@wavemaker/angular-codegen 12.0.0-next.141131 → 12.0.0-next.141138
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- angular-codegen/angular-app/angular.json +13 -1
- angular-codegen/angular-app/build-scripts/update-version.js +24 -0
- angular-codegen/angular-app/package-lock.json +8431 -10702
- angular-codegen/angular-app/package.json +18 -14
- angular-codegen/angular-app/src/assets/styles/css/wm-style.css +1 -1
- angular-codegen/angular-app/src/framework/util/page-util.ts +1 -3
- angular-codegen/angular-app/src/setup-jest.js +1 -0
- angular-codegen/angular-app/tsconfig.json +0 -3
- angular-codegen/dependencies/expression-parser.cjs.js +1 -40
- angular-codegen/dependencies/pipe-provider.cjs.js +41 -303
- angular-codegen/dependencies/transpilation-mobile.cjs.js +418 -598
- angular-codegen/dependencies/transpilation-web.cjs.js +418 -598
- angular-codegen/package.json +1 -1
- angular-codegen/src/codegen.js +1 -1
- angular-codegen/src/gen-components.js +1 -1
- angular-codegen/src/gen-index-html.js +1 -1
- angular-codegen/src/handlebar-helpers.js +1 -1
- angular-codegen/src/pages-util.js +1 -1
- angular-codegen/src/update-angular-json.js +1 -1
- angular-codegen/templates/app.module.ts.hbs +1 -5
- angular-codegen/templates/page/page.module.ts.hbs +0 -11
- angular-codegen/angular-app/src/framework/services/customwidget-config-provider.service.ts +0 -13
- angular-codegen/dependencies/custom-widgets-bundle.cjs.js +0 -390
- angular-codegen/src/gen-customwidget-config.js +0 -1
- angular-codegen/templates/component.config.ts.hbs +0 -1
- angular-codegen/templates/customwidget/customwidget-config.ts.hbs +0 -6
- angular-codegen/templates/customwidget/customwidget.component.script.js.hbs +0 -3
- angular-codegen/templates/customwidget/customwidget.component.ts.hbs +0 -42
|
@@ -10454,46 +10454,6 @@ const PRESERVE_HOST_CONTENT$1 = new InjectionToken$1((typeof ngDevMode === 'unde
|
|
|
10454
10454
|
* is enabled.
|
|
10455
10455
|
*/
|
|
10456
10456
|
const IS_I18N_HYDRATION_ENABLED$1 = new InjectionToken$1((typeof ngDevMode === 'undefined' || !!ngDevMode ? 'IS_I18N_HYDRATION_ENABLED' : ''));
|
|
10457
|
-
|
|
10458
|
-
/**
|
|
10459
|
-
* @fileoverview
|
|
10460
|
-
* A module to facilitate use of a Trusted Types policy internally within
|
|
10461
|
-
* Angular. It lazily constructs the Trusted Types policy, providing helper
|
|
10462
|
-
* utilities for promoting strings to Trusted Types. When Trusted Types are not
|
|
10463
|
-
* available, strings are used as a fallback.
|
|
10464
|
-
* @security All use of this module is security-sensitive and should go through
|
|
10465
|
-
* security review.
|
|
10466
|
-
*/
|
|
10467
|
-
/**
|
|
10468
|
-
* The Trusted Types policy, or null if Trusted Types are not
|
|
10469
|
-
* enabled/supported, or undefined if the policy has not been created yet.
|
|
10470
|
-
*/
|
|
10471
|
-
let policy$1$1;
|
|
10472
|
-
/**
|
|
10473
|
-
* Returns the Trusted Types policy, or null if Trusted Types are not
|
|
10474
|
-
* enabled/supported. The first call to this function will create the policy.
|
|
10475
|
-
*/
|
|
10476
|
-
function getPolicy$1$1() {
|
|
10477
|
-
if (policy$1$1 === undefined) {
|
|
10478
|
-
policy$1$1 = null;
|
|
10479
|
-
if (_global$3.trustedTypes) {
|
|
10480
|
-
try {
|
|
10481
|
-
policy$1$1 = _global$3.trustedTypes.createPolicy('angular', {
|
|
10482
|
-
createHTML: (s) => s,
|
|
10483
|
-
createScript: (s) => s,
|
|
10484
|
-
createScriptURL: (s) => s,
|
|
10485
|
-
});
|
|
10486
|
-
}
|
|
10487
|
-
catch {
|
|
10488
|
-
// trustedTypes.createPolicy throws if called with a name that is
|
|
10489
|
-
// already registered, even in report-only mode. Until the API changes,
|
|
10490
|
-
// catch the error not to break the applications functionally. In such
|
|
10491
|
-
// cases, the code will fall back to using strings.
|
|
10492
|
-
}
|
|
10493
|
-
}
|
|
10494
|
-
}
|
|
10495
|
-
return policy$1$1;
|
|
10496
|
-
}
|
|
10497
10457
|
/**
|
|
10498
10458
|
* Unsafely promote a string to a TrustedHTML, falling back to strings when
|
|
10499
10459
|
* Trusted Types are not available.
|
|
@@ -10504,7 +10464,7 @@ function getPolicy$1$1() {
|
|
|
10504
10464
|
* element.innerHTML.
|
|
10505
10465
|
*/
|
|
10506
10466
|
function trustedHTMLFromString$1(html) {
|
|
10507
|
-
return
|
|
10467
|
+
return html;
|
|
10508
10468
|
}
|
|
10509
10469
|
/**
|
|
10510
10470
|
* Unsafely promote a string to a TrustedScriptURL, falling back to strings
|
|
@@ -10516,49 +10476,7 @@ function trustedHTMLFromString$1(html) {
|
|
|
10516
10476
|
* assigning to script.src.
