Fix async lifecycle ordering, add _spa_init boot phase, update to jqhtml _load_only/_load_render_only flags
🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
This commit is contained in:
2
node_modules/dompurify/dist/purify.cjs.d.ts
generated
vendored
2
node_modules/dompurify/dist/purify.cjs.d.ts
generated
vendored
@@ -1,4 +1,4 @@
|
||||
/*! @license DOMPurify 3.3.1 | (c) Cure53 and other contributors | Released under the Apache license 2.0 and Mozilla Public License 2.0 | github.com/cure53/DOMPurify/blob/3.3.1/LICENSE */
|
||||
/*! @license DOMPurify 3.3.2 | (c) Cure53 and other contributors | Released under the Apache license 2.0 and Mozilla Public License 2.0 | github.com/cure53/DOMPurify/blob/3.3.2/LICENSE */
|
||||
|
||||
import { TrustedTypePolicy, TrustedHTML, TrustedTypesWindow } from 'trusted-types/lib/index.js';
|
||||
|
||||
|
||||
19
node_modules/dompurify/dist/purify.cjs.js
generated
vendored
19
node_modules/dompurify/dist/purify.cjs.js
generated
vendored
@@ -1,4 +1,4 @@
|
||||
/*! @license DOMPurify 3.3.1 | (c) Cure53 and other contributors | Released under the Apache license 2.0 and Mozilla Public License 2.0 | github.com/cure53/DOMPurify/blob/3.3.1/LICENSE */
|
||||
/*! @license DOMPurify 3.3.2 | (c) Cure53 and other contributors | Released under the Apache license 2.0 and Mozilla Public License 2.0 | github.com/cure53/DOMPurify/blob/3.3.2/LICENSE */
|
||||
|
||||
'use strict';
|
||||
|
||||
@@ -307,7 +307,7 @@ const _createHooksMap = function _createHooksMap() {
|
||||
function createDOMPurify() {
|
||||
let window = arguments.length > 0 && arguments[0] !== undefined ? arguments[0] : getGlobal();
|
||||
const DOMPurify = root => createDOMPurify(root);
|
||||
DOMPurify.version = '3.3.1';
|
||||
DOMPurify.version = '3.3.2';
|
||||
DOMPurify.removed = [];
|
||||
if (!window || !window.document || window.document.nodeType !== NODE_TYPE.document || !window.Element) {
|
||||
// Not running in a browser, provide a factory function
|
||||
@@ -602,7 +602,7 @@ function createDOMPurify() {
|
||||
/* Parse profile info */
|
||||
if (USE_PROFILES) {
|
||||
ALLOWED_TAGS = addToSet({}, text);
|
||||
ALLOWED_ATTR = [];
|
||||
ALLOWED_ATTR = create(null);
|
||||
if (USE_PROFILES.html === true) {
|
||||
addToSet(ALLOWED_TAGS, html$1);
|
||||
addToSet(ALLOWED_ATTR, html);
|
||||
@@ -623,6 +623,13 @@ function createDOMPurify() {
|
||||
addToSet(ALLOWED_ATTR, xml);
|
||||
}
|
||||
}
|
||||
/* Prevent function-based ADD_ATTR / ADD_TAGS from leaking across calls */
|
||||
if (!objectHasOwnProperty(cfg, 'ADD_TAGS')) {
|
||||
EXTRA_ELEMENT_HANDLING.tagCheck = null;
|
||||
}
|
||||
if (!objectHasOwnProperty(cfg, 'ADD_ATTR')) {
|
||||
EXTRA_ELEMENT_HANDLING.attributeCheck = null;
|
||||
}
|
||||
/* Merge configuration parameters */
|
||||
if (cfg.ADD_TAGS) {
|
||||
if (typeof cfg.ADD_TAGS === 'function') {
|
||||
@@ -1020,6 +1027,10 @@ function createDOMPurify() {
|
||||
*/
|
||||
// eslint-disable-next-line complexity
|
||||
const _isValidAttribute = function _isValidAttribute(lcTag, lcName, value) {
|
||||
/* FORBID_ATTR must always win, even if ADD_ATTR predicate would allow it */
|
||||
if (FORBID_ATTR[lcName]) {
|
||||
return false;
|
||||
}
|
||||
/* Make sure attribute cannot clobber */
|
||||
if (SANITIZE_DOM && (lcName === 'id' || lcName === 'name') && (value in document || value in formElement)) {
|
||||
return false;
|
||||
@@ -1112,7 +1123,7 @@ function createDOMPurify() {
|
||||
value = SANITIZE_NAMED_PROPS_PREFIX + value;
|
||||
}
|
||||
/* Work around a security issue with comments inside attributes */
|
||||
if (SAFE_FOR_XML && regExpTest(/((--!?|])>)|<\/(style|title|textarea)/i, value)) {
|
||||
if (SAFE_FOR_XML && regExpTest(/((--!?|])>)|<\/(style|script|title|xmp|textarea|noscript|iframe|noembed|noframes)/i, value)) {
|
||||
_removeAttribute(name, currentNode);
