post-merge
* npm run build * upstream fix for XSS vulnerability
This commit is contained in:
@@ -674,7 +674,8 @@ function populateInfo(i)
|
||||
//WLEDMM: add total heap and total PSRAM, and build number, add bin name
|
||||
if (i.ver.includes("0.14.1")) vcn = "Sitting Ducks"; // easter egg
|
||||
if (i.ver.includes("0.14.0")) vcn = "Lupo"; // check for MM versioning scheme
|
||||
if (i.ver.includes("0.14.0-b15.2")) vcn = "Sitting Ducks"; // late easter egg
|
||||
if (i.ver.includes("0.14.0-b15.1")) vcn = "Sitting Ducks"; // late easter egg
|
||||
if (i.ver.includes("0.14.0-b15.2")) vcn = "The Way"; // recently watched The Mandalorian?
|
||||
if (i.ver.includes("0.14.0-b15.22")) vcn = "Lupo";
|
||||
cn += `v${i.ver} <i>"${vcn}"</i><p>(WLEDMM_${i.ver} ${i.rel}.bin)</p><p><em>build ${i.vid}</em></p><table>
|
||||
${urows}
|
||||
|
||||
@@ -19,7 +19,7 @@
|
||||
|
||||
const button = gId("scan");
|
||||
button.disabled = true;
|
||||
button.innerHTML = "Scanning...";
|
||||
button.textContent = "Scanning...";
|
||||
|
||||
fetch(url).then((response) => {
|
||||
return response.json();
|
||||
@@ -70,7 +70,7 @@
|
||||
const option = cE("option");
|
||||
|
||||
option.setAttribute("value", networks[i].ssid);
|
||||
option.innerHTML = `${networks[i].ssid} (${networks[i].rssi} dBm)`;
|
||||
option.textContent = `${networks[i].ssid} (${networks[i].rssi} dBm)`;
|
||||
|
||||
if (networks[i].ssid === cs.value) {
|
||||
option.setAttribute("selected", "selected");
|
||||
@@ -81,14 +81,14 @@
|
||||
const option = cE("option");
|
||||
|
||||
option.setAttribute("value", "!Cs");
|
||||
option.innerHTML = `Other network...`;
|
||||
option.textContent = `Other network...`;
|
||||
select.appendChild(option);
|
||||
|
||||
cs.replaceWith(select);
|
||||
}
|
||||
|
||||
button.disabled = false;
|
||||
button.innerHTML = "Scan";
|
||||
button.textContent = "Scan";
|
||||
});
|
||||
}
|
||||
// replace WiFi select with custom SSID input field again
|
||||
|
||||
Reference in New Issue
Block a user