@commercetools-frontend/mc-html-template 21.21.0 → 21.21.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
|
@@ -129,7 +129,7 @@ var toStructuredHeaderString = function toStructuredHeaderString() {
|
|
|
129
129
|
};
|
|
130
130
|
|
|
131
131
|
var processHeaders = function processHeaders(applicationConfig) {
|
|
132
|
-
var _context7, _context8, _context9, _applicationConfig$he, _applicationConfig$he2, _applicationConfig$he3, _context10, _applicationConfig$he4
|
|
132
|
+
var _context7, _context8, _context9, _applicationConfig$he, _applicationConfig$he2, _applicationConfig$he3, _context10, _applicationConfig$he4;
|
|
133
133
|
|
|
134
134
|
var isMcDevEnv = applicationConfig.env.env === 'development'; // List hashes for injected inline scripts.
|
|
135
135
|
// https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/script-src
|
|
@@ -175,15 +175,13 @@ var processHeaders = function processHeaders(applicationConfig) {
|
|
|
175
175
|
|
|
176
176
|
|
|
177
177
|
var mergedCsp = mergeCspDirectives(cspDirectives, (_applicationConfig$he = (_applicationConfig$he2 = applicationConfig.headers) === null || _applicationConfig$he2 === void 0 ? void 0 : _applicationConfig$he2.csp) !== null && _applicationConfig$he !== void 0 ? _applicationConfig$he : {});
|
|
178
|
-
return _objectSpread(_objectSpread(_objectSpread(
|
|
178
|
+
return _objectSpread(_objectSpread(_objectSpread({}, constants.HTTP_SECURITY_HEADERS), {}, {
|
|
179
179
|
// The `Content-Security-Policy` header is always generated
|
|
180
180
|
// based on the Custom Application config.
|
|
181
181
|
'Content-Security-Policy': toHeaderString(mergedCsp)
|
|
182
182
|
}, ((_applicationConfig$he3 = applicationConfig.headers) === null || _applicationConfig$he3 === void 0 ? void 0 : _applicationConfig$he3.strictTransportSecurity) && {
|
|
183
183
|
'Strict-Transport-Security': _concatInstanceProperty__default["default"](_context10 = [constants.HTTP_SECURITY_HEADERS['Strict-Transport-Security']]).call(_context10, _toConsumableArray(applicationConfig.headers.strictTransportSecurity)).join('; ')
|
|
184
|
-
}), ((_applicationConfig$he4 = applicationConfig.headers) === null || _applicationConfig$he4 === void 0 ? void 0 : _applicationConfig$he4.
|
|
185
|
-
'Feature-Policy': toHeaderString(applicationConfig.headers.featurePolicies)
|
|
186
|
-
}), ((_applicationConfig$he5 = applicationConfig.headers) === null || _applicationConfig$he5 === void 0 ? void 0 : _applicationConfig$he5.permissionsPolicies) && {
|
|
184
|
+
}), ((_applicationConfig$he4 = applicationConfig.headers) === null || _applicationConfig$he4 === void 0 ? void 0 : _applicationConfig$he4.permissionsPolicies) && {
|
|
187
185
|
'Permissions-Policy': toStructuredHeaderString(applicationConfig.headers.permissionsPolicies)
|
|
188
186
|
});
|
|
189
187
|
};
|
|
@@ -129,7 +129,7 @@ var toStructuredHeaderString = function toStructuredHeaderString() {
|
|
|
129
129
|
};
|
|
130
130
|
|
|
131
131
|
var processHeaders = function processHeaders(applicationConfig) {
|
|
132
|
-
var _context7, _context8, _context9, _applicationConfig$he, _applicationConfig$he2, _applicationConfig$he3, _context10, _applicationConfig$he4
|
|
132
|
+
var _context7, _context8, _context9, _applicationConfig$he, _applicationConfig$he2, _applicationConfig$he3, _context10, _applicationConfig$he4;
|
|
133
133
|
|
|
134
134
|
var isMcDevEnv = applicationConfig.env.env === 'development'; // List hashes for injected inline scripts.
|
|
135
135
|
// https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/script-src
|
|
@@ -175,15 +175,13 @@ var processHeaders = function processHeaders(applicationConfig) {
|
|
|
175
175
|
|
|
176
176
|
|
|
177
177
|
var mergedCsp = mergeCspDirectives(cspDirectives, (_applicationConfig$he = (_applicationConfig$he2 = applicationConfig.headers) === null || _applicationConfig$he2 === void 0 ? void 0 : _applicationConfig$he2.csp) !== null && _applicationConfig$he !== void 0 ? _applicationConfig$he : {});
|
|
178
|
-
return _objectSpread(_objectSpread(_objectSpread(
|
|
178
|
+
return _objectSpread(_objectSpread(_objectSpread({}, constants.HTTP_SECURITY_HEADERS), {}, {
|
|
179
179
|
// The `Content-Security-Policy` header is always generated
|
|
180
180
|
// based on the Custom Application config.
|
|
181
181
|
'Content-Security-Policy': toHeaderString(mergedCsp)
|
|
182
182
|
}, ((_applicationConfig$he3 = applicationConfig.headers) === null || _applicationConfig$he3 === void 0 ? void 0 : _applicationConfig$he3.strictTransportSecurity) && {
|
|
183
183
|
'Strict-Transport-Security': _concatInstanceProperty__default["default"](_context10 = [constants.HTTP_SECURITY_HEADERS['Strict-Transport-Security']]).call(_context10, _toConsumableArray(applicationConfig.headers.strictTransportSecurity)).join('; ')
|
|
184
|
-
}), ((_applicationConfig$he4 = applicationConfig.headers) === null || _applicationConfig$he4 === void 0 ? void 0 : _applicationConfig$he4.
