@bigbinary/neeto-team-members-frontend 2.7.1 → 2.7.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.cjs.js +58 -26
- package/dist/index.cjs.js.map +1 -1
- package/dist/index.js +58 -26
- package/dist/index.js.map +1 -1
- package/package.json +14 -14
package/dist/index.js
CHANGED
|
@@ -23,7 +23,7 @@ import require$$0 from 'util';
|
|
|
23
23
|
import classnames from 'classnames';
|
|
24
24
|
import MenuBar from '@bigbinary/neeto-molecules/MenuBar';
|
|
25
25
|
|
|
26
|
-
/*! @license DOMPurify 3.0.
|
|
26
|
+
/*! @license DOMPurify 3.0.3 | (c) Cure53 and other contributors | Released under the Apache license 2.0 and Mozilla Public License 2.0 | github.com/cure53/DOMPurify/blob/3.0.3/LICENSE */
|
|
27
27
|
|
|
28
28
|
const {
|
|
29
29
|
entries,
|
|
@@ -99,7 +99,9 @@ function unconstruct(func) {
|
|
|
99
99
|
/* Add properties to a lookup table */
|
|
100
100
|
|
|
101
101
|
function addToSet(set, array, transformCaseFunc) {
|
|
102
|
-
|
|
102
|
+
var _transformCaseFunc;
|
|
103
|
+
|
|
104
|
+
transformCaseFunc = (_transformCaseFunc = transformCaseFunc) !== null && _transformCaseFunc !== void 0 ? _transformCaseFunc : stringToLowerCase;
|
|
103
105
|
|
|
104
106
|
if (setPrototypeOf) {
|
|
105
107
|
// Make 'in' and truthy checks like Boolean(set.constructor)
|
|
@@ -173,12 +175,12 @@ function lookupGetter(object, prop) {
|
|
|
173
175
|
const html$1 = freeze(['a', 'abbr', 'acronym', 'address', 'area', 'article', 'aside', 'audio', 'b', 'bdi', 'bdo', 'big', 'blink', 'blockquote', 'body', 'br', 'button', 'canvas', 'caption', 'center', 'cite', 'code', 'col', 'colgroup', 'content', 'data', 'datalist', 'dd', 'decorator', 'del', 'details', 'dfn', 'dialog', 'dir', 'div', 'dl', 'dt', 'element', 'em', 'fieldset', 'figcaption', 'figure', 'font', 'footer', 'form', 'h1', 'h2', 'h3', 'h4', 'h5', 'h6', 'head', 'header', 'hgroup', 'hr', 'html', 'i', 'img', 'input', 'ins', 'kbd', 'label', 'legend', 'li', 'main', 'map', 'mark', 'marquee', 'menu', 'menuitem', 'meter', 'nav', 'nobr', 'ol', 'optgroup', 'option', 'output', 'p', 'picture', 'pre', 'progress', 'q', 'rp', 'rt', 'ruby', 's', 'samp', 'section', 'select', 'shadow', 'small', 'source', 'spacer', 'span', 'strike', 'strong', 'style', 'sub', 'summary', 'sup', 'table', 'tbody', 'td', 'template', 'textarea', 'tfoot', 'th', 'thead', 'time', 'tr', 'track', 'tt', 'u', 'ul', 'var', 'video', 'wbr']); // SVG
|
|
174
176
|
|
|
175
177
|
const svg$1 = freeze(['svg', 'a', 'altglyph', 'altglyphdef', 'altglyphitem', 'animatecolor', 'animatemotion', 'animatetransform', 'circle', 'clippath', 'defs', 'desc', 'ellipse', 'filter', 'font', 'g', 'glyph', 'glyphref', 'hkern', 'image', 'line', 'lineargradient', 'marker', 'mask', 'metadata', 'mpath', 'path', 'pattern', 'polygon', 'polyline', 'radialgradient', 'rect', 'stop', 'style', 'switch', 'symbol', 'text', 'textpath', 'title', 'tref', 'tspan', 'view', 'vkern']);
|
|
176
|
-
const svgFilters = freeze(['feBlend', 'feColorMatrix', 'feComponentTransfer', 'feComposite', 'feConvolveMatrix', 'feDiffuseLighting', 'feDisplacementMap', 'feDistantLight', 'feFlood', 'feFuncA', 'feFuncB', 'feFuncG', 'feFuncR', 'feGaussianBlur', 'feImage', 'feMerge', 'feMergeNode', 'feMorphology', 'feOffset', 'fePointLight', 'feSpecularLighting', 'feSpotLight', 'feTile', 'feTurbulence']); // List of SVG elements that are disallowed by default.
