@bigbinary/neeto-team-members-frontend 2.7.1 → 2.7.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/index.cjs.js CHANGED
@@ -58,7 +58,7 @@ var require$$0__default = /*#__PURE__*/_interopDefaultLegacy(require$$0);
58
58
  var classnames__default = /*#__PURE__*/_interopDefaultLegacy(classnames);
59
59
  var MenuBar__default = /*#__PURE__*/_interopDefaultLegacy(MenuBar);
60
60
 
61
- /*! @license DOMPurify 3.0.2 | (c) Cure53 and other contributors | Released under the Apache license 2.0 and Mozilla Public License 2.0 | github.com/cure53/DOMPurify/blob/3.0.2/LICENSE */
61
+ /*! @license DOMPurify 3.0.3 | (c) Cure53 and other contributors | Released under the Apache license 2.0 and Mozilla Public License 2.0 | github.com/cure53/DOMPurify/blob/3.0.3/LICENSE */
62
62
 
63
63
  const {
64
64
  entries,
@@ -134,7 +134,9 @@ function unconstruct(func) {
134
134
  /* Add properties to a lookup table */
135
135
 
136
136
  function addToSet(set, array, transformCaseFunc) {
137
- transformCaseFunc = transformCaseFunc ? transformCaseFunc : stringToLowerCase;
137
+ var _transformCaseFunc;
138
+
139
+ transformCaseFunc = (_transformCaseFunc = transformCaseFunc) !== null && _transformCaseFunc !== void 0 ? _transformCaseFunc : stringToLowerCase;
138
140
 
139
141
  if (setPrototypeOf) {
140
142
  // Make 'in' and truthy checks like Boolean(set.constructor)
@@ -208,12 +210,12 @@ function lookupGetter(object, prop) {
208
210
  const html$1 = freeze(['a', 'abbr', 'acronym', 'address', 'area', 'article', 'aside', 'audio', 'b', 'bdi', 'bdo', 'big', 'blink', 'blockquote', 'body', 'br', 'button', 'canvas', 'caption', 'center', 'cite', 'code', 'col', 'colgroup', 'content', 'data', 'datalist', 'dd', 'decorator', 'del', 'details', 'dfn', 'dialog', 'dir', 'div', 'dl', 'dt', 'element', 'em', 'fieldset', 'figcaption', 'figure', 'font', 'footer', 'form', 'h1', 'h2', 'h3', 'h4', 'h5', 'h6', 'head', 'header', 'hgroup', 'hr', 'html', 'i', 'img', 'input', 'ins', 'kbd', 'label', 'legend', 'li', 'main', 'map', 'mark', 'marquee', 'menu', 'menuitem', 'meter', 'nav', 'nobr', 'ol', 'optgroup', 'option', 'output', 'p', 'picture', 'pre', 'progress', 'q', 'rp', 'rt', 'ruby', 's', 'samp', 'section', 'select', 'shadow', 'small', 'source', 'spacer', 'span', 'strike', 'strong', 'style', 'sub', 'summary', 'sup', 'table', 'tbody', 'td', 'template', 'textarea', 'tfoot', 'th', 'thead', 'time', 'tr', 'track', 'tt', 'u', 'ul', 'var', 'video', 'wbr']); // SVG
209
211
 
210
212
  const svg$1 = freeze(['svg', 'a', 'altglyph', 'altglyphdef', 'altglyphitem', 'animatecolor', 'animatemotion', 'animatetransform', 'circle', 'clippath', 'defs', 'desc', 'ellipse', 'filter', 'font', 'g', 'glyph', 'glyphref', 'hkern', 'image', 'line', 'lineargradient', 'marker', 'mask', 'metadata', 'mpath', 'path', 'pattern', 'polygon', 'polyline', 'radialgradient', 'rect', 'stop', 'style', 'switch', 'symbol', 'text', 'textpath', 'title', 'tref', 'tspan', 'view', 'vkern']);
211
- const svgFilters = freeze(['feBlend', 'feColorMatrix', 'feComponentTransfer', 'feComposite', 'feConvolveMatrix', 'feDiffuseLighting', 'feDisplacementMap', 'feDistantLight', 'feFlood', 'feFuncA', 'feFuncB', 'feFuncG', 'feFuncR', 'feGaussianBlur', 'feImage', 'feMerge', 'feMergeNode', 'feMorphology', 'feOffset', 'fePointLight', 'feSpecularLighting', 'feSpotLight', 'feTile', 'feTurbulence']); // List of SVG elements that are disallowed by default.
213
+ const svgFilters = freeze(['feBlend', 'feColorMatrix', 'feComponentTransfer', 'feComposite', 'feConvolveMatrix', 'feDiffuseLighting', 'feDisplacementMap', 'feDistantLight', 'feDropShadow', 'feFlood', 'feFuncA', 'feFuncB', 'feFuncG', 'feFuncR', 'feGaussianBlur', 'feImage', 'feMerge', 'feMergeNode', 'feMorphology', 'feOffset', 'fePointLight', 'feSpecularLighting', 'feSpotLight', 'feTile', 'feTurbulence']); // List of SVG elements that are disallowed by default.
212
214
  // We still need to know them so that we can do namespace
213
215
  // checks properly in case one wants to add them to
214
216
  // allow-list.
215
217
 
