@wavemaker/angular-codegen 12.0.0-next.141134 → 12.0.0-next.141138
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- angular-codegen/angular-app/package-lock.json +9248 -7049
- angular-codegen/angular-app/package.json +10 -13
- angular-codegen/angular-app/src/assets/styles/css/wm-style.css +1 -1
- angular-codegen/angular-app/src/framework/util/page-util.ts +1 -3
- angular-codegen/angular-app/tsconfig.json +0 -3
- angular-codegen/dependencies/expression-parser.cjs.js +1 -40
- angular-codegen/dependencies/pipe-provider.cjs.js +12 -280
- angular-codegen/dependencies/transpilation-mobile.cjs.js +413 -610
- angular-codegen/dependencies/transpilation-web.cjs.js +413 -610
- angular-codegen/package.json +1 -1
- angular-codegen/src/codegen.js +1 -1
- angular-codegen/src/gen-components.js +1 -1
- angular-codegen/src/gen-index-html.js +1 -1
- angular-codegen/src/handlebar-helpers.js +1 -1
- angular-codegen/src/pages-util.js +1 -1
- angular-codegen/src/update-angular-json.js +1 -1
- angular-codegen/templates/app.module.ts.hbs +1 -5
- angular-codegen/templates/page/page.module.ts.hbs +0 -11
- angular-codegen/angular-app/src/framework/services/customwidget-config-provider.service.ts +0 -13
- angular-codegen/dependencies/custom-widgets-bundle.cjs.js +0 -411
- angular-codegen/src/gen-customwidget-config.js +0 -1
- angular-codegen/templates/component.config.ts.hbs +0 -1
- angular-codegen/templates/customwidget/customwidget-config.ts.hbs +0 -6
- angular-codegen/templates/customwidget/customwidget.component.script.js.hbs +0 -3
- angular-codegen/templates/customwidget/customwidget.component.ts.hbs +0 -43
|
@@ -1,7 +1,5 @@
|
|
|
1
1
|
const prefabConfigs = new Map<string, any>();
|
|
2
|
-
const customWidgetConfigs = new Map<string, any>();
|
|
3
2
|
|
|
4
3
|
export const registerPrefabConfig = (prefabName: string, config: any) => prefabConfigs.set(prefabName, config);
|
|
5
4
|
export const getPrefabConfig = prefabName => prefabConfigs.get(prefabName);
|
|
6
|
-
|
|
7
|
-
export const getCustomWidgetConfig = customWidget => customWidgetConfigs.get(customWidget);
|
|
5
|
+
|
|
@@ -37,9 +37,6 @@
|
|
|
37
37
|
"@wavemaker/variables": [
|
|
38
38
|
"node_modules/@wavemaker/variables/"
|
|
39
39
|
],
|
|
40
|
-
"@wavemaker/custom-widgets-m3": [
|
|
41
|
-
"node_modules/@wavemaker/custom-widgets-m3/"
|
|
42
|
-
],
|
|
43
40
|
"@wm/components/base": [
|
|
44
41
|
"node_modules/@wavemaker/app-ng-runtime/components/base/public_api.d.ts"
|
|
45
42
|
],
|
|
@@ -4975,45 +4975,6 @@ class AbstractJsEmitterVisitor extends AbstractEmitterVisitor {
|
|
|
4975
4975
|
this.visitAllObjects(param => ctx.print(null, param.name), params, ctx, ',');
|
|
4976
4976
|
}
|
|
4977
4977
|
}
|
|
4978
|
-
|
|
4979
|
-
/**
|
|
4980
|
-
* @fileoverview
|
|
4981
|
-
* A module to facilitate use of a Trusted Types policy within the JIT
|
|
4982
|
-
* compiler. It lazily constructs the Trusted Types policy, providing helper
|
|
4983
|
-
* utilities for promoting strings to Trusted Types. When Trusted Types are not
|
|
4984
|
-
* available, strings are used as a fallback.
|
|
4985
|
-
* @security All use of this module is security-sensitive and should go through
|
|
4986
|
-
* security review.
|
|
4987
|
-
*/
|
|
4988
|
-
/**
|
|
4989
|
-
* The Trusted Types policy, or null if Trusted Types are not
|
|
4990
|
-
* enabled/supported, or undefined if the policy has not been created yet.
|
|
4991
|
-
*/
|
|
4992
|
-
let policy;
|
|
4993
|
-
/**
|
|
4994
|
-
* Returns the Trusted Types policy, or null if Trusted Types are not
|
|
4995
|
-
* enabled/supported. The first call to this function will create the policy.
