playbook_ui 11.13.0.pre.alpha.fontawesome1 → 11.14.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/app/pb_kits/playbook/pb_passphrase/_passphrase.jsx +56 -97
- data/app/pb_kits/playbook/pb_passphrase/docs/_passphrase_breached.html.erb +145 -1
- data/app/pb_kits/playbook/pb_passphrase/docs/_passphrase_breached.jsx +127 -3
- data/app/pb_kits/playbook/pb_passphrase/docs/_passphrase_breached.md +11 -2
- data/app/pb_kits/playbook/pb_passphrase/docs/_passphrase_common.html.erb +136 -0
- data/app/pb_kits/playbook/pb_passphrase/docs/_passphrase_common.jsx +90 -8
- data/app/pb_kits/playbook/pb_passphrase/docs/_passphrase_common.md +5 -0
- data/app/pb_kits/playbook/pb_passphrase/docs/_passphrase_confirmation.html.erb +51 -0
- data/app/pb_kits/playbook/pb_passphrase/docs/_passphrase_confirmation.jsx +39 -0
- data/app/pb_kits/playbook/pb_passphrase/docs/_passphrase_default.html.erb +0 -2
- data/app/pb_kits/playbook/pb_passphrase/docs/_passphrase_default.jsx +6 -20
- data/app/pb_kits/playbook/pb_passphrase/docs/_passphrase_input_props.html.erb +2 -2
- data/app/pb_kits/playbook/pb_passphrase/docs/_passphrase_input_props.jsx +1 -1
- data/app/pb_kits/playbook/pb_passphrase/docs/_passphrase_meter_settings.html.erb +318 -5
- data/app/pb_kits/playbook/pb_passphrase/docs/_passphrase_meter_settings.jsx +134 -48
- data/app/pb_kits/playbook/pb_passphrase/docs/_passphrase_meter_settings.md +11 -5
- data/app/pb_kits/playbook/pb_passphrase/docs/_passphrase_strength_change.html.erb +123 -0
- data/app/pb_kits/playbook/pb_passphrase/docs/_passphrase_strength_change.jsx +96 -20
- data/app/pb_kits/playbook/pb_passphrase/docs/_passphrase_strength_change.md +6 -2
- data/app/pb_kits/playbook/pb_passphrase/docs/example.yml +4 -0
- data/app/pb_kits/playbook/pb_passphrase/docs/index.js +1 -0
- data/app/pb_kits/playbook/pb_passphrase/passphrase.html.erb +1 -1
- data/app/pb_kits/playbook/pb_passphrase/passphrase.rb +5 -9
- data/app/pb_kits/playbook/pb_passphrase/passphrase.test.jsx +0 -47
- data/fonts/fontawesome-min.js +5 -0
- data/fonts/regular-min.js +5 -0
- data/lib/playbook/version.rb +1 -1
- metadata +11 -8
- data/app/pb_kits/playbook/pb_passphrase/docs/_passphrase_default.md +0 -1
- data/app/pb_kits/playbook/pb_passphrase/passwordStrength.js +0 -55
- data/app/pb_kits/playbook/pb_passphrase/useHaveIBeenPwned.js +0 -52
- data/app/pb_kits/playbook/pb_passphrase/useZxcvbn.js +0 -58
data/lib/playbook/version.rb
CHANGED
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: playbook_ui
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 11.
