@bigbinary/neeto-team-members-frontend 2.7.1 → 2.7.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/index.js CHANGED
@@ -23,7 +23,7 @@ import require$$0 from 'util';
23
23
  import classnames from 'classnames';
24
24
  import MenuBar from '@bigbinary/neeto-molecules/MenuBar';
25
25
 
26
- /*! @license DOMPurify 3.0.2 | (c) Cure53 and other contributors | Released under the Apache license 2.0 and Mozilla Public License 2.0 | github.com/cure53/DOMPurify/blob/3.0.2/LICENSE */
26
+ /*! @license DOMPurify 3.0.3 | (c) Cure53 and other contributors | Released under the Apache license 2.0 and Mozilla Public License 2.0 | github.com/cure53/DOMPurify/blob/3.0.3/LICENSE */
27
27
 
28
28
  const {
29
29
  entries,
@@ -99,7 +99,9 @@ function unconstruct(func) {
99
99
  /* Add properties to a lookup table */
100
100
 
101
101
  function addToSet(set, array, transformCaseFunc) {
102
- transformCaseFunc = transformCaseFunc ? transformCaseFunc : stringToLowerCase;
102
+ var _transformCaseFunc;
103
+
104
+ transformCaseFunc = (_transformCaseFunc = transformCaseFunc) !== null && _transformCaseFunc !== void 0 ? _transformCaseFunc : stringToLowerCase;
103
105
 
104
106
  if (setPrototypeOf) {
105
107
  // Make 'in' and truthy checks like Boolean(set.constructor)
@@ -173,12 +175,12 @@ function lookupGetter(object, prop) {
173
175
  const html$1 = freeze(['a', 'abbr', 'acronym', 'address', 'area', 'article', 'aside', 'audio', 'b', 'bdi', 'bdo', 'big', 'blink', 'blockquote', 'body', 'br', 'button', 'canvas', 'caption', 'center', 'cite', 'code', 'col', 'colgroup', 'content', 'data', 'datalist', 'dd', 'decorator', 'del', 'details', 'dfn', 'dialog', 'dir', 'div', 'dl', 'dt', 'element', 'em', 'fieldset', 'figcaption', 'figure', 'font', 'footer', 'form', 'h1', 'h2', 'h3', 'h4', 'h5', 'h6', 'head', 'header', 'hgroup', 'hr', 'html', 'i', 'img', 'input', 'ins', 'kbd', 'label', 'legend', 'li', 'main', 'map', 'mark', 'marquee', 'menu', 'menuitem', 'meter', 'nav', 'nobr', 'ol', 'optgroup', 'option', 'output', 'p', 'picture', 'pre', 'progress', 'q', 'rp', 'rt', 'ruby', 's', 'samp', 'section', 'select', 'shadow', 'small', 'source', 'spacer', 'span', 'strike', 'strong', 'style', 'sub', 'summary', 'sup', 'table', 'tbody', 'td', 'template', 'textarea', 'tfoot', 'th', 'thead', 'time', 'tr', 'track', 'tt', 'u', 'ul', 'var', 'video', 'wbr']); // SVG
174
176
 
175
177
  const svg$1 = freeze(['svg', 'a', 'altglyph', 'altglyphdef', 'altglyphitem', 'animatecolor', 'animatemotion', 'animatetransform', 'circle', 'clippath', 'defs', 'desc', 'ellipse', 'filter', 'font', 'g', 'glyph', 'glyphref', 'hkern', 'image', 'line', 'lineargradient', 'marker', 'mask', 'metadata', 'mpath', 'path', 'pattern', 'polygon', 'polyline', 'radialgradient', 'rect', 'stop', 'style', 'switch', 'symbol', 'text', 'textpath', 'title', 'tref', 'tspan', 'view', 'vkern']);
176
- const svgFilters = freeze(['feBlend', 'feColorMatrix', 'feComponentTransfer', 'feComposite', 'feConvolveMatrix', 'feDiffuseLighting', 'feDisplacementMap', 'feDistantLight', 'feFlood', 'feFuncA', 'feFuncB', 'feFuncG', 'feFuncR', 'feGaussianBlur', 'feImage', 'feMerge', 'feMergeNode', 'feMorphology', 'feOffset', 'fePointLight', 'feSpecularLighting', 'feSpotLight', 'feTile', 'feTurbulence']); // List of SVG elements that are disallowed by default.
178
+ const svgFilters = freeze(['feBlend', 'feColorMatrix', 'feComponentTransfer', 'feComposite', 'feConvolveMatrix', 'feDiffuseLighting', 'feDisplacementMap', 'feDistantLight', 'feDropShadow', 'feFlood', 'feFuncA', 'feFuncB', 'feFuncG', 'feFuncR', 'feGaussianBlur', 'feImage', 'feMerge', 'feMergeNode', 'feMorphology', 'feOffset', 'fePointLight', 'feSpecularLighting', 'feSpotLight', 'feTile', 'feTurbulence']); // List of SVG elements that are disallowed by default.
177
179
  // We still need to know them so that we can do namespace
178
180
  // checks properly in case one wants to add them to
179
181
  // allow-list.
180
182
 