|
|
4996
|
-
*/
|
|
4997
|
-
function getPolicy() {
|
|
4998
|
-
if (policy === undefined) {
|
|
4999
|
-
const trustedTypes = _global['trustedTypes'];
|
|
5000
|
-
policy = null;
|
|
5001
|
-
if (trustedTypes) {
|
|
5002
|
-
try {
|
|
5003
|
-
policy = trustedTypes.createPolicy('angular#unsafe-jit', {
|
|
5004
|
-
createScript: (s) => s,
|
|
5005
|
-
});
|
|
5006
|
-
}
|
|
5007
|
-
catch {
|
|
5008
|
-
// trustedTypes.createPolicy throws if called with a name that is
|
|
5009
|
-
// already registered, even in report-only mode. Until the API changes,
|
|
5010
|
-
// catch the error not to break the applications functionally. In such
|
|
5011
|
-
// cases, the code will fall back to using strings.
|
|
5012
|
-
}
|
|
5013
|
-
}
|
|
5014
|
-
}
|
|
5015
|
-
return policy;
|
|
5016
|
-
}
|
|
5017
4978
|
/**
|
|
5018
4979
|
* Unsafely promote a string to a TrustedScript, falling back to strings when
|
|
5019
4980
|
* Trusted Types are not available.
|
|
@@ -5022,7 +4983,7 @@ function getPolicy() {
|
|
|
5022
4983
|
* interpreted and executed as a script by a browser, e.g. when calling eval.
|
|
5023
4984
|
*/
|
|
5024
4985
|
function trustedScriptFromString(script) {
|
|
5025
|
-
return
|
|
4986
|
+
return script;
|
|
5026
4987
|
}
|
|
5027
4988
|
/**
|
|
5028
4989
|
* Unsafely call the Function constructor with the given string arguments.
|
|
@@ -10454,46 +10454,6 @@ const PRESERVE_HOST_CONTENT$1 = new InjectionToken$1((typeof ngDevMode === 'unde
|
|
|
10454
10454
|
* is enabled.
|
|
10455
10455
|
*/
|
|
10456
10456
|
const IS_I18N_HYDRATION_ENABLED$1 = new InjectionToken$1((typeof ngDevMode === 'undefined' || !!ngDevMode ? 'IS_I18N_HYDRATION_ENABLED' : ''));
|
|
10457
|
-
|
|
10458
|
-
/**
|
|
10459
|
-
* @fileoverview
|
|
10460
|
-
* A module to facilitate use of a Trusted Types policy internally within
|
|
10461
|
-
* Angular. It lazily constructs the Trusted Types policy, providing helper
|
|
10462
|
-
* utilities for promoting strings to Trusted Types. When Trusted Types are not
|
|
10463
|
-
* available, strings are used as a fallback.
|
|
10464
|
-
* @security All use of this module is security-sensitive and should go through
|
|
10465
|
-
* security review.
|
|
10466
|
-
*/
|
|
10467
|
-
/**
|
|
10468
|
-
* The Trusted Types policy, or null if Trusted Types are not
|
|
10469
|
-
* enabled/supported, or undefined if the policy has not been created yet.
|
|
10470
|
-
*/
|
|
10471
|
-
let policy$1$1;
|
|
10472
|
-
/**
|
|
10473
|
-
* Returns the Trusted Types policy, or null if Trusted Types are not
|
|
10474
|
-
* enabled/supported. The first call to this function will create the policy.
|
|
10475
|
-
*/
|
|
10476
|
-
function getPolicy$1$1() {
|
|
10477
|
-
if (policy$1$1 === undefined) {
|
|
10478
|
-
policy$1$1 = null;
|
|
10479
|
-
if (_global$3.trustedTypes) {
|
|
10480
|
-
try {
|
|
10481
|
-
policy$1$1 = _global$3.trustedTypes.createPolicy('angular', {
|
|
10482
|
-
createHTML: (s) => s,
|
|
10483
|
-
createScript: (s) => s,
|
|
10484
|
-
createScriptURL: (s) => s,
|
|
10485
|
-
});
|
|
10486
|
-
}
|
|
10487
|
-
catch {
|
|
10488
|
-
// trustedTypes.createPolicy throws if called with a name that is
|
|
10489
|
-
// already registered, even in report-only mode. Until the API changes,
|
|
10490
|
-
// catch the error not to break the applications functionally. In such
|
|
10491
|
-
// cases, the code will fall back to using strings.
|
|
10492
|
-
}
|
|
10493
|
-
}
|
|
10494
|
-
}
|
|
10495
|
-
return policy$1$1;
|
|
10496
|
-
}
|
|
10497
10457
|
/**
|
|
10498
10458
|
* Unsafely promote a string to a TrustedHTML, falling back to strings when
|
|
10499
10459
|
* Trusted Types are not available.
|
|
@@ -10504,7 +10464,7 @@ function getPolicy$1$1() {
|
|
|
10504
10464
|
* element.innerHTML.