|
4
|
+
version: 11.14.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Power UX
|
@@ -9,7 +9,7 @@ authors:
|
|
9
9
|
autorequire:
|
10
10
|
bindir: bin
|
11
11
|
cert_chain: []
|
12
|
-
date: 2022-12-
|
12
|
+
date: 2022-12-13 00:00:00.000000000 Z
|
13
13
|
dependencies:
|
14
14
|
- !ruby/object:Gem::Dependency
|
15
15
|
name: actionpack
|
@@ -1465,16 +1465,20 @@ files:
|
|
1465
1465
|
- app/pb_kits/playbook/pb_passphrase/docs/_passphrase_breached.html.erb
|
1466
1466
|
- app/pb_kits/playbook/pb_passphrase/docs/_passphrase_breached.jsx
|
1467
1467
|
- app/pb_kits/playbook/pb_passphrase/docs/_passphrase_breached.md
|
1468
|
+
- app/pb_kits/playbook/pb_passphrase/docs/_passphrase_common.html.erb
|
1468
1469
|
- app/pb_kits/playbook/pb_passphrase/docs/_passphrase_common.jsx
|
1470
|
+
- app/pb_kits/playbook/pb_passphrase/docs/_passphrase_common.md
|
1471
|
+
- app/pb_kits/playbook/pb_passphrase/docs/_passphrase_confirmation.html.erb
|
1472
|
+
- app/pb_kits/playbook/pb_passphrase/docs/_passphrase_confirmation.jsx
|
1469
1473
|
- app/pb_kits/playbook/pb_passphrase/docs/_passphrase_default.html.erb
|
1470
1474
|
- app/pb_kits/playbook/pb_passphrase/docs/_passphrase_default.jsx
|
1471
|
-
- app/pb_kits/playbook/pb_passphrase/docs/_passphrase_default.md
|
1472
1475
|
- app/pb_kits/playbook/pb_passphrase/docs/_passphrase_input_props.html.erb
|
1473
1476
|
- app/pb_kits/playbook/pb_passphrase/docs/_passphrase_input_props.jsx
|
1474
1477
|
- app/pb_kits/playbook/pb_passphrase/docs/_passphrase_input_props.md
|
1475
1478
|
- app/pb_kits/playbook/pb_passphrase/docs/_passphrase_meter_settings.html.erb
|
1476
1479
|
- app/pb_kits/playbook/pb_passphrase/docs/_passphrase_meter_settings.jsx
|
1477
1480
|
- app/pb_kits/playbook/pb_passphrase/docs/_passphrase_meter_settings.md
|
1481
|
+
- app/pb_kits/playbook/pb_passphrase/docs/_passphrase_strength_change.html.erb
|
1478
1482
|
- app/pb_kits/playbook/pb_passphrase/docs/_passphrase_strength_change.jsx
|
1479
1483
|
- app/pb_kits/playbook/pb_passphrase/docs/_passphrase_strength_change.md
|
1480
1484
|
- app/pb_kits/playbook/pb_passphrase/docs/_passphrase_tips.html.erb
|
@@ -1485,9 +1489,6 @@ files:
|
|
1485
1489
|
- app/pb_kits/playbook/pb_passphrase/passphrase.html.erb
|
1486
1490
|
- app/pb_kits/playbook/pb_passphrase/passphrase.rb
|
1487
1491
|
- app/pb_kits/playbook/pb_passphrase/passphrase.test.jsx
|
1488
|
-
- app/pb_kits/playbook/pb_passphrase/passwordStrength.js
|
1489
|
-
- app/pb_kits/playbook/pb_passphrase/useHaveIBeenPwned.js
|
1490
|
-
- app/pb_kits/playbook/pb_passphrase/useZxcvbn.js
|
1491
1492
|
- app/pb_kits/playbook/pb_person/_person.jsx
|
1492
1493
|
- app/pb_kits/playbook/pb_person/_person.scss
|
1493
1494
|
- app/pb_kits/playbook/pb_person/docs/_description.md
|
@@ -2286,6 +2287,8 @@ files:
|
|
2286
2287
|
- app/pb_kits/playbook/utilities/test/globalProps/order.test.js
|
2287
2288
|
- app/pb_kits/playbook/utilities/text.ts
|
2288
2289
|
- dist/reset.css
|
2290
|
+
- fonts/fontawesome-min.js
|
2291
|
+
- fonts/regular-min.js
|
2289
2292
|
- lib/playbook.rb
|
2290
2293
|
- lib/playbook/align_content.rb
|
2291
2294
|
- lib/playbook/align_items.rb
|
@@ -2356,9 +2359,9 @@ required_ruby_version: !ruby/object:Gem::Requirement
|
|
2356
2359
|
version: '0'
|
2357
2360
|
required_rubygems_version: !ruby/object:Gem::Requirement
|
2358
2361
|
requirements:
|
2359
|
-
- - "
|
2362
|
+
- - ">="
|
2360
2363
|
- !ruby/object:Gem::Version
|
2361
|
-
version:
|
2364
|
+
version: '0'
|
2362
2365
|
requirements: []
|
2363
2366
|
rubygems_version: 3.3.7
|
2364
2367
|
signing_key:
|
@@ -1 +0,0 @@
|
|
1
|
-
Use the `confirmation` prop to only include the label and show/hide icon.
