@wavemaker/angular-codegen 12.0.0-next.141134 → 12.0.0-next.141140

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,7 +1,5 @@
1
1
  const prefabConfigs = new Map<string, any>();
2
- const customWidgetConfigs = new Map<string, any>();
3
2
 
4
3
  export const registerPrefabConfig = (prefabName: string, config: any) => prefabConfigs.set(prefabName, config);
5
4
  export const getPrefabConfig = prefabName => prefabConfigs.get(prefabName);
6
- export const registerCustomWidgetConfig = (customWidget: string, config: any) => customWidgetConfigs.set(customWidget, config);
7
- export const getCustomWidgetConfig = customWidget => customWidgetConfigs.get(customWidget);
5
+
@@ -37,9 +37,6 @@
37
37
  "@wavemaker/variables": [
38
38
  "node_modules/@wavemaker/variables/"
39
39
  ],
40
- "@wavemaker/custom-widgets-m3": [
41
- "node_modules/@wavemaker/custom-widgets-m3/"
42
- ],
43
40
  "@wm/components/base": [
44
41
  "node_modules/@wavemaker/app-ng-runtime/components/base/public_api.d.ts"
45
42
  ],
@@ -4975,45 +4975,6 @@ class AbstractJsEmitterVisitor extends AbstractEmitterVisitor {
4975
4975
  this.visitAllObjects(param => ctx.print(null, param.name), params, ctx, ',');
4976
4976
  }
4977
4977
  }
4978
-
4979
- /**
4980
- * @fileoverview
4981
- * A module to facilitate use of a Trusted Types policy within the JIT
4982
- * compiler. It lazily constructs the Trusted Types policy, providing helper
4983
- * utilities for promoting strings to Trusted Types. When Trusted Types are not
4984
- * available, strings are used as a fallback.
4985
- * @security All use of this module is security-sensitive and should go through
4986
- * security review.
4987
- */
4988
- /**
4989
- * The Trusted Types policy, or null if Trusted Types are not
4990
- * enabled/supported, or undefined if the policy has not been created yet.
4991
- */
4992
- let policy;
4993
- /**
4994
- * Returns the Trusted Types policy, or null if Trusted Types are not
4995
- * enabled/supported. The first call to this function will create the policy.
4996
- */
4997
- function getPolicy() {
4998
- if (policy === undefined) {
4999
- const trustedTypes = _global['trustedTypes'];
5000
- policy = null;
5001
- if (trustedTypes) {
5002
- try {
5003
- policy = trustedTypes.createPolicy('angular#unsafe-jit', {
5004
- createScript: (s) => s,
5005
- });
5006
- }
5007
- catch {
5008
- // trustedTypes.createPolicy throws if called with a name that is
5009
- // already registered, even in report-only mode. Until the API changes,
5010
- // catch the error not to break the applications functionally. In such
5011
- // cases, the code will fall back to using strings.
5012
- }
5013
- }
5014
- }
5015
- return policy;
5016
- }
5017
4978
  /**
5018
4979
  * Unsafely promote a string to a TrustedScript, falling back to strings when
5019
4980
  * Trusted Types are not available.
@@ -5022,7 +4983,7 @@ function getPolicy() {
5022
4983
  * interpreted and executed as a script by a browser, e.g. when calling eval.
5023
4984
  */
5024
4985
  function trustedScriptFromString(script) {
5025
- return getPolicy()?.createScript(script) || script;
4986
+ return script;
5026
4987
  }
5027
4988
  /**
5028
4989
  * Unsafely call the Function constructor with the given string arguments.
@@ -10454,46 +10454,6 @@ const PRESERVE_HOST_CONTENT$1 = new InjectionToken$1((typeof ngDevMode === 'unde
10454
10454
  * is enabled.
10455
10455
  */
10456
10456
  const IS_I18N_HYDRATION_ENABLED$1 = new InjectionToken$1((typeof ngDevMode === 'undefined' || !!ngDevMode ? 'IS_I18N_HYDRATION_ENABLED' : ''));
10457
-
10458
- /**
10459
- * @fileoverview
10460
- * A module to facilitate use of a Trusted Types policy internally within
10461
- * Angular. It lazily constructs the Trusted Types policy, providing helper
10462
- * utilities for promoting strings to Trusted Types. When Trusted Types are not
10463
- * available, strings are used as a fallback.
10464
- * @security All use of this module is security-sensitive and should go through
10465
- * security review.
10466
- */
10467
- /**
10468
- * The Trusted Types policy, or null if Trusted Types are not
10469
- * enabled/supported, or undefined if the policy has not been created yet.
10470
- */
10471
- let policy$1$1;
10472
- /**
10473
- * Returns the Trusted Types policy, or null if Trusted Types are not
10474
- * enabled/supported. The first call to this function will create the policy.
10475
- */
10476
- function getPolicy$1$1() {
10477
- if (policy$1$1 === undefined) {
10478
- policy$1$1 = null;
10479
- if (_global$3.trustedTypes) {
10480
- try {
10481
- policy$1$1 = _global$3.trustedTypes.createPolicy('angular', {
10482
- createHTML: (s) => s,
10483
- createScript: (s) => s,
10484
- createScriptURL: (s) => s,
10485
