@wavemaker/angular-codegen 12.0.0-next.141131 → 12.0.0-next.141138

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (28) hide show
  1. angular-codegen/angular-app/angular.json +13 -1
  2. angular-codegen/angular-app/build-scripts/update-version.js +24 -0
  3. angular-codegen/angular-app/package-lock.json +8431 -10702
  4. angular-codegen/angular-app/package.json +18 -14
  5. angular-codegen/angular-app/src/assets/styles/css/wm-style.css +1 -1
  6. angular-codegen/angular-app/src/framework/util/page-util.ts +1 -3
  7. angular-codegen/angular-app/src/setup-jest.js +1 -0
  8. angular-codegen/angular-app/tsconfig.json +0 -3
  9. angular-codegen/dependencies/expression-parser.cjs.js +1 -40
  10. angular-codegen/dependencies/pipe-provider.cjs.js +41 -303
  11. angular-codegen/dependencies/transpilation-mobile.cjs.js +418 -598
  12. angular-codegen/dependencies/transpilation-web.cjs.js +418 -598
  13. angular-codegen/package.json +1 -1
  14. angular-codegen/src/codegen.js +1 -1
  15. angular-codegen/src/gen-components.js +1 -1
  16. angular-codegen/src/gen-index-html.js +1 -1
  17. angular-codegen/src/handlebar-helpers.js +1 -1
  18. angular-codegen/src/pages-util.js +1 -1
  19. angular-codegen/src/update-angular-json.js +1 -1
  20. angular-codegen/templates/app.module.ts.hbs +1 -5
  21. angular-codegen/templates/page/page.module.ts.hbs +0 -11
  22. angular-codegen/angular-app/src/framework/services/customwidget-config-provider.service.ts +0 -13
  23. angular-codegen/dependencies/custom-widgets-bundle.cjs.js +0 -390
  24. angular-codegen/src/gen-customwidget-config.js +0 -1
  25. angular-codegen/templates/component.config.ts.hbs +0 -1
  26. angular-codegen/templates/customwidget/customwidget-config.ts.hbs +0 -6
  27. angular-codegen/templates/customwidget/customwidget.component.script.js.hbs +0 -3
  28. angular-codegen/templates/customwidget/customwidget.component.ts.hbs +0 -42
@@ -10454,46 +10454,6 @@ const PRESERVE_HOST_CONTENT$1 = new InjectionToken$1((typeof ngDevMode === 'unde
10454
10454
  * is enabled.
10455
10455
  */
10456
10456
  const IS_I18N_HYDRATION_ENABLED$1 = new InjectionToken$1((typeof ngDevMode === 'undefined' || !!ngDevMode ? 'IS_I18N_HYDRATION_ENABLED' : ''));
10457
-
10458
- /**
10459
- * @fileoverview
10460
- * A module to facilitate use of a Trusted Types policy internally within
10461
- * Angular. It lazily constructs the Trusted Types policy, providing helper
10462
- * utilities for promoting strings to Trusted Types. When Trusted Types are not
10463
- * available, strings are used as a fallback.
10464
- * @security All use of this module is security-sensitive and should go through
10465
- * security review.
10466
- */
10467
- /**
10468
- * The Trusted Types policy, or null if Trusted Types are not
10469
- * enabled/supported, or undefined if the policy has not been created yet.
10470
- */
10471
- let policy$1$1;
10472
- /**
10473
- * Returns the Trusted Types policy, or null if Trusted Types are not
10474
- * enabled/supported. The first call to this function will create the policy.
10475
- */
10476
- function getPolicy$1$1() {
10477
- if (policy$1$1 === undefined) {
10478
- policy$1$1 = null;
10479
- if (_global$3.trustedTypes) {
10480
- try {
10481
- policy$1$1 = _global$3.trustedTypes.createPolicy('angular', {
10482
- createHTML: (s) => s,
10483
- createScript: (s) => s,
10484
- createScriptURL: (s) => s,
10485
- });
10486
- }
10487
- catch {
10488
- // trustedTypes.createPolicy throws if called with a name that is
10489
- // already registered, even in report-only mode. Until the API changes,
10490
- // catch the error not to break the applications functionally. In such
10491
- // cases, the code will fall back to using strings.
10492
- }
10493
- }
10494
- }
10495
- return policy$1$1;
10496
- }
10497
10457
  /**
10498
10458
  * Unsafely promote a string to a TrustedHTML, falling back to strings when
10499
10459
  * Trusted Types are not available.
@@ -10504,7 +10464,7 @@ function getPolicy$1$1() {
10504
10464
  * element.innerHTML.
10505
10465
  */
10506
10466
  function trustedHTMLFromString$1(html) {
10507
- return getPolicy$1$1()?.createHTML(html) || html;
10467
+ return html;
10508
10468
  }
10509
10469
  /**
10510
10470
  * Unsafely promote a string to a TrustedScriptURL, falling back to strings
@@ -10516,49 +10476,7 @@ function trustedHTMLFromString$1(html) {
10516
10476
  * assigning to script.src.
