@bigbinary/neeto-team-members-frontend 2.7.1 → 2.7.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.cjs.js +58 -26
- package/dist/index.cjs.js.map +1 -1
- package/dist/index.js +58 -26
- package/dist/index.js.map +1 -1
- package/package.json +14 -14
package/dist/index.cjs.js
CHANGED
|
@@ -58,7 +58,7 @@ var require$$0__default = /*#__PURE__*/_interopDefaultLegacy(require$$0);
|
|
|
58
58
|
var classnames__default = /*#__PURE__*/_interopDefaultLegacy(classnames);
|
|
59
59
|
var MenuBar__default = /*#__PURE__*/_interopDefaultLegacy(MenuBar);
|
|
60
60
|
|
|
61
|
-
/*! @license DOMPurify 3.0.
|
|
61
|
+
/*! @license DOMPurify 3.0.3 | (c) Cure53 and other contributors | Released under the Apache license 2.0 and Mozilla Public License 2.0 | github.com/cure53/DOMPurify/blob/3.0.3/LICENSE */
|
|
62
62
|
|
|
63
63
|
const {
|
|
64
64
|
entries,
|
|
@@ -134,7 +134,9 @@ function unconstruct(func) {
|
|
|
134
134
|
/* Add properties to a lookup table */
|
|
135
135
|
|
|
136
136
|
function addToSet(set, array, transformCaseFunc) {
|
|
137
|
-
|
|
137
|
+
var _transformCaseFunc;
|
|
138
|
+
|
|
139
|
+
transformCaseFunc = (_transformCaseFunc = transformCaseFunc) !== null && _transformCaseFunc !== void 0 ? _transformCaseFunc : stringToLowerCase;
|
|
138
140
|
|
|
139
141
|
if (setPrototypeOf) {
|
|
140
142
|
// Make 'in' and truthy checks like Boolean(set.constructor)
|
|
@@ -208,12 +210,12 @@ function lookupGetter(object, prop) {
|
|
|
208
210
|
const html$1 = freeze(['a', 'abbr', 'acronym', 'address', 'area', 'article', 'aside', 'audio', 'b', 'bdi', 'bdo', 'big', 'blink', 'blockquote', 'body', 'br', 'button', 'canvas', 'caption', 'center', 'cite', 'code', 'col', 'colgroup', 'content', 'data', 'datalist', 'dd', 'decorator', 'del', 'details', 'dfn', 'dialog', 'dir', 'div', 'dl', 'dt', 'element', 'em', 'fieldset', 'figcaption', 'figure', 'font', 'footer', 'form', 'h1', 'h2', 'h3', 'h4', 'h5', 'h6', 'head', 'header', 'hgroup', 'hr', 'html', 'i', 'img', 'input', 'ins', 'kbd', 'label', 'legend', 'li', 'main', 'map', 'mark', 'marquee', 'menu', 'menuitem', 'meter', 'nav', 'nobr', 'ol', 'optgroup', 'option', 'output', 'p', 'picture', 'pre', 'progress', 'q', 'rp', 'rt', 'ruby', 's', 'samp', 'section', 'select', 'shadow', 'small', 'source', 'spacer', 'span', 'strike', 'strong', 'style', 'sub', 'summary', 'sup', 'table', 'tbody', 'td', 'template', 'textarea', 'tfoot', 'th', 'thead', 'time', 'tr', 'track', 'tt', 'u', 'ul', 'var', 'video', 'wbr']); // SVG
|
|
209
211
|
|
|
210
212
|
const svg$1 = freeze(['svg', 'a', 'altglyph', 'altglyphdef', 'altglyphitem', 'animatecolor', 'animatemotion', 'animatetransform', 'circle', 'clippath', 'defs', 'desc', 'ellipse', 'filter', 'font', 'g', 'glyph', 'glyphref', 'hkern', 'image', 'line', 'lineargradient', 'marker', 'mask', 'metadata', 'mpath', 'path', 'pattern', 'polygon', 'polyline', 'radialgradient', 'rect', 'stop', 'style', 'switch', 'symbol', 'text', 'textpath', 'title', 'tref', 'tspan', 'view', 'vkern']);
|
|
211
|
-
const svgFilters = freeze(['feBlend', 'feColorMatrix', 'feComponentTransfer', 'feComposite', 'feConvolveMatrix', 'feDiffuseLighting', 'feDisplacementMap', 'feDistantLight', 'feFlood', 'feFuncA', 'feFuncB', 'feFuncG', 'feFuncR', 'feGaussianBlur', 'feImage', 'feMerge', 'feMergeNode', 'feMorphology', 'feOffset', 'fePointLight', 'feSpecularLighting', 'feSpotLight', 'feTile', 'feTurbulence']); // List of SVG elements that are disallowed by default.
