@ -1,12 +1,12 @@
( self [ "webpackChunk" ] = self [ "webpackChunk" ] || [ ] ) . push ( [ [ 82709 ] , {
( self [ "webpackChunk" ] = self [ "webpackChunk" ] || [ ] ) . push ( [ [ 21622 ] , {
/***/ 82709 :
/***/ 21622 :
/ * ! * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * ! * \
! * * * . / node _modules / _dompurify @ 2.5 . 6 @ dompurify / dist / purify . js * * * !
! * * * . / node _modules / _dompurify @ 2.5 . 7 @ dompurify / dist / purify . js * * * !
\ * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * /
/***/ ( function ( module ) {
/*! @license DOMPurify 2.5. 6 | (c) Cure53 and other contributors | Released under the Apache license 2.0 and Mozilla Public License 2.0 | github.com/cure53/DOMPurify/blob/2.5.6 /LICENSE */
/*! @license DOMPurify 2.5. 7 | (c) Cure53 and other contributors | Released under the Apache license 2.0 and Mozilla Public License 2.0 | github.com/cure53/DOMPurify/blob/2.5.7 /LICENSE */
( function ( global , factory ) {
true ? module . exports = factory ( ) :
@ -294,7 +294,7 @@
* Version label , exposed for easier checks
* if DOMPurify is up to date or not
* /
DOMPurify . version = '2.5. 6 ';
DOMPurify . version = '2.5. 7 ';
/ * *
* Array of elements that DOMPurify removed during sanitation .
@ -681,7 +681,7 @@
CONFIG = cfg ;
} ;
var MATHML _TEXT _INTEGRATION _POINTS = addToSet ( { } , [ 'mi' , 'mo' , 'mn' , 'ms' , 'mtext' ] ) ;
var HTML _INTEGRATION _POINTS = addToSet ( { } , [ ' foreignobject', ' annotation-xml'] ) ;
var HTML _INTEGRATION _POINTS = addToSet ( { } , [ ' annotation-xml'] ) ;
// Certain elements are allowed in both SVG and HTML
// namespace. We need to specify them explicitly
@ -1157,12 +1157,6 @@
_executeHook ( 'uponSanitizeAttribute' , currentNode , hookEvent ) ;
value = hookEvent . attrValue ;
/* Work around a security issue with comments inside attributes */
if ( SAFE _FOR _XML && regExpTest ( /((--!?|])>)|<\/(style|title)/i , value ) ) {
_removeAttribute ( name , currentNode ) ;
continue ;
}
/* Did the hooks approve of the attribute? */
if ( hookEvent . forceKeepAttr ) {
continue ;
@ -1206,6 +1200,12 @@
value = SANITIZE _NAMED _PROPS _PREFIX + value ;
}
/* Work around a security issue with comments inside attributes */
if ( SAFE _FOR _XML && regExpTest ( /((--!?|])>)|<\/(style|title)/i , value ) ) {
_removeAttribute ( name , currentNode ) ;
continue ;
}
/* Handle attributes that require Trusted Types */
if ( trustedTypesPolicy && _typeof ( trustedTypes ) === 'object' && typeof trustedTypes . getAttributeType === 'function' ) {
if ( namespaceURI ) ; else {