|
@@ -1,55 +0,0 @@
|
|
1
|
-
import zxcvbn from 'zxcvbn'
|
2
|
-
|
3
|
-
export const zxcvbnPasswordScore = (options) => {
|
4
|
-
const {
|
5
|
-
calculate = zxcvbn,
|
6
|
-
averageThreshold = 2,
|
7
|
-
strongThreshold = 3,
|
8
|
-
minLength = 12,
|
9
|
-
} = options
|
10
|
-
|
11
|
-
return {
|
12
|
-
minLength,
|
13
|
-
averageThreshold,
|
14
|
-
strongThreshold,
|
15
|
-
test: function (password = '', common = false) {
|
16
|
-
const feedbackValues = (str) => {
|
17
|
-
let percent, variant, text
|
18
|
-
|
19
|
-
if (password.length <= 0) {
|
20
|
-
percent = '0'
|
21
|
-
variant = 'negative'
|
22
|
-
text = '\u00A0' //nbsp to keep form from jumping when typing beings
|
23
|
-
} else if (common) {
|
24
|
-
percent = '25'
|
25
|
-
variant = 'negative'
|
26
|
-
text = 'This passphrase is too common'
|
27
|
-
} else if (password.length < this.minLength || str < this.averageThreshold) {
|
28
|
-
percent = '25'
|
29
|
-
variant = 'negative'
|
30
|
-
text = 'Too weak'
|
31
|
-
} else if (str < this.strongThreshold){
|
32
|
-
percent = '50'
|
33
|
-
variant = 'warning'
|
34
|
-
text = 'Almost there, keep going!'
|
35
|
-
} else if (str >= this.strongThreshold) {
|
36
|
-
percent = '100'
|
37
|
-
variant = 'positive'
|
38
|
-
text = 'Success! Strong passphrase'
|
39
|
-
}
|
40
|
-
return { percent, variant, text }
|
41
|
-
}
|
42
|
-
|
43
|
-
const result = calculate(password)
|
44
|
-
|
45
|
-
return (
|
46
|
-
{
|
47
|
-
suggestions: result.feedback.suggestions,
|
48
|
-
warning: result.feedback.warning,
|
49
|
-
strength: result.score,
|
50
|
-
...feedbackValues(result.score),
|
51
|
-
}
|
52
|
-
)
|
53
|
-
},
|
54
|
-
}
|
55
|
-
}
|
@@ -1,52 +0,0 @@
|
|
1
|
-
|
2
|
-
import { useEffect, useState } from 'react'
|
3
|
-
|
4
|
-
const checkHaveIBeenPwned = async function (passphrase) {
|
5
|
-
const buffer = new TextEncoder('utf-8').encode(passphrase)
|
6
|
-
const digest = await crypto.subtle.digest('SHA-1', buffer)
|
7
|
-
const hashArray = Array.from(new Uint8Array(digest))
|
8
|
-
const hashHex = hashArray.map((b) => b.toString(16).padStart(2, '0')).join('')
|
9
|
-
|
10
|
-
const firstFive = hashHex.slice(0, 5)
|
11
|
-
const endOfHash = hashHex.slice(5)
|
12
|
-
|
13
|
-
const resp = await fetch(`https://api.pwnedpasswords.com/range/${firstFive}`)
|
14
|
-
const text = await resp.text()
|
15
|
-
|
16
|
-
const match = text.split('\n').some((line) => {
|
17
|
-
//Each line is <sha-1-hash-suffix>:<count of incidents>
|
18
|
-
return line.split(':')[0] === endOfHash.toUpperCase()
|
19
|
-
})
|
20
|
-
return match
|
21
|
-
}
|
22
|
-
|
23
|
-
/**
|
24
|
-
* If the input hasn't changed in <delay> ms,
|
25
|
-
* hit the haveibeenpwned api and check if the given passphrase is compromised
|
26
|
-
*/
|
27
|
-
export default function useHaveIBeenPwned(passphrase, minLength, delay = 400) {