|
|
213
|
+
const svgFilters = freeze(['feBlend', 'feColorMatrix', 'feComponentTransfer', 'feComposite', 'feConvolveMatrix', 'feDiffuseLighting', 'feDisplacementMap', 'feDistantLight', 'feDropShadow', 'feFlood', 'feFuncA', 'feFuncB', 'feFuncG', 'feFuncR', 'feGaussianBlur', 'feImage', 'feMerge', 'feMergeNode', 'feMorphology', 'feOffset', 'fePointLight', 'feSpecularLighting', 'feSpotLight', 'feTile', 'feTurbulence']); // List of SVG elements that are disallowed by default.
|
|
212
214
|
// We still need to know them so that we can do namespace
|
|
213
215
|
// checks properly in case one wants to add them to
|
|
214
216
|
// allow-list.
|
|
215
217
|
|
|
216
|
-
const svgDisallowed = freeze(['animate', 'color-profile', 'cursor', 'discard', '
|
|
218
|
+
const svgDisallowed = freeze(['animate', 'color-profile', 'cursor', 'discard', 'font-face', 'font-face-format', 'font-face-name', 'font-face-src', 'font-face-uri', 'foreignobject', 'hatch', 'hatchpath', 'mesh', 'meshgradient', 'meshpatch', 'meshrow', 'missing-glyph', 'script', 'set', 'solidcolor', 'unknown', 'use']);
|
|
217
219
|
const mathMl$1 = freeze(['math', 'menclose', 'merror', 'mfenced', 'mfrac', 'mglyph', 'mi', 'mlabeledtr', 'mmultiscripts', 'mn', 'mo', 'mover', 'mpadded', 'mphantom', 'mroot', 'mrow', 'ms', 'mspace', 'msqrt', 'mstyle', 'msub', 'msup', 'msubsup', 'mtable', 'mtd', 'mtext', 'mtr', 'munder', 'munderover', 'mprescripts']); // Similarly to SVG, we want to know all MathML elements,
|
|
218
220
|
// even those that we disallow by default.
|
|
219
221
|
|
|
@@ -258,13 +260,13 @@ const getGlobal = () => typeof window === 'undefined' ? null : window;
|
|
|
258
260
|
* Creates a no-op policy for internal use only.
|
|
259
261
|
* Don't export this function outside this module!
|
|
260
262
|
* @param {?TrustedTypePolicyFactory} trustedTypes The policy factory.
|
|
261
|
-
* @param {
|
|
263
|
+
* @param {HTMLScriptElement} purifyHostElement The Script element used to load DOMPurify (to determine policy name suffix).
|
|
262
264
|
* @return {?TrustedTypePolicy} The policy created (or null, if Trusted Types
|
|
263
|
-
* are not supported).
|
|
265
|
+
* are not supported or creating the policy failed).