|
|
10517
10477
|
*/
|
|
10518
10478
|
function trustedScriptURLFromString$1(url) {
|
|
10519
|
-
return
|
|
10520
|
-
}
|
|
10521
|
-
|
|
10522
|
-
/**
|
|
10523
|
-
* @fileoverview
|
|
10524
|
-
* A module to facilitate use of a Trusted Types policy internally within
|
|
10525
|
-
* Angular specifically for bypassSecurityTrust* and custom sanitizers. It
|
|
10526
|
-
* lazily constructs the Trusted Types policy, providing helper utilities for
|
|
10527
|
-
* promoting strings to Trusted Types. When Trusted Types are not available,
|
|
10528
|
-
* strings are used as a fallback.
|
|
10529
|
-
* @security All use of this module is security-sensitive and should go through
|
|
10530
|
-
* security review.
|
|
10531
|
-
*/
|
|
10532
|
-
/**
|
|
10533
|
-
* The Trusted Types policy, or null if Trusted Types are not
|
|
10534
|
-
* enabled/supported, or undefined if the policy has not been created yet.
|
|
10535
|
-
*/
|
|
10536
|
-
let policy$4;
|
|
10537
|
-
/**
|
|
10538
|
-
* Returns the Trusted Types policy, or null if Trusted Types are not
|
|
10539
|
-
* enabled/supported. The first call to this function will create the policy.
|
|
10540
|
-
*/
|
|
10541
|
-
function getPolicy$4() {
|
|
10542
|
-
if (policy$4 === undefined) {
|
|
10543
|
-
policy$4 = null;
|
|
10544
|
-
if (_global$3.trustedTypes) {
|
|
10545
|
-
try {
|
|
10546
|
-
policy$4 = _global$3.trustedTypes
|
|
10547
|
-
.createPolicy('angular#unsafe-bypass', {
|
|
10548
|
-
createHTML: (s) => s,
|
|
10549
|
-
createScript: (s) => s,
|
|
10550
|
-
createScriptURL: (s) => s,
|
|
10551
|
-
});
|
|
10552
|
-
}
|
|
10553
|
-
catch {
|
|
10554
|
-
// trustedTypes.createPolicy throws if called with a name that is
|
|
10555
|
-
// already registered, even in report-only mode. Until the API changes,
|
|
10556
|
-
// catch the error not to break the applications functionally. In such
|
|
10557
|
-
// cases, the code will fall back to using strings.
|
|
10558
|
-
}
|
|
10559
|
-
}
|
|
10560
|
-
}
|
|
10561
|
-
return policy$4;
|
|
10479
|
+
return url;
|
|
10562
10480
|
}
|
|
10563
10481
|
/**
|
|
10564
10482
|
* Unsafely promote a string to a TrustedHTML, falling back to strings when
|
|
@@ -10569,7 +10487,7 @@ function getPolicy$4() {
|
|
|
10569
10487
|
* bypassSecurityTrust* functions.
|
|
10570
10488
|
*/
|
|
10571
10489
|
function trustedHTMLFromStringBypass$1(html) {
|
|
10572
|
-
return
|
|
10490
|
+
return html;
|
|
10573
10491
|
}
|
|
10574
10492
|
/**
|
|
10575
10493
|
* Unsafely promote a string to a TrustedScript, falling back to strings when
|
|
@@ -10580,7 +10498,7 @@ function trustedHTMLFromStringBypass$1(html) {
|
|
|
10580
10498
|
* bypassSecurityTrust* functions.
|
|
10581
10499
|
*/
|
|
10582
10500
|
function trustedScriptFromStringBypass$1(script) {
|
|
10583
|
-
return
|
|
10501
|
+
return script;
|
|
10584
10502
|
}
|
|
10585
10503
|
/**
|
|
10586
10504
|
* Unsafely promote a string to a TrustedScriptURL, falling back to strings
|
|
@@ -10591,7 +10509,7 @@ function trustedScriptFromStringBypass$1(script) {
|
|
|
10591
10509
|
* bypassSecurityTrust* functions.
|
|
10592
10510
|
*/
|
|
10593
10511
|
function trustedScriptURLFromStringBypass$1(url) {
|
|
10594
|
-
return
|
|
10512
|
+
return url;
|
|
10595
10513
|
}
|
|
10596
10514
|
|
|
10597
10515
|
let SafeValueImpl$1 = class SafeValueImpl {
|
|
@@ -55134,46 +55052,6 @@ const PRESERVE_HOST_CONTENT = new InjectionToken((typeof ngDevMode === 'undefine
|
|
|
55134
55052
|
* is enabled.
|
|
55135
55053
|
*/
|
|
55136
55054
|
const IS_I18N_HYDRATION_ENABLED = new InjectionToken((typeof ngDevMode === 'undefined' || !!ngDevMode ? 'IS_I18N_HYDRATION_ENABLED' : ''));
|
|
55137
|
-
|
|
55138
|
-
/**
|
|
55139
|
-
* @fileoverview
|
|
55140
|
-
* A module to facilitate use of a Trusted Types policy internally within
|
|
55141
|
-
* Angular. It lazily constructs the Trusted Types policy, providing helper
|
|
55142
|
-
* utilities for promoting strings to Trusted Types. When Trusted Types are not
|
|
55143
|
-
* available, strings are used as a fallback.
|
|
55144
|
-
* @security All use of this module is security-sensitive and should go through
|
|
55145
|
-
* security review.
|
|
55146
|
-
*/
|
|
55147
|
-
/**
|
|
55148
|
-
* The Trusted Types policy, or null if Trusted Types are not
|
|
55149
|
-
* enabled/supported, or undefined if the policy has not been created yet.
|
|
55150
|
-
*/
|
|
55151
|
-
let policy$1;
|
|
55152
|
-
/**
|
|
55153
|
-
* Returns the Trusted Types policy, or null if Trusted Types are not
|
|
55154
|
-
* enabled/supported. The first call to this function will create the policy.
