@angular/core 20.3.14 → 20.3.16
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/api.d.d.ts +1 -1
- package/chrome_dev_tools_performance.d.d.ts +1 -1
- package/discovery.d.d.ts +1 -1
- package/effect.d.d.ts +1 -1
- package/event_dispatcher.d.d.ts +1 -1
- package/fesm2022/attribute.mjs +1 -1
- package/fesm2022/core.mjs +2 -2
- package/fesm2022/debug_node.mjs +956 -922
- package/fesm2022/debug_node.mjs.map +1 -1
- package/fesm2022/effect.mjs +1 -1
- package/fesm2022/not_found.mjs +1 -1
- package/fesm2022/primitives/di.mjs +1 -1
- package/fesm2022/primitives/event-dispatch.mjs +1 -1
- package/fesm2022/primitives/signals.mjs +1 -1
- package/fesm2022/resource.mjs +1 -1
- package/fesm2022/root_effect_scheduler.mjs +2 -2
- package/fesm2022/root_effect_scheduler.mjs.map +1 -1
- package/fesm2022/rxjs-interop.mjs +1 -1
- package/fesm2022/signal.mjs +1 -1
- package/fesm2022/testing.mjs +1 -1
- package/fesm2022/weak_ref.mjs +1 -1
- package/formatter.d.d.ts +1 -1
- package/index.d.ts +11 -10
- package/package.json +2 -2
- package/primitives/di/index.d.ts +1 -1
- package/primitives/event-dispatch/index.d.ts +1 -1
- package/primitives/signals/index.d.ts +1 -1
- package/rxjs-interop/index.d.ts +1 -1
- package/schematics/bundles/add-bootstrap-context-to-server-main.cjs +5 -5
- package/schematics/bundles/{apply_import_manager-D4J7SXHI.cjs → apply_import_manager-C-hIllzM.cjs} +3 -3
- package/schematics/bundles/cleanup-unused-imports.cjs +5 -5
- package/schematics/bundles/{compiler_host-C306_97v.cjs → compiler_host-C7zi7NDP.cjs} +2 -2
- package/schematics/bundles/control-flow-migration.cjs +3 -3
- package/schematics/bundles/document-core.cjs +5 -5
- package/schematics/bundles/imports-CIX-JgAN.cjs +1 -1
- package/schematics/bundles/{index-u3tqvIQa.cjs → index-BdbAclL_.cjs} +4 -4
- package/schematics/bundles/{index-AeYmwRJL.cjs → index-CEqacA4Q.cjs} +12 -12
- package/schematics/bundles/inject-flags.cjs +5 -5
- package/schematics/bundles/inject-migration.cjs +3 -3
- package/schematics/bundles/leading_space-D9nQ8UQC.cjs +1 -1
- package/schematics/bundles/{migrate_ts_type_references-D0f8FXVW.cjs → migrate_ts_type_references-BJnim1Tm.cjs} +5 -5
- package/schematics/bundles/ng_decorators-B5HCqr20.cjs +1 -1
- package/schematics/bundles/nodes-B16H9JUd.cjs +1 -1
- package/schematics/bundles/output-migration.cjs +6 -6
- package/schematics/bundles/{project_paths-CMd3bdgw.cjs → project_paths-qw-vHpyb.cjs} +3 -3
- package/schematics/bundles/{project_tsconfig_paths-CopGppNj.cjs → project_tsconfig_paths-C5dXM8JP.cjs} +107 -69
- package/schematics/bundles/property_name-BBwFuqMe.cjs +1 -1
- package/schematics/bundles/route-lazy-loading.cjs +3 -3
- package/schematics/bundles/router-current-navigation.cjs +4 -4
- package/schematics/bundles/self-closing-tags-migration.cjs +4 -4
- package/schematics/bundles/signal-input-migration.cjs +7 -7
- package/schematics/bundles/signal-queries-migration.cjs +7 -7
- package/schematics/bundles/signals.cjs +7 -7
- package/schematics/bundles/standalone-migration.cjs +4 -4
- package/schematics/bundles/symbol-VPWguRxr.cjs +1 -1
- package/schematics/bundles/test-bed-get.cjs +4 -4
- package/testing/index.d.ts +1 -1
- package/weak_ref.d.d.ts +1 -1
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
'use strict';
|
|
2
2
|
/**
|
|
3
|
-
* @license Angular v20.3.