216
- const svgDisallowed = freeze(['animate', 'color-profile', 'cursor', 'discard', 'fedropshadow', 'font-face', 'font-face-format', 'font-face-name', 'font-face-src', 'font-face-uri', 'foreignobject', 'hatch', 'hatchpath', 'mesh', 'meshgradient', 'meshpatch', 'meshrow', 'missing-glyph', 'script', 'set', 'solidcolor', 'unknown', 'use']);
218
+ const svgDisallowed = freeze(['animate', 'color-profile', 'cursor', 'discard', 'font-face', 'font-face-format', 'font-face-name', 'font-face-src', 'font-face-uri', 'foreignobject', 'hatch', 'hatchpath', 'mesh', 'meshgradient', 'meshpatch', 'meshrow', 'missing-glyph', 'script', 'set', 'solidcolor', 'unknown', 'use']);
217
219
  const mathMl$1 = freeze(['math', 'menclose', 'merror', 'mfenced', 'mfrac', 'mglyph', 'mi', 'mlabeledtr', 'mmultiscripts', 'mn', 'mo', 'mover', 'mpadded', 'mphantom', 'mroot', 'mrow', 'ms', 'mspace', 'msqrt', 'mstyle', 'msub', 'msup', 'msubsup', 'mtable', 'mtd', 'mtext', 'mtr', 'munder', 'munderover', 'mprescripts']); // Similarly to SVG, we want to know all MathML elements,
218
220
  // even those that we disallow by default.
219
221
 
@@ -258,13 +260,13 @@ const getGlobal = () => typeof window === 'undefined' ? null : window;
258
260
  * Creates a no-op policy for internal use only.
259
261
  * Don't export this function outside this module!
260
262
  * @param {?TrustedTypePolicyFactory} trustedTypes The policy factory.
261
- * @param {Document} document The document object (to determine policy name suffix)
263
+ * @param {HTMLScriptElement} purifyHostElement The Script element used to load DOMPurify (to determine policy name suffix).
262
264
  * @return {?TrustedTypePolicy} The policy created (or null, if Trusted Types
263
- * are not supported).
265
+ * are not supported or creating the policy failed).
264
266
  */
265
267
 
266
268
 
267
- const _createTrustedTypesPolicy = function _createTrustedTypesPolicy(trustedTypes, document) {
269
+ const _createTrustedTypesPolicy = function _createTrustedTypesPolicy(trustedTypes, purifyHostElement) {
268
270
  if (typeof trustedTypes !== 'object' || typeof trustedTypes.createPolicy !== 'function') {
269
271
  return null;
270
272
  } // Allow the callers to control the unique policy name
@@ -275,8 +277,8 @@ const _createTrustedTypesPolicy = function _createTrustedTypesPolicy(trustedType
275
277
  let suffix = null;
276
278
  const ATTR_NAME = 'data-tt-policy-suffix';
277
279
 
278
- if (document.currentScript && document.currentScript.hasAttribute(ATTR_NAME)) {
279
- suffix = document.currentScript.getAttribute(ATTR_NAME);
280
+ if (purifyHostElement && purifyHostElement.hasAttribute(ATTR_NAME)) {
281
+ suffix = purifyHostElement.getAttribute(ATTR_NAME);
280
282
  }
281
283
 
282
284
  const policyName = 'dompurify' + (suffix ? '#' + suffix : '');
@@ -311,7 +313,7 @@ function createDOMPurify() {
311
313
  */
312
314
 