|
|
55155
|
-
*/
|
|
55156
|
-
function getPolicy$1() {
|
|
55157
|
-
if (policy$1 === undefined) {
|
|
55158
|
-
policy$1 = null;
|
|
55159
|
-
if (_global$1.trustedTypes) {
|
|
55160
|
-
try {
|
|
55161
|
-
policy$1 = _global$1.trustedTypes.createPolicy('angular', {
|
|
55162
|
-
createHTML: (s) => s,
|
|
55163
|
-
createScript: (s) => s,
|
|
55164
|
-
createScriptURL: (s) => s,
|
|
55165
|
-
});
|
|
55166
|
-
}
|
|
55167
|
-
catch {
|
|
55168
|
-
// trustedTypes.createPolicy throws if called with a name that is
|
|
55169
|
-
// already registered, even in report-only mode. Until the API changes,
|
|
55170
|
-
// catch the error not to break the applications functionally. In such
|
|
55171
|
-
// cases, the code will fall back to using strings.
|
|
55172
|
-
}
|
|
55173
|
-
}
|
|
55174
|
-
}
|
|
55175
|
-
return policy$1;
|
|
55176
|
-
}
|
|
55177
55055
|
/**
|
|
55178
55056
|
* Unsafely promote a string to a TrustedHTML, falling back to strings when
|
|
55179
55057
|
* Trusted Types are not available.
|
|
@@ -55184,7 +55062,7 @@ function getPolicy$1() {
|
|
|
55184
55062
|
* element.innerHTML.
|
|
55185
55063
|
*/
|
|
55186
55064
|
function trustedHTMLFromString(html) {
|
|
55187
|
-
return
|
|
55065
|
+
return html;
|
|
55188
55066
|
}
|
|
55189
55067
|
/**
|
|
55190
55068
|
* Unsafely promote a string to a TrustedScriptURL, falling back to strings
|
|
@@ -55196,49 +55074,7 @@ function trustedHTMLFromString(html) {
|
|
|
55196
55074
|
* assigning to script.src.
|
|
55197
55075
|
*/
|
|
55198
55076
|
function trustedScriptURLFromString(url) {
|
|
55199
|
-
return
|
|
55200
|
-
}
|
|
55201
|
-
|
|
55202
|
-
/**
|
|
55203
|
-
* @fileoverview
|
|
55204
|
-
* A module to facilitate use of a Trusted Types policy internally within
|
|
55205
|
-
* Angular specifically for bypassSecurityTrust* and custom sanitizers. It
|
|
55206
|
-
* lazily constructs the Trusted Types policy, providing helper utilities for
|
|
55207
|
-
* promoting strings to Trusted Types. When Trusted Types are not available,
|
|
55208
|
-
* strings are used as a fallback.
|
|
55209
|
-
* @security All use of this module is security-sensitive and should go through
|
|
55210
|
-
* security review.
|
|
55211
|
-
*/
|
|
55212
|
-
/**
|
|
55213
|
-
* The Trusted Types policy, or null if Trusted Types are not
|
|
55214
|
-
* enabled/supported, or undefined if the policy has not been created yet.
|
|
55215
|
-
*/
|
|
55216
|
-
let policy$2;
|
|
55217
|
-
/**
|
|
55218
|
-
* Returns the Trusted Types policy, or null if Trusted Types are not
|
|
55219
|
-
* enabled/supported. The first call to this function will create the policy.
|
|
55220
|
-
*/
|
|
55221
|
-
function getPolicy$2() {
|
|
55222
|
-
if (policy$2 === undefined) {
|
|
55223
|
-
policy$2 = null;
|
|
55224
|
-
if (_global$1.trustedTypes) {
|
|
55225
|
-
try {
|
|
55226
|
-
policy$2 = _global$1.trustedTypes
|
|
55227
|
-
.createPolicy('angular#unsafe-bypass', {
|
|
55228
|
-
createHTML: (s) => s,
|
|
55229
|
-
createScript: (s) => s,
|
|
55230
|
-
createScriptURL: (s) => s,
|
|
55231
|
-
});
|
|
55232
|
-
}
|
|
55233
|
-
catch {
|
|
55234
|
-
// trustedTypes.createPolicy throws if called with a name that is
|
|
55235
|
-
// already registered, even in report-only mode. Until the API changes,
|
|
55236
|
-
// catch the error not to break the applications functionally. In such
|
|
55237
|
-
// cases, the code will fall back to using strings.
|
|
55238
|
-
}
|
|
55239
|
-
}
|
|
55240
|
-
}
|
|
55241
|
-
return policy$2;
|
|
55077
|
+
return url;
|
|
55242
55078
|
}
|
|
55243
55079
|
/**
|
|
55244
55080
|
* Unsafely promote a string to a TrustedHTML, falling back to strings when
|
|
@@ -55249,7 +55085,7 @@ function getPolicy$2() {
|
|
|
55249
55085
|
* bypassSecurityTrust* functions.
|
|
55250
55086
|
*/
|
|
55251
55087
|
function trustedHTMLFromStringBypass(html) {
|
|
55252
|
-
return
|
|
55088
|
+
return html;
|
|
55253
55089
|
}
|
|
55254
55090
|
/**
|
|
55255
55091
|
* Unsafely promote a string to a TrustedScript, falling back to strings when
|
|
@@ -55260,7 +55096,7 @@ function trustedHTMLFromStringBypass(html) {
|
|
|
55260
55096
|
* bypassSecurityTrust* functions.
|
|
55261
55097
|
*/
|
|
55262
55098
|
function trustedScriptFromStringBypass(script) {
|
|
55263
|
-
return
|
|
55099
|
+
return script;
|
|
55264
55100
|
}
|
|
55265
55101
|
/**
|
|
55266
55102
|
* Unsafely promote a string to a TrustedScriptURL, falling back to strings
|
|
@@ -55271,7 +55107,7 @@ function trustedScriptFromStringBypass(script) {
|
|
|
55271
55107
|
* bypassSecurityTrust* functions.
|
|
55272
55108
|
*/
|
|
55273
55109
|
function trustedScriptURLFromStringBypass(url) {
|
|
55274
|
-
return
|
|
55110
|
+
return url;
|
|
55275
55111
|
}
|
|
55276
55112
|
|
|
55277
55113
|
class SafeValueImpl {
|
|
@@ -94344,45 +94180,6 @@ let AbstractJsEmitterVisitor$1 = class AbstractJsEmitterVisitor extends Abstract
|
|
|
94344
94180
|
this.visitAllObjects(param => ctx.print(null, param.name), params, ctx, ',');
|
|
94345
94181
|
}
|
|
94346
94182
|
};
|
|
94347
|
-
|
|
94348
|
-
/**
|
|
94349
|
-
* @fileoverview
|
|
94350
|
-
* A module to facilitate use of a Trusted Types policy within the JIT
|
|
94351
|
-
* compiler. It lazily constructs the Trusted Types policy, providing helper
|
|
94352
|
-
* utilities for promoting strings to Trusted Types. When Trusted Types are not
|
|
94353
|
-
* available, strings are used as a fallback.
|
|
94354
|
-
* @security All use of this module is security-sensitive and should go through
|
|
94355
|
-
* security review.
|
|
94356
|
-
*/
|
|
94357
|
-
/**
|
|
94358
|
-
* The Trusted Types policy, or null if Trusted Types are not
|
|
94359
|
-
* enabled/supported, or undefined if the policy has not been created yet.
|
|
94360
|
-
*/
|
|
94361
|
-
let policy$3;
|
|
94362
|
-
/**
|
|
94363
|
-
* Returns the Trusted Types policy, or null if Trusted Types are not
|
|
94364
|
-
* enabled/supported. The first call to this function will create the policy.
|
|
94365
|
-
*/
|
|
94366
|
-
function getPolicy$3() {
|
|
94367
|
-
if (policy$3 === undefined) {
|
|
94368
|
-
const trustedTypes = _global$2['trustedTypes'];
|
|
94369
|
-
policy$3 = null;
|
|
94370
|
-
if (trustedTypes) {
|
|
94371
|
-
try {
|
|
94372
|
-
policy$3 = trustedTypes.createPolicy('angular#unsafe-jit', {
|
|
94373
|
-
createScript: (s) => s,
|
|
94374
|
-
});
|
|
94375
|
-
}
|
|
94376
|
-
catch {
|
|
94377
|
-
// trustedTypes.createPolicy throws if called with a name that is
|
|
94378
|
-
// already registered, even in report-only mode. Until the API changes,
|
|
94379
|
-
// catch the error not to break the applications functionally. In such
|
|
94380
|
-
// cases, the code will fall back to using strings.
|
|
94381
|
-
}
|
|
94382
|
-
}
|
|
94383
|
-
}
|
|
94384
|
-
return policy$3;
|
|
94385
|
-
}
|
|
94386
94183
|
/**
|
|
94387
94184
|
* Unsafely promote a string to a TrustedScript, falling back to strings when
|
|
94388
94185
|
* Trusted Types are not available.
|
|
@@ -94391,7 +94188,7 @@ function getPolicy$3() {
|
|
|
94391
94188
|
* interpreted and executed as a script by a browser, e.g. when calling eval.
|
|
94392
94189
|
*/
|
|
94393
94190
|
function trustedScriptFromString$1(script) {
|
|
94394
|
-
return
|
|
94191
|
+
return script;
|
|
94395
94192
|
}
|
|
94396
94193
|
/**
|
|
94397
94194
|
* Unsafely call the Function constructor with the given string arguments.
|
|
@@ -126424,15 +126221,15 @@ var dataViewCtorString$1 = toSource$1(DataView$1$1),
|
|
|
126424
126221
|
* @param {*} value The value to query.
|
|
126425
126222
|
* @returns {string} Returns the `toStringTag`.
|
|
126426
126223
|
*/
|
|
126427
|
-
var getTag$
|
|
126224
|
+
var getTag$2 = baseGetTag$1;
|
|
126428
126225
|
|
|
126429
126226
|
// Fallback for data views, maps, sets, and weak maps in IE 11 and promises in Node.js < 6.
|
|
126430
|
-
if ((DataView$1$1 && getTag$
|
|
126431
|
-
(Map$1$1 && getTag$
|
|
126432
|
-
(Promise$1$1 && getTag$
|
|
126433
|
-
(Set$1$1 && getTag$
|
|
126434
|
-
(WeakMap$1$1 && getTag$
|
|
126435
|
-
getTag$
|
|
126227
|
+
if ((DataView$1$1 && getTag$2(new DataView$1$1(new ArrayBuffer(1))) != dataViewTag$3$1) ||
|
|
126228
|
+
(Map$1$1 && getTag$2(new Map$1$1) != mapTag$8$1) ||
|
|
126229
|
+
(Promise$1$1 && getTag$2(Promise$1$1.resolve()) != promiseTag$1) ||
|
|
126230
|
+
(Set$1$1 && getTag$2(new Set$1$1) != setTag$8$1) ||
|
|
126231
|
+
(WeakMap$1$1 && getTag$2(new WeakMap$1$1) != weakMapTag$2$1)) {
|
|
126232
|
+
getTag$2 = function(value) {
|
|
126436
126233
|
var result = baseGetTag$1(value),
|
|
126437
126234
|
Ctor = result == objectTag$2$1 ? value.constructor : undefined,
|
|
126438
126235
|
ctorString = Ctor ? toSource$1(Ctor) : '';
|
|
@@ -126450,7 +126247,7 @@ if ((DataView$1$1 && getTag$1(new DataView$1$1(new ArrayBuffer(1))) != dataViewT
|
|
|
126450
126247
|
};
|
|
126451
126248
|
}
|
|
126452
126249
|
|
|
126453
|
-
var getTag$1$1 = getTag$
|
|
126250
|
+
var getTag$1$1 = getTag$2;
|
|
126454
126251
|
|
|
126455
126252
|
/** Used for built-in method references. */
|
|
126456
126253
|
var objectProto$c$1 = Object.prototype;
|
|
@@ -142032,7 +141829,6 @@ var FormWidgetType$1;
|
|
|
142032