|
|
3
|
+
* @license Angular v20.3.16
|
|
4
4
|
* (c) 2010-2025 Google LLC. https://angular.io/
|
|
5
5
|
* License: MIT
|
|
6
6
|
*/
|
|
@@ -479,6 +479,7 @@ var SecurityContext;
|
|
|
479
479
|
SecurityContext[SecurityContext["SCRIPT"] = 3] = "SCRIPT";
|
|
480
480
|
SecurityContext[SecurityContext["URL"] = 4] = "URL";
|
|
481
481
|
SecurityContext[SecurityContext["RESOURCE_URL"] = 5] = "RESOURCE_URL";
|
|
482
|
+
SecurityContext[SecurityContext["ATTRIBUTE_NO_BINDING"] = 6] = "ATTRIBUTE_NO_BINDING";
|
|
482
483
|
})(SecurityContext || (SecurityContext = {}));
|
|
483
484
|
var MissingTranslationStrategy;
|
|
484
485
|
(function (MissingTranslationStrategy) {
|
|
@@ -2857,6 +2858,10 @@ class Identifiers {
|
|
|
2857
2858
|
// sanitization-related functions
|
|
2858
2859
|
static sanitizeHtml = { name: 'ɵɵsanitizeHtml', moduleName: CORE };
|
|
2859
2860
|
static sanitizeStyle = { name: 'ɵɵsanitizeStyle', moduleName: CORE };
|
|
2861
|
+
static validateAttribute = {
|
|
2862
|
+
name: 'ɵɵvalidateAttribute',
|
|
2863
|
+
moduleName: CORE,
|
|
2864
|
+
};
|
|
2860
2865
|
static sanitizeResourceUrl = {
|
|
2861
2866
|
name: 'ɵɵsanitizeResourceUrl',
|
|
2862
2867
|
moduleName: CORE,
|
|
@@ -2872,10 +2877,6 @@ class Identifiers {
|
|
|
2872
2877
|
name: 'ɵɵtrustConstantResourceUrl',
|
|
2873
2878
|
moduleName: CORE,
|
|
2874
2879
|
};
|
|
2875
|
-
static validateIframeAttribute = {
|
|
2876
|
-
name: 'ɵɵvalidateIframeAttribute',
|
|
2877
|
-
moduleName: CORE,
|
|
2878
|
-
};
|
|
2879
2880
|
// Decorators
|
|
2880
2881
|
static inputDecorator = { name: 'Input', moduleName: CORE };
|
|
2881
2882
|
static outputDecorator = { name: 'Output', moduleName: CORE };
|
|
@@ -20216,7 +20217,6 @@ function interleave(left, right) {
|
|
|
20216
20217
|
// =================================================================================================
|
|
20217
20218
|
//
|
|
20218
20219
|
// DO NOT EDIT THIS LIST OF SECURITY SENSITIVE PROPERTIES WITHOUT A SECURITY REVIEW!
|
|
20219
|
-
// Reach out to mprobst for details.
|
|
20220
20220
|
//
|
|
20221
20221
|
// =================================================================================================
|
|
20222
20222
|
/** Map from tagName|propertyName to SecurityContext. Properties applying to all tags use '*'. */
|
|
@@ -20234,6 +20234,7 @@ function SECURITY_SCHEMA() {
|
|
|
20234
20234
|
'area|ping',
|
|
20235
20235
|
'audio|src',
|
|
20236
20236
|
'a|href',
|
|
20237
|
+
'a|xlink:href',
|
|
20237
20238
|
'a|ping',
|
|
20238
20239
|
'blockquote|cite',
|
|
20239
20240
|
'body|background',
|
|
@@ -20247,6 +20248,74 @@ function SECURITY_SCHEMA() {
|
|
|
20247
20248
|
'track|src',
|
|
20248
20249
|
'video|poster',
|
|
20249
20250
|
'video|src',
|
|
20251
|
+
// MathML namespace
|
|
20252
|
+
// https://crsrc.org/c/third_party/blink/renderer/core/sanitizer/sanitizer.cc;l=753-768;drc=b3eb16372dcd3317d65e9e0265015e322494edcd;bpv=1;bpt=1
|
|
20253
|
+
'annotation|href',
|
|
20254
|
+
'annotation|xlink:href',
|
|
20255
|
+
'annotation-xml|href',
|
|
20256
|
+
'annotation-xml|xlink:href',
|
|
20257
|
+
'maction|href',
|
|
20258
|
+
'maction|xlink:href',
|
|
20259
|
+
'malignmark|href',
|
|
20260
|
+
'malignmark|xlink:href',
|
|
20261
|
+
'math|href',
|
|
20262
|
+
'math|xlink:href',
|
|
20263
|
+
'mroot|href',
|
|
20264
|
+
'mroot|xlink:href',
|
|
20265
|
+
'msqrt|href',
|
|
20266
|
+
'msqrt|xlink:href',
|
|
20267
|
+
'merror|href',
|
|
20268
|
+
'merror|xlink:href',
|
|
20269
|
+
'mfrac|href',
|
|
20270
|
+
'mfrac|xlink:href',
|
|
20271
|
+
'mglyph|href',
|
|
20272
|
+
'mglyph|xlink:href',
|
|
20273
|
+
'msub|href',
|
|
20274
|
+
'msub|xlink:href',
|
|
20275
|
+
'msup|href',
|
|
20276
|
+
'msup|xlink:href',
|
|
20277
|
+
'msubsup|href',
|
|
20278
|
+
'msubsup|xlink:href',
|
|
20279
|
+
'mmultiscripts|href',
|
|
20280
|
+
'mmultiscripts|xlink:href',
|
|
20281
|
+
'mprescripts|href',
|
|
20282
|
+
'mprescripts|xlink:href',
|
|
20283
|
+
'mi|href',
|
|
20284
|
+
'mi|xlink:href',
|
|
20285
|
+
'mn|href',
|
|
20286
|
+
'mn|xlink:href',
|
|
20287
|
+
'mo|href',
|
|
20288
|
+
'mo|xlink:href',
|
|
20289
|
+
'mpadded|href',
|
|
20290
|
+
'mpadded|xlink:href',
|
|
20291
|
+
'mphantom|href',
|
|
20292
|
+
'mphantom|xlink:href',
|
|
20293
|
+
'mrow|href',
|
|
20294
|
+
'mrow|xlink:href',
|
|
20295
|
+
'ms|href',
|
|
20296
|
+
'ms|xlink:href',
|
|
20297
|
+
'mspace|href',
|
|
20298
|
+
'mspace|xlink:href',
|
|
20299
|
+
'mstyle|href',
|
|
20300
|
+
'mstyle|xlink:href',
|
|
20301
|
+
'mtable|href',
|
|
20302
|
+
'mtable|xlink:href',
|
|
20303
|
+
'mtd|href',
|
|
20304
|
+
'mtd|xlink:href',
|
|
20305
|
+
'mtr|href',
|
|
20306
|
+
'mtr|xlink:href',
|
|
20307
|
+
'mtext|href',
|
|
20308
|
+
'mtext|xlink:href',
|
|
20309
|
+
'mover|href',
|
|
20310
|
+
'mover|xlink:href',
|
|
20311
|
+
'munder|href',
|
|
20312
|
+
'munder|xlink:href',
|
|
20313
|
+
'munderover|href',
|
|
20314
|
+
'munderover|xlink:href',
|
|
20315
|
+
'semantics|href',
|
|
20316
|
+
'semantics|xlink:href',
|
|
20317
|
+
'none|href',
|
|
20318
|
+
'none|xlink:href',
|
|
20250
20319
|
]);
|
|
20251
20320
|
registerContext(SecurityContext.RESOURCE_URL, [
|
|
20252
20321
|
'applet|code',
|
|
@@ -20262,6 +20331,33 @@ function SECURITY_SCHEMA() {
|
|
|
20262
20331
|
'object|codebase',
|
|
20263
20332
|
'object|data',
|
|
20264
20333
|
'script|src',
|
|
20334
|
+
// The below two are for Script SVG
|
|
20335
|
+
// See: https://developer.mozilla.org/en-US/docs/Web/API/SVGScriptElement/href
|
|
20336
|
+
'script|href',
|
|
20337
|
+
'script|xlink:href',
|
|
20338
|
+
]);
|
|
20339
|
+
// Keep this in sync with SECURITY_SENSITIVE_ELEMENTS in packages/core/src/sanitization/sanitization.ts
|
|
20340
|
+
// Unknown is the internal tag name for unknown elements example used for host-bindings.