313
315
 
314
- DOMPurify.version = '3.0.2';
316
+ DOMPurify.version = '3.0.3';
315
317
  /**
316
318
  * Array of elements that DOMPurify removed during sanitation.
317
319
  * Empty if nothing was removed.
@@ -327,6 +329,7 @@ function createDOMPurify() {
327
329
  }
328
330
 
329
331
  const originalDocument = window.document;
332
+ const currentScript = originalDocument.currentScript;
330
333
  let {
331
334
  document
332
335
  } = window;
@@ -360,9 +363,8 @@ function createDOMPurify() {
360
363
  }
361
364
  }
362
365
 
363
- const trustedTypesPolicy = _createTrustedTypesPolicy(trustedTypes, originalDocument);
364
-
365
- const emptyHTML = trustedTypesPolicy ? trustedTypesPolicy.createHTML('') : '';
366
+ let trustedTypesPolicy;
367
+ let emptyHTML = '';
366
368
  const {
367
369
  implementation,
368
370
  createNodeIterator,
@@ -377,7 +379,7 @@ function createDOMPurify() {
377
379
  * Expose whether this browser supports running the full DOMPurify.
378
380
  */
379
381
 
380
- DOMPurify.isSupported = typeof entries === 'function' && typeof getParentNode === 'function' && implementation && typeof implementation.createHTMLDocument !== 'undefined';
382
+ DOMPurify.isSupported = typeof entries === 'function' && typeof getParentNode === 'function' && implementation && implementation.createHTMLDocument !== undefined;
381
383
  const {
382
384
  MUSTACHE_EXPR,
383
385
  ERB_EXPR,
@@ -724,6 +726,31 @@ function createDOMPurify() {
724
726
  if (ALLOWED_TAGS.table) {
725
727
  addToSet(ALLOWED_TAGS, ['tbody']);
726
728
  delete FORBID_TAGS.tbody;
729
+ }
730
+
731
+ if (cfg.TRUSTED_TYPES_POLICY) {
732
+ if (typeof cfg.TRUSTED_TYPES_POLICY.createHTML !== 'function') {
733
+ throw typeErrorCreate('TRUSTED_TYPES_POLICY configuration option must provide a "createHTML" hook.');
734
+ }
735
+
736
+ if (typeof cfg.TRUSTED_TYPES_POLICY.createScriptURL !== 'function') {
737
+ throw typeErrorCreate('TRUSTED_TYPES_POLICY configuration option must provide a "createScriptURL" hook.');
738
+ } // Overwrite existing TrustedTypes policy.
739
+
740
+
741
+ trustedTypesPolicy = cfg.TRUSTED_TYPES_POLICY; // Sign local variables required by `sanitize`.
742
+
743
+ emptyHTML = trustedTypesPolicy.createHTML('');
744
+ } else {
745
+ // Uninitialized policy, attempt to initialize the internal dompurify policy.
746
+ if (trustedTypesPolicy === undefined) {
747
+ trustedTypesPolicy = _createTrustedTypesPolicy(trustedTypes, currentScript);
748
+ } // If creating the internal policy succeeded sign internal variables.
749
+
750
+
751
+ if (trustedTypesPolicy !== null && typeof emptyHTML === 'string') {
752
+ emptyHTML = trustedTypesPolicy.createHTML('');
753
+ }
727
754
  } // Prevent further manipulation of configuration.
728
755
  // Not available in IE8, Safari 5, etc.
729
756
 
@@ -1160,9 +1187,9 @@ function createDOMPurify() {
1160
1187
  }
1161
1188
  /* Check value is safe. First, is attr inert? If so, is safe */
1162
1189
 
1163
- } else if (URI_SAFE_ATTRIBUTES[lcName]) ; else if (regExpTest(IS_ALLOWED_URI$1, stringReplace(value, ATTR_WHITESPACE, ''))) ; else if ((lcName === 'src' || lcName === 'xlink:href' || lcName === 'href') && lcTag !== 'script' && stringIndexOf(value, 'data:') === 0 && DATA_URI_TAGS[lcTag]) ; else if (ALLOW_UNKNOWN_PROTOCOLS && !regExpTest(IS_SCRIPT_OR_DATA, stringReplace(value, ATTR_WHITESPACE, ''))) ; else if (!value) ; else {
1190
+ } else if (URI_SAFE_ATTRIBUTES[lcName]) ; else if (regExpTest(IS_ALLOWED_URI$1, stringReplace(value, ATTR_WHITESPACE, ''))) ; else if ((lcName === 'src' || lcName === 'xlink:href' || lcName === 'href') && lcTag !== 'script' && stringIndexOf(value, 'data:') === 0 && DATA_URI_TAGS[lcTag]) ; else if (ALLOW_UNKNOWN_PROTOCOLS && !regExpTest(IS_SCRIPT_OR_DATA, stringReplace(value, ATTR_WHITESPACE, ''))) ; else if (value) {
1164
1191
  return false;
1165
- }
1192
+ } else ;
1166
1193
 