141829
|
FormWidgetType["TIMESTAMP"] = "timestamp";
|
|
142033
141830
|
FormWidgetType["TYPEAHEAD"] = "typeahead";
|
|
142034
141831
|
FormWidgetType["UPLOAD"] = "upload";
|
|
142035
|
-
FormWidgetType["CUSTOM"] = "custom";
|
|
142036
141832
|
})(FormWidgetType$1 || (FormWidgetType$1 = {}));
|
|
142037
141833
|
var DataType$1;
|
|
142038
141834
|
(function (DataType) {
|
|
@@ -143756,7 +143552,6 @@ var ComponentType$1;
|
|
|
143756
143552
|
ComponentType[ComponentType["PAGE"] = 0] = "PAGE";
|
|
143757
143553
|
ComponentType[ComponentType["PREFAB"] = 1] = "PREFAB";
|
|
143758
143554
|
ComponentType[ComponentType["PARTIAL"] = 2] = "PARTIAL";
|
|
143759
|
-
ComponentType[ComponentType["WIDGET"] = 3] = "WIDGET";
|
|
143760
143555
|
})(ComponentType$1 || (ComponentType$1 = {}));
|
|
143761
143556
|
var Operation$1;
|
|
143762
143557
|
(function (Operation) {
|
|
@@ -143816,7 +143611,6 @@ const REGEX$1 = {
|
|
|
143816
143611
|
IPOD: /iPod/i,
|
|
143817
143612
|
IPAD: /iPad/i,
|
|
143818
143613
|
MAC: /Mac/i,
|
|
143819
|
-
MACINTEL: /MacIntel/i,
|
|
143820
143614
|
ANDROID_TABLET: /android|android 3.0|xoom|sch-i800|playbook|tablet|kindle/i,
|
|
143821
143615
|
MOBILE: /Mobile/i,
|
|
143822
143616
|
WINDOWS: /Windows Phone/i,
|
|
@@ -143846,14 +143640,6 @@ const REGEX$1 = {
|
|
|
143846
143640
|
const NUMBER_TYPES$1 = ['int', DataType$1.INTEGER, DataType$1.FLOAT, DataType$1.DOUBLE, DataType$1.LONG, DataType$1.SHORT, DataType$1.BYTE, DataType$1.BIG_INTEGER, DataType$1.BIG_DECIMAL];
|
|
143847
143641
|
const now$2 = new Date();
|
|
143848
143642
|
const CURRENT_DATE$1 = 'CURRENT_DATE';
|
|
143849
|
-
const getNavClass$1 = (suffix) => {
|
|
143850
|
-
const APP_NAV_CLASS_PREFIX = 'app-nav-';
|
|
143851
|
-
return APP_NAV_CLASS_PREFIX + suffix;
|
|
143852
|
-
};
|
|
143853
|
-
const getSheetPositionClass$1 = (suffix) => {
|
|
143854
|
-
const SHEET_POSITION_CLASS_PREFIX = 'sheet-position-';
|
|
143855
|
-
return SHEET_POSITION_CLASS_PREFIX + suffix;
|
|
143856
|
-
};
|
|
143857
143643
|
const isDefined$1 = v => 'undefined' !== typeof v;
|
|
143858
143644
|
const isObject$3 = v => null !== v && 'object' === typeof v;
|
|
143859
143645
|
const toBoolean$1 = (val, identity) => ((val && val !== 'false') ? true : (identity ? val === identity : false));
|
|
@@ -143868,9 +143654,10 @@ const isAndroidTablet$1 = () => REGEX$1.ANDROID_TABLET.test(userAgent$1) && !((/
|
|
|
143868
143654
|
const isIphone$1 = () => REGEX$1.IPHONE.test(userAgent$1);
|
|
143869
143655
|
const isIpod$1 = () => REGEX$1.IPOD.test(userAgent$1);
|
|
143870
143656
|
const isIpad$1 = () => {
|
|
143871
|
-
return REGEX$1.IPAD.test(userAgent$1) || (window.navigator.maxTouchPoints && window.navigator.maxTouchPoints > 2 &&
|
|
143657
|
+
return REGEX$1.IPAD.test(userAgent$1) || (window.navigator.maxTouchPoints && window.navigator.maxTouchPoints > 2 && REGEX$1.MAC.test(window.navigator.platform));
|
|
143872
143658
|
};
|
|
143873
143659
|
const isIos$1 = () => isIphone$1() || isIpod$1() || isIpad$1();
|
|
143660
|
+
const isSafari$1 = () => navigator.userAgent.indexOf('Safari') !== -1 && navigator.userAgent.indexOf('Chrome') === -1;
|
|
143874
143661
|
const isLargeTabletLandscape$1 = (landScapeWidth, landScapeHeight) => {
|
|
143875
143662
|
const width = landScapeWidth || '1366px';
|
|
143876
143663
|
const height = landScapeHeight || '1024px';
|
|
@@ -144092,7 +143879,7 @@ const getFormattedDate$1 = (datePipe, dateObj, format, timeZone, isTimeStampType
|
|
|
144092
143879
|
if (format === 'UTC') {
|
|
144093
143880
|
return new Date(dateObj).toISOString();
|
|
144094
143881
|
}
|
|
144095
|
-
if (timeZone) {
|
|
143882
|
+
if (timeZone && timeZone !== moment.defaultZone?.name) {
|
|
144096
143883
|
const momentFormat = format.replaceAll('y', 'Y').replaceAll('d', 'D').replace('a', 'A');
|
|
144097
143884
|
if (isIntervalDateTime) { // dates which are of type time widget (value is hh:mm:ss) but returned as date string from time comp
|
|
144098
143885
|
return moment(dateObj).format(momentFormat);
|
|
@@ -145301,11 +145088,9 @@ var Utils$1 = /*#__PURE__*/Object.freeze({
|
|
|
145301
145088
|
getFormattedDate: getFormattedDate$1,
|
|
145302
145089
|
getMomentLocaleObject: getMomentLocaleObject$1,
|
|
145303
145090
|
getNativeDateObject: getNativeDateObject$1,
|
|
145304
|
-
getNavClass: getNavClass$1,
|
|
145305
145091
|
getResourceURL: getResourceURL$1,
|
|
145306
145092
|
getRouteNameFromLink: getRouteNameFromLink$1,
|
|
145307
145093
|
getSessionStorageItem: getSessionStorageItem$1,
|
|
145308
|
-
getSheetPositionClass: getSheetPositionClass$1,
|
|
145309
145094
|
getUrlParams: getUrlParams$1,
|
|
145310
145095
|
getValidDateObject: getValidDateObject$1,
|
|
145311
145096
|
getValidJSON: getValidJSON$1,
|
|
@@ -145338,6 +145123,7 @@ var Utils$1 = /*#__PURE__*/Object.freeze({
|
|
|
145338
145123
|
isNumberType: isNumberType$1,
|
|
145339
145124
|
isObject: isObject$3,
|
|
145340
145125
|
isPageable: isPageable$1,
|
|
145126
|
+
isSafari: isSafari$1,
|
|
145341
145127
|
isTablet: isTablet$1,
|
|
145342
145128
|
isValidWebURL: isValidWebURL$1,
|
|
145343
145129
|
isVideoFile: isVideoFile$1,
|
|
@@ -146875,7 +146661,7 @@ class FileIconClassPipe {
|
|
|
146875
146661
|
class StateClassPipe {
|
|
146876
146662
|
transform(state) {
|
|
146877
146663
|
const stateClassMap = {
|
|
146878
|
-
'success': 'wi wi-
|
|
146664
|
+
'success': 'wi wi-check-circle text-success',
|
|
146879
146665
|
'error': 'wi wi-error text-danger'
|
|
146880
146666
|
};
|
|
146881
146667
|
return stateClassMap[state.toLowerCase()];
|
|
@@ -153688,45 +153474,6 @@ class AbstractJsEmitterVisitor extends AbstractEmitterVisitor {
|
|
|
153688
153474
|
this.visitAllObjects(param => ctx.print(null, param.name), params, ctx, ',');
|
|
153689
153475
|
}
|
|
153690
153476
|
}
|
|
153691
|
-
|
|
153692
|
-
/**
|
|
153693
|
-
* @fileoverview
|
|
153694
|
-
* A module to facilitate use of a Trusted Types policy within the JIT
|
|
153695
|
-
* compiler. It lazily constructs the Trusted Types policy, providing helper
|
|
153696
|
-
* utilities for promoting strings to Trusted Types. When Trusted Types are not
|
|
153697
|
-
* available, strings are used as a fallback.
|
|
153698
|
-
* @security All use of this module is security-sensitive and should go through
|
|
153699
|
-
* security review.
|
|
153700
|
-
*/
|
|
153701
|
-
/**
|
|
153702
|
-
* The Trusted Types policy, or null if Trusted Types are not
|
|
153703
|
-
* enabled/supported, or undefined if the policy has not been created yet.
|
|
153704
|
-
*/
|
|
153705
|
-
let policy;
|
|
153706
|
-
/**
|
|
153707
|
-
* Returns the Trusted Types policy, or null if Trusted Types are not
|
|
153708
|
-
* enabled/supported. The first call to this function will create the policy.
|
|
153709
|
-
*/
|
|
153710
|
-
function getPolicy() {
|
|
153711
|
-
if (policy === undefined) {
|
|
153712
|
-
const trustedTypes = _global['trustedTypes'];
|
|
153713
|
-
policy = null;
|
|
153714
|
-
if (trustedTypes) {
|
|
153715
|
-
try {
|
|
153716
|
-
policy = trustedTypes.createPolicy('angular#unsafe-jit', {
|
|
153717
|
-
createScript: (s) => s,
|
|
153718
|
-
});
|
|
153719
|
-
}
|
|
153720
|
-
catch {
|
|
153721
|
-
// trustedTypes.createPolicy throws if called with a name that is
|
|
153722
|
-
// already registered, even in report-only mode. Until the API changes,
|
|
153723
|
-
// catch the error not to break the applications functionally. In such
|
|
153724
|
-
// cases, the code will fall back to using strings.
|
|
153725
|
-
}
|
|
153726
|
-
}
|
|
153727
|
-
}
|
|
153728
|
-
return policy;
|
|
153729
|
-
}
|
|
153730
153477
|
/**
|
|
153731
153478
|
* Unsafely promote a string to a TrustedScript, falling back to strings when
|
|
153732
153479
|
* Trusted Types are not available.
|
|
@@ -153735,7 +153482,7 @@ function getPolicy() {
|
|
|
153735
153482
|
* interpreted and executed as a script by a browser, e.g. when calling eval.
|
|
153736
153483
|
*/
|
|
153737
153484
|
function trustedScriptFromString(script) {
|
|
153738
|
-
return
|
|
153485
|
+
return script;
|
|
153739
153486
|
}
|
|
153740
153487
|
/**
|
|
153741
153488
|
* Unsafely call the Function constructor with the given string arguments.
|
|
@@ -185794,6 +185541,8 @@ if ((DataView$1 && getTag(new DataView$1(new ArrayBuffer(1))) != dataViewTag$3)
|
|
|
185794
185541
|
};
|
|
185795
185542
|
}
|
|
185796
185543
|
|
|
185544
|
+
var getTag$1 = getTag;
|
|
185545
|
+
|
|
185797
185546
|
/** Used for built-in method references. */
|
|
185798
185547
|
var objectProto$c = Object.prototype;
|
|
185799
185548
|
|
|
@@ -185986,7 +185735,7 @@ var mapTag$6 = '[object Map]';
|
|
|
185986
185735
|
* @returns {boolean} Returns `true` if `value` is a map, else `false`.
|
|
185987
185736
|
*/
|
|
185988
185737
|
function baseIsMap(value) {
|
|
185989
|
-
return isObjectLike(value) && getTag(value) == mapTag$6;
|
|
185738
|
+
return isObjectLike(value) && getTag$1(value) == mapTag$6;
|
|
185990
185739
|
}
|
|
185991
185740
|
|
|
185992
185741
|
/* Node.js helper references. */
|
|
@@ -186022,7 +185771,7 @@ var setTag$6 = '[object Set]';
|
|
|
186022
185771
|
* @returns {boolean} Returns `true` if `value` is a set, else `false`.