|
|
20341
|
+
// These are unsafe as `attributeName` can be `href` or `xlink:href`
|
|
20342
|
+
// See: http://b/463880509#comment7
|
|
20343
|
+
registerContext(SecurityContext.ATTRIBUTE_NO_BINDING, [
|
|
20344
|
+
'animate|attributeName',
|
|
20345
|
+
'set|attributeName',
|
|
20346
|
+
'animateMotion|attributeName',
|
|
20347
|
+
'animateTransform|attributeName',
|
|
20348
|
+
'unknown|attributeName',
|
|
20349
|
+
'iframe|sandbox',
|
|
20350
|
+
'iframe|allow',
|
|
20351
|
+
'iframe|allowFullscreen',
|
|
20352
|
+
'iframe|referrerPolicy',
|
|
20353
|
+
'iframe|csp',
|
|
20354
|
+
'iframe|fetchPriority',
|
|
20355
|
+
'unknown|sandbox',
|
|
20356
|
+
'unknown|allow',
|
|
20357
|
+
'unknown|allowFullscreen',
|
|
20358
|
+
'unknown|referrerPolicy',
|
|
20359
|
+
'unknown|csp',
|
|
20360
|
+
'unknown|fetchPriority',
|
|
20265
20361
|
]);
|
|
20266
20362
|
}
|
|
20267
20363
|
return _SECURITY_SCHEMA;
|
|
@@ -20270,32 +20366,6 @@ function registerContext(ctx, specs) {
|
|
|
20270
20366
|
for (const spec of specs)
|
|
20271
20367
|
_SECURITY_SCHEMA[spec.toLowerCase()] = ctx;
|
|
20272
20368
|
}
|
|
20273
|
-
/**
|
|
20274
|
-
* The set of security-sensitive attributes of an `<iframe>` that *must* be
|
|
20275
|
-
* applied as a static attribute only. This ensures that all security-sensitive
|
|
20276
|
-
* attributes are taken into account while creating an instance of an `<iframe>`
|
|
20277
|
-
* at runtime.
|
|
20278
|
-
*
|
|
20279
|
-
* Note: avoid using this set directly, use the `isIframeSecuritySensitiveAttr` function
|
|
20280
|
-
* in the code instead.
|
|
20281
|
-
*/
|
|
20282
|
-
const IFRAME_SECURITY_SENSITIVE_ATTRS = new Set([
|
|
20283
|
-
'sandbox',
|
|
20284
|
-
'allow',
|
|
20285
|
-
'allowfullscreen',
|
|
20286
|
-
'referrerpolicy',
|
|
20287
|
-
'csp',
|
|
20288
|
-
'fetchpriority',
|
|
20289
|
-
]);
|
|
20290
|
-
/**
|
|
20291
|
-
* Checks whether a given attribute name might represent a security-sensitive
|
|
20292
|
-
* attribute of an <iframe>.
|
|
20293
|
-
*/
|
|
20294
|
-
function isIframeSecuritySensitiveAttr(attrName) {
|
|
20295
|
-
// The `setAttribute` DOM API is case-insensitive, so we lowercase the value
|
|
20296
|
-
// before checking it against a known security-sensitive attributes.
|
|
20297
|
-
return IFRAME_SECURITY_SENSITIVE_ATTRS.has(attrName.toLowerCase());
|
|
20298
|
-
}
|
|
20299
20369
|
|
|
20300
20370
|
class ElementSchemaRegistry {
|
|
20301
20371
|
}
|
|
@@ -25078,6 +25148,7 @@ const sanitizerFns = new Map([
|
|
|
25078
25148
|
[SecurityContext.SCRIPT, Identifiers.sanitizeScript],
|
|
25079
25149
|
[SecurityContext.STYLE, Identifiers.sanitizeStyle],
|
|
25080
25150
|
[SecurityContext.URL, Identifiers.sanitizeUrl],
|
|
25151
|
+
[SecurityContext.ATTRIBUTE_NO_BINDING, Identifiers.validateAttribute],
|
|
25081
25152
|
]);
|
|
25082
25153
|
/**
|
|
25083
25154
|
* Map of security contexts to their trusted value function.
|
|
@@ -25091,7 +25162,6 @@ const trustedValueFns = new Map([
|
|
|
25091
25162
|
*/
|
|
25092
25163
|
function resolveSanitizers(job) {
|
|
25093
25164
|
for (const unit of job.units) {
|
|
25094
|
-
const elements = createOpXrefMap(unit);
|
|
25095
25165
|
// For normal element bindings we create trusted values for security sensitive constant
|
|
25096
25166
|
// attributes. However, for host bindings we skip this step (this matches what
|
|
25097
25167
|
// TemplateDefinitionBuilder does).
|
|
@@ -25112,8 +25182,8 @@ function resolveSanitizers(job) {
|
|
|
25112
25182
|
let sanitizerFn = null;
|
|
25113
25183
|
if (Array.isArray(op.securityContext) &&
|
|
25114
25184
|
op.securityContext.length === 2 &&
|
|
25115
|
-
op.securityContext.