10517
10477
  */
10518
10478
  function trustedScriptURLFromString$1(url) {
10519
- return getPolicy$1$1()?.createScriptURL(url) || url;
10520
- }
10521
-
10522
- /**
10523
- * @fileoverview
10524
- * A module to facilitate use of a Trusted Types policy internally within
10525
- * Angular specifically for bypassSecurityTrust* and custom sanitizers. It
10526
- * lazily constructs the Trusted Types policy, providing helper utilities for
10527
- * promoting strings to Trusted Types. When Trusted Types are not available,
10528
- * strings are used as a fallback.
10529
- * @security All use of this module is security-sensitive and should go through
10530
- * security review.
10531
- */
10532
- /**
10533
- * The Trusted Types policy, or null if Trusted Types are not
10534
- * enabled/supported, or undefined if the policy has not been created yet.
10535
- */
10536
- let policy$4;
10537
- /**
10538
- * Returns the Trusted Types policy, or null if Trusted Types are not
10539
- * enabled/supported. The first call to this function will create the policy.
10540
- */
10541
- function getPolicy$4() {
10542
- if (policy$4 === undefined) {
10543
- policy$4 = null;
10544
- if (_global$3.trustedTypes) {
10545
- try {
10546
- policy$4 = _global$3.trustedTypes
10547
- .createPolicy('angular#unsafe-bypass', {
10548
- createHTML: (s) => s,
10549
- createScript: (s) => s,
10550
- createScriptURL: (s) => s,
10551
- });
10552
- }
10553
- catch {
10554
- // trustedTypes.createPolicy throws if called with a name that is
10555
- // already registered, even in report-only mode. Until the API changes,
10556
- // catch the error not to break the applications functionally. In such
10557
- // cases, the code will fall back to using strings.
10558
- }
10559
- }
10560
- }
10561
- return policy$4;
10479
+ return url;
10562
10480
  }
10563
10481
  /**
10564
10482
  * Unsafely promote a string to a TrustedHTML, falling back to strings when
@@ -10569,7 +10487,7 @@ function getPolicy$4() {
10569
10487
  * bypassSecurityTrust* functions.
10570
10488
  */
10571
10489
  function trustedHTMLFromStringBypass$1(html) {
10572
- return getPolicy$4()?.createHTML(html) || html;
10490
+ return html;
10573
10491
  }
10574
10492
  /**
10575
10493
  * Unsafely promote a string to a TrustedScript, falling back to strings when
@@ -10580,7 +10498,7 @@ function trustedHTMLFromStringBypass$1(html) {
10580
10498
  * bypassSecurityTrust* functions.
10581
10499
  */
10582
10500
  function trustedScriptFromStringBypass$1(script) {
10583
- return getPolicy$4()?.createScript(script) || script;
10501
+ return script;
10584
10502
  }
10585
10503
  /**
10586
10504
  * Unsafely promote a string to a TrustedScriptURL, falling back to strings
@@ -10591,7 +10509,7 @@ function trustedScriptFromStringBypass$1(script) {
10591
10509
  * bypassSecurityTrust* functions.
10592
10510
  */
10593
10511
  function trustedScriptURLFromStringBypass$1(url) {
10594
- return getPolicy$4()?.createScriptURL(url) || url;
10512
+ return url;
10595
10513
  }
10596
10514
 
10597
10515
  let SafeValueImpl$1 = class SafeValueImpl {
@@ -55134,46 +55052,6 @@ const PRESERVE_HOST_CONTENT = new InjectionToken((typeof ngDevMode === 'undefine
55134
55052
  * is enabled.
55135
55053
  */
55136
55054
  const IS_I18N_HYDRATION_ENABLED = new InjectionToken((typeof ngDevMode === 'undefined' || !!ngDevMode ? 'IS_I18N_HYDRATION_ENABLED' : ''));
55137
-
55138
- /**
55139
- * @fileoverview
55140
- * A module to facilitate use of a Trusted Types policy internally within
55141
- * Angular. It lazily constructs the Trusted Types policy, providing helper
55142
- * utilities for promoting strings to Trusted Types. When Trusted Types are not
55143
- * available, strings are used as a fallback.
55144
- * @security All use of this module is security-sensitive and should go through
55145
- * security review.
55146
- */
55147
- /**
55148
- * The Trusted Types policy, or null if Trusted Types are not
55149
- * enabled/supported, or undefined if the policy has not been created yet.
55150
- */
55151
- let policy$1;
55152
- /**
55153
- * Returns the Trusted Types policy, or null if Trusted Types are not
55154
- * enabled/supported. The first call to this function will create the policy.