|
|
186023
185772
|
*/
|
|
186024
185773
|
function baseIsSet(value) {
|
|
186025
|
-
return isObjectLike(value) && getTag(value) == setTag$6;
|
|
185774
|
+
return isObjectLike(value) && getTag$1(value) == setTag$6;
|
|
186026
185775
|
}
|
|
186027
185776
|
|
|
186028
185777
|
/* Node.js helper references. */
|
|
@@ -186135,7 +185884,7 @@ function baseClone(value, bitmask, customizer, key, object, stack) {
|
|
|
186135
185884
|
return copyArray(value, result);
|
|
186136
185885
|
}
|
|
186137
185886
|
} else {
|
|
186138
|
-
var tag = getTag(value),
|
|
185887
|
+
var tag = getTag$1(value),
|
|
186139
185888
|
isFunc = tag == funcTag || tag == genTag;
|
|
186140
185889
|
|
|
186141
185890
|
if (isBuffer(value)) {
|
|
@@ -186843,8 +186592,8 @@ var hasOwnProperty$9 = objectProto$a.hasOwnProperty;
|
|
|
186843
186592
|
function baseIsEqualDeep(object, other, bitmask, customizer, equalFunc, stack) {
|
|
186844
186593
|
var objIsArr = isArray(object),
|
|
186845
186594
|
othIsArr = isArray(other),
|
|
186846
|
-
objTag = objIsArr ? arrayTag : getTag(object),
|
|
186847
|
-
othTag = othIsArr ? arrayTag : getTag(other);
|
|
186595
|
+
objTag = objIsArr ? arrayTag : getTag$1(object),
|
|
186596
|
+
othTag = othIsArr ? arrayTag : getTag$1(other);
|
|
186848
186597
|
|
|
186849
186598
|
objTag = objTag == argsTag ? objectTag : objTag;
|
|
186850
186599
|
othTag = othTag == argsTag ? objectTag : othTag;
|
|
@@ -188919,7 +188668,7 @@ var mapTag$3 = '[object Map]',
|
|
|
188919
188668
|
*/
|
|
188920
188669
|
function createToPairs(keysFunc) {
|
|
188921
188670
|
return function(object) {
|
|
188922
|
-
var tag = getTag(object);
|
|
188671
|
+
var tag = getTag$1(object);
|
|
188923
188672
|
if (tag == mapTag$3) {
|
|
188924
188673
|
return mapToArray(object);
|
|
188925
188674
|
}
|
|
@@ -191166,7 +190915,7 @@ function isEmpty(value) {
|
|
|
191166
190915
|
isBuffer(value) || isTypedArray(value) || isArguments(value))) {
|
|
191167
190916
|
return !value.length;
|
|
191168
190917
|
}
|
|
191169
|
-
var tag = getTag(value);
|
|
190918
|
+
var tag = getTag$1(value);
|
|
191170
190919
|
if (tag == mapTag$2 || tag == setTag$2) {
|
|
191171
190920
|
return !value.size;
|
|
191172
190921
|
}
|
|
@@ -191654,7 +191403,7 @@ var weakMapTag = '[object WeakMap]';
|
|
|
191654
191403
|
* // => false
|
|
191655
191404
|
*/
|
|
191656
191405
|
function isWeakMap(value) {
|
|
191657
|
-
return isObjectLike(value) && getTag(value) == weakMapTag;
|
|
191406
|
+
return isObjectLike(value) && getTag$1(value) == weakMapTag;
|
|
191658
191407
|
}
|
|
191659
191408
|
|
|
191660
191409
|
/** `Object#toString` result references. */
|
|
@@ -192625,7 +192374,7 @@ function toArray(value) {
|
|
|
192625
192374
|
if (symIterator$1 && value[symIterator$1]) {
|
|
192626
192375
|
return iteratorToArray(value[symIterator$1]());
|
|
192627
192376
|
}
|
|
192628
|
-
var tag = getTag(value),
|
|
192377
|
+
var tag = getTag$1(value),
|
|
192629
192378
|
func = tag == mapTag$1 ? mapToArray : (tag == setTag$1 ? setToArray : values);
|
|
192630
192379
|
|
|
192631
192380
|
return func(value);
|
|
@@ -194964,7 +194713,7 @@ function size(collection) {
|
|
|
194964
194713
|
if (isArrayLike(collection)) {
|
|
194965
194714
|
return isString(collection) ? stringSize(collection) : collection.length;
|
|
194966
194715
|
}
|
|
194967
|
-
var tag = getTag(collection);
|
|
194716
|
+
var tag = getTag$1(collection);
|
|
194968
194717
|
if (tag == mapTag || tag == setTag) {
|
|
194969
194718
|
return collection.size;
|
|
194970
194719
|
}
|
|
@@ -201374,7 +201123,6 @@ var FormWidgetType;
|
|
|
201374
201123
|
FormWidgetType["TIMESTAMP"] = "timestamp";
|
|
201375
201124
|
FormWidgetType["TYPEAHEAD"] = "typeahead";
|
|
201376
201125
|
FormWidgetType["UPLOAD"] = "upload";
|
|
201377
|
-
FormWidgetType["CUSTOM"] = "custom";
|
|
201378
201126
|
})(FormWidgetType || (FormWidgetType = {}));
|
|
201379
201127
|
var DataType;
|
|
201380
201128
|
(function (DataType) {
|
|
@@ -202033,7 +201781,6 @@ var ComponentType;
|
|
|
202033
201781
|
ComponentType[ComponentType["PAGE"] = 0] = "PAGE";
|
|
202034
201782
|
ComponentType[ComponentType["PREFAB"] = 1] = "PREFAB";
|
|
202035
201783
|
ComponentType[ComponentType["PARTIAL"] = 2] = "PARTIAL";
|
|
202036
|
-
ComponentType[ComponentType["WIDGET"] = 3] = "WIDGET";