|
|
264
266
|
*/
|
|
265
267
|
|
|
266
268
|
|
|
267
|
-
const _createTrustedTypesPolicy = function _createTrustedTypesPolicy(trustedTypes,
|
|
269
|
+
const _createTrustedTypesPolicy = function _createTrustedTypesPolicy(trustedTypes, purifyHostElement) {
|
|
268
270
|
if (typeof trustedTypes !== 'object' || typeof trustedTypes.createPolicy !== 'function') {
|
|
269
271
|
return null;
|
|
270
272
|
} // Allow the callers to control the unique policy name
|
|
@@ -275,8 +277,8 @@ const _createTrustedTypesPolicy = function _createTrustedTypesPolicy(trustedType
|
|
|
275
277
|
let suffix = null;
|
|
276
278
|
const ATTR_NAME = 'data-tt-policy-suffix';
|
|
277
279
|
|
|
278
|
-
if (
|
|
279
|
-
suffix =
|
|
280
|
+
if (purifyHostElement && purifyHostElement.hasAttribute(ATTR_NAME)) {
|
|
281
|
+
suffix = purifyHostElement.getAttribute(ATTR_NAME);
|
|
280
282
|
}
|
|
281
283
|
|
|
282
284
|
const policyName = 'dompurify' + (suffix ? '#' + suffix : '');
|
|
@@ -311,7 +313,7 @@ function createDOMPurify() {
|
|
|
311
313
|
*/
|
|
312
314
|
|
|
313
315
|
|
|
314
|
-
DOMPurify.version = '3.0.
|
|
316
|
+
DOMPurify.version = '3.0.3';
|
|
315
317
|
/**
|
|
316
318
|
* Array of elements that DOMPurify removed during sanitation.
|
|
317
319
|
* Empty if nothing was removed.
|
|
@@ -327,6 +329,7 @@ function createDOMPurify() {
|
|
|
327
329
|
}
|
|
328
330
|
|
|
329
331
|
const originalDocument = window.document;
|
|
332
|
+
const currentScript = originalDocument.currentScript;
|
|
330
333
|
let {
|
|
331
334
|
document
|
|
332
335
|
} = window;
|
|
@@ -360,9 +363,8 @@ function createDOMPurify() {
|
|
|
360
363
|
}
|
|
361
364
|
}
|
|
362
365
|
|
|
363
|
-
|
|
364
|
-
|
|
365
|
-
const emptyHTML = trustedTypesPolicy ? trustedTypesPolicy.createHTML('') : '';
|
|
366
|
+
let trustedTypesPolicy;
|
|
367
|
+
let emptyHTML = '';
|
|
366
368
|
const {
|
|
367
369
|
implementation,
|
|
368
370
|
createNodeIterator,
|
|
@@ -377,7 +379,7 @@ function createDOMPurify() {
|
|
|
377
379
|
* Expose whether this browser supports running the full DOMPurify.
|
|
378
380
|
*/
|
|
379
381
|
|
|
380
|
-
DOMPurify.isSupported = typeof entries === 'function' && typeof getParentNode === 'function' && implementation &&
|
|
382
|
+
DOMPurify.isSupported = typeof entries === 'function' && typeof getParentNode === 'function' && implementation && implementation.createHTMLDocument !== undefined;
|
|
381
383
|
const {
|
|
382
384
|
MUSTACHE_EXPR,
|
|
383
385
|
ERB_EXPR,
|
|
@@ -724,6 +726,31 @@ function createDOMPurify() {
|
|
|
724
726
|
if (ALLOWED_TAGS.table) {
|
|
725
727
|
addToSet(ALLOWED_TAGS, ['tbody']);
|
|
726
728
|
delete FORBID_TAGS.tbody;
|
|
729
|
+
}
|
|
730
|
+
|
|
731
|
+
if (cfg.TRUSTED_TYPES_POLICY) {
|
|
732
|
+
if (typeof cfg.TRUSTED_TYPES_POLICY.createHTML !== 'function') {
|
|
733
|
+
throw typeErrorCreate('TRUSTED_TYPES_POLICY configuration option must provide a "createHTML" hook.');
|
|
734
|
+
}
|
|
735
|
+
|
|
736
|
+
if (typeof cfg.TRUSTED_TYPES_POLICY.createScriptURL !== 'function') {
|
|
737
|
+
throw typeErrorCreate('TRUSTED_TYPES_POLICY configuration option must provide a "createScriptURL" hook.');
|
|
738
|
+
} // Overwrite existing TrustedTypes policy.