55155
- */
55156
- function getPolicy$1() {
55157
- if (policy$1 === undefined) {
55158
- policy$1 = null;
55159
- if (_global$1.trustedTypes) {
55160
- try {
55161
- policy$1 = _global$1.trustedTypes.createPolicy('angular', {
55162
- createHTML: (s) => s,
55163
- createScript: (s) => s,
55164
- createScriptURL: (s) => s,
55165
- });
55166
- }
55167
- catch {
55168
- // trustedTypes.createPolicy throws if called with a name that is
55169
- // already registered, even in report-only mode. Until the API changes,
55170
- // catch the error not to break the applications functionally. In such
55171
- // cases, the code will fall back to using strings.
55172
- }
55173
- }
55174
- }
55175
- return policy$1;
55176
- }
55177
55055
  /**
55178
55056
  * Unsafely promote a string to a TrustedHTML, falling back to strings when
55179
55057
  * Trusted Types are not available.
@@ -55184,7 +55062,7 @@ function getPolicy$1() {
55184
55062
  * element.innerHTML.
55185
55063
  */
55186
55064
  function trustedHTMLFromString(html) {
55187
- return getPolicy$1()?.createHTML(html) || html;
55065
+ return html;
55188
55066
  }
55189
55067
  /**
55190
55068
  * Unsafely promote a string to a TrustedScriptURL, falling back to strings
@@ -55196,49 +55074,7 @@ function trustedHTMLFromString(html) {
55196
55074
  * assigning to script.src.
55197
55075
  */
55198
55076
  function trustedScriptURLFromString(url) {
55199
- return getPolicy$1()?.createScriptURL(url) || url;
55200
- }
55201
-
55202
- /**
55203
- * @fileoverview
55204
- * A module to facilitate use of a Trusted Types policy internally within
55205
- * Angular specifically for bypassSecurityTrust* and custom sanitizers. It
55206
- * lazily constructs the Trusted Types policy, providing helper utilities for
55207
- * promoting strings to Trusted Types. When Trusted Types are not available,
55208
- * strings are used as a fallback.
55209
- * @security All use of this module is security-sensitive and should go through
55210
- * security review.
55211
- */
55212
- /**
55213
- * The Trusted Types policy, or null if Trusted Types are not
55214
- * enabled/supported, or undefined if the policy has not been created yet.
55215
- */
55216
- let policy$2;
55217
- /**
55218
- * Returns the Trusted Types policy, or null if Trusted Types are not
55219
- * enabled/supported. The first call to this function will create the policy.
55220
- */
55221
- function getPolicy$2() {
55222
- if (policy$2 === undefined) {
55223
- policy$2 = null;
55224
- if (_global$1.trustedTypes) {
55225
- try {
55226
- policy$2 = _global$1.trustedTypes
55227
- .createPolicy('angular#unsafe-bypass', {
55228
- createHTML: (s) => s,
55229
- createScript: (s) => s,
55230
- createScriptURL: (s) => s,
55231
- });
55232
- }
55233
- catch {
55234
- // trustedTypes.createPolicy throws if called with a name that is
55235
- // already registered, even in report-only mode. Until the API changes,
55236
- // catch the error not to break the applications functionally. In such
55237
- // cases, the code will fall back to using strings.
55238
- }
55239
- }
55240
- }
55241
- return policy$2;
55077
+ return url;
55242
55078
  }
55243
55079
  /**
55244
55080
  * Unsafely promote a string to a TrustedHTML, falling back to strings when
@@ -55249,7 +55085,7 @@ function getPolicy$2() {
55249
55085
  * bypassSecurityTrust* functions.
55250
55086
  */
55251
55087
  function trustedHTMLFromStringBypass(html) {
55252
- return getPolicy$2()?.createHTML(html) || html;
55088
+ return html;
55253
55089
  }
55254
55090
  /**
55255
55091
  * Unsafely promote a string to a TrustedScript, falling back to strings when
@@ -55260,7 +55096,7 @@ function trustedHTMLFromStringBypass(html) {
55260
55096
  * bypassSecurityTrust* functions.
55261
55097
  */
55262
55098
  function trustedScriptFromStringBypass(script) {
55263
- return getPolicy$2()?.createScript(script) || script;
55099
+ return script;
55264
55100
  }
55265
55101
  /**
55266
55102
  * Unsafely promote a string to a TrustedScriptURL, falling back to strings
@@ -55271,7 +55107,7 @@ function trustedScriptFromStringBypass(script) {
55271
55107
  * bypassSecurityTrust* functions.
55272
55108
  */
55273
55109
  function trustedScriptURLFromStringBypass(url) {
55274
- return getPolicy$2()?.createScriptURL(url) || url;
55110
+ return url;
55275
55111
  }
55276
55112
 
55277
55113
  class SafeValueImpl {
@@ -94344,45 +94180,6 @@ let AbstractJsEmitterVisitor$1 = class AbstractJsEmitterVisitor extends Abstract
94344
94180
  this.visitAllObjects(param => ctx.print(null, param.name), params, ctx, ',');
94345
94181
  }
94346
94182
  };
94347
-
94348
- /**
94349
- * @fileoverview
94350
- * A module to facilitate use of a Trusted Types policy within the JIT
94351
- * compiler. It lazily constructs the Trusted Types policy, providing helper
94352
- * utilities for promoting strings to Trusted Types. When Trusted Types are not
94353
- * available, strings are used as a fallback.