|
|
25116
|
-
op.securityContext.
|
|
25185
|
+
op.securityContext.includes(SecurityContext.URL) &&
|
|
25186
|
+
op.securityContext.includes(SecurityContext.RESOURCE_URL)) {
|
|
25117
25187
|
// When the host element isn't known, some URL attributes (such as "src" and "href") may
|
|
25118
25188
|
// be part of multiple different security contexts. In this case we use special
|
|
25119
25189
|
// sanitization function and select the actual sanitizer at runtime based on a tag name
|
|
@@ -25124,43 +25194,11 @@ function resolveSanitizers(job) {
|
|
|
25124
25194
|
sanitizerFn = sanitizerFns.get(getOnlySecurityContext(op.securityContext)) ?? null;
|
|
25125
25195
|
}
|
|
25126
25196
|
op.sanitizer = sanitizerFn !== null ? importExpr(sanitizerFn) : null;
|
|
25127
|
-
// If there was no sanitization function found based on the security context of an
|
|
25128
|
-
// attribute/property, check whether this attribute/property is one of the
|
|
25129
|
-
// security-sensitive <iframe> attributes (and that the current element is actually an
|
|
25130
|
-
// <iframe>).
|
|
25131
|
-
if (op.sanitizer === null) {
|
|
25132
|
-
let isIframe = false;
|
|
25133
|
-
if (job.kind === CompilationJobKind.Host || op.kind === OpKind.DomProperty) {
|
|
25134
|
-
// Note: for host bindings defined on a directive, we do not try to find all
|
|
25135
|
-
// possible places where it can be matched, so we can not determine whether
|
|
25136
|
-
// the host element is an <iframe>. In this case, we just assume it is and append a
|
|
25137
|
-
// validation function, which is invoked at runtime and would have access to the
|
|
25138
|
-
// underlying DOM element to check if it's an <iframe> and if so - run extra checks.
|
|
25139
|
-
isIframe = true;
|
|
25140
|
-
}
|
|
25141
|
-
else {
|
|
25142
|
-
// For a normal binding we can just check if the element its on is an iframe.
|
|
25143
|
-
const ownerOp = elements.get(op.target);
|
|
25144
|
-
if (ownerOp === undefined || !isElementOrContainerOp(ownerOp)) {
|
|
25145
|
-
throw Error('Property should have an element-like owner');
|
|
25146
|
-
}
|
|
25147
|
-
isIframe = isIframeElement(ownerOp);
|
|
25148
|
-
}
|
|
25149
|
-
if (isIframe && isIframeSecuritySensitiveAttr(op.name)) {
|
|
25150
|
-
op.sanitizer = importExpr(Identifiers.validateIframeAttribute);
|
|
25151
|
-
}
|
|
25152
|
-
}
|
|
25153
25197
|
break;
|
|
25154
25198
|
}
|
|
25155
25199
|
}
|
|
25156
25200
|
}
|
|
25157
25201
|
}
|
|
25158
|
-
/**
|
|
25159
|
-
* Checks whether the given op represents an iframe element.
|
|
25160
|
-
*/
|
|
25161
|
-
function isIframeElement(op) {
|
|
25162
|
-
return op.kind === OpKind.ElementStart && op.tag?.toLowerCase() === 'iframe';
|
|
25163
|
-
}
|
|
25164
25202
|
/**
|
|
25165
25203
|
* Asserts that there is only a single security context and returns it.
|
|
25166
25204
|
*/
|
|
@@ -32792,7 +32830,7 @@ function isAttrNode(ast) {
|
|
|
32792
32830
|
* @description
|
|
32793
32831
|
* Entry point for all public APIs of the compiler package.
|
|
32794
32832
|
*/
|
|
32795
|
-
const VERSION = new Version('20.3.
|
|
32833
|
+
const VERSION = new Version('20.3.16');
|
|
32796
32834
|
|
|
32797
32835
|
//////////////////////////////////////
|
|
32798
32836
|
// THIS FILE HAS GLOBAL SIDE EFFECT //
|
|
@@ -33854,7 +33892,7 @@ class NodeJSPathManipulation {
|
|
|
33854
33892
|
// G3-ESM-MARKER: G3 uses CommonJS, but externally everything in ESM.
|
|
33855
33893
|
// CommonJS/ESM interop for determining the current file name and containing dir.