181
- const svgDisallowed = freeze(['animate', 'color-profile', 'cursor', 'discard', 'fedropshadow', 'font-face', 'font-face-format', 'font-face-name', 'font-face-src', 'font-face-uri', 'foreignobject', 'hatch', 'hatchpath', 'mesh', 'meshgradient', 'meshpatch', 'meshrow', 'missing-glyph', 'script', 'set', 'solidcolor', 'unknown', 'use']);
183
+ const svgDisallowed = freeze(['animate', 'color-profile', 'cursor', 'discard', 'font-face', 'font-face-format', 'font-face-name', 'font-face-src', 'font-face-uri', 'foreignobject', 'hatch', 'hatchpath', 'mesh', 'meshgradient', 'meshpatch', 'meshrow', 'missing-glyph', 'script', 'set', 'solidcolor', 'unknown', 'use']);
182
184
  const mathMl$1 = freeze(['math', 'menclose', 'merror', 'mfenced', 'mfrac', 'mglyph', 'mi', 'mlabeledtr', 'mmultiscripts', 'mn', 'mo', 'mover', 'mpadded', 'mphantom', 'mroot', 'mrow', 'ms', 'mspace', 'msqrt', 'mstyle', 'msub', 'msup', 'msubsup', 'mtable', 'mtd', 'mtext', 'mtr', 'munder', 'munderover', 'mprescripts']); // Similarly to SVG, we want to know all MathML elements,
183
185
  // even those that we disallow by default.
184
186
 
@@ -223,13 +225,13 @@ const getGlobal = () => typeof window === 'undefined' ? null : window;
223
225
  * Creates a no-op policy for internal use only.
224
226
  * Don't export this function outside this module!
225
227
  * @param {?TrustedTypePolicyFactory} trustedTypes The policy factory.
226
- * @param {Document} document The document object (to determine policy name suffix)
228
+ * @param {HTMLScriptElement} purifyHostElement The Script element used to load DOMPurify (to determine policy name suffix).
227
229
  * @return {?TrustedTypePolicy} The policy created (or null, if Trusted Types
228
- * are not supported).
230
+ * are not supported or creating the policy failed).
229
231
  */
230
232
 
231
233
 
232
- const _createTrustedTypesPolicy = function _createTrustedTypesPolicy(trustedTypes, document) {
234
+ const _createTrustedTypesPolicy = function _createTrustedTypesPolicy(trustedTypes, purifyHostElement) {
233
235
  if (typeof trustedTypes !== 'object' || typeof trustedTypes.createPolicy !== 'function') {
234
236
  return null;
235
237
  } // Allow the callers to control the unique policy name
@@ -240,8 +242,8 @@ const _createTrustedTypesPolicy = function _createTrustedTypesPolicy(trustedType
240
242
  let suffix = null;
241
243
  const ATTR_NAME = 'data-tt-policy-suffix';
242
244
 
243
- if (document.currentScript && document.currentScript.hasAttribute(ATTR_NAME)) {
244
- suffix = document.currentScript.getAttribute(ATTR_NAME);
245
+ if (purifyHostElement && purifyHostElement.hasAttribute(ATTR_NAME)) {
246
+ suffix = purifyHostElement.getAttribute(ATTR_NAME);
245
247
  }
246
248
 
247
249
  const policyName = 'dompurify' + (suffix ? '#' + suffix : '');
@@ -276,7 +278,7 @@ function createDOMPurify() {
276
278
  */
277
279
 