|
|
739
|
+
|
|
740
|
+
|
|
741
|
+
trustedTypesPolicy = cfg.TRUSTED_TYPES_POLICY; // Sign local variables required by `sanitize`.
|
|
742
|
+
|
|
743
|
+
emptyHTML = trustedTypesPolicy.createHTML('');
|
|
744
|
+
} else {
|
|
745
|
+
// Uninitialized policy, attempt to initialize the internal dompurify policy.
|
|
746
|
+
if (trustedTypesPolicy === undefined) {
|
|
747
|
+
trustedTypesPolicy = _createTrustedTypesPolicy(trustedTypes, currentScript);
|
|
748
|
+
} // If creating the internal policy succeeded sign internal variables.
|
|
749
|
+
|
|
750
|
+
|
|
751
|
+
if (trustedTypesPolicy !== null && typeof emptyHTML === 'string') {
|
|
752
|
+
emptyHTML = trustedTypesPolicy.createHTML('');
|
|
753
|
+
}
|
|
727
754
|
} // Prevent further manipulation of configuration.
|
|
728
755
|
// Not available in IE8, Safari 5, etc.
|
|
729
756
|
|
|
@@ -1160,9 +1187,9 @@ function createDOMPurify() {
|
|
|
1160
1187
|
}
|
|
1161
1188
|
/* Check value is safe. First, is attr inert? If so, is safe */
|
|
1162
1189
|
|
|
1163
|
-
} else if (URI_SAFE_ATTRIBUTES[lcName]) ; else if (regExpTest(IS_ALLOWED_URI$1, stringReplace(value, ATTR_WHITESPACE, ''))) ; else if ((lcName === 'src' || lcName === 'xlink:href' || lcName === 'href') && lcTag !== 'script' && stringIndexOf(value, 'data:') === 0 && DATA_URI_TAGS[lcTag]) ; else if (ALLOW_UNKNOWN_PROTOCOLS && !regExpTest(IS_SCRIPT_OR_DATA, stringReplace(value, ATTR_WHITESPACE, ''))) ; else if (
|
|
1190
|
+
} else if (URI_SAFE_ATTRIBUTES[lcName]) ; else if (regExpTest(IS_ALLOWED_URI$1, stringReplace(value, ATTR_WHITESPACE, ''))) ; else if ((lcName === 'src' || lcName === 'xlink:href' || lcName === 'href') && lcTag !== 'script' && stringIndexOf(value, 'data:') === 0 && DATA_URI_TAGS[lcTag]) ; else if (ALLOW_UNKNOWN_PROTOCOLS && !regExpTest(IS_SCRIPT_OR_DATA, stringReplace(value, ATTR_WHITESPACE, ''))) ; else if (value) {
|
|
1164
1191
|
return false;
|
|
1165
|
-
}
|
|
1192
|
+
} else ;
|
|
1166
1193
|
|
|
1167
1194
|
return true;
|
|
1168
1195
|
};
|
|
@@ -1292,12 +1319,16 @@ function createDOMPurify() {
|
|
|
1292
1319
|
if (namespaceURI) ; else {
|
|
1293
1320
|
switch (trustedTypes.getAttributeType(lcTag, lcName)) {
|
|
1294
1321
|
case 'TrustedHTML':
|
|
1295
|
-
|
|
1296
|
-
|
|
1322
|
+
{
|
|
1323
|
+
value = trustedTypesPolicy.createHTML(value);
|
|
1324
|
+
break;
|
|
1325
|
+
}
|
|
1297
1326
|
|
|
1298
1327
|
case 'TrustedScriptURL':
|
|
1299
|
-
|
|
1300
|
-
|
|
1328
|
+
{
|
|
1329
|
+
value = trustedTypesPolicy.createScriptURL(value);
|
|
1330
|
+
break;
|
|
1331
|
+
}
|
|
1301
1332
|
}
|
|
1302
1333
|
}
|
|
1303
1334
|
}
|
|
@@ -1390,15 +1421,14 @@ function createDOMPurify() {