|
|
33856
33894
|
const isCommonJS = typeof __filename !== 'undefined';
|
|
33857
|
-
const currentFileUrl = isCommonJS ? null : (typeof document === 'undefined' ? require('u' + 'rl').pathToFileURL(__filename).href : (_documentCurrentScript && _documentCurrentScript.tagName.toUpperCase() === 'SCRIPT' && _documentCurrentScript.src || new URL('project_tsconfig_paths-
|
|
33895
|
+
const currentFileUrl = isCommonJS ? null : (typeof document === 'undefined' ? require('u' + 'rl').pathToFileURL(__filename).href : (_documentCurrentScript && _documentCurrentScript.tagName.toUpperCase() === 'SCRIPT' && _documentCurrentScript.src || new URL('project_tsconfig_paths-C5dXM8JP.cjs', document.baseURI).href));
|
|
33858
33896
|
// Note, when this code loads in the browser, `url` may be an empty `{}` due to the Closure shims.
|
|
33859
33897
|
const currentFileName = isCommonJS
|
|
33860
33898
|
? __filename
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
'use strict';
|
|
2
2
|
/**
|
|
3
|
-
* @license Angular v20.3.
|
|
3
|
+
* @license Angular v20.3.16
|
|
4
4
|
* (c) 2010-2025 Google LLC. https://angular.io/
|
|
5
5
|
* License: MIT
|
|
6
6
|
*/
|
|
@@ -9,8 +9,8 @@
|
|
|
9
9
|
var schematics = require('@angular-devkit/schematics');
|
|
10
10
|
var fs = require('fs');
|
|
11
11
|
var p = require('path');
|
|
12
|
-
var compiler_host = require('./compiler_host-
|
|
13
|
-
var project_tsconfig_paths = require('./project_tsconfig_paths-
|
|
12
|
+
var compiler_host = require('./compiler_host-C7zi7NDP.cjs');
|
|
13
|
+
var project_tsconfig_paths = require('./project_tsconfig_paths-C5dXM8JP.cjs');
|
|
14
14
|
var ts = require('typescript');
|
|
15
15
|
var property_name = require('./property_name-BBwFuqMe.cjs');
|
|
16
16
|
require('os');
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
'use strict';
|
|
2
2
|
/**
|
|
3
|
-
* @license Angular v20.3.
|
|
3
|
+
* @license Angular v20.3.16
|
|
4
4
|
* (c) 2010-2025 Google LLC. https://angular.io/
|
|
5
5
|
* License: MIT
|
|
6
6
|
*/
|
|
@@ -8,11 +8,11 @@
|
|
|
8
8
|
|
|
9
9
|
var ts = require('typescript');
|
|
10
10
|
require('os');
|
|
11
|
-
require('./project_tsconfig_paths-
|
|
12
|
-
require('./index-
|
|
11
|
+
require('./project_tsconfig_paths-C5dXM8JP.cjs');
|
|
12
|
+
require('./index-CEqacA4Q.cjs');
|
|
13
13
|
require('path');
|
|
14
14
|
require('node:path');
|
|
15
|
-
var project_paths = require('./project_paths-
|
|
15
|
+
var project_paths = require('./project_paths-qw-vHpyb.cjs');
|
|
16
16
|
var imports = require('./imports-CIX-JgAN.cjs');
|
|
17
17
|
var symbol = require('./symbol-VPWguRxr.cjs');
|
|
18
18
|
require('@angular-devkit/core');
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
'use strict';
|
|
2
2
|
/**
|
|
3
|
-
* @license Angular v20.3.
|
|
3
|
+
* @license Angular v20.3.16
|
|
4
4
|
* (c) 2010-2025 Google LLC. https://angular.io/
|
|
5
5
|
* License: MIT
|
|
6
6
|
*/
|
|
@@ -8,11 +8,11 @@
|
|
|
8
8
|
|
|
9
9
|
var ts = require('typescript');
|
|
10
10
|
require('os');
|
|
11
|
-
var project_tsconfig_paths = require('./project_tsconfig_paths-
|
|
12
|
-
require('./index-
|
|
11
|
+
var project_tsconfig_paths = require('./project_tsconfig_paths-C5dXM8JP.cjs');
|
|
12
|
+
require('./index-CEqacA4Q.cjs');
|
|
13
13
|
require('path');
|
|
14
14
|
require('node:path');
|
|
15
|
-
var project_paths = require('./project_paths-
|
|
15
|
+
var project_paths = require('./project_paths-qw-vHpyb.cjs');
|
|
16
16
|
var ng_decorators = require('./ng_decorators-B5HCqr20.cjs');
|
|
17
17
|
var property_name = require('./property_name-BBwFuqMe.cjs');
|
|
18
18
|
require('@angular-devkit/core');
|
|
@@ -1,23 +1,23 @@
|
|
|
1
1
|
'use strict';
|
|
2
2
|
/**
|
|
3
|
-
* @license Angular v20.3.