|
|
178
|
+
const svgFilters = freeze(['feBlend', 'feColorMatrix', 'feComponentTransfer', 'feComposite', 'feConvolveMatrix', 'feDiffuseLighting', 'feDisplacementMap', 'feDistantLight', 'feDropShadow', 'feFlood', 'feFuncA', 'feFuncB', 'feFuncG', 'feFuncR', 'feGaussianBlur', 'feImage', 'feMerge', 'feMergeNode', 'feMorphology', 'feOffset', 'fePointLight', 'feSpecularLighting', 'feSpotLight', 'feTile', 'feTurbulence']); // List of SVG elements that are disallowed by default.
|
|
177
179
|
// We still need to know them so that we can do namespace
|
|
178
180
|
// checks properly in case one wants to add them to
|
|
179
181
|
// allow-list.
|
|
180
182
|
|
|
181
|
-
const svgDisallowed = freeze(['animate', 'color-profile', 'cursor', 'discard', '
|
|
183
|
+
const svgDisallowed = freeze(['animate', 'color-profile', 'cursor', 'discard', 'font-face', 'font-face-format', 'font-face-name', 'font-face-src', 'font-face-uri', 'foreignobject', 'hatch', 'hatchpath', 'mesh', 'meshgradient', 'meshpatch', 'meshrow', 'missing-glyph', 'script', 'set', 'solidcolor', 'unknown', 'use']);
|
|
182
184
|
const mathMl$1 = freeze(['math', 'menclose', 'merror', 'mfenced', 'mfrac', 'mglyph', 'mi', 'mlabeledtr', 'mmultiscripts', 'mn', 'mo', 'mover', 'mpadded', 'mphantom', 'mroot', 'mrow', 'ms', 'mspace', 'msqrt', 'mstyle', 'msub', 'msup', 'msubsup', 'mtable', 'mtd', 'mtext', 'mtr', 'munder', 'munderover', 'mprescripts']); // Similarly to SVG, we want to know all MathML elements,
|
|
183
185
|
// even those that we disallow by default.
|
|
184
186
|
|
|
@@ -223,13 +225,13 @@ const getGlobal = () => typeof window === 'undefined' ? null : window;
|
|
|
223
225
|
* Creates a no-op policy for internal use only.
|
|
224
226
|
* Don't export this function outside this module!
|
|
225
227
|
* @param {?TrustedTypePolicyFactory} trustedTypes The policy factory.
|
|
226
|
-
* @param {
|
|
228
|
+
* @param {HTMLScriptElement} purifyHostElement The Script element used to load DOMPurify (to determine policy name suffix).
|
|
227
229
|
* @return {?TrustedTypePolicy} The policy created (or null, if Trusted Types
|
|
228
|
-
* are not supported).
|
|
230
|
+
* are not supported or creating the policy failed).