- });
10486
- }
10487
- catch {
10488
- // trustedTypes.createPolicy throws if called with a name that is
10489
- // already registered, even in report-only mode. Until the API changes,
10490
- // catch the error not to break the applications functionally. In such
10491
- // cases, the code will fall back to using strings.
10492
- }
10493
- }
10494
- }
10495
- return policy$1$1;
10496
- }
10497
10457
  /**
10498
10458
  * Unsafely promote a string to a TrustedHTML, falling back to strings when
10499
10459
  * Trusted Types are not available.
@@ -10504,7 +10464,7 @@ function getPolicy$1$1() {
10504
10464
  * element.innerHTML.
10505
10465
  */
10506
10466
  function trustedHTMLFromString$1(html) {
10507
- return getPolicy$1$1()?.createHTML(html) || html;
10467
+ return html;
10508
10468
  }
10509
10469
  /**
10510
10470
  * Unsafely promote a string to a TrustedScriptURL, falling back to strings
@@ -10516,49 +10476,7 @@ function trustedHTMLFromString$1(html) {
10516
10476
  * assigning to script.src.
10517
10477
  */
10518
10478
  function trustedScriptURLFromString$1(url) {
10519
- return getPolicy$1$1()?.createScriptURL(url) || url;
10520
- }
10521
-
10522
- /**
10523
- * @fileoverview
10524
- * A module to facilitate use of a Trusted Types policy internally within
10525
- * Angular specifically for bypassSecurityTrust* and custom sanitizers. It
10526
- * lazily constructs the Trusted Types policy, providing helper utilities for
10527
- * promoting strings to Trusted Types. When Trusted Types are not available,
10528
- * strings are used as a fallback.
10529
- * @security All use of this module is security-sensitive and should go through
10530
- * security review.
10531
- */
10532
- /**
10533
- * The Trusted Types policy, or null if Trusted Types are not
10534
- * enabled/supported, or undefined if the policy has not been created yet.
10535
- */
10536
- let policy$4;
10537
- /**
10538
- * Returns the Trusted Types policy, or null if Trusted Types are not
10539
- * enabled/supported. The first call to this function will create the policy.
10540
- */
10541
- function getPolicy$4() {
10542
- if (policy$4 === undefined) {
10543
- policy$4 = null;
10544
- if (_global$3.trustedTypes) {
10545
- try {
10546
- policy$4 = _global$3.trustedTypes
10547
- .createPolicy('angular#unsafe-bypass', {
10548
- createHTML: (s) => s,
10549
- createScript: (s) => s,
10550
- createScriptURL: (s) => s,
10551
- });
10552
- }
10553
- catch {
10554
- // trustedTypes.createPolicy throws if called with a name that is
10555
- // already registered, even in report-only mode. Until the API changes,
10556
- // catch the error not to break the applications functionally. In such
10557
- // cases, the code will fall back to using strings.
10558
- }
10559
- }
10560
- }
10561
- return policy$4;
10479
+ return url;
10562
10480
  }
10563
10481
  /**
10564
10482
  * Unsafely promote a string to a TrustedHTML, falling back to strings when
@@ -10569,7 +10487,7 @@ function getPolicy$4() {
10569
10487
  * bypassSecurityTrust* functions.
10570
10488
  */
10571
10489
  function trustedHTMLFromStringBypass$1(html) {
10572
- return getPolicy$4()?.createHTML(html) || html;
10490
+ return html;
10573
10491
  }
10574
10492
  /**
10575
10493
  * Unsafely promote a string to a TrustedScript, falling back to strings when
@@ -10580,7 +10498,7 @@ function trustedHTMLFromStringBypass$1(html) {
10580
10498
  * bypassSecurityTrust* functions.
10581
10499
  */
10582
10500
  function trustedScriptFromStringBypass$1(script) {
10583
- return getPolicy$4()?.createScript(script) || script;
10501
+ return script;
10584
10502
  }
10585
10503
  /**
10586
10504
  * Unsafely promote a string to a TrustedScriptURL, falling back to strings
@@ -10591,7 +10509,7 @@ function trustedScriptFromStringBypass$1(script) {
10591
10509
  * bypassSecurityTrust* functions.
10592
10510
  */
10593
10511
  function trustedScriptURLFromStringBypass$1(url) {
10594
- return getPolicy$4()?.createScriptURL(url) || url;
10512
+ return url;
10595
10513
  }
10596
10514
 
10597
10515
  let SafeValueImpl$1 = class SafeValueImpl {
@@ -55134,46 +55052,6 @@ const PRESERVE_HOST_CONTENT = new InjectionToken((typeof ngDevMode === 'undefine
55134
55052
  * is enabled.
55135
55053
  */
55136
55054
  const IS_I18N_HYDRATION_ENABLED = new InjectionToken((typeof ngDevMode === 'undefined' || !!ngDevMode ? 'IS_I18N_HYDRATION_ENABLED' : ''));
55137
-
55138
- /**
55139
- * @fileoverview
55140
- * A module to facilitate use of a Trusted Types policy internally within
55141
- * Angular. It lazily constructs the Trusted Types policy, providing helper
55142
- * utilities for promoting strings to Trusted Types. When Trusted Types are not
55143
- * available, strings are used as a fