@mapgis/webclient-vue-cesium 17.2.2 → 17.4.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist-libs/webclient-vue-cesium.common.1.js +245 -236
- package/dist-libs/webclient-vue-cesium.common.2.js +19 -24
- package/dist-libs/webclient-vue-cesium.common.js +11441 -9533
- package/dist-libs/webclient-vue-cesium.css +1 -1
- package/dist-libs/webclient-vue-cesium.umd.1.js +245 -236
- package/dist-libs/webclient-vue-cesium.umd.2.js +19 -24
- package/dist-libs/webclient-vue-cesium.umd.js +11441 -9533
- package/dist-libs/webclient-vue-cesium.umd.min.1.js +2 -2
- package/dist-libs/webclient-vue-cesium.umd.min.2.js +2 -2
- package/dist-libs/webclient-vue-cesium.umd.min.js +81 -81
- package/package.json +6 -6
|
@@ -3,7 +3,7 @@
|
|
|
3
3
|
/***/ "c0c4":
|
|
4
4
|
/***/ (function(module, exports, __webpack_require__) {
|
|
5
5
|
|
|
6
|
-
/*! @license DOMPurify 2.5.
|
|
6
|
+
/*! @license DOMPurify 2.5.8 | (c) Cure53 and other contributors | Released under the Apache license 2.0 and Mozilla Public License 2.0 | github.com/cure53/DOMPurify/blob/2.5.8/LICENSE */
|
|
7
7
|
|
|
8
8
|
(function (global, factory) {
|
|
9
9
|
true ? module.exports = factory() :
|
|
@@ -228,7 +228,7 @@
|
|
|
228
228
|
var MUSTACHE_EXPR = seal(/\{\{[\w\W]*|[\w\W]*\}\}/gm); // Specify template detection regex for SAFE_FOR_TEMPLATES mode
|
|
229
229
|
var ERB_EXPR = seal(/<%[\w\W]*|[\w\W]*%>/gm);
|
|
230
230
|
var TMPLIT_EXPR = seal(/\${[\w\W]*}/gm);
|
|
231
|
-
var DATA_ATTR = seal(/^data-[\-\w.\u00B7-\uFFFF]
|
|
231
|
+
var DATA_ATTR = seal(/^data-[\-\w.\u00B7-\uFFFF]+$/); // eslint-disable-line no-useless-escape
|
|
232
232
|
var ARIA_ATTR = seal(/^aria-[\-\w]+$/); // eslint-disable-line no-useless-escape
|
|
233
233
|
var IS_ALLOWED_URI = seal(/^(?:(?:(?:f|ht)tps?|mailto|tel|callto|cid|xmpp):|[^a-z]|[a-z+.\-]+(?:[^a-z+.\-:]|$))/i // eslint-disable-line no-useless-escape
|
|
234
234
|
);
|
|
@@ -291,7 +291,7 @@
|
|
|
291
291
|
* Version label, exposed for easier checks
|
|
292
292
|
* if DOMPurify is up to date or not
|
|
293
293
|
*/
|
|
294
|
-
DOMPurify.version = '2.5.
|
|
294
|
+
DOMPurify.version = '2.5.8';
|
|
295
295
|
|
|
296
296
|
/**
|
|
297
297
|
* Array of elements that DOMPurify removed during sanitation.
|
|
@@ -678,7 +678,7 @@
|
|
|
678
678
|
CONFIG = cfg;
|
|
679
679
|
};
|
|
680
680
|
var MATHML_TEXT_INTEGRATION_POINTS = addToSet({}, ['mi', 'mo', 'mn', 'ms', 'mtext']);
|
|
681
|
-
var HTML_INTEGRATION_POINTS = addToSet({}, ['
|
|
681
|
+
var HTML_INTEGRATION_POINTS = addToSet({}, ['annotation-xml']);
|
|
682
682
|
|
|
683
683
|
// Certain elements are allowed in both SVG and HTML
|
|
684
684
|
// namespace. We need to specify them explicitly
|
|
@@ -1126,7 +1126,7 @@
|
|
|
1126
1126
|
var attributes = currentNode.attributes;
|
|
1127
1127
|
|
|
1128
1128
|
/* Check if we have attributes; if not we might have a text node */
|
|
1129
|
-
if (!attributes) {
|
|
1129
|
+
if (!attributes || _isClobbered(currentNode)) {
|
|
1130
1130
|
return;
|
|
1131
1131
|
}
|
|
1132
1132
|
var hookEvent = {
|
|
@@ -1154,12 +1154,6 @@
|
|
|
1154
1154
|
_executeHook('uponSanitizeAttribute', currentNode, hookEvent);
|
|
1155
1155
|
value = hookEvent.attrValue;
|
|
1156
1156
|
|
|
1157
|
-
/* Work around a security issue with comments inside attributes */
|
|
1158
|
-
if (SAFE_FOR_XML && regExpTest(/((--!?|])>)|<\/(style|title)/i, value)) {
|
|
1159
|
-
_removeAttribute(name, currentNode);
|
|
1160
|
-
continue;
|
|
1161
|
-
}
|
|
1162
|
-
|
|
1163
1157
|
/* Did the hooks approve of the attribute? */
|
|
1164
1158
|
if (hookEvent.forceKeepAttr) {
|
|
1165
1159
|
continue;
|
|
@@ -1203,6 +1197,12 @@
|
|
|
1203
1197
|
value = SANITIZE_NAMED_PROPS_PREFIX + value;
|
|
1204
1198
|
}
|
|
1205
1199
|
|
|
1200
|
+
/* Work around a security issue with comments inside attributes */
|
|
1201
|
+
if (SAFE_FOR_XML && regExpTest(/((--!?|])>)|<\/(style|title)/i, value)) {
|
|
1202
|
+
_removeAttribute(name, currentNode);
|
|
1203
|
+
continue;
|
|
1204
|
+
}
|
|
1205
|
+
|
|
1206
1206
|
/* Handle attributes that require Trusted Types */
|
|
1207
1207
|
if (trustedTypesPolicy && _typeof(trustedTypes) === 'object' && typeof trustedTypes.getAttributeType === 'function') {
|
|
1208
1208
|
if (namespaceURI) ; else {
|
|
@@ -1255,19 +1255,16 @@
|
|
|
1255
1255
|
while (shadowNode = shadowIterator.nextNode()) {
|
|
1256
1256
|
/* Execute a hook if present */
|
|
1257
1257
|
_executeHook('uponSanitizeShadowNode', shadowNode, null);
|
|
1258
|
-
|
|
1259
1258
|
/* Sanitize tags and elements */
|
|
1260
|
-
|
|
1261
|
-
|
|
1262
|
-
|
|
1259
|
+
_sanitizeElements(shadowNode);
|
|
1260
|
+
|
|
1261
|
+
/* Check attributes next */
|
|
1262
|
+
_sanitizeAttributes(shadowNode);
|
|
1263
1263
|
|
|
1264
1264
|
/* Deep shadow DOM detected */
|
|
1265
1265
|
if (shadowNode.content instanceof DocumentFragment) {
|
|
1266
1266
|
_sanitizeShadowDOM(shadowNode.content);
|
|
1267
1267
|
}
|
|
1268
|
-
|
|
1269
|
-
/* Check attributes, sanitize if necessary */
|
|
1270
|
-
_sanitizeAttributes(shadowNode);
|
|
1271
1268
|
}
|
|
1272
1269
|
|
|
1273
1270
|
/* Execute a hook if present */
|
|
@@ -1389,17 +1386,15 @@
|
|
|
1389
1386
|
}
|
|
1390
1387
|
|
|
1391
1388
|
/* Sanitize tags and elements */
|
|
1392
|
-
|
|
1393
|
-
|
|
1394
|
-
|
|
1389
|
+
_sanitizeElements(currentNode);
|
|
1390
|
+
|
|
1391
|
+
/* Check attributes next */
|
|
1392
|
+
_sanitizeAttributes(currentNode);
|
|
1395
1393
|
|
|
1396
1394
|
/* Shadow DOM detected, sanitize it */
|
|
1397
1395
|
if (currentNode.content instanceof DocumentFragment) {
|
|
1398
1396
|
_sanitizeShadowDOM(currentNode.content);
|
|
1399
1397
|
}
|
|
1400
|
-
|
|
1401
|
-
/* Check attributes, sanitize if necessary */
|
|
1402
|
-
_sanitizeAttributes(currentNode);
|
|
1403
1398
|
oldNode = currentNode;
|
|
1404
1399
|
}
|
|
1405
1400
|
oldNode = null;
|