|
|
229
231
|
*/
|
|
230
232
|
|
|
231
233
|
|
|
232
|
-
const _createTrustedTypesPolicy = function _createTrustedTypesPolicy(trustedTypes,
|
|
234
|
+
const _createTrustedTypesPolicy = function _createTrustedTypesPolicy(trustedTypes, purifyHostElement) {
|
|
233
235
|
if (typeof trustedTypes !== 'object' || typeof trustedTypes.createPolicy !== 'function') {
|
|
234
236
|
return null;
|
|
235
237
|
} // Allow the callers to control the unique policy name
|
|
@@ -240,8 +242,8 @@ const _createTrustedTypesPolicy = function _createTrustedTypesPolicy(trustedType
|
|
|
240
242
|
let suffix = null;
|
|
241
243
|
const ATTR_NAME = 'data-tt-policy-suffix';
|
|
242
244
|
|
|
243
|
-
if (
|
|
244
|
-
suffix =
|
|
245
|
+
if (purifyHostElement && purifyHostElement.hasAttribute(ATTR_NAME)) {
|
|
246
|
+
suffix = purifyHostElement.getAttribute(ATTR_NAME);
|
|
245
247
|
}
|
|
246
248
|
|
|
247
249
|
const policyName = 'dompurify' + (suffix ? '#' + suffix : '');
|
|
@@ -276,7 +278,7 @@ function createDOMPurify() {
|
|
|
276
278
|
*/
|
|
277
279
|
|
|
278
280
|
|
|
279
|
-
DOMPurify.version = '3.0.
|
|
281
|
+
DOMPurify.version = '3.0.3';
|
|
280
282
|
/**
|
|
281
283
|
* Array of elements that DOMPurify removed during sanitation.
|
|
282
284
|
* Empty if nothing was removed.
|
|
@@ -292,6 +294,7 @@ function createDOMPurify() {
|
|
|
292
294
|
}
|
|
293
295
|
|
|
294
296
|
const originalDocument = window.document;
|
|
297
|
+
const currentScript = originalDocument.currentScript;
|
|
295
298
|
let {
|
|
296
299
|
document
|
|
297
300
|
} = window;
|
|
@@ -325,9 +328,8 @@ function createDOMPurify() {
|
|
|
325
328
|
}
|
|
326
329
|
}
|
|
327
330
|
|
|
328
|
-
|
|
329
|
-
|
|
330
|
-
const emptyHTML = trustedTypesPolicy ? trustedTypesPolicy.createHTML('') : '';
|
|
331
|
+
let trustedTypesPolicy;
|
|
332
|
+
let emptyHTML = '';
|
|
331
333
|
const {
|
|
332
334
|
implementation,
|
|
333
335
|
createNodeIterator,
|
|
@@ -342,7 +344,7 @@ function createDOMPurify() {
|
|
|
342
344
|
* Expose whether this browser supports running the full DOMPurify.
|
|
343
345
|
*/
|
|
344
346
|
|
|
345
|
-
DOMPurify.isSupported = typeof entries === 'function' && typeof getParentNode === 'function' && implementation &&
|
|
347
|
+
DOMPurify.isSupported = typeof entries === 'function' && typeof getParentNode === 'function' && implementation && implementation.createHTMLDocument !== undefined;
|
|
346
348
|
const {
|
|
347
349
|
MUSTACHE_EXPR,
|
|
348
350
|
ERB_EXPR,
|
|
@@ -689,6 +691,31 @@ function createDOMPurify() {
|
|
|
689
691
|
if (ALLOWED_TAGS.table) {
|
|
690
692
|
addToSet(ALLOWED_TAGS, ['tbody']);
|
|
691
693
|
delete FORBID_TAGS.tbody;
|
|
694
|
+
}
|
|
695
|
+
|
|
696
|
+
if (cfg.TRUSTED_TYPES_POLICY) {
|
|
697
|
+
if (typeof cfg.TRUSTED_TYPES_POLICY.createHTML !== 'function') {
|
|
698
|
+
throw typeErrorCreate('TRUSTED_TYPES_POLICY configuration option must provide a "createHTML" hook.');
|
|
699
|
+
}
|
|
700
|
+
|
|
701
|
+
if (typeof cfg.TRUSTED_TYPES_POLICY.createScriptURL !== 'function') {
|
|
702
|
+
throw typeErrorCreate('TRUSTED_TYPES_POLICY configuration option must provide a "createScriptURL" hook.');
|
|
703
|
+
} // Overwrite existing TrustedTypes policy.
|
|
704
|
+
|
|
705
|
+
|
|
706
|
+
trustedTypesPolicy = cfg.TRUSTED_TYPES_POLICY; // Sign local variables required by `sanitize`.
|
|
707
|
+
|
|
708
|
+
emptyHTML = trustedTypesPolicy.createHTML('');
|
|
709
|
+
} else {
|
|
710
|
+
// Uninitialized policy, attempt to initialize the internal dompurify policy.
|
|
711
|
+
if (trustedTypesPolicy === undefined) {
|
|
712
|
+
trustedTypesPolicy = _createTrustedTypesPolicy(trustedTypes, currentScript);
|
|
713
|
+
} // If creating the internal policy succeeded sign internal variables.
|
|
714
|
+
|
|
715
|
+
|
|
716
|
+
if (trustedTypesPolicy !== null && typeof emptyHTML === 'string') {
|
|
717
|
+
emptyHTML = trustedTypesPolicy.createHTML('');
|
|
718
|
+
}
|
|
692
719
|
} // Prevent further manipulation of configuration.
|
|
693
720
|
// Not available in IE8, Safari 5, etc.
|
|
694
721
|
|
|
@@ -1125,9 +1152,9 @@ function createDOMPurify() {
|
|
|
1125
1152
|
}
|
|
1126
1153
|
/* Check value is safe. First, is attr inert? If so, is safe */
|
|
1127
1154
|
|
|
1128
|
-
} else if (URI_SAFE_ATTRIBUTES[lcName]) ; else if (regExpTest(IS_ALLOWED_URI$1, stringReplace(value, ATTR_WHITESPACE, ''))) ; else if ((lcName === 'src' || lcName === 'xlink:href' || lcName === 'href') && lcTag !== 'script' && stringIndexOf(value, 'data:') === 0 && DATA_URI_TAGS[lcTag]) ; else if (ALLOW_UNKNOWN_PROTOCOLS && !regExpTest(IS_SCRIPT_OR_DATA, stringReplace(value, ATTR_WHITESPACE, ''))) ; else if (
|
|
1155
|
+
} else if (URI_SAFE_ATTRIBUTES[lcName]) ; else if (regExpTest(IS_ALLOWED_URI$1, stringReplace(value, ATTR_WHITESPACE, ''))) ; else if ((lcName === 'src' || lcName === 'xlink:href' || lcName === 'href') && lcTag !== 'script' && stringIndexOf(value, 'data:') === 0 && DATA_URI_TAGS[lcTag]) ; else if (ALLOW_UNKNOWN_PROTOCOLS && !regExpTest(IS_SCRIPT_OR_DATA, stringReplace(value, ATTR_WHITESPACE, ''))) ; else if (value) {
|
|
1129
1156
|
return false;
|
|
1130
|
-
}
|
|
1157
|
+
} else ;
|
|
1131
1158
|
|
|
1132
1159
|
return true;
|
|
1133
1160
|
};
|
|
@@ -1257,12 +1284,16 @@ function createDOMPurify() {
|
|
|
1257
1284
|
if (namespaceURI) ; else {
|
|
1258
1285
|
switch (trustedTypes.getAttributeType(lcTag, lcName)) {
|
|
1259
1286
|
case 'TrustedHTML':
|
|
1260
|
-
|
|
1261
|
-
|
|
1287
|
+
{
|
|
1288
|
+
value = trustedTypesPolicy.createHTML(value);
|
|
1289
|
+
break;
|
|
1290
|
+
}
|
|
1262
1291
|
|
|
1263
1292
|
case 'TrustedScriptURL':
|
|
1264
|
-
|
|
1265
|
-
|
|
1293
|
+
{
|
|
1294
|
+
value = trustedTypesPolicy.createScriptURL(value);
|
|
1295
|
+
break;
|
|
1296
|
+
}
|
|
1266
1297
|
}
|
|
1267
1298
|
}
|
|
1268
1299
|
}
|
|