|
|
10505
10465
|
*/
|
|
10506
10466
|
function trustedHTMLFromString$1(html) {
|
|
10507
|
-
return
|
|
10467
|
+
return html;
|
|
10508
10468
|
}
|
|
10509
10469
|
/**
|
|
10510
10470
|
* Unsafely promote a string to a TrustedScriptURL, falling back to strings
|
|
@@ -10516,49 +10476,7 @@ function trustedHTMLFromString$1(html) {
|
|
|
10516
10476
|
* assigning to script.src.
|
|
10517
10477
|
*/
|
|
10518
10478
|
function trustedScriptURLFromString$1(url) {
|
|
10519
|
-
return
|
|
10520
|
-
}
|
|
10521
|
-
|
|
10522
|
-
/**
|
|
10523
|
-
* @fileoverview
|
|
10524
|
-
* A module to facilitate use of a Trusted Types policy internally within
|
|
10525
|
-
* Angular specifically for bypassSecurityTrust* and custom sanitizers. It
|
|
10526
|
-
* lazily constructs the Trusted Types policy, providing helper utilities for
|
|
10527
|
-
* promoting strings to Trusted Types. When Trusted Types are not available,
|
|
10528
|
-
* strings are used as a fallback.
|
|
10529
|
-
* @security All use of this module is security-sensitive and should go through
|
|
10530
|
-
* security review.
|
|
10531
|
-
*/
|
|
10532
|
-
/**
|
|
10533
|
-
* The Trusted Types policy, or null if Trusted Types are not
|
|
10534
|
-
* enabled/supported, or undefined if the policy has not been created yet.
|
|
10535
|
-
*/
|
|
10536
|
-
let policy$4;
|
|
10537
|
-
/**
|
|
10538
|
-
* Returns the Trusted Types policy, or null if Trusted Types are not
|
|
10539
|
-
* enabled/supported. The first call to this function will create the policy.
|
|
10540
|
-
*/
|
|
10541
|
-
function getPolicy$4() {
|
|
10542
|
-
if (policy$4 === undefined) {
|
|
10543
|
-
policy$4 = null;
|
|
10544
|
-
if (_global$3.trustedTypes) {
|
|
10545
|
-
try {
|
|
10546
|
-
policy$4 = _global$3.trustedTypes
|
|
10547
|
-
.createPolicy('angular#unsafe-bypass', {
|
|
10548
|
-
createHTML: (s) => s,
|
|
10549
|
-
createScript: (s) => s,
|
|
10550
|
-
createScriptURL: (s) => s,
|
|
10551
|
-
});
|
|
10552
|
-
}
|
|
10553
|
-
catch {
|
|
10554
|
-
// trustedTypes.createPolicy throws if called with a name that is
|
|
10555
|
-
// already registered, even in report-only mode. Until the API changes,
|
|
10556
|
-
// catch the error not to break the applications functionally. In such
|
|
10557
|
-
// cases, the code will fall back to using strings.
|
|
10558
|
-
}
|
|
10559
|
-
}
|
|
10560
|
-
}
|
|
10561
|
-
return policy$4;
|
|
10479
|
+
return url;
|
|
10562
10480
|
}
|
|
10563
10481
|
/**
|
|
10564
10482
|
* Unsafely promote a string to a TrustedHTML, falling back to strings when
|
|
@@ -10569,7 +10487,7 @@ function getPolicy$4() {
|
|
|
10569
10487
|
* bypassSecurityTrust* functions.
|
|
10570
10488
|
*/
|
|
10571
10489
|
function trustedHTMLFromStringBypass$1(html) {
|
|
10572
|
-
return
|
|
10490
|
+
return html;
|
|
10573
10491
|
}
|
|
10574
10492
|
/**
|
|
10575
10493
|
* Unsafely promote a string to a TrustedScript, falling back to strings when
|
|
@@ -10580,7 +10498,7 @@ function trustedHTMLFromStringBypass$1(html) {
|
|
|
10580
10498
|
* bypassSecurityTrust* functions.
|
|
10581
10499
|
*/
|
|
10582
10500
|
function trustedScriptFromStringBypass$1(script) {
|
|
10583
|
-
return
|
|
10501
|
+
return script;
|
|
10584
10502
|
}
|
|
10585
10503
|
/**
|
|
10586
10504
|
* Unsafely promote a string to a TrustedScriptURL, falling back to strings
|
|
@@ -10591,7 +10509,7 @@ function trustedScriptFromStringBypass$1(script) {
|
|
|
10591
10509
|
* bypassSecurityTrust* functions.
