
Security News
The Hidden Blast Radius of the Axios Compromise
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.
ide-component-tree
Advanced tools
ide-component-tree
npm 包方式:
npm install --save ide-component-tree
web 方式:
<script src="https://unpkg.com/ide-component-tree@0.1.3/dist/index.umd.js"></script>
引入之后将会暴露全局变量 ideComponentTree.
如果你想要在 webpack 中 external 该库,可以使用以下配置:
{
externals: {
"ide-component-tree": {
"commonjs": "ide-component-tree",
"commonjs2": "ide-component-tree",
"amd": "ide-component-tree",
"root": "ideComponentTree"
}
}
}
首先从 git 仓库拉取代码,安装依赖项:
git clone https://github.com/one-gourd/ide-component-tree.git
npm install
## 安装 peerDependencies 依赖包
npm install ss-tree@x.x.x ide-lib-utils@0.x ide-lib-base-component@0.x ide-lib-engine@0.x ette@0.x ette-proxy@0.x ette-router@0.x antd@3.x mobx@4.x mobx-react@5.x mobx-react-lite@1.x mobx-state-tree@3.10.x react@16.x styled-components@4.x.x react-dom@16.x
运行以下命令后,访问 demo 地址: http://localhost:9000
npm run dev
也可访问 storybook 参考具体的使用案例:http://localhost:9001/
npm run storybook
使用 jest 进行测试,执行:
npm test
普通的 npm 发布即可,记得发布前需要手动打包:
npm run build && npm publish
FAQs
component tree for ide
The npm package ide-component-tree receives a total of 2 weekly downloads. As such, ide-component-tree popularity was classified as not popular.
We found that ide-component-tree demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.

Research
A supply chain attack on Axios introduced a malicious dependency, plain-crypto-js@4.2.1, published minutes earlier and absent from the project’s GitHub releases.

Research
Malicious versions of the Telnyx Python SDK on PyPI delivered credential-stealing malware via a multi-stage supply chain attack.