278
280
 
279
- DOMPurify.version = '3.0.2';
281
+ DOMPurify.version = '3.0.3';
280
282
  /**
281
283
  * Array of elements that DOMPurify removed during sanitation.
282
284
  * Empty if nothing was removed.
@@ -292,6 +294,7 @@ function createDOMPurify() {
292
294
  }
293
295
 
294
296
  const originalDocument = window.document;
297
+ const currentScript = originalDocument.currentScript;
295
298
  let {
296
299
  document
297
300
  } = window;
@@ -325,9 +328,8 @@ function createDOMPurify() {
325
328
  }
326
329
  }
327
330
 
328
- const trustedTypesPolicy = _createTrustedTypesPolicy(trustedTypes, originalDocument);
329
-
330
- const emptyHTML = trustedTypesPolicy ? trustedTypesPolicy.createHTML('') : '';
331
+ let trustedTypesPolicy;
332
+ let emptyHTML = '';
331
333
  const {
332
334
  implementation,
333
335
  createNodeIterator,
@@ -342,7 +344,7 @@ function createDOMPurify() {
342
344
  * Expose whether this browser supports running the full DOMPurify.
343
345
  */
344
346
 
345
- DOMPurify.isSupported = typeof entries === 'function' && typeof getParentNode === 'function' && implementation && typeof implementation.createHTMLDocument !== 'undefined';
347
+ DOMPurify.isSupported = typeof entries === 'function' && typeof getParentNode === 'function' && implementation && implementation.createHTMLDocument !== undefined;
346
348
  const {
347
349
  MUSTACHE_EXPR,
348
350
  ERB_EXPR,
@@ -689,6 +691,31 @@ function createDOMPurify() {
689
691
  if (ALLOWED_TAGS.table) {
690
692
  addToSet(ALLOWED_TAGS, ['tbody']);
691
693
  delete FORBID_TAGS.tbody;
694
+ }
695
+
696
+ if (cfg.TRUSTED_TYPES_POLICY) {
697
+ if (typeof cfg.TRUSTED_TYPES_POLICY.createHTML !== 'function') {
698
+ throw typeErrorCreate('TRUSTED_TYPES_POLICY configuration option must provide a "createHTML" hook.');
699
+ }
700
+
701
+ if (typeof cfg.TRUSTED_TYPES_POLICY.createScriptURL !== 'function') {
702
+ throw typeErrorCreate('TRUSTED_TYPES_POLICY configuration option must provide a "createScriptURL" hook.');
703
+ } // Overwrite existing TrustedTypes policy.
704
+
705
+
706
+ trustedTypesPolicy = cfg.TRUSTED_TYPES_POLICY; // Sign local variables required by `sanitize`.
707
+
708
+ emptyHTML = trustedTypesPolicy.createHTML('');
709
+ } else {
710
+ // Uninitialized policy, attempt to initialize the internal dompurify policy.
711
+ if (trustedTypesPolicy === undefined) {
712
+ trustedTypesPolicy = _createTrustedTypesPolicy(trustedTypes, currentScript);
713
+ } // If creating the internal policy succeeded sign internal variables.
714
+
715
+
716
+ if (trustedTypesPolicy !== null && typeof emptyHTML === 'string') {
717
+ emptyHTML = trustedTypesPolicy.createHTML('');
718
+ }
692
719
  } // Prevent further manipulation of configuration.
693
720
  // Not available in IE8, Safari 5, etc.
694
721
 
@@ -1125,9 +1152,9 @@ function createDOMPurify() {
1125
1152
  }
1126
1153
  /* Check value is safe. First, is attr inert? If so, is safe */
1127
1154
 
1128
- } else if (URI_SAFE_ATTRIBUTES[lcName]) ; else if (regExpTest(IS_ALLOWED_URI$1, stringReplace(value, ATTR_WHITESPACE, ''))) ; else if ((lcName === 'src' || lcName === 'xlink:href' || lcName === 'href') && lcTag !== 'script' && stringIndexOf(value, 'data:') === 0 && DATA_URI_TAGS[lcTag]) ; else if (ALLOW_UNKNOWN_PROTOCOLS && !regExpTest(IS_SCRIPT_OR_DATA, stringReplace(value, ATTR_WHITESPACE, ''))) ; else if (!value) ; else {
1155
+ } else if (URI_SAFE_ATTRIBUTES[lcName]) ; else if (regExpTest(IS_ALLOWED_URI$1, stringReplace(value, ATTR_WHITESPACE, ''))) ; else if ((lcName === 'src' || lcName === 'xlink:href' || lcName === 'href') && lcTag !== 'script' && stringIndexOf(value, 'data:') === 0 && DATA_URI_TAGS[lcTag]) ; else if (ALLOW_UNKNOWN_PROTOCOLS && !regExpTest(IS_SCRIPT_OR_DATA, stringReplace(value, ATTR_WHITESPACE, ''))) ; else if (value) {
1129
1156
  return false;
1130
- }
1157
+ } else ;
1131
1158
 