|
|
10592
10510
|
*/
|
|
10593
10511
|
function trustedScriptURLFromStringBypass$1(url) {
|
|
10594
|
-
return
|
|
10512
|
+
return url;
|
|
10595
10513
|
}
|
|
10596
10514
|
|
|
10597
10515
|
let SafeValueImpl$1 = class SafeValueImpl {
|
|
@@ -55134,46 +55052,6 @@ const PRESERVE_HOST_CONTENT = new InjectionToken((typeof ngDevMode === 'undefine
|
|
|
55134
55052
|
* is enabled.
|
|
55135
55053
|
*/
|
|
55136
55054
|
const IS_I18N_HYDRATION_ENABLED = new InjectionToken((typeof ngDevMode === 'undefined' || !!ngDevMode ? 'IS_I18N_HYDRATION_ENABLED' : ''));
|
|
55137
|
-
|
|
55138
|
-
/**
|
|
55139
|
-
* @fileoverview
|
|
55140
|
-
* A module to facilitate use of a Trusted Types policy internally within
|
|
55141
|
-
* Angular. It lazily constructs the Trusted Types policy, providing helper
|
|
55142
|
-
* utilities for promoting strings to Trusted Types. When Trusted Types are not
|
|
55143
|
-
* available, strings are used as a fallback.
|
|
55144
|
-
* @security All use of this module is security-sensitive and should go through
|
|
55145
|
-
* security review.
|
|
55146
|
-
*/
|
|
55147
|
-
/**
|
|
55148
|
-
* The Trusted Types policy, or null if Trusted Types are not
|
|
55149
|
-
* enabled/supported, or undefined if the policy has not been created yet.
|
|
55150
|
-
*/
|
|
55151
|
-
let policy$1;
|
|
55152
|
-
/**
|
|
55153
|
-
* Returns the Trusted Types policy, or null if Trusted Types are not
|
|
55154
|
-
* enabled/supported. The first call to this function will create the policy.
|
|
55155
|
-
*/
|
|
55156
|
-
function getPolicy$1() {
|
|
55157
|
-
if (policy$1 === undefined) {
|
|
55158
|
-
policy$1 = null;
|
|
55159
|
-
if (_global$1.trustedTypes) {
|
|
55160
|
-
try {
|
|
55161
|
-
policy$1 = _global$1.trustedTypes.createPolicy('angular', {
|
|
55162
|
-
createHTML: (s) => s,
|
|
55163
|
-
createScript: (s) => s,
|
|
55164
|
-
createScriptURL: (s) => s,
|
|
55165
|
-
});
|
|
55166
|
-
}
|
|
55167
|
-
catch {
|
|
55168
|
-
// trustedTypes.createPolicy throws if called with a name that is
|
|
55169
|
-
// already registered, even in report-only mode. Until the API changes,
|
|
55170
|
-
// catch the error not to break the applications functionally. In such
|
|
55171
|
-
// cases, the code will fall back to using strings.
|
|
55172
|
-
}
|
|
55173
|
-
}
|
|
55174
|
-
}
|
|
55175
|
-
return policy$1;
|
|
55176
|
-
}
|
|
55177
55055
|
/**
|
|
55178
55056
|
* Unsafely promote a string to a TrustedHTML, falling back to strings when
|
|
55179
55057
|
* Trusted Types are not available.
|
|
@@ -55184,7 +55062,7 @@ function getPolicy$1() {
|
|
|
55184
55062
|
* element.innerHTML.
|
|
55185
55063
|
*/
|
|
55186
55064
|
function trustedHTMLFromString(html) {
|
|
55187
|
-
return
|
|
55065
|
+
return html;
|
|
55188
55066
|
}
|
|
55189
55067
|
/**
|
|
55190
55068
|
* Unsafely promote a string to a TrustedScriptURL, falling back to strings
|
|
@@ -55196,49 +55074,7 @@ function trustedHTMLFromString(html) {
|
|
|
55196
55074
|
* assigning to script.src.
|
|
55197
55075
|
*/
|
|
55198
55076
|
function trustedScriptURLFromString(url) {
|
|
55199
|
-
return
|
|
55200
|
-
}
|
|
55201
|
-
|
|
55202
|
-
/**
|
|
55203
|
-
* @fileoverview
|
|
55204
|
-
* A module to facilitate use of a Trusted Types policy internally within
|
|
55205
|
-
* Angular specifically for bypassSecurityTrust* and custom sanitizers. It
|
|
55206
|
-
* lazily constructs the Trusted Types policy, providing helper utilities for
|
|
55207
|
-
* promoting strings to Trusted Types. When Trusted Types are not available,
|
|
55208
|
-
* strings are used as a fallback.
|
|
55209
|
-
* @security All use of this module is security-sensitive and should go through
|
|
55210
|
-
* security review.
|
|
55211
|
-
*/
|
|
55212
|
-
/**
|
|
55213
|
-
* The Trusted Types policy, or null if Trusted Types are not
|
|
55214
|
-
* enabled/supported, or undefined if the policy has not been created yet.
|
|
55215
|
-
*/
|
|
55216
|
-
let policy$2;
|
|
55217
|
-
/**
|
|
55218
|
-
* Returns the Trusted Types policy, or null if Trusted Types are not
|
|
55219
|
-
* enabled/supported. The first call to this function will create the policy.
|
|
55220
|
-
*/
|
|
55221
|
-
function getPolicy$2() {
|
|
55222
|
-
if (policy$2 === undefined) {
|
|
55223
|
-
policy$2 = null;
|
|
55224
|
-
if (_global$1.trustedTypes) {
|
|
55225
|
-
try {
|
|
55226
|
-
policy$2 = _global$1.trustedTypes
|
|
55227
|
-
.createPolicy('angular#unsafe-bypass', {
|
|
55228
|
-
createHTML: (s) => s,
|
|
55229
|
-
createScript: (s) => s,
|
|
55230
|
-
createScriptURL: (s) => s,
|
|
55231
|
-
});
|
|
55232
|
-
}
|
|
55233
|
-
catch {
|
|
55234
|
-
// trustedTypes.createPolicy throws if called with a name that is
|
|
55235
|
-
// already registered, even in report-only mode. Until the API changes,
|
|
55236
|
-
// catch the error not to break the applications functionally. In such
|
|
55237
|
-
// cases, the code will fall back to using strings.
|
|
55238
|
-
}
|
|
55239
|
-
}
|
|
55240
|
-
}
|
|
55241
|
-
return policy$2;
|
|
55077
|
+
return url;
|
|
55242
55078
|
}
|
|
55243
55079
|
/**
|
|
55244
55080
|
* Unsafely promote a string to a TrustedHTML, falling back to strings when
|
|
@@ -55249,7 +55085,7 @@ function getPolicy$2() {
|
|
|
55249
55085
|
* bypassSecurityTrust* functions.
|
|
55250
55086
|
*/
|
|
55251
55087
|
function trustedHTMLFromStringBypass(html) {
|
|
55252
|
-
return
|
|
55088
|
+
return html;
|
|
55253
55089
|
}
|
|
55254
55090
|
/**
|
|
55255
55091
|
* Unsafely promote a string to a TrustedScript, falling back to strings when
|
|
@@ -55260,7 +55096,7 @@ function trustedHTMLFromStringBypass(html) {
|
|
|
55260
55096
|
* bypassSecurityTrust* functions.
|
|
55261
55097
|
*/
|
|
55262
55098
|
function trustedScriptFromStringBypass(script) {
|
|
55263
|
-
return
|
|
55099
|
+
return script;
|
|
55264
55100
|
}
|
|
55265
55101
|
/**
|
|
55266
55102
|
* Unsafely promote a string to a TrustedScriptURL, falling back to strings
|
|
@@ -55271,7 +55107,7 @@ function trustedScriptFromStringBypass(script) {
|
|
|
55271
55107
|
* bypassSecurityTrust* functions.
|
|
55272
55108
|
*/
|
|
55273
55109
|
function trustedScriptURLFromStringBypass(url) {
|
|
55274
|
-
return
|
|
55110
|
+
return url;
|
|
55275
55111
|
}
|
|
55276
55112
|
|
|
55277
55113
|
class SafeValueImpl {
|
|
@@ -94344,45 +94180,6 @@ let AbstractJsEmitterVisitor$1 = class AbstractJsEmitterVisitor extends Abstract
|
|
|
94344
94180
|
this.visitAllObjects(param => ctx.print(null, param.name), params, ctx, ',');
|
|
94345
94181
|
}
|
|
94346
94182
|
};
|
|
94347
|
-
|
|
94348
|
-
/**
|
|
94349
|
-
* @fileoverview
|
|
94350
|
-
* A module to facilitate use of a Trusted Types policy within the JIT
|
|
94351
|
-
* compiler. It lazily constructs the Trusted Types policy, providing helper
|
|
94352
|
-
* utilities for promoting strings to Trusted Types. When Trusted Types are not
|
|
94353
|
-
* available, strings are used as a fallback.
|
|
94354
|
-
* @security All use of this module is security-sensitive and should go through
|
|
94355
|
-
* security review.
|
|
94356
|
-
*/
|
|
94357
|
-
/**
|
|
94358
|
-
* The Trusted Types policy, or null if Trusted Types are not
|
|
94359
|
-
* enabled/supported, or undefined if the policy has not been created yet.
|
|
94360
|
-
*/
|
|
94361
|
-
let policy$3;
|
|
94362
|
-
/**
|
|
94363
|
-
* Returns the Trusted Types policy, or null if Trusted Types are not
|
|
94364
|
-
* enabled/supported. The first call to this function will create the policy.
