNPKGThe forceAttract()
method is available in the global d3
namespace.
d3.forceSimulation
.force('attract', d3.forceAttract());
Add an 'attract'
force just like you would any other D3 force module:
// add an attract force to pull nodes toward the center of the screen
d3.forceSimulation()
.force('attract', forceAttract() // see 'Accessing the module' above for the correct syntax
.target([width/2, height/2])
.strength(0.05));
More detailed examples:
The forceAttract
module follows the basic interface described in d3-force, additionally implementing the following:
# attract.initialize(nodes) <>
Assigns the array of nodes to this force. This method is called when a force is bound to a simulation via simulation.force and when the simulation’s nodes change via simulation.nodes. A force may perform necessary work during initialization, such as evaluating per-node parameters, to avoid repeatedly performing work during each application of the force.
# attract.strength([strength]) <>
If strength is specified, sets the force strength to the specified number in the range [0,1] and returns this force. If strength is not specified, returns the current strength, which defaults to 0.1. Um, I guess if strength is negative, this might act as a repulsion force? 🤔 I should try that!
This parameter determines the attraction strength of each node to the specified (via attract.target) target node/position.
If target is specified, sets the target point accessor to the specified two-element array [x, y]
or function, re-evaluates the target point accessor for each node, and returns this force. If target is not specified, returns the current target point accessor, which defaults to a function that returns [0, 0]
.
The target point accessor is invoked for each node in the simulation, being passed the node, its zero-based index, and the array of all nodes (the standard D3 format of (d, i, nodes)
). The resulting ⟨x, y⟩ point is then stored internally, such that the target point for each node is only recomputed when the force is initialized or when this method is called with a new target, and not on every application of the force.
Install nvm and npm if you haven't already.
Build with the following commands:
nvm use
npm install
npm run dist
Test with npm run test
.
FAQs
Attraction force for d3.forceSimulation.
The npm package d3-force-attract receives a total of 120 weekly downloads. As such, d3-force-attract popularity was classified as not popular.
We found that d3-force-attract demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket researchers uncover a malicious npm package posing as a tool for detecting vulnerabilities in Etherium smart contracts.
Security News
Research
A supply chain attack on Rspack's npm packages injected cryptomining malware, potentially impacting thousands of developers.
Research
Security News
Socket researchers discovered a malware campaign on npm delivering the Skuld infostealer via typosquatted packages, exposing sensitive data.