|
||||
continue;
|
||||
}
|
||||
|
||||
2
node_modules/dompurify/dist/purify.cjs.js.map
generated
vendored
2
node_modules/dompurify/dist/purify.cjs.js.map
generated
vendored
File diff suppressed because one or more lines are too long
2
node_modules/dompurify/dist/purify.es.d.mts
generated
vendored
2
node_modules/dompurify/dist/purify.es.d.mts
generated
vendored
@@ -1,4 +1,4 @@
|
||||
/*! @license DOMPurify 3.3.1 | (c) Cure53 and other contributors | Released under the Apache license 2.0 and Mozilla Public License 2.0 | github.com/cure53/DOMPurify/blob/3.3.1/LICENSE */
|
||||
/*! @license DOMPurify 3.3.2 | (c) Cure53 and other contributors | Released under the Apache license 2.0 and Mozilla Public License 2.0 | github.com/cure53/DOMPurify/blob/3.3.2/LICENSE */
|
||||
|
||||
import { TrustedTypePolicy, TrustedHTML, TrustedTypesWindow } from 'trusted-types/lib/index.js';
|
||||
|
||||
|
||||
19
node_modules/dompurify/dist/purify.es.mjs
generated
vendored
19
node_modules/dompurify/dist/purify.es.mjs
generated
vendored
@@ -1,4 +1,4 @@
|
||||
/*! @license DOMPurify 3.3.1 | (c) Cure53 and other contributors | Released under the Apache license 2.0 and Mozilla Public License 2.0 | github.com/cure53/DOMPurify/blob/3.3.1/LICENSE */
|
||||
/*! @license DOMPurify 3.3.2 | (c) Cure53 and other contributors | Released under the Apache license 2.0 and Mozilla Public License 2.0 | github.com/cure53/DOMPurify/blob/3.3.2/LICENSE */
|
||||
|
||||
const {
|
||||
entries,
|
||||
@@ -305,7 +305,7 @@ const _createHooksMap = function _createHooksMap() {
|
||||
function createDOMPurify() {
|
||||
let window = arguments.length > 0 && arguments[0] !== undefined ? arguments[0] : getGlobal();
|
||||
const DOMPurify = root => createDOMPurify(root);
|
||||
DOMPurify.version = '3.3.1';
|
||||
DOMPurify.version = '3.3.2';
|
||||
DOMPurify.removed = [];
|
||||
if (!window || !window.document || window.document.nodeType !== NODE_TYPE.document || !window.Element) {
|
||||
// Not running in a browser, provide a factory function
|
||||
@@ -600,7 +600,7 @@ function createDOMPurify() {
|
||||
/* Parse profile info */
|
||||
if (USE_PROFILES) {
|
||||
ALLOWED_TAGS = addToSet({}, text);
|
||||
ALLOWED_ATTR = [];
|
||||
ALLOWED_ATTR = create(null);
|
||||
if (USE_PROFILES.html === true) {
|
||||
addToSet(ALLOWED_TAGS, html$1);
|
||||
addToSet(ALLOWED_ATTR, html);
|
||||
@@ -621,6 +621,13 @@ function createDOMPurify() {
|
||||
addToSet(ALLOWED_ATTR, xml);
|
||||
}
|
||||
}
|
||||
/* Prevent function-based ADD_ATTR / ADD_TAGS from leaking across calls */
|
||||
if (!objectHasOwnProperty(cfg, 'ADD_TAGS')) {
|
||||
EXTRA_ELEMENT_HANDLING.tagCheck = null;
|
||||
}
|
||||
if (!objectHasOwnProperty(cfg, 'ADD_ATTR')) {
|
||||
EXTRA_ELEMENT_HANDLING.attributeCheck = null;
|
||||
}
|
||||
/* Merge configuration parameters */
|
||||
if (cfg.ADD_TAGS) {
|
||||
if (typeof cfg.ADD_TAGS === 'function') {
|
||||
@@ -1018,6 +1025,10 @@ function createDOMPurify() {
|
||||
*/
|
||||
// eslint-disable-next-line complexity
|
||||
const _isValidAttribute = function _isValidAttribute(lcTag, lcName, value) {
|
||||
/* FORBID_ATTR must always win, even if ADD_ATTR predicate would allow it */
|
||||
if (FORBID_ATTR[lcName]) {
|
||||
return false;
|
||||
}
|
||||
/* Make sure attribute cannot clobber */
|
||||
if (SANITIZE_DOM && (lcName === 'id' || lcName === 'name') && (value in document || value in formElement)) {
|
||||
return false;
|
||||
@@ -1110,7 +1121,7 @@ function createDOMPurify() {
|
||||
value = SANITIZE_NAMED_PROPS_PREFIX + value;
|
||||
}
|
||||
/* Work around a security issue with comments inside attributes */
|
||||
if (SAFE_FOR_XML && regExpTest(/((--!?|])>)|<\/(style|title|textarea)/i, value)) {
|
||||
if (SAFE_FOR_XML && regExpTest(/((--!?|])>)|<\/(style|script|title|xmp|textarea|noscript|iframe|noembed|noframes)/i, value)) {