|
|
202037
201784
|
})(ComponentType || (ComponentType = {}));
|
|
202038
201785
|
var Operation;
|
|
202039
201786
|
(function (Operation) {
|
|
@@ -202093,7 +201840,6 @@ const REGEX = {
|
|
|
202093
201840
|
IPOD: /iPod/i,
|
|
202094
201841
|
IPAD: /iPad/i,
|
|
202095
201842
|
MAC: /Mac/i,
|
|
202096
|
-
MACINTEL: /MacIntel/i,
|
|
202097
201843
|
ANDROID_TABLET: /android|android 3.0|xoom|sch-i800|playbook|tablet|kindle/i,
|
|
202098
201844
|
MOBILE: /Mobile/i,
|
|
202099
201845
|
WINDOWS: /Windows Phone/i,
|
|
@@ -202123,14 +201869,6 @@ const REGEX = {
|
|
|
202123
201869
|
const NUMBER_TYPES = ['int', DataType.INTEGER, DataType.FLOAT, DataType.DOUBLE, DataType.LONG, DataType.SHORT, DataType.BYTE, DataType.BIG_INTEGER, DataType.BIG_DECIMAL];
|
|
202124
201870
|
const now = new Date();
|
|
202125
201871
|
const CURRENT_DATE = 'CURRENT_DATE';
|
|
202126
|
-
const getNavClass = (suffix) => {
|
|
202127
|
-
const APP_NAV_CLASS_PREFIX = 'app-nav-';
|
|
202128
|
-
return APP_NAV_CLASS_PREFIX + suffix;
|
|
202129
|
-
};
|
|
202130
|
-
const getSheetPositionClass = (suffix) => {
|
|
202131
|
-
const SHEET_POSITION_CLASS_PREFIX = 'sheet-position-';
|
|
202132
|
-
return SHEET_POSITION_CLASS_PREFIX + suffix;
|
|
202133
|
-
};
|
|
202134
201872
|
const isDefined = v => 'undefined' !== typeof v;
|
|
202135
201873
|
const isObject = v => null !== v && 'object' === typeof v;
|
|
202136
201874
|
const toBoolean = (val, identity) => ((val && val !== 'false') ? true : (identity ? val === identity : false));
|
|
@@ -202145,9 +201883,10 @@ const isAndroidTablet = () => REGEX.ANDROID_TABLET.test(userAgent) && !((/Tablet
|
|
|
202145
201883
|
const isIphone = () => REGEX.IPHONE.test(userAgent);
|
|
202146
201884
|
const isIpod = () => REGEX.IPOD.test(userAgent);
|
|
202147
201885
|
const isIpad = () => {
|
|
202148
|
-
return REGEX.IPAD.test(userAgent) || (window.navigator.maxTouchPoints && window.navigator.maxTouchPoints > 2 &&
|
|
201886
|
+
return REGEX.IPAD.test(userAgent) || (window.navigator.maxTouchPoints && window.navigator.maxTouchPoints > 2 && REGEX.MAC.test(window.navigator.platform));
|
|
202149
201887
|
};
|
|
202150
201888
|
const isIos = () => isIphone() || isIpod() || isIpad();
|
|
201889
|
+
const isSafari = () => navigator.userAgent.indexOf('Safari') !== -1 && navigator.userAgent.indexOf('Chrome') === -1;
|
|
202151
201890
|
const isLargeTabletLandscape = (landScapeWidth, landScapeHeight) => {
|
|
202152
201891
|
const width = landScapeWidth || '1366px';
|
|
202153
201892
|
const height = landScapeHeight || '1024px';
|
|
@@ -202369,7 +202108,7 @@ const getFormattedDate = (datePipe, dateObj, format, timeZone, isTimeStampType,
|
|
|
202369
202108
|
if (format === 'UTC') {
|
|
202370
202109
|
return new Date(dateObj).toISOString();
|
|
202371
202110
|
}
|
|
202372
|
-
if (timeZone) {
|
|
202111
|
+
if (timeZone && timeZone !== moment.defaultZone?.name) {
|
|
202373
202112
|
const momentFormat = format.replaceAll('y', 'Y').replaceAll('d', 'D').replace('a', 'A');
|
|
202374
202113
|
if (isIntervalDateTime) { // dates which are of type time widget (value is hh:mm:ss) but returned as date string from time comp
|
|
202375
202114
|
return moment(dateObj).format(momentFormat);
|
|
@@ -203578,11 +203317,9 @@ var Utils = /*#__PURE__*/Object.freeze({
|
|
|
203578
203317
|
getFormattedDate: getFormattedDate,
|
|
203579
203318
|
getMomentLocaleObject: getMomentLocaleObject,
|
|
203580
203319
|
getNativeDateObject: getNativeDateObject,
|
|
203581
|
-
getNavClass: getNavClass,
|
|
203582
203320
|
getResourceURL: getResourceURL,
|
|
203583
203321
|
getRouteNameFromLink: getRouteNameFromLink,
|
|
203584
203322
|
getSessionStorageItem: getSessionStorageItem,
|
|
203585
|
-
getSheetPositionClass: getSheetPositionClass,
|
|
203586
203323
|
getUrlParams: getUrlParams,
|
|
203587
203324
|
getValidDateObject: getValidDateObject,
|
|
203588
203325
|
getValidJSON: getValidJSON,
|
|
@@ -203615,6 +203352,7 @@ var Utils = /*#__PURE__*/Object.freeze({
|
|
|
203615
203352
|
isNumberType: isNumberType,
|
|
203616
203353
|
isObject: isObject,
|
|
203617
203354
|
isPageable: isPageable,
|
|
203355
|
+
isSafari: isSafari,
|
|
203618
203356
|
isTablet: isTablet,
|
|
203619
203357
|
isValidWebURL: isValidWebURL,
|
|
203620
203358
|
isVideoFile: isVideoFile,
|