- Vue.js 2 Design Patterns and Best Practices
- Paul Halliday
- 260字
- 2021-06-24 18:33:08
Watched properties
Computed properties are not always the answer to our reactive data problems, sometimes we need to create our own custom watched properties. Computed properties can only be synchronous, must be pure (for example, no observed side-effects), and return a value; this is in direct contrast to a watched property, which is often used to deal with asynchronous data.
A watched property allows us to reactively execute a function whenever a piece of data changes. This means that we can call a function every time an item from our data object changes, and we'll have access to this changed value as a parameter. Let's take a look at this with a simple example:
<template>
<div>
<input type="number" v-model="id" />
<p>Name: {{user.name}}</p>
<p>Email: {{user.email}}</p>
<p>Id: {{user.id}}</p>
</div>
</template>
<script>
import axios from 'axios';
export default {
data() {
return {
id: '',
user: {}
}
},
methods: {
getDataForUser() {
axios.get(`https://jsonplaceholder.typicode.com/users/${this.id}`)
.then(res => this.user = res.data);
}
},
watch: {
id() {
this.getDataForUser();
}
}
}
</script>
In this example, any time our text box changes with a new id (1-10), we get information about that particular user, like so:

This is effectively watching for any changes on the id and calling the getDataForUser method, retrieving new data about this user.
Although watched properties do have a lot of power, the benefits of computed properties on performance and ease of use should not be understated; therefore wherever possible, favor computed properties over watched properties.
- Building E-commerce Sites with VirtueMart Cookbook
- 工業控制網絡安全技術與實踐
- 農產品物聯網研究與應用
- 局域網組建、管理與維護項目教程(Windows Server 2003)
- 智慧城市中的移動互聯網技術
- 互聯網安全的40個智慧洞見:2014年中國互聯網安全大會文集
- 數字通信同步技術的MATLAB與FPGA實現:Altera/Verilog版(第2版)
- Learning Swift(Second Edition)
- 中國互聯網發展報告2018
- Working with Legacy Systems
- Getting Started with Memcached
- LwIP應用開發實戰指南:基于STM32
- Cisco無線局域網配置基礎
- 黑客與反黑工具使用詳解
- 一本書讀懂移動物聯網