@mapgis/webclient-vue-cesium 17.2.2 → 17.4.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -3,7 +3,7 @@
3
3
  /***/ "c0c4":
4
4
  /***/ (function(module, exports, __webpack_require__) {
5
5
 
6
- /*! @license DOMPurify 2.5.6 | (c) Cure53 and other contributors | Released under the Apache license 2.0 and Mozilla Public License 2.0 | github.com/cure53/DOMPurify/blob/2.5.6/LICENSE */
6
+ /*! @license DOMPurify 2.5.8 | (c) Cure53 and other contributors | Released under the Apache license 2.0 and Mozilla Public License 2.0 | github.com/cure53/DOMPurify/blob/2.5.8/LICENSE */
7
7
 
8
8
  (function (global, factory) {
9
9
  true ? module.exports = factory() :
@@ -228,7 +228,7 @@
228
228
  var MUSTACHE_EXPR = seal(/\{\{[\w\W]*|[\w\W]*\}\}/gm); // Specify template detection regex for SAFE_FOR_TEMPLATES mode
229
229
  var ERB_EXPR = seal(/<%[\w\W]*|[\w\W]*%>/gm);
230
230
  var TMPLIT_EXPR = seal(/\${[\w\W]*}/gm);
231
- var DATA_ATTR = seal(/^data-[\-\w.\u00B7-\uFFFF]/); // eslint-disable-line no-useless-escape
231
+ var DATA_ATTR = seal(/^data-[\-\w.\u00B7-\uFFFF]+$/); // eslint-disable-line no-useless-escape
232
232
  var ARIA_ATTR = seal(/^aria-[\-\w]+$/); // eslint-disable-line no-useless-escape
233
233
  var IS_ALLOWED_URI = seal(/^(?:(?:(?:f|ht)tps?|mailto|tel|callto|cid|xmpp):|[^a-z]|[a-z+.\-]+(?:[^a-z+.\-:]|$))/i // eslint-disable-line no-useless-escape
234
234
  );
@@ -291,7 +291,7 @@
291
291
  * Version label, exposed for easier checks
292
292
  * if DOMPurify is up to date or not
293
293
  */
294
- DOMPurify.version = '2.5.6';
294
+ DOMPurify.version = '2.5.8';
295
295
 
296
296
  /**
297
297
  * Array of elements that DOMPurify removed during sanitation.
@@ -678,7 +678,7 @@
678
678
  CONFIG = cfg;
679
679
  };
680
680
  var MATHML_TEXT_INTEGRATION_POINTS = addToSet({}, ['mi', 'mo', 'mn', 'ms', 'mtext']);
681
- var HTML_INTEGRATION_POINTS = addToSet({}, ['foreignobject', 'annotation-xml']);
681
+ var HTML_INTEGRATION_POINTS = addToSet({}, ['annotation-xml']);
682
682
 
683
683
  // Certain elements are allowed in both SVG and HTML
684
684
  // namespace. We need to specify them explicitly
@@ -1126,7 +1126,7 @@
1126
1126
  var attributes = currentNode.attributes;
1127
1127
 
1128
1128
  /* Check if we have attributes; if not we might have a text node */
1129
- if (!attributes) {
1129
+ if (!attributes || _isClobbered(currentNode)) {
1130
1130
  return;
1131
1131
  }
1132
1132
  var hookEvent = {
@@ -1154,12 +1154,6 @@
1154
1154
  _executeHook('uponSanitizeAttribute', currentNode, hookEvent);
1155
1155
  value = hookEvent.attrValue;
1156
1156
 
1157
- /* Work around a security issue with comments inside attributes */
1158
- if (SAFE_FOR_XML && regExpTest(/((--!?|])>)|<\/(style|title)/i, value)) {
1159
- _removeAttribute(name, currentNode);
1160
- continue;
1161
- }
1162
-
1163
1157
  /* Did the hooks approve of the attribute? */
1164
1158
  if (hookEvent.forceKeepAttr) {
1165
1159
  continue;
@@ -1203,6 +1197,12 @@
1203
1197
  value = SANITIZE_NAMED_PROPS_PREFIX + value;
1204
1198
  }
1205
1199
 
1200
+ /* Work around a security issue with comments inside attributes */
1201
+ if (SAFE_FOR_XML && regExpTest(/((--!?|])>)|<\/(style|title)/i, value)) {
1202
+ _removeAttribute(name, currentNode);
1203
+ continue;
1204
+ }
1205
+
1206
1206
  /* Handle attributes that require Trusted Types */
1207
1207
  if (trustedTypesPolicy && _typeof(trustedTypes) === 'object' && typeof trustedTypes.getAttributeType === 'function') {
1208
1208
  if (namespaceURI) ; else {
@@ -1255,19 +1255,16 @@
1255
1255
  while (shadowNode = shadowIterator.nextNode()) {
1256
1256
  /* Execute a hook if present */
1257
1257
  _executeHook('uponSanitizeShadowNode', shadowNode, null);
1258
-
1259
1258
  /* Sanitize tags and elements */
1260
- if (_sanitizeElements(shadowNode)) {
1261
- continue;
1262
- }
1259
+ _sanitizeElements(shadowNode);
1260
+
1261
+ /* Check attributes next */
1262
+ _sanitizeAttributes(shadowNode);
1263
1263
 
1264
1264
  /* Deep shadow DOM detected */
1265
1265
  if (shadowNode.content instanceof DocumentFragment) {
1266
1266
  _sanitizeShadowDOM(shadowNode.content);
1267
1267
  }
1268
-
1269
- /* Check attributes, sanitize if necessary */
1270
- _sanitizeAttributes(shadowNode);
1271
1268
  }
1272
1269
 
1273
1270
  /* Execute a hook if present */
@@ -1389,17 +1386,15 @@
1389
1386
  }
1390
1387
 
1391
1388
  /* Sanitize tags and elements */
1392
- if (_sanitizeElements(currentNode)) {
1393
- continue;
1394
- }
1389
+ _sanitizeElements(currentNode);
1390
+
1391
+ /* Check attributes next */
1392
+ _sanitizeAttributes(currentNode);
1395
1393
 
1396
1394
  /* Shadow DOM detected, sanitize it */
1397
1395
  if (currentNode.content instanceof DocumentFragment) {
1398
1396
  _sanitizeShadowDOM(currentNode.content);
1399
1397
  }
1400
-
1401
- /* Check attributes, sanitize if necessary */
1402
- _sanitizeAttributes(currentNode);
1403
1398
  oldNode = currentNode;
1404
1399
  }
1405
1400
  oldNode = null;