94354
- * @security All use of this module is security-sensitive and should go through
94355
- * security review.
94356
- */
94357
- /**
94358
- * The Trusted Types policy, or null if Trusted Types are not
94359
- * enabled/supported, or undefined if the policy has not been created yet.
94360
- */
94361
- let policy$3;
94362
- /**
94363
- * Returns the Trusted Types policy, or null if Trusted Types are not
94364
- * enabled/supported. The first call to this function will create the policy.
94365
- */
94366
- function getPolicy$3() {
94367
- if (policy$3 === undefined) {
94368
- const trustedTypes = _global$2['trustedTypes'];
94369
- policy$3 = null;
94370
- if (trustedTypes) {
94371
- try {
94372
- policy$3 = trustedTypes.createPolicy('angular#unsafe-jit', {
94373
- createScript: (s) => s,
94374
- });
94375
- }
94376
- catch {
94377
- // trustedTypes.createPolicy throws if called with a name that is
94378
- // already registered, even in report-only mode. Until the API changes,
94379
- // catch the error not to break the applications functionally. In such
94380
- // cases, the code will fall back to using strings.
94381
- }
94382
- }
94383
- }
94384
- return policy$3;
94385
- }
94386
94183
  /**
94387
94184
  * Unsafely promote a string to a TrustedScript, falling back to strings when
94388
94185
  * Trusted Types are not available.
@@ -94391,7 +94188,7 @@ function getPolicy$3() {
94391
94188
  * interpreted and executed as a script by a browser, e.g. when calling eval.
94392
94189
  */
94393
94190
  function trustedScriptFromString$1(script) {
94394
- return getPolicy$3()?.createScript(script) || script;
94191
+ return script;
94395
94192
  }
94396
94193
  /**
94397
94194
  * Unsafely call the Function constructor with the given string arguments.
@@ -126424,15 +126221,15 @@ var dataViewCtorString$1 = toSource$1(DataView$1$1),
126424
126221
  * @param {*} value The value to query.
126425
126222
  * @returns {string} Returns the `toStringTag`.
126426
126223
  */
126427
- var getTag$1 = baseGetTag$1;
126224
+ var getTag$2 = baseGetTag$1;
126428
126225
 
126429
126226
  // Fallback for data views, maps, sets, and weak maps in IE 11 and promises in Node.js < 6.
126430
- if ((DataView$1$1 && getTag$1(new DataView$1$1(new ArrayBuffer(1))) != dataViewTag$3$1) ||
126431
- (Map$1$1 && getTag$1(new Map$1$1) != mapTag$8$1) ||
126432
- (Promise$1$1 && getTag$1(Promise$1$1.resolve()) != promiseTag$1) ||
126433
- (Set$1$1 && getTag$1(new Set$1$1) != setTag$8$1) ||
126434
- (WeakMap$1$1 && getTag$1(new WeakMap$1$1) != weakMapTag$2$1)) {
126435
- getTag$1 = function(value) {
126227
+ if ((DataView$1$1 && getTag$2(new DataView$1$1(new ArrayBuffer(1))) != dataViewTag$3$1) ||
126228
+ (Map$1$1 && getTag$2(new Map$1$1) != mapTag$8$1) ||
126229
+ (Promise$1$1 && getTag$2(Promise$1$1.resolve()) != promiseTag$1) ||
126230
+ (Set$1$1 && getTag$2(new Set$1$1) != setTag$8$1) ||
126231
+ (WeakMap$1$1 && getTag$2(new WeakMap$1$1) != weakMapTag$2$1)) {
126232
+ getTag$2 = function(value) {
126436
126233
  var result = baseGetTag$1(value),
126437
126234
  Ctor = result == objectTag$2$1 ? value.constructor : undefined,
126438
126235
  ctorString = Ctor ? toSource$1(Ctor) : '';
@@ -126450,7 +126247,7 @@ if ((DataView$1$1 && getTag$1(new DataView$1$1(new ArrayBuffer(1))) != dataViewT
126450
126247
  };
126451
126248
  }
126452
126249
 
126453
- var getTag$1$1 = getTag$1;
126250
+ var getTag$1$1 = getTag$2;
126454
126251
 
126455
126252
  /** Used for built-in method references. */
126456
126253
  var objectProto$c$1 = Object.prototype;
@@ -142032,7 +141829,6 @@ var FormWidgetType$1;
142032
141829
  FormWidgetType["TIMESTAMP"] = "timestamp";
142033
141830
  FormWidgetType["TYPEAHEAD"] = "typeahead";
142034
141831
  FormWidgetType["UPLOAD"] = "upload";
142035
- FormWidgetType["CUSTOM"] = "custom";
142036
141832
  })(FormWidgetType$1 || (FormWidgetType$1 = {}));
142037
141833
  var DataType$1;
142038
141834
  (function (DataType) {
@@ -143756,7 +143552,6 @@ var ComponentType$1;
143756
143552
  ComponentType[ComponentType["PAGE"] = 0] = "PAGE";