@@ -1355,15 +1386,14 @@ function createDOMPurify() {
|
|
|
1355
1386
|
|
|
1356
1387
|
|
|
1357
1388
|
if (typeof dirty !== 'string' && !_isNode(dirty)) {
|
|
1358
|
-
|
|
1359
|
-
if (typeof dirty.toString !== 'function') {
|
|
1360
|
-
throw typeErrorCreate('toString is not a function');
|
|
1361
|
-
} else {
|
|
1389
|
+
if (typeof dirty.toString === 'function') {
|
|
1362
1390
|
dirty = dirty.toString();
|
|
1363
1391
|
|
|
1364
1392
|
if (typeof dirty !== 'string') {
|
|
1365
1393
|
throw typeErrorCreate('dirty is not a string, aborting');
|
|
1366
1394
|
}
|
|
1395
|
+
} else {
|
|
1396
|
+
throw typeErrorCreate('toString is not a function');
|
|
1367
1397
|
}
|
|
1368
1398
|
}
|
|
1369
1399
|
/* Return dirty HTML if DOMPurify cannot run */
|
|
@@ -9376,6 +9406,7 @@ var getDefaultColumns = function getDefaultColumns(_ref5) {
|
|
|
9376
9406
|
permissions = _ref5.permissions;
|
|
9377
9407
|
return [{
|
|
9378
9408
|
dataIndex: "name",
|
|
9409
|
+
fixed: "left",
|
|
9379
9410
|
key: "name",
|
|
9380
9411
|
render: function render(_, tableData) {
|
|
9381
9412
|
return renderNameColumn({
|
|
@@ -10390,7 +10421,7 @@ var AppList = function AppList(_ref) {
|
|
|
10390
10421
|
var selectedEmail = pluck("value", emails);
|
|
10391
10422
|
useEffect(function () {
|
|
10392
10423
|
if (savedStateRef.current.isAppListEnabled !== isAppListEnabled) {
|
|
10393
|
-
appRoles.forEach(function (appRole, index) {
|
|
10424
|
+
appRoles === null || appRoles === void 0 ? void 0 : appRoles.forEach(function (appRole, index) {
|
|
10394
10425
|
var _globalProps$appName;
|
|
10395
10426
|
if ((appRole === null || appRole === void 0 ? void 0 : appRole.appName) === ((_globalProps$appName = globalProps.appName) === null || _globalProps$appName === void 0 ? void 0 : _globalProps$appName.substring(5))) {
|
|
10396
10427
|
setFieldValue("appRoles[".concat(index, "].isEnabled"), true);
|
|
@@ -10788,8 +10819,9 @@ var RolesRadioGroup = function RolesRadioGroup(_ref) {
|
|
|
10788
10819
|
values = _useFormikContext.values,
|
|
10789
10820
|
setFieldValue = _useFormikContext.setFieldValue;
|
|
10790
10821
|
var setDefaultSelection = function setDefaultSelection(currentRole) {
|
|
10822
|
+
var _values$appRoles;
|
|
10791
10823
|
var condition = isAdminRole(currentRole);
|
|
10792
|
-
values.appRoles.forEach(function (_ref2, index) {
|
|
10824
|
+
(_values$appRoles = values.appRoles) === null || _values$appRoles === void 0 ? void 0 : _values$appRoles.forEach(function (_ref2, index) {
|
|
10793
10825
|
var _globalProps$appName;
|
|
10794
10826
|
var appName = _ref2.appName,
|
|
10795
10827
|
activeRole = _ref2.activeRole;
|