|
|
3
|
+
* @license Angular v20.3.16
|
|
4
4
|
* (c) 2010-2025 Google LLC. https://angular.io/
|
|
5
5
|
* License: MIT
|
|
6
6
|
*/
|
|
7
7
|
'use strict';
|
|
8
8
|
|
|
9
|
-
var migrate_ts_type_references = require('./migrate_ts_type_references-
|
|
9
|
+
var migrate_ts_type_references = require('./migrate_ts_type_references-BJnim1Tm.cjs');
|
|
10
10
|
var ts = require('typescript');
|
|
11
11
|
require('os');
|
|
12
|
-
var project_tsconfig_paths = require('./project_tsconfig_paths-
|
|
13
|
-
var index$1 = require('./index-
|
|
12
|
+
var project_tsconfig_paths = require('./project_tsconfig_paths-C5dXM8JP.cjs');
|
|
13
|
+
var index$1 = require('./index-CEqacA4Q.cjs');
|
|
14
14
|
require('path');
|
|
15
15
|
require('node:path');
|
|
16
|
-
var project_paths = require('./project_paths-
|
|
17
|
-
var index = require('./index-
|
|
16
|
+
var project_paths = require('./project_paths-qw-vHpyb.cjs');
|
|
17
|
+
var index = require('./index-BdbAclL_.cjs');
|
|
18
18
|
var assert$1 = require('assert');
|
|
19
19
|
var assert = require('node:assert');
|
|
20
|
-
var apply_import_manager = require('./apply_import_manager-
|
|
20
|
+
var apply_import_manager = require('./apply_import_manager-C-hIllzM.cjs');
|
|
21
21
|
require('@angular-devkit/core');
|
|
22
22
|
require('node:path/posix');
|
|
23
23
|
require('./leading_space-D9nQ8UQC.cjs');
|
|
@@ -1,23 +1,23 @@
|
|
|
1
1
|
'use strict';
|
|
2
2
|
/**
|
|
3
|
-
* @license Angular v20.3.
|
|
3
|
+
* @license Angular v20.3.16
|
|
4
4
|
* (c) 2010-2025 Google LLC. https://angular.io/
|
|
5
5
|
* License: MIT
|
|
6
6
|
*/
|
|
7
7
|
'use strict';
|
|
8
8
|
|
|
9
|
-
var project_tsconfig_paths = require('./project_tsconfig_paths-
|
|
9
|
+
var project_tsconfig_paths = require('./project_tsconfig_paths-C5dXM8JP.cjs');
|
|
10
10
|
var ts = require('typescript');
|
|
11
11
|
require('os');
|
|
12
|
-
var index$1 = require('./index-
|
|
12
|
+
var index$1 = require('./index-CEqacA4Q.cjs');
|
|
13
13
|
require('path');
|
|
14
14
|
require('node:path');
|
|
15
|
-
var project_paths = require('./project_paths-
|
|
16
|
-
var apply_import_manager = require('./apply_import_manager-
|
|
17
|
-
var migrate_ts_type_references = require('./migrate_ts_type_references-
|
|
15
|
+
var project_paths = require('./project_paths-qw-vHpyb.cjs');
|
|
16
|
+
var apply_import_manager = require('./apply_import_manager-C-hIllzM.cjs');
|
|
17
|
+
var migrate_ts_type_references = require('./migrate_ts_type_references-BJnim1Tm.cjs');
|
|
18
18
|
var assert = require('assert');
|
|
19
19
|
require('node:assert');
|
|
20
|
-
var index = require('./index-
|
|
20
|
+
var index = require('./index-BdbAclL_.cjs');
|
|
21
21
|
require('@angular-devkit/core');
|
|
22
22
|
require('node:path/posix');
|
|
23
23
|
require('fs');
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
'use strict';
|
|
2
2
|
/**
|
|
3
|
-
* @license Angular v20.3.