143757
143553
  ComponentType[ComponentType["PREFAB"] = 1] = "PREFAB";
143758
143554
  ComponentType[ComponentType["PARTIAL"] = 2] = "PARTIAL";
143759
- ComponentType[ComponentType["WIDGET"] = 3] = "WIDGET";
143760
143555
  })(ComponentType$1 || (ComponentType$1 = {}));
143761
143556
  var Operation$1;
143762
143557
  (function (Operation) {
@@ -143816,7 +143611,6 @@ const REGEX$1 = {
143816
143611
  IPOD: /iPod/i,
143817
143612
  IPAD: /iPad/i,
143818
143613
  MAC: /Mac/i,
143819
- MACINTEL: /MacIntel/i,
143820
143614
  ANDROID_TABLET: /android|android 3.0|xoom|sch-i800|playbook|tablet|kindle/i,
143821
143615
  MOBILE: /Mobile/i,
143822
143616
  WINDOWS: /Windows Phone/i,
@@ -143846,14 +143640,6 @@ const REGEX$1 = {
143846
143640
  const NUMBER_TYPES$1 = ['int', DataType$1.INTEGER, DataType$1.FLOAT, DataType$1.DOUBLE, DataType$1.LONG, DataType$1.SHORT, DataType$1.BYTE, DataType$1.BIG_INTEGER, DataType$1.BIG_DECIMAL];
143847
143641
  const now$2 = new Date();
143848
143642
  const CURRENT_DATE$1 = 'CURRENT_DATE';
143849
- const getNavClass$1 = (suffix) => {
143850
- const APP_NAV_CLASS_PREFIX = 'app-nav-';
143851
- return APP_NAV_CLASS_PREFIX + suffix;
143852
- };
143853
- const getSheetPositionClass$1 = (suffix) => {
143854
- const SHEET_POSITION_CLASS_PREFIX = 'sheet-position-';
143855
- return SHEET_POSITION_CLASS_PREFIX + suffix;
143856
- };
143857
143643
  const isDefined$1 = v => 'undefined' !== typeof v;
143858
143644
  const isObject$3 = v => null !== v && 'object' === typeof v;
143859
143645
  const toBoolean$1 = (val, identity) => ((val && val !== 'false') ? true : (identity ? val === identity : false));
@@ -143868,9 +143654,10 @@ const isAndroidTablet$1 = () => REGEX$1.ANDROID_TABLET.test(userAgent$1) && !((/
143868
143654
  const isIphone$1 = () => REGEX$1.IPHONE.test(userAgent$1);
143869
143655
  const isIpod$1 = () => REGEX$1.IPOD.test(userAgent$1);
143870
143656
  const isIpad$1 = () => {
143871
- return REGEX$1.IPAD.test(userAgent$1) || (window.navigator.maxTouchPoints && window.navigator.maxTouchPoints > 2 && (REGEX$1.MAC.test(window.navigator.platform) || REGEX$1.MACINTEL.test(window.navigator.platform)));
143657
+ return REGEX$1.IPAD.test(userAgent$1) || (window.navigator.maxTouchPoints && window.navigator.maxTouchPoints > 2 && REGEX$1.MAC.test(window.navigator.platform));
143872
143658
  };
143873
143659
  const isIos$1 = () => isIphone$1() || isIpod$1() || isIpad$1();
143660
+ const isSafari$1 = () => navigator.userAgent.indexOf('Safari') !== -1 && navigator.userAgent.indexOf('Chrome') === -1;
143874
143661
  const isLargeTabletLandscape$1 = (landScapeWidth, landScapeHeight) => {
143875
143662
  const width = landScapeWidth || '1366px';
143876
143663
  const height = landScapeHeight || '1024px';
@@ -144092,7 +143879,7 @@ const getFormattedDate$1 = (datePipe, dateObj, format, timeZone, isTimeStampType
144092
143879
  if (format === 'UTC') {
144093
143880
  return new Date(dateObj).toISOString();
144094
143881
  }
144095
- if (timeZone) {
143882
+ if (timeZone && timeZone !== moment.defaultZone?.name) {
144096
143883
  const momentFormat = format.replaceAll('y', 'Y').replaceAll('d', 'D').replace('a', 'A');
144097
143884
  if (isIntervalDateTime) { // dates which are of type time widget (value is hh:mm:ss) but returned as date string from time comp
144098
143885
  return moment(dateObj).format(momentFormat);
@@ -145301,11 +145088,9 @@ var Utils$1 = /*#__PURE__*/Object.freeze({
145301
145088
  getFormattedDate: getFormattedDate$1,
145302
145089
  getMomentLocaleObject: getMomentLocaleObject$1,
145303
145090
  getNativeDateObject: getNativeDateObject$1,
145304
- getNavClass: getNavClass$1,
145305
145091
  getResourceURL: getResourceURL$1,
145306
145092
  getRouteNameFromLink: getRouteNameFromLink$1,
145307
145093
  getSessionStorageItem: getSessionStorageItem$1,
145308
- getSheetPositionClass: getSheetPositionClass$1,
145309
145094
  getUrlParams: getUrlParams$1,
145310
145095
  getValidDateObject: getValidDateObject$1,
145311
145096