|
||||
_removeAttribute(name, currentNode);
|
||||
continue;
|
||||
}
|
||||
|
||||
2
node_modules/dompurify/dist/purify.es.mjs.map
generated
vendored
2
node_modules/dompurify/dist/purify.es.mjs.map
generated
vendored
File diff suppressed because one or more lines are too long
19
node_modules/dompurify/dist/purify.js
generated
vendored
19
node_modules/dompurify/dist/purify.js
generated
vendored
@@ -1,4 +1,4 @@
|
||||
/*! @license DOMPurify 3.3.1 | (c) Cure53 and other contributors | Released under the Apache license 2.0 and Mozilla Public License 2.0 | github.com/cure53/DOMPurify/blob/3.3.1/LICENSE */
|
||||
/*! @license DOMPurify 3.3.2 | (c) Cure53 and other contributors | Released under the Apache license 2.0 and Mozilla Public License 2.0 | github.com/cure53/DOMPurify/blob/3.3.2/LICENSE */
|
||||
|
||||
(function (global, factory) {
|
||||
typeof exports === 'object' && typeof module !== 'undefined' ? module.exports = factory() :
|
||||
@@ -311,7 +311,7 @@
|
||||
function createDOMPurify() {
|
||||
let window = arguments.length > 0 && arguments[0] !== undefined ? arguments[0] : getGlobal();
|
||||
const DOMPurify = root => createDOMPurify(root);
|
||||
DOMPurify.version = '3.3.1';
|
||||
DOMPurify.version = '3.3.2';
|
||||
DOMPurify.removed = [];
|
||||
if (!window || !window.document || window.document.nodeType !== NODE_TYPE.document || !window.Element) {
|
||||
// Not running in a browser, provide a factory function
|
||||
@@ -606,7 +606,7 @@
|
||||
/* Parse profile info */
|
||||
if (USE_PROFILES) {
|
||||
ALLOWED_TAGS = addToSet({}, text);
|
||||
ALLOWED_ATTR = [];
|
||||
ALLOWED_ATTR = create(null);
|
||||
if (USE_PROFILES.html === true) {
|
||||
addToSet(ALLOWED_TAGS, html$1);
|
||||
addToSet(ALLOWED_ATTR, html);
|
||||
@@ -627,6 +627,13 @@
|
||||
addToSet(ALLOWED_ATTR, xml);
|
||||
}
|
||||
}
|
||||
/* Prevent function-based ADD_ATTR / ADD_TAGS from leaking across calls */
|
||||
if (!objectHasOwnProperty(cfg, 'ADD_TAGS')) {
|
||||
EXTRA_ELEMENT_HANDLING.tagCheck = null;
|
||||
}
|
||||
if (!objectHasOwnProperty(cfg, 'ADD_ATTR')) {
|
||||
EXTRA_ELEMENT_HANDLING.attributeCheck = null;
|
||||
}
|
||||
/* Merge configuration parameters */
|
||||
if (cfg.ADD_TAGS) {
|
||||
if (typeof cfg.ADD_TAGS === 'function') {
|
||||
@@ -1024,6 +1031,10 @@
|
||||
*/
|
||||
// eslint-disable-next-line complexity
|
||||
const _isValidAttribute = function _isValidAttribute(lcTag, lcName, value) {
|
||||
/* FORBID_ATTR must always win, even if ADD_ATTR predicate would allow it */
|
||||
if (FORBID_ATTR[lcName]) {
|
||||
return false;
|
||||
}
|
||||
/* Make sure attribute cannot clobber */
|
||||
if (SANITIZE_DOM && (lcName === 'id' || lcName === 'name') && (value in document || value in formElement)) {
|
||||
return false;
|
||||
@@ -1116,7 +1127,7 @@
|
||||
value = SANITIZE_NAMED_PROPS_PREFIX + value;
|
||||
}
|
||||
/* Work around a security issue with comments inside attributes */
|
||||
if (SAFE_FOR_XML && regExpTest(/((--!?|])>)|<\/(style|title|textarea)/i, value)) {
|
||||
if (SAFE_FOR_XML && regExpTest(/((--!?|])>)|<\/(style|script|title|xmp|textarea|noscript|iframe|noembed|noframes)/i, value)) {
|
||||
_removeAttribute(name, currentNode);
|
||||
continue;
|
||||
}
|
||||
|
||||
2
node_modules/dompurify/dist/purify.js.map
generated
vendored
2
node_modules/dompurify/dist/purify.js.map
generated
vendored
File diff suppressed because one or more lines are too long
4
node_modules/dompurify/dist/purify.min.js
generated
vendored
4
node_modules/dompurify/dist/purify.min.js
generated
vendored
File diff suppressed because one or more lines are too long
2
node_modules/dompurify/dist/purify.min.js.map
generated
vendored
2
node_modules/dompurify/dist/purify.min.js.map
generated
vendored
File diff suppressed because one or more lines are too long
Reference in New Issue
Block a user