|
|
3
|
+
* @license Angular v20.3.16
|
|
4
4
|
* (c) 2010-2025 Google LLC. https://angular.io/
|
|
5
5
|
* License: MIT
|
|
6
6
|
*/
|
|
@@ -10,7 +10,7 @@ var schematics = require('@angular-devkit/schematics');
|
|
|
10
10
|
var signalQueriesMigration = require('./signal-queries-migration.cjs');
|
|
11
11
|
var signalInputMigration = require('./signal-input-migration.cjs');
|
|
12
12
|
var outputMigration = require('./output-migration.cjs');
|
|
13
|
-
require('./project_tsconfig_paths-
|
|
13
|
+
require('./project_tsconfig_paths-C5dXM8JP.cjs');
|
|
14
14
|
require('typescript');
|
|
15
15
|
require('os');
|
|
16
16
|
require('fs');
|
|
@@ -18,14 +18,14 @@ require('module');
|
|
|
18
18
|
require('path');
|
|
19
19
|
require('url');
|
|
20
20
|
require('@angular-devkit/core');
|
|
21
|
-
require('./index-
|
|
21
|
+
require('./index-CEqacA4Q.cjs');
|
|
22
22
|
require('node:path');
|
|
23
|
-
require('./project_paths-
|
|
23
|
+
require('./project_paths-qw-vHpyb.cjs');
|
|
24
24
|
require('node:path/posix');
|
|
25
|
-
require('./apply_import_manager-
|
|
26
|
-
require('./migrate_ts_type_references-
|
|
25
|
+
require('./apply_import_manager-C-hIllzM.cjs');
|
|
26
|
+
require('./migrate_ts_type_references-BJnim1Tm.cjs');
|
|
27
27
|
require('assert');
|
|
28
|
-
require('./index-
|
|
28
|
+
require('./index-BdbAclL_.cjs');
|
|
29
29
|
require('./leading_space-D9nQ8UQC.cjs');
|
|
30
30
|
require('node:assert');
|
|
31
31
|
|
|
@@ -1,18 +1,18 @@
|
|
|
1
1
|
'use strict';
|
|
2
2
|
/**
|
|
3
|
-
* @license Angular v20.3.
|
|
3
|
+
* @license Angular v20.3.16
|
|
4
4
|
* (c) 2010-2025 Google LLC. https://angular.io/
|
|
5
5
|
* License: MIT
|
|
6
6
|
*/
|
|
7
7
|
'use strict';
|
|
8
8
|
|
|
9
9
|
var schematics = require('@angular-devkit/schematics');
|
|
10
|
-
var index = require('./index-
|
|
10
|
+
var index = require('./index-CEqacA4Q.cjs');
|
|
11
11
|
var fs = require('fs');
|
|
12
12
|
var p = require('path');
|
|
13
13
|
var ts = require('typescript');
|
|
14
|
-
var compiler_host = require('./compiler_host-
|
|
15
|
-
var project_tsconfig_paths = require('./project_tsconfig_paths-
|
|
14
|
+
var compiler_host = require('./compiler_host-C7zi7NDP.cjs');
|
|
15
|
+
var project_tsconfig_paths = require('./project_tsconfig_paths-C5dXM8JP.cjs');
|
|
16
16
|
var ng_decorators = require('./ng_decorators-B5HCqr20.cjs');
|
|
17
17
|
var nodes = require('./nodes-B16H9JUd.cjs');
|
|
18
18
|
var symbol = require('./symbol-VPWguRxr.cjs');
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
'use strict';
|
|
2
2
|
/**
|
|
3
|
-
* @license Angular v20.3.
|
|
3
|
+
* @license Angular v20.3.16
|
|
4
4
|
* (c) 2010-2025 Google LLC. https://angular.io/
|
|
5
5
|
* License: MIT
|
|
6
6
|
*/
|
|
@@ -8,11 +8,11 @@
|
|
|
8
8
|
|
|
9
9
|
var ts = require('typescript');
|
|
10
10
|
require('os');
|
|
11
|
-
require('./project_tsconfig_paths-
|
|
12
|
-
require('./index-
|
|
11
|
+
require('./project_tsconfig_paths-C5dXM8JP.cjs');
|
|
12
|
+
require('./index-CEqacA4Q.cjs');
|
|
13
13
|
require('path');
|
|
14
14
|
require('node:path');
|
|
15
|
-
var project_paths = require('./project_paths-
|
|
15
|
+
var project_paths = require('./project_paths-qw-vHpyb.cjs');
|
|
16
16
|
var imports = require('./imports-CIX-JgAN.cjs');
|
|
17
17
|
var symbol = require('./symbol-VPWguRxr.cjs');
|
|
18
18
|
require('@angular-devkit/core');
|
package/testing/index.d.ts
CHANGED
package/weak_ref.d.d.ts
CHANGED