|
|
94365
|
-
*/
|
|
94366
|
-
function getPolicy$3() {
|
|
94367
|
-
if (policy$3 === undefined) {
|
|
94368
|
-
const trustedTypes = _global$2['trustedTypes'];
|
|
94369
|
-
policy$3 = null;
|
|
94370
|
-
if (trustedTypes) {
|
|
94371
|
-
try {
|
|
94372
|
-
policy$3 = trustedTypes.createPolicy('angular#unsafe-jit', {
|
|
94373
|
-
createScript: (s) => s,
|
|
94374
|
-
});
|
|
94375
|
-
}
|
|
94376
|
-
catch {
|
|
94377
|
-
// trustedTypes.createPolicy throws if called with a name that is
|
|
94378
|
-
// already registered, even in report-only mode. Until the API changes,
|
|
94379
|
-
// catch the error not to break the applications functionally. In such
|
|
94380
|
-
// cases, the code will fall back to using strings.
|
|
94381
|
-
}
|
|
94382
|
-
}
|
|
94383
|
-
}
|
|
94384
|
-
return policy$3;
|
|
94385
|
-
}
|
|
94386
94183
|
/**
|
|
94387
94184
|
* Unsafely promote a string to a TrustedScript, falling back to strings when
|
|
94388
94185
|
* Trusted Types are not available.
|
|
@@ -94391,7 +94188,7 @@ function getPolicy$3() {
|
|
|
94391
94188
|
* interpreted and executed as a script by a browser, e.g. when calling eval.
|
|
94392
94189
|
*/
|
|
94393
94190
|
function trustedScriptFromString$1(script) {
|
|
94394
|
-
return
|
|
94191
|
+
return script;
|
|
94395
94192
|
}
|
|
94396
94193
|
/**
|
|
94397
94194
|
* Unsafely call the Function constructor with the given string arguments.
|
|
@@ -142015,7 +141812,6 @@ var FormWidgetType$1;
|
|
|
142015
141812
|
FormWidgetType["CHIPS"] = "chips";
|
|
142016
141813
|
FormWidgetType["COLORPICKER"] = "colorpicker";
|
|
142017
141814
|
FormWidgetType["CURRENCY"] = "currency";
|
|
142018
|
-
FormWidgetType["CUSTOMWIDGET"] = "custom-widget";
|
|
142019
141815
|
FormWidgetType["DATE"] = "date";
|
|
142020
141816
|
FormWidgetType["DATETIME"] = "datetime";
|
|
142021
141817
|
FormWidgetType["NUMBER"] = "number";
|
|
@@ -143756,7 +143552,6 @@ var ComponentType$1;
|
|
|
143756
143552
|
ComponentType[ComponentType["PAGE"] = 0] = "PAGE";
|
|
143757
143553
|
ComponentType[ComponentType["PREFAB"] = 1] = "PREFAB";
|
|
143758
143554
|
ComponentType[ComponentType["PARTIAL"] = 2] = "PARTIAL";
|
|
143759
|
-
ComponentType[ComponentType["WIDGET"] = 3] = "WIDGET";
|
|
143760
143555
|
})(ComponentType$1 || (ComponentType$1 = {}));
|
|
143761
143556
|
var Operation$1;
|
|
143762
143557
|
(function (Operation) {
|
|
@@ -143845,14 +143640,6 @@ const REGEX$1 = {
|
|
|
143845
143640
|
const NUMBER_TYPES$1 = ['int', DataType$1.INTEGER, DataType$1.FLOAT, DataType$1.DOUBLE, DataType$1.LONG, DataType$1.SHORT, DataType$1.BYTE, DataType$1.BIG_INTEGER, DataType$1.BIG_DECIMAL];
|
|
143846
143641
|
const now$2 = new Date();
|
|
143847
143642
|
const CURRENT_DATE$1 = 'CURRENT_DATE';
|
|
143848
|
-
const getNavClass$1 = (suffix) => {
|
|
143849
|
-
const APP_NAV_CLASS_PREFIX = 'app-nav-';
|
|
143850
|
-
return APP_NAV_CLASS_PREFIX + suffix;
|
|
143851
|
-
};
|
|
143852
|
-
const getSheetPositionClass$1 = (suffix) => {
|
|
143853
|
-
const SHEET_POSITION_CLASS_PREFIX = 'sheet-position-';
|
|
143854
|
-
return SHEET_POSITION_CLASS_PREFIX + suffix;
|
|
143855
|
-
};
|
|
143856
143643
|
const isDefined$1 = v => 'undefined' !== typeof v;
|
|
143857
143644
|
const isObject$3 = v => null !== v && 'object' === typeof v;
|
|
143858
143645
|
const toBoolean$1 = (val, identity) => ((val && val !== 'false') ? true : (identity ? val === identity : false));
|
|
@@ -144484,7 +144271,6 @@ const isEqualWithFields$1 = (obj1, obj2, compareBy) => {
|
|
|
144484
144271
|
