@commercetools-frontend/mc-html-template 21.21.0 → 21.21.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -129,7 +129,7 @@ var toStructuredHeaderString = function toStructuredHeaderString() {
129
129
  };
130
130
 
131
131
  var processHeaders = function processHeaders(applicationConfig) {
132
- var _context7, _context8, _context9, _applicationConfig$he, _applicationConfig$he2, _applicationConfig$he3, _context10, _applicationConfig$he4, _applicationConfig$he5;
132
+ var _context7, _context8, _context9, _applicationConfig$he, _applicationConfig$he2, _applicationConfig$he3, _context10, _applicationConfig$he4;
133
133
 
134
134
  var isMcDevEnv = applicationConfig.env.env === 'development'; // List hashes for injected inline scripts.
135
135
  // https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/script-src
@@ -175,15 +175,13 @@ var processHeaders = function processHeaders(applicationConfig) {
175
175
 
176
176
 
177
177
  var mergedCsp = mergeCspDirectives(cspDirectives, (_applicationConfig$he = (_applicationConfig$he2 = applicationConfig.headers) === null || _applicationConfig$he2 === void 0 ? void 0 : _applicationConfig$he2.csp) !== null && _applicationConfig$he !== void 0 ? _applicationConfig$he : {});
178
- return _objectSpread(_objectSpread(_objectSpread(_objectSpread({}, constants.HTTP_SECURITY_HEADERS), {}, {
178
+ return _objectSpread(_objectSpread(_objectSpread({}, constants.HTTP_SECURITY_HEADERS), {}, {
179
179
  // The `Content-Security-Policy` header is always generated
180
180
  // based on the Custom Application config.
181
181
  'Content-Security-Policy': toHeaderString(mergedCsp)
182
182
  }, ((_applicationConfig$he3 = applicationConfig.headers) === null || _applicationConfig$he3 === void 0 ? void 0 : _applicationConfig$he3.strictTransportSecurity) && {
183
183
  'Strict-Transport-Security': _concatInstanceProperty__default["default"](_context10 = [constants.HTTP_SECURITY_HEADERS['Strict-Transport-Security']]).call(_context10, _toConsumableArray(applicationConfig.headers.strictTransportSecurity)).join('; ')
184
- }), ((_applicationConfig$he4 = applicationConfig.headers) === null || _applicationConfig$he4 === void 0 ? void 0 : _applicationConfig$he4.featurePolicies) && {
185
- 'Feature-Policy': toHeaderString(applicationConfig.headers.featurePolicies)
186
- }), ((_applicationConfig$he5 = applicationConfig.headers) === null || _applicationConfig$he5 === void 0 ? void 0 : _applicationConfig$he5.permissionsPolicies) && {
184
+ }), ((_applicationConfig$he4 = applicationConfig.headers) === null || _applicationConfig$he4 === void 0 ? void 0 : _applicationConfig$he4.permissionsPolicies) && {
187
185
  'Permissions-Policy': toStructuredHeaderString(applicationConfig.headers.permissionsPolicies)
188
186
  });
189
187
  };
@@ -129,7 +129,7 @@ var toStructuredHeaderString = function toStructuredHeaderString() {
129
129
  };
130
130
 
131
131
  var processHeaders = function processHeaders(applicationConfig) {
132
- var _context7, _context8, _context9, _applicationConfig$he, _applicationConfig$he2, _applicationConfig$he3, _context10, _applicationConfig$he4, _applicationConfig$he5;
132
+ var _context7, _context8, _context9, _applicationConfig$he, _applicationConfig$he2, _applicationConfig$he3, _context10, _applicationConfig$he4;
133
133
 
134
134
  var isMcDevEnv = applicationConfig.env.env === 'development'; // List hashes for injected inline scripts.
135
135
  // https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/script-src
@@ -175,15 +175,13 @@ var processHeaders = function processHeaders(applicationConfig) {
175
175
 