1167
1194
  return true;
1168
1195
  };
@@ -1292,12 +1319,16 @@ function createDOMPurify() {
1292
1319
  if (namespaceURI) ; else {
1293
1320
  switch (trustedTypes.getAttributeType(lcTag, lcName)) {
1294
1321
  case 'TrustedHTML':
1295
- value = trustedTypesPolicy.createHTML(value);
1296
- break;
1322
+ {
1323
+ value = trustedTypesPolicy.createHTML(value);
1324
+ break;
1325
+ }
1297
1326
 
1298
1327
  case 'TrustedScriptURL':
1299
- value = trustedTypesPolicy.createScriptURL(value);
1300
- break;
1328
+ {
1329
+ value = trustedTypesPolicy.createScriptURL(value);
1330
+ break;
1331
+ }
1301
1332
  }
1302
1333
  }
1303
1334
  }
@@ -1390,15 +1421,14 @@ function createDOMPurify() {
1390
1421
 
1391
1422
 
1392
1423
  if (typeof dirty !== 'string' && !_isNode(dirty)) {
1393
- // eslint-disable-next-line no-negated-condition
1394
- if (typeof dirty.toString !== 'function') {
1395
- throw typeErrorCreate('toString is not a function');
1396
- } else {
1424
+ if (typeof dirty.toString === 'function') {
1397
1425
  dirty = dirty.toString();
1398
1426
 
1399
1427
  if (typeof dirty !== 'string') {
1400
1428
  throw typeErrorCreate('dirty is not a string, aborting');
1401
1429
  }
1430
+ } else {
1431
+ throw typeErrorCreate('toString is not a function');
1402
1432
  }
1403
1433
  }
1404
1434
  /* Return dirty HTML if DOMPurify cannot run */
@@ -9411,6 +9441,7 @@ var getDefaultColumns = function getDefaultColumns(_ref5) {
9411
9441
  permissions = _ref5.permissions;
9412
9442
  return [{
9413
9443
  dataIndex: "name",
9444
+ fixed: "left",
9414
9445
  key: "name",
9415
9446
  render: function render(_, tableData) {
9416
9447
  return renderNameColumn({
@@ -10425,7 +10456,7 @@ var AppList = function AppList(_ref) {
10425
10456
  var selectedEmail = ramda.pluck("value", emails);
10426
10457
  React.useEffect(function () {
10427
10458
  if (savedStateRef.current.isAppListEnabled !== isAppListEnabled) {
10428
- appRoles.forEach(function (appRole, index) {
10459
+ appRoles === null || appRoles === void 0 ? void 0 : appRoles.forEach(function (appRole, index) {
10429
10460
  var _globalProps$appName;
10430
10461
  if ((appRole === null || appRole === void 0 ? void 0 : appRole.appName) === ((_globalProps$appName = initializers.globalProps.appName) === null || _globalProps$appName === void 0 ? void 0 : _globalProps$appName.substring(5))) {
10431
10462
  setFieldValue("appRoles[".concat(index, "].isEnabled"), true);
@@ -10823,8 +10854,9 @@ var RolesRadioGroup = function RolesRadioGroup(_ref) {
10823
10854
  values = _useFormikContext.values,
10824
10855
  setFieldValue = _useFormikContext.setFieldValue;
10825
10856
  var setDefaultSelection = function setDefaultSelection(currentRole) {
10857
+ var _values$appRoles;
10826
10858
  var condition = isAdminRole(currentRole);
10827
- values.appRoles.forEach(function (_ref2, index) {
10859
+ (_values$appRoles = values.appRoles) === null || _values$appRoles === void 0 ? void 0 : _values$appRoles.forEach(function (_ref2, index) {
10828
10860
  var _globalProps$appName;
10829
10861
  var appName = _ref2.appName,
10830
10862
  activeRole = _ref2.activeRole;