|
28
|
-
const [isPwned, setIsPwned] = useState(false)
|
29
|
-
|
30
|
-
useEffect(
|
31
|
-
() => {
|
32
|
-
// only check the API for passphrases above the minimum size
|
33
|
-
if (passphrase.length < minLength) {
|
34
|
-
setIsPwned(false)
|
35
|
-
return
|
36
|
-
}
|
37
|
-
|
38
|
-
const handler = setTimeout(() => {
|
39
|
-
checkHaveIBeenPwned(passphrase)
|
40
|
-
.then((pwned) => setIsPwned(pwned))
|
41
|
-
.catch(() => setIsPwned(false))
|
42
|
-
}, delay)
|
43
|
-
|
44
|
-
return () => {
|
45
|
-
clearTimeout(handler)
|
46
|
-
}
|
47
|
-
},
|
48
|
-
[passphrase, minLength, delay]
|
49
|
-
)
|
50
|
-
|
51
|
-
return isPwned
|
52
|
-
}
|
@@ -1,58 +0,0 @@
|
|
1
|
-
import { useEffect, useMemo, useState } from 'react'
|
2
|
-
import zxcvbn from 'zxcvbn'
|
3
|
-
|
4
|
-
export default function useZxcvbn(options) {
|
5
|
-
const { passphrase = '', common, isPwned, confirmation, averageThreshold, minLength, strongThreshold } = options
|
6
|
-
const calculator = useMemo(
|
7
|
-
() => confirmation ? () => ({ score: 0 }) : zxcvbn,
|
8
|
-
[confirmation]
|
9
|
-
)
|
10
|
-
|
11
|
-
const [percent, setPercent] = useState('0')
|
12
|
-
const [variant, setVariant] = useState('negative')
|
13
|
-
const [text, setText] = useState('\u00A0') //nbsp to keep height constant
|
14
|
-
const [result, setResult] = useState({})
|
15
|
-
|
16
|
-
useEffect(() => {
|
17
|
-
if (confirmation) return
|
18
|
-
const newResult = calculator(passphrase)
|
19
|
-
setResult(newResult)
|
20
|
-
const str = newResult.score
|
21
|
-
|
22
|
-
const noPassphrase = passphrase.length <= 0
|
23
|
-
const commonPassphrase = common || isPwned
|
24
|
-
const weakPassphrase = passphrase.length < minLength || str < averageThreshold
|
25
|
-
const averagePassphrase = str < strongThreshold
|
26
|
-
const strongPassphrase = str >= strongThreshold
|
27
|
-
|
28
|
-
if (noPassphrase) {
|
29
|
-
setPercent('0')
|
30
|
-
setVariant('negative')
|
31
|
-
setText('\u00A0') //nbsp to keep height constant
|
32
|
-
} else if (commonPassphrase) {
|
33
|
-
setPercent('25')
|
34
|
-
setVariant('negative')
|
35
|
-
setText('This passphrase is too common')
|
36
|
-
} else if (weakPassphrase) {
|
37
|
-
setPercent('25')
|
38
|
-
setVariant('negative')
|
39
|
-
setText('Too weak')
|
40
|
-
} else if (averagePassphrase){
|
41
|
-
setPercent('50')
|
42
|
-
setVariant('warning')
|
43
|
-
setText('Almost there, keep going!')
|
44
|
-
} else if (strongPassphrase) {
|
45
|
-
setPercent('100')
|
46
|
-
setVariant('positive')
|
47
|
-
setText('Success! Strong passphrase')
|
48
|
-
}
|
49
|
-
}, [passphrase, common, isPwned, averageThreshold, minLength, strongThreshold]
|
50
|
-
)
|
51
|
-
|
52
|
-
return {
|
53
|
-
strength: common || isPwned ? 0 : result.score,
|
54
|
-
percent,
|
55
|
-
variant,
|
56
|
-
text,
|
57
|
-
}
|
58
|
-
}
|