176
176
 
177
177
  var mergedCsp = mergeCspDirectives(cspDirectives, (_applicationConfig$he = (_applicationConfig$he2 = applicationConfig.headers) === null || _applicationConfig$he2 === void 0 ? void 0 : _applicationConfig$he2.csp) !== null && _applicationConfig$he !== void 0 ? _applicationConfig$he : {});
178
- return _objectSpread(_objectSpread(_objectSpread(_objectSpread({}, constants.HTTP_SECURITY_HEADERS), {}, {
178
+ return _objectSpread(_objectSpread(_objectSpread({}, constants.HTTP_SECURITY_HEADERS), {}, {
179
179
  // The `Content-Security-Policy` header is always generated
180
180
  // based on the Custom Application config.
181
181
  'Content-Security-Policy': toHeaderString(mergedCsp)
182
182
  }, ((_applicationConfig$he3 = applicationConfig.headers) === null || _applicationConfig$he3 === void 0 ? void 0 : _applicationConfig$he3.strictTransportSecurity) && {
183
183
  'Strict-Transport-Security': _concatInstanceProperty__default["default"](_context10 = [constants.HTTP_SECURITY_HEADERS['Strict-Transport-Security']]).call(_context10, _toConsumableArray(applicationConfig.headers.strictTransportSecurity)).join('; ')
184
- }), ((_applicationConfig$he4 = applicationConfig.headers) === null || _applicationConfig$he4 === void 0 ? void 0 : _applicationConfig$he4.featurePolicies) && {
185
- 'Feature-Policy': toHeaderString(applicationConfig.headers.featurePolicies)
186
- }), ((_applicationConfig$he5 = applicationConfig.headers) === null || _applicationConfig$he5 === void 0 ? void 0 : _applicationConfig$he5.permissionsPolicies) && {
184
+ }), ((_applicationConfig$he4 = applicationConfig.headers) === null || _applicationConfig$he4 === void 0 ? void 0 : _applicationConfig$he4.permissionsPolicies) && {
187
185
  'Permissions-Policy': toStructuredHeaderString(applicationConfig.headers.permissionsPolicies)
188
186
  });
189
187
  };
@@ -104,7 +104,7 @@ var toStructuredHeaderString = function toStructuredHeaderString() {
104
104
  };
105
105
 
106
106
  var processHeaders = function processHeaders(applicationConfig) {
107
- var _context7, _context8, _context9, _applicationConfig$he, _applicationConfig$he2, _applicationConfig$he3, _context10, _applicationConfig$he4, _applicationConfig$he5;
107
+ var _context7, _context8, _context9, _applicationConfig$he, _applicationConfig$he2, _applicationConfig$he3, _context10, _applicationConfig$he4;
108
108
 
109
109
  var isMcDevEnv = applicationConfig.env.env === 'development'; // List hashes for injected inline scripts.
110
110
  // https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/script-src
@@ -150,15 +150,13 @@ var processHeaders = function processHeaders(applicationConfig) {
150
150
 
151
151
 
152
152
  var mergedCsp = mergeCspDirectives(cspDirectives, (_applicationConfig$he = (_applicationConfig$he2 = applicationConfig.headers) === null || _applicationConfig$he2 === void 0 ? void 0 : _applicationConfig$he2.csp) !== null && _applicationConfig$he !== void 0 ? _applicationConfig$he : {});
153
- return _objectSpread(_objectSpread(_objectSpread(_objectSpread({}, HTTP_SECURITY_HEADERS), {}, {
153
+ return _objectSpread(_objectSpread(_objectSpread({}, HTTP_SECURITY_HEADERS), {}, {
154
154
  // The `Content-Security-Policy` header is always generated
155
155
  // based on the Custom Application config.
156
156
  'Content-Security-Policy': toHeaderString(mergedCsp)
157
157
  }, ((_applicationConfig$he3 = applicationConfig.headers) === null || _applicationConfig$he3 === void 0 ? void 0 : _applicationConfig$he3.strictTransportSecurity) && {
158
158
  'Strict-Transport-Security': _concatInstanceProperty(_context10 = [HTTP_SECURITY_HEADERS['Strict-Transport-Security']]).call(_context10, _toConsumableArray(applicationConfig.headers.strictTransportSecurity)).join('; ')
159
- }), ((_applicationConfig$he4 = applicationConfig.headers) === null || _applicationConfig$he4 === void 0 ? void 0 : _applicationConfig$he4.featurePolicies) && {
160
- 'Feature-Policy': toHeaderString(applicationConfig.headers.featurePolicies)
161
- }), ((_applicationConfig$he5 = applicationConfig.headers) === null || _applicationConfig$he5 === void 0 ? void 0 : _applicationConfig$he5.permissionsPolicies) && {
159
+ }), ((_applicationConfig$he4 = applicationConfig.headers) === null || _applicationConfig$he4 === void 0 ? void 0 : _applicationConfig$he4.permissionsPolicies) && {
162
160
  'Permissions-Policy': toStructuredHeaderString(applicationConfig.headers.permissionsPolicies)
163
161
  });
164
162
  };
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@commercetools-frontend/mc-html-template",
3
- "version": "21.21.0",
3
+ "version": "21.21.2",
4
4
  "description": "Everything related to render the index.html for a MC application",
5
5
  "bugs": "https://github.com/commercetools/merchant-center-application-kit/issues",
6
6
  "repository": {
@@ -30,8 +30,8 @@
30
30
  "dependencies": {
31
31
  "@babel/runtime": "^7.19.0",
32
32
  "@babel/runtime-corejs3": "^7.19.0",
33
- "@commercetools-frontend/application-config": "21.21.0",
34
- "@commercetools-frontend/constants": "21.21.0",
33
+ "@commercetools-frontend/application-config": "21.21.2",
34
+ "@commercetools-frontend/constants": "21.21.2",
35
35
  "serialize-javascript": "6.0.0",
36
36
  "uglify-js": "3.17.3",
37
37
  "uglifycss": "0.0.29"