1132
1159
  return true;
1133
1160
  };
@@ -1257,12 +1284,16 @@ function createDOMPurify() {
1257
1284
  if (namespaceURI) ; else {
1258
1285
  switch (trustedTypes.getAttributeType(lcTag, lcName)) {
1259
1286
  case 'TrustedHTML':
1260
- value = trustedTypesPolicy.createHTML(value);
1261
- break;
1287
+ {
1288
+ value = trustedTypesPolicy.createHTML(value);
1289
+ break;
1290
+ }
1262
1291
 
1263
1292
  case 'TrustedScriptURL':
1264
- value = trustedTypesPolicy.createScriptURL(value);
1265
- break;
1293
+ {
1294
+ value = trustedTypesPolicy.createScriptURL(value);
1295
+ break;
1296
+ }
1266
1297
  }
1267
1298
  }
1268
1299
  }
@@ -1355,15 +1386,14 @@ function createDOMPurify() {
1355
1386
 
1356
1387
 
1357
1388
  if (typeof dirty !== 'string' && !_isNode(dirty)) {
1358
- // eslint-disable-next-line no-negated-condition
1359
- if (typeof dirty.toString !== 'function') {
1360
- throw typeErrorCreate('toString is not a function');
1361
- } else {
1389
+ if (typeof dirty.toString === 'function') {
1362
1390
  dirty = dirty.toString();
1363
1391
 
1364
1392
  if (typeof dirty !== 'string') {
1365
1393
  throw typeErrorCreate('dirty is not a string, aborting');
1366
1394
  }
1395
+ } else {
1396
+ throw typeErrorCreate('toString is not a function');
1367
1397
  }
1368
1398
  }
1369
1399
  /* Return dirty HTML if DOMPurify cannot run */
@@ -9376,6 +9406,7 @@ var getDefaultColumns = function getDefaultColumns(_ref5) {
9376
9406
  permissions = _ref5.permissions;
9377
9407
  return [{
9378
9408
  dataIndex: "name",
9409
+ fixed: "left",
9379
9410
  key: "name",
9380
9411
  render: function render(_, tableData) {
9381
9412
  return renderNameColumn({
@@ -10390,7 +10421,7 @@ var AppList = function AppList(_ref) {
10390
10421
  var selectedEmail = pluck("value", emails);
10391
10422
  useEffect(function () {
10392
10423
  if (savedStateRef.current.isAppListEnabled !== isAppListEnabled) {
10393
- appRoles.forEach(function (appRole, index) {
10424
+ appRoles === null || appRoles === void 0 ? void 0 : appRoles.forEach(function (appRole, index) {
10394
10425
  var _globalProps$appName;
10395
10426
  if ((appRole === null || appRole === void 0 ? void 0 : appRole.appName) === ((_globalProps$appName = globalProps.appName) === null || _globalProps$appName === void 0 ? void 0 : _globalProps$appName.substring(5))) {
10396
10427
  setFieldValue("appRoles[".concat(index, "].isEnabled"), true);
@@ -10788,8 +10819,9 @@ var RolesRadioGroup = function RolesRadioGroup(_ref) {
10788
10819
  values = _useFormikContext.values,
10789
10820
  setFieldValue = _useFormikContext.setFieldValue;
10790
10821
  var setDefaultSelection = function setDefaultSelection(currentRole) {
10822
+ var _values$appRoles;
10791
10823
  var condition = isAdminRole(currentRole);
10792
- values.appRoles.forEach(function (_ref2, index) {
10824
+ (_values$appRoles = values.appRoles) === null || _values$appRoles === void 0 ? void 0 : _values$appRoles.forEach(function (_ref2, index) {
10793
10825
  var _globalProps$appName;
10794
10826
  var appName = _ref2.appName,
10795
10827
  activeRole = _ref2.activeRole;