Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
react-tether
Advanced tools
A positioning engine to make overlays, tooltips and dropdowns better
Cross-browser Testing Platform and Open Source <3 Provided by Sauce Labs.
React wrapper around Tether, a positioning engine to make overlays, tooltips and dropdowns better
npm install react-tether
As of version 2, a minimum of React 16.3 is required. If you need support for React < 16.3 please use the 1.x branch.
import TetherComponent from "react-tether";
class SimpleDemo extends React.Component {
constructor(props) {
super(props);
this.state = {
isOpen: false,
};
}
render() {
const { isOpen } = this.state;
return (
<TetherComponent
attachment="top center"
constraints={[
{
to: "scrollParent",
attachment: "together",
},
]}
/* renderTarget: This is what the item will be tethered to, make sure to attach the ref */
renderTarget={(ref) => (
<button
ref={ref}
onClick={() => {
this.setState({ isOpen: !isOpen });
}}
>
Toggle Tethered Content
</button>
)}
/* renderElement: If present, this item will be tethered to the the component returned by renderTarget */
renderElement={(ref) =>
isOpen && (
<div ref={ref}>
<h2>Tethered Content</h2>
<p>A paragraph to accompany the title.</p>
</div>
)
}
/>
);
}
}
renderTarget
: PropTypes.funcThis is a render prop, the component returned from this function will be Tether's target
. One argument, ref, is passed into this function. This is a ref that must be attached to the highest possible DOM node in the tree. If this is not done the element will not render.
renderElement
: PropTypes.funcThis is a render prop, the component returned from this function will be Tether's element
, that will be moved. If no component is returned, the target will still render, but with no element tethered. One argument, ref, is passed into this function. This is a ref that must be attached to the highest possible DOM node in the tree. If this is not done the element will not render.
renderElementTag
: PropTypes.stringThe tag that is used to render the Tether element, defaults to div
.
renderElementTo
: PropTypes.stringWhere in the DOM the Tether element is appended. Passes in any valid selector to document.querySelector
. Defaults to document.body
.
Tether requires this element to be position: static;
, otherwise it will default to document.body
. See this example for more information.
Tether Options
:Any valid Tether options.
children
:Previous versions of react-tether used children to render the target and component, using children will now throw an error. Please use renderTarget and renderElement instead
The following methods are exposed on the component instance:
getTetherInstance(): Tether
disable(): void
enable(): void
on(event: string, handler: function, ctx: any): void
once(event: string, handler: function, ctx: any): void
off(event: string, handler: function): void
position(): void
<TetherComponent
ref={(tether) => (this.tether = tether)}
renderTarget={(ref) => <Target ref={ref} />}
renderElement={(ref) => (
<Element ref={ref} onResize={() => this.tether && this.tether.position()} />
)}
/>
clone repo
git clone git@github.com:danreeves/react-tether.git
move into folder
cd ~/react-tether
install dependencies
npm install
run dev mode
npm run demo
open your browser and visit: http://localhost:1234/
FAQs
A positioning engine to make overlays, tooltips and dropdowns better
We found that react-tether demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.