  getValidJSON: getValidJSON$1,
@@ -145338,6 +145123,7 @@ var Utils$1 = /*#__PURE__*/Object.freeze({
145338
145123
  isNumberType: isNumberType$1,
145339
145124
  isObject: isObject$3,
145340
145125
  isPageable: isPageable$1,
145126
+ isSafari: isSafari$1,
145341
145127
  isTablet: isTablet$1,
145342
145128
  isValidWebURL: isValidWebURL$1,
145343
145129
  isVideoFile: isVideoFile$1,
@@ -146875,7 +146661,7 @@ class FileIconClassPipe {
146875
146661
  class StateClassPipe {
146876
146662
  transform(state) {
146877
146663
  const stateClassMap = {
146878
- 'success': 'wi wi-done text-success',
146664
+ 'success': 'wi wi-check-circle text-success',
146879
146665
  'error': 'wi wi-error text-danger'
146880
146666
  };
146881
146667
  return stateClassMap[state.toLowerCase()];
@@ -153688,45 +153474,6 @@ class AbstractJsEmitterVisitor extends AbstractEmitterVisitor {
153688
153474
  this.visitAllObjects(param => ctx.print(null, param.name), params, ctx, ',');
153689
153475
  }
153690
153476
  }
153691
-
153692
- /**
153693
- * @fileoverview
153694
- * A module to facilitate use of a Trusted Types policy within the JIT
153695
- * compiler. It lazily constructs the Trusted Types policy, providing helper
153696
- * utilities for promoting strings to Trusted Types. When Trusted Types are not
153697
- * available, strings are used as a fallback.
153698
- * @security All use of this module is security-sensitive and should go through
153699
- * security review.
153700
- */
153701
- /**
153702
- * The Trusted Types policy, or null if Trusted Types are not
153703
- * enabled/supported, or undefined if the policy has not been created yet.
153704
- */
153705
- let policy;
153706
- /**
153707
- * Returns the Trusted Types policy, or null if Trusted Types are not
153708
- * enabled/supported. The first call to this function will create the policy.
153709
- */
153710
- function getPolicy() {
153711
- if (policy === undefined) {
153712
- const trustedTypes = _global['trustedTypes'];
153713
- policy = null;
153714
- if (trustedTypes) {
153715
- try {
153716
- policy = trustedTypes.createPolicy('angular#unsafe-jit', {
153717
- createScript: (s) => s,
153718
- });
153719
- }
153720
- catch {
153721
- // trustedTypes.createPolicy throws if called with a name that is
153722
- // already registered, even in report-only mode. Until the API changes,
153723
- // catch the error not to break the applications functionally. In such
153724
- // cases, the code will fall back to using strings.
153725
- }
153726
- }
153727
- }
153728
- return policy;
153729
- }
153730
153477
  /**
153731
153478
  * Unsafely promote a string to a TrustedScript, falling back to strings when
153732
153479
  * Trusted Types are not available.
@@ -153735,7 +153482,7 @@ function getPolicy() {
153735
153482
  * interpreted and executed as a script by a browser, e.g. when calling eval.
153736
153483
  */
153737
153484
  function trustedScriptFromString(script) {
153738
- return getPolicy()?.createScript(script) || script;
153485
+ return script;
153739
153486
  }
153740
153487
  /**
153741
153488
  * Unsafely call the Function constructor with the given string arguments.
@@ -185794,6 +185541,8 @@ if ((DataView$1 && getTag(new DataView$1(new ArrayBuffer(1))) != dataViewTag$3)
185794
185541
  };
185795
185542
  }
185796
185543
 
185544
+ var getTag$1 = getTag;
185545
+
185797
185546
  /** Used for built-in method references. */
185798
185547
  var objectProto$c = Object.prototype;
185799
185548
 
@@ -185986,7 +185735,7 @@ var mapTag$6 = '[object Map]';
185986
185735
  * @returns {boolean} Returns `true` if `value` is a map, else `false`.
185987
185736
  */
185988
185737
  function baseIsMap(value) {
185989
- return isObjectLike(value) && getTag(value) == mapTag$6;
185738
+ return isObjectLike(value) && getTag$1(value) == mapTag$6;
185990
185739
  }
185991
185740
 
185992
185741
  /* Node.js helper references. */
@@ -186022,7 +185771,7 @@ var setTag$6 = '[object Set]';
186022
185771
  * @returns {boolean} Returns `true` if `value` is a set, else `false`.