// compareBy can be 'id' or 'id1, id2' or 'id1, id2:id3'
|
|
144485
144272
|
// Split the compareby comma separated values
|
|
144486
144273
|
let _compareBy = isArray$2(compareBy) ? compareBy : split$1(compareBy, ',');
|
|
144487
|
-
//@ts-ignore
|
|
144488
144274
|
_compareBy = map$2(_compareBy, trim$1);
|
|
144489
144275
|
return isEqualWith$1(obj1, obj2, function (o1, o2) {
|
|
144490
144276
|
return every$1(_compareBy, function (cb) {
|
|
@@ -145302,11 +145088,9 @@ var Utils$1 = /*#__PURE__*/Object.freeze({
|
|
|
145302
145088
|
getFormattedDate: getFormattedDate$1,
|
|
145303
145089
|
getMomentLocaleObject: getMomentLocaleObject$1,
|
|
145304
145090
|
getNativeDateObject: getNativeDateObject$1,
|
|
145305
|
-
getNavClass: getNavClass$1,
|
|
145306
145091
|
getResourceURL: getResourceURL$1,
|
|
145307
145092
|
getRouteNameFromLink: getRouteNameFromLink$1,
|
|
145308
145093
|
getSessionStorageItem: getSessionStorageItem$1,
|
|
145309
|
-
getSheetPositionClass: getSheetPositionClass$1,
|
|
145310
145094
|
getUrlParams: getUrlParams$1,
|
|
145311
145095
|
getValidDateObject: getValidDateObject$1,
|
|
145312
145096
|
getValidJSON: getValidJSON$1,
|
|
@@ -153690,45 +153474,6 @@ class AbstractJsEmitterVisitor extends AbstractEmitterVisitor {
|
|
|
153690
153474
|
this.visitAllObjects(param => ctx.print(null, param.name), params, ctx, ',');
|
|
153691
153475
|
}
|
|
153692
153476
|
}
|
|
153693
|
-
|
|
153694
|
-
/**
|
|
153695
|
-
* @fileoverview
|
|
153696
|
-
* A module to facilitate use of a Trusted Types policy within the JIT
|
|
153697
|
-
* compiler. It lazily constructs the Trusted Types policy, providing helper
|
|
153698
|
-
* utilities for promoting strings to Trusted Types. When Trusted Types are not
|
|
153699
|
-
* available, strings are used as a fallback.
|
|
153700
|
-
* @security All use of this module is security-sensitive and should go through
|
|
153701
|
-
* security review.
|
|
153702
|
-
*/
|
|
153703
|
-
/**
|
|
153704
|
-
* The Trusted Types policy, or null if Trusted Types are not
|
|
153705
|
-
* enabled/supported, or undefined if the policy has not been created yet.
|
|
153706
|
-
*/
|
|
153707
|
-
let policy;
|
|
153708
|
-
/**
|
|
153709
|
-
* Returns the Trusted Types policy, or null if Trusted Types are not
|
|
153710
|
-
* enabled/supported. The first call to this function will create the policy.
|
|
153711
|
-
*/
|
|
153712
|
-
function getPolicy() {
|
|
153713
|
-
if (policy === undefined) {
|
|
153714
|
-
const trustedTypes = _global['trustedTypes'];
|
|
153715
|
-
policy = null;
|
|
153716
|
-
if (trustedTypes) {
|
|
153717
|
-
try {
|
|
153718
|
-
policy = trustedTypes.createPolicy('angular#unsafe-jit', {
|
|
153719
|
-
createScript: (s) => s,
|
|
153720
|
-
});
|
|
153721
|
-
}
|
|
153722
|
-
catch {
|
|
153723
|
-
// trustedTypes.createPolicy throws if called with a name that is
|
|
153724
|
-
// already registered, even in report-only mode. Until the API changes,
|
|
153725
|
-
// catch the error not to break the applications functionally. In such
|
|
153726
|
-
// cases, the code will fall back to using strings.
|
|
153727
|
-
}
|
|
153728
|
-
}
|
|
153729
|
-
}
|
|
153730
|
-
return policy;
|
|
153731
|
-
}
|
|
153732
153477
|
/**
|
|
153733
153478
|
* Unsafely promote a string to a TrustedScript, falling back to strings when
|
|
153734
153479
|
* Trusted Types are not available.
|
|
@@ -153737,7 +153482,7 @@ function getPolicy() {
|
|
|
153737
153482
|
* interpreted and executed as a script by a browser, e.g. when calling eval.