|
|
|
1390
1421
|
|
|
1391
1422
|
|
|
1392
1423
|
if (typeof dirty !== 'string' && !_isNode(dirty)) {
|
|
1393
|
-
|
|
1394
|
-
if (typeof dirty.toString !== 'function') {
|
|
1395
|
-
throw typeErrorCreate('toString is not a function');
|
|
1396
|
-
} else {
|
|
1424
|
+
if (typeof dirty.toString === 'function') {
|
|
1397
1425
|
dirty = dirty.toString();
|
|
1398
1426
|
|
|
1399
1427
|
if (typeof dirty !== 'string') {
|
|
1400
1428
|
throw typeErrorCreate('dirty is not a string, aborting');
|
|
1401
1429
|
}
|
|
1430
|
+
} else {
|
|
1431
|
+
throw typeErrorCreate('toString is not a function');
|
|
1402
1432
|
}
|
|
1403
1433
|
}
|
|
1404
1434
|
/* Return dirty HTML if DOMPurify cannot run */
|
|
@@ -9411,6 +9441,7 @@ var getDefaultColumns = function getDefaultColumns(_ref5) {
|
|
|
9411
9441
|
permissions = _ref5.permissions;
|
|
9412
9442
|
return [{
|
|
9413
9443
|
dataIndex: "name",
|
|
9444
|
+
fixed: "left",
|
|
9414
9445
|
key: "name",
|
|
9415
9446
|
render: function render(_, tableData) {
|
|
9416
9447
|
return renderNameColumn({
|
|
@@ -10425,7 +10456,7 @@ var AppList = function AppList(_ref) {
|
|
|
10425
10456
|
var selectedEmail = ramda.pluck("value", emails);
|
|
10426
10457
|
React.useEffect(function () {
|
|
10427
10458
|
if (savedStateRef.current.isAppListEnabled !== isAppListEnabled) {
|
|
10428
|
-
appRoles.forEach(function (appRole, index) {
|
|
10459
|
+
appRoles === null || appRoles === void 0 ? void 0 : appRoles.forEach(function (appRole, index) {
|
|
10429
10460
|
var _globalProps$appName;
|
|
10430
10461
|
if ((appRole === null || appRole === void 0 ? void 0 : appRole.appName) === ((_globalProps$appName = initializers.globalProps.appName) === null || _globalProps$appName === void 0 ? void 0 : _globalProps$appName.substring(5))) {
|
|
10431
10462
|
setFieldValue("appRoles[".concat(index, "].isEnabled"), true);
|
|
@@ -10823,8 +10854,9 @@ var RolesRadioGroup = function RolesRadioGroup(_ref) {
|
|
|
10823
10854
|
values = _useFormikContext.values,
|
|
10824
10855
|
setFieldValue = _useFormikContext.setFieldValue;
|
|
10825
10856
|
var setDefaultSelection = function setDefaultSelection(currentRole) {
|
|
10857
|
+
var _values$appRoles;
|
|
10826
10858
|
var condition = isAdminRole(currentRole);
|
|
10827
|
-
values.appRoles.forEach(function (_ref2, index) {
|
|
10859
|
+
(_values$appRoles = values.appRoles) === null || _values$appRoles === void 0 ? void 0 : _values$appRoles.forEach(function (_ref2, index) {
|
|
10828
10860
|
var _globalProps$appName;
|
|
10829
10861
|
var appName = _ref2.appName,
|
|
10830
10862
|
activeRole = _ref2.activeRole;
|