|
|
185
|
-
'Feature-Policy': toHeaderString(applicationConfig.headers.featurePolicies)
|
|
186
|
-
}), ((_applicationConfig$he5 = applicationConfig.headers) === null || _applicationConfig$he5 === void 0 ? void 0 : _applicationConfig$he5.permissionsPolicies) && {
|
|
184
|
+
}), ((_applicationConfig$he4 = applicationConfig.headers) === null || _applicationConfig$he4 === void 0 ? void 0 : _applicationConfig$he4.permissionsPolicies) && {
|
|
187
185
|
'Permissions-Policy': toStructuredHeaderString(applicationConfig.headers.permissionsPolicies)
|
|
188
186
|
});
|
|
189
187
|
};
|
|
@@ -104,7 +104,7 @@ var toStructuredHeaderString = function toStructuredHeaderString() {
|
|
|
104
104
|
};
|
|
105
105
|
|
|
106
106
|
var processHeaders = function processHeaders(applicationConfig) {
|
|
107
|
-
var _context7, _context8, _context9, _applicationConfig$he, _applicationConfig$he2, _applicationConfig$he3, _context10, _applicationConfig$he4
|
|
107
|
+
var _context7, _context8, _context9, _applicationConfig$he, _applicationConfig$he2, _applicationConfig$he3, _context10, _applicationConfig$he4;
|
|
108
108
|
|
|
109
109
|
var isMcDevEnv = applicationConfig.env.env === 'development'; // List hashes for injected inline scripts.
|
|
110
110
|
// https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/script-src
|
|
@@ -150,15 +150,13 @@ var processHeaders = function processHeaders(applicationConfig) {
|
|
|
150
150
|
|
|
151
151
|
|
|
152
152
|
var mergedCsp = mergeCspDirectives(cspDirectives, (_applicationConfig$he = (_applicationConfig$he2 = applicationConfig.headers) === null || _applicationConfig$he2 === void 0 ? void 0 : _applicationConfig$he2.csp) !== null && _applicationConfig$he !== void 0 ? _applicationConfig$he : {});
|
|
153
|
-
return _objectSpread(_objectSpread(_objectSpread(
|
|
153
|
+
return _objectSpread(_objectSpread(_objectSpread({}, HTTP_SECURITY_HEADERS), {}, {
|
|
154
154
|
// The `Content-Security-Policy` header is always generated
|
|
155
155
|
// based on the Custom Application config.
|
|
156
156
|
'Content-Security-Policy': toHeaderString(mergedCsp)
|
|
157
157
|
}, ((_applicationConfig$he3 = applicationConfig.headers) === null || _applicationConfig$he3 === void 0 ? void 0 : _applicationConfig$he3.strictTransportSecurity) && {
|
|
158
158
|
'Strict-Transport-Security': _concatInstanceProperty(_context10 = [HTTP_SECURITY_HEADERS['Strict-Transport-Security']]).call(_context10, _toConsumableArray(applicationConfig.headers.strictTransportSecurity)).join('; ')
|
|
159
|
-
}), ((_applicationConfig$he4 = applicationConfig.headers) === null || _applicationConfig$he4 === void 0 ? void 0 : _applicationConfig$he4.
|
|
160
|
-
'Feature-Policy': toHeaderString(applicationConfig.headers.featurePolicies)
|
|
161
|
-
}), ((_applicationConfig$he5 = applicationConfig.headers) === null || _applicationConfig$he5 === void 0 ? void 0 : _applicationConfig$he5.permissionsPolicies) && {
|
|
159
|
+
}), ((_applicationConfig$he4 = applicationConfig.headers) === null || _applicationConfig$he4 === void 0 ? void 0 : _applicationConfig$he4.permissionsPolicies) && {
|
|
162
160
|
'Permissions-Policy': toStructuredHeaderString(applicationConfig.headers.permissionsPolicies)
|
|
163
161
|
});
|
|
164
162
|
};
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@commercetools-frontend/mc-html-template",
|
|
3
|
-
"version": "21.21.
|
|
3
|
+
"version": "21.21.2",
|
|
4
4
|
"description": "Everything related to render the index.html for a MC application",
|
|
5
5
|
"bugs": "https://github.com/commercetools/merchant-center-application-kit/issues",
|
|
6
6
|
"repository": {
|
|
@@ -30,8 +30,8 @@
|
|
|
30
30
|
"dependencies": {
|
|
31
31
|
"@babel/runtime": "^7.19.0",
|
|
32
32
|
"@babel/runtime-corejs3": "^7.19.0",
|
|
33
|
-
"@commercetools-frontend/application-config": "21.21.
|
|
34
|
-
"@commercetools-frontend/constants": "21.21.
|
|
33
|
+
"@commercetools-frontend/application-config": "21.21.2",
|
|
34
|
+
"@commercetools-frontend/constants": "21.21.2",
|
|
35
35
|
"serialize-javascript": "6.0.0",
|
|
36
36
|
"uglify-js": "3.17.3",
|
|
37
37
|
"uglifycss": "0.0.29"
|