|
|
153738
153483
|
*/
|
|
153739
153484
|
function trustedScriptFromString(script) {
|
|
153740
|
-
return
|
|
153485
|
+
return script;
|
|
153741
153486
|
}
|
|
153742
153487
|
/**
|
|
153743
153488
|
* Unsafely call the Function constructor with the given string arguments.
|
|
@@ -201361,7 +201106,6 @@ var FormWidgetType;
|
|
|
201361
201106
|
FormWidgetType["CHIPS"] = "chips";
|
|
201362
201107
|
FormWidgetType["COLORPICKER"] = "colorpicker";
|
|
201363
201108
|
FormWidgetType["CURRENCY"] = "currency";
|
|
201364
|
-
FormWidgetType["CUSTOMWIDGET"] = "custom-widget";
|
|
201365
201109
|
FormWidgetType["DATE"] = "date";
|
|
201366
201110
|
FormWidgetType["DATETIME"] = "datetime";
|
|
201367
201111
|
FormWidgetType["NUMBER"] = "number";
|
|
@@ -202037,7 +201781,6 @@ var ComponentType;
|
|
|
202037
201781
|
ComponentType[ComponentType["PAGE"] = 0] = "PAGE";
|
|
202038
201782
|
ComponentType[ComponentType["PREFAB"] = 1] = "PREFAB";
|
|
202039
201783
|
ComponentType[ComponentType["PARTIAL"] = 2] = "PARTIAL";
|
|
202040
|
-
ComponentType[ComponentType["WIDGET"] = 3] = "WIDGET";
|
|
202041
201784
|
})(ComponentType || (ComponentType = {}));
|
|
202042
201785
|
var Operation;
|
|
202043
201786
|
(function (Operation) {
|
|
@@ -202126,14 +201869,6 @@ const REGEX = {
|
|
|
202126
201869
|
const NUMBER_TYPES = ['int', DataType.INTEGER, DataType.FLOAT, DataType.DOUBLE, DataType.LONG, DataType.SHORT, DataType.BYTE, DataType.BIG_INTEGER, DataType.BIG_DECIMAL];
|
|
202127
201870
|
const now = new Date();
|
|
202128
201871
|
const CURRENT_DATE = 'CURRENT_DATE';
|
|
202129
|
-
const getNavClass = (suffix) => {
|
|
202130
|
-
const APP_NAV_CLASS_PREFIX = 'app-nav-';
|
|
202131
|
-
return APP_NAV_CLASS_PREFIX + suffix;
|
|
202132
|
-
};
|
|
202133
|
-
const getSheetPositionClass = (suffix) => {
|
|
202134
|
-
const SHEET_POSITION_CLASS_PREFIX = 'sheet-position-';
|
|
202135
|
-
return SHEET_POSITION_CLASS_PREFIX + suffix;
|
|
202136
|
-
};
|
|
202137
201872
|
const isDefined = v => 'undefined' !== typeof v;
|
|
202138
201873
|
const isObject = v => null !== v && 'object' === typeof v;
|
|
202139
201874
|
const toBoolean = (val, identity) => ((val && val !== 'false') ? true : (identity ? val === identity : false));
|
|
@@ -202765,7 +202500,6 @@ const isEqualWithFields = (obj1, obj2, compareBy) => {
|
|
|
202765
202500
|
// compareBy can be 'id' or 'id1, id2' or 'id1, id2:id3'
|
|
202766
202501
|
// Split the compareby comma separated values
|
|
202767
202502
|
let _compareBy = isArray(compareBy) ? compareBy : split(compareBy, ',');
|
|
202768
|
-
//@ts-ignore
|
|
202769
202503
|
_compareBy = map(_compareBy, trim);
|
|
202770
202504
|
return isEqualWith(obj1, obj2, function (o1, o2) {
|
|
202771
202505
|
return every(_compareBy, function (cb) {
|
|
@@ -203583,11 +203317,9 @@ var Utils = /*#__PURE__*/Object.freeze({
|
|
|
203583
203317
|
getFormattedDate: getFormattedDate,
|
|
203584
203318
|
getMomentLocaleObject: getMomentLocaleObject,
|
|
203585
203319
|
getNativeDateObject: getNativeDateObject,
|
|
203586
|
-
getNavClass: getNavClass,
|
|
203587
203320
|
getResourceURL: getResourceURL,
|
|
203588
203321
|
getRouteNameFromLink: getRouteNameFromLink,
|
|
203589
203322
|
getSessionStorageItem: getSessionStorageItem,
|
|
203590
|
-
getSheetPositionClass: getSheetPositionClass,
|
|
203591
203323
|
getUrlParams: getUrlParams,
|
|
203592
203324
|
getValidDateObject: getValidDateObject,
|
|
203593
203325
|
getValidJSON: getValidJSON,
|