186023
185772
  */
186024
185773
  function baseIsSet(value) {
186025
- return isObjectLike(value) && getTag(value) == setTag$6;
185774
+ return isObjectLike(value) && getTag$1(value) == setTag$6;
186026
185775
  }
186027
185776
 
186028
185777
  /* Node.js helper references. */
@@ -186135,7 +185884,7 @@ function baseClone(value, bitmask, customizer, key, object, stack) {
186135
185884
  return copyArray(value, result);
186136
185885
  }
186137
185886
  } else {
186138
- var tag = getTag(value),
185887
+ var tag = getTag$1(value),
186139
185888
  isFunc = tag == funcTag || tag == genTag;
186140
185889
 
186141
185890
  if (isBuffer(value)) {
@@ -186843,8 +186592,8 @@ var hasOwnProperty$9 = objectProto$a.hasOwnProperty;
186843
186592
  function baseIsEqualDeep(object, other, bitmask, customizer, equalFunc, stack) {
186844
186593
  var objIsArr = isArray(object),
186845
186594
  othIsArr = isArray(other),
186846
- objTag = objIsArr ? arrayTag : getTag(object),
186847
- othTag = othIsArr ? arrayTag : getTag(other);
186595
+ objTag = objIsArr ? arrayTag : getTag$1(object),
186596
+ othTag = othIsArr ? arrayTag : getTag$1(other);
186848
186597
 
186849
186598
  objTag = objTag == argsTag ? objectTag : objTag;
186850
186599
  othTag = othTag == argsTag ? objectTag : othTag;
@@ -188919,7 +188668,7 @@ var mapTag$3 = '[object Map]',
188919
188668
  */
188920
188669
  function createToPairs(keysFunc) {
188921
188670
  return function(object) {
188922
- var tag = getTag(object);
188671
+ var tag = getTag$1(object);
188923
188672
  if (tag == mapTag$3) {
188924
188673
  return mapToArray(object);
188925
188674
  }
@@ -191166,7 +190915,7 @@ function isEmpty(value) {
191166
190915
  isBuffer(value) || isTypedArray(value) || isArguments(value))) {
191167
190916
  return !value.length;
191168
190917
  }
191169
- var tag = getTag(value);
190918
+ var tag = getTag$1(value);
191170
190919
  if (tag == mapTag$2 || tag == setTag$2) {
191171
190920
  return !value.size;
191172
190921
  }
@@ -191654,7 +191403,7 @@ var weakMapTag = '[object WeakMap]';
191654
191403
  * // => false
191655
191404
  */
191656
191405
  function isWeakMap(value) {
191657
- return isObjectLike(value) && getTag(value) == weakMapTag;
191406
+ return isObjectLike(value) && getTag$1(value) == weakMapTag;
191658
191407
  }
191659
191408
 
191660
191409
  /** `Object#toString` result references. */
@@ -192625,7 +192374,7 @@ function toArray(value) {
192625
192374
  if (symIterator$1 && value[symIterator$1]) {
192626
192375
  return iteratorToArray(value[symIterator$1]());
192627
192376
  }
192628
- var tag = getTag(value),
192377
+ var tag = getTag$1(value),
192629
192378
  func = tag == mapTag$1 ? mapToArray : (tag == setTag$1 ? setToArray : values);
192630
192379
 
192631
192380
  return func(value);
@@ -194964,7 +194713,7 @@ function size(collection) {
194964
194713
  if (isArrayLike(collection)) {
194965
194714
  return isString(collection) ? stringSize(collection) : collection.length;
194966
194715
  }
194967
- var tag = getTag(collection);
194716
+ var tag = getTag$1(collection);
194968
194717
  if (tag == mapTag || tag == setTag) {
194969
194718
  return collection.size;
194970
194719
  }
@@ -201374,7 +201123,6 @@ var FormWidgetType;
201374
201123
  FormWidgetType["TIMESTAMP"] = "timestamp";
201375
201124
  FormWidgetType["TYPEAHEAD"] = "typeahead";
201376
201125
  FormWidgetType["UPLOAD"] = "upload";
201377
- FormWidgetType["CUSTOM"] = "custom";
201378
201126
  })(FormWidgetType || (FormWidgetType = {}));
201379
201127
  var DataType;
201380
201128
  (function (DataType) {
@@ -202033,7 +201781,6 @@ var ComponentType;
202033
201781
  ComponentType[ComponentType["PAGE"] = 0] = "PAGE";
202034
201782
  ComponentType[ComponentType["PREFAB"] = 1] = "PREFAB";
202035
201783
  ComponentType[ComponentType["PARTIAL"] = 2] = "PARTIAL";
202036
- ComponentType[ComponentType["WIDGET"] = 3] = "WIDGET";
202037
201784
  })(ComponentType || (ComponentType = {}));
202038
201785
  var Operation;
202039
201786
  (function (Operation) {
@@ -202093,7 +201840,6 @@ const REGEX = {
202093
201840
  IPOD: /iPod/i,
202094
201841
  IPAD: /iPad/i,
202095
201842
  MAC: /Mac/i,
202096
- MACINTEL: /MacIntel/i,
202097
201843
  ANDROID_TABLET: /android|android 3.0|xoom|sch-i800|playbook|tablet|kindle/i,
202098
201844
  MOBILE: /Mobile/i,
202099
201845
  WINDOWS: /Windows Phone/i,
@@ -202123,14 +201869,6 @@ const REGEX = {
202123
201869
  const NUMBER_TYPES = ['int', DataType.INTEGER, DataType.FLOAT, DataType.DOUBLE, DataType.LONG, DataType.SHORT, DataType.BYTE, DataType.BIG_INTEGER, DataType.BIG_DECIMAL];
202124
201870
  const now = new Date();
202125
201871
  const CURRENT_DATE = 'CURRENT_DATE';
202126
- const getNavClass = (suffix) => {
202127
- const APP_NAV_CLASS_PREFIX = 'app-nav-';
202128
- return APP_NAV_CLASS_PREFIX + suffix;
202129
- };
202130
- const getSheetPositionClass = (suffix) => {
202131
- const SHEET_POSITION_CLASS_PREFIX = 'sheet-position-';
202132
- return SHEET_POSITION_CLASS_PREFIX + suffix;
202133
- };
202134
201872
  const isDefined = v => 'undefined' !== typeof v;
202135
201873
  const isObject = v => null !== v && 'object' === typeof v;
202136
201874
  const toBoolean = (val, identity) => ((val && val !== 'false') ? true : (identity ? val === identity : false));
@@ -202145,9 +201883,10 @@ const isAndroidTablet = () => REGEX.ANDROID_TABLET.test(userAgent) && !((/Tablet
202145
201883
  const isIphone = () => REGEX.IPHONE.test(userAgent);
202146
201884
  const isIpod = () => REGEX.IPOD.test(userAgent);
202147
201885
  const isIpad = () => {
202148
- return REGEX.IPAD.test(userAgent) || (window.navigator.maxTouchPoints && window.navigator.maxTouchPoints > 2 && (REGEX.MAC.test(window.navigator.platform) || REGEX.MACINTEL.test(window.navigator.platform)));
201886
+ return REGEX.IPAD.test(userAgent) || (window.navigator.maxTouchPoints && window.navigator.maxTouchPoints > 2 && REGEX.MAC.test(window.navigator.platform));
202149
201887
  };
202150
201888
  const isIos = () => isIphone() || isIpod() || isIpad();
201889
+ const isSafari = () => navigator.userAgent.indexOf('Safari') !== -1 && navigator.userAgent.indexOf('Chrome') === -1;
202151
201890
  const isLargeTabletLandscape = (landScapeWidth, landScapeHeight) => {
202152
201891
  const width = landScapeWidth || '1366px';
202153
201892
  const height = landScapeHeight || '1024px';
@@ -202369,7 +202108,7 @@ const getFormattedDate = (datePipe, dateObj, format, timeZone, isTimeStampType,
202369
202108
  if (format === 'UTC') {
202370
202109
  return new Date(dateObj).toISOString();
202371
202110
  }
202372
- if (timeZone) {
202111
+ if (timeZone && timeZone !== moment.defaultZone?.name) {
202373
202112
  const momentFormat = format.replaceAll('y', 'Y').replaceAll('d', 'D').replace('a', 'A');
202374
202113
  if (isIntervalDateTime) { // dates which are of type time widget (value is hh:mm:ss) but returned as date string from time comp
202375
202114
  return moment(dateObj).format(momentFormat);
@@ -203578,11 +203317,9 @@ var Utils = /*#__PURE__*/Object.freeze({
203578
203317
  getFormattedDate: getFormattedDate,
203579
203318
  getMomentLocaleObject: getMomentLocaleObject,
203580
203319
  getNativeDateObject: getNativeDateObject,
203581
- getNavClass: getNavClass,
203582
203320
  getResourceURL: getResourceURL,
203583
203321
  getRouteNameFromLink: getRouteNameFromLink,
203584
203322
  getSessionStorageItem: getSessionStorageItem,
203585
- getSheetPositionClass: getSheetPositionClass,
203586
203323
  getUrlParams: getUrlParams,
203587
203324
  getValidDateObject: getValidDateObject,
203588
203325
  getValidJSON: getValidJSON,
@@ -203615,6 +203352,7 @@ var Utils = /*#__PURE__*/Object.freeze({
203615
203352
  isNumberType: isNumberType,
203616
203353
  isObject: isObject,
203617
203354
  isPageable: isPageable,
203355
+ isSafari: isSafari,
203618
203356
  isTablet: isTablet,
203619
203357
  isValidWebURL: isValidWebURL,
203620
203358
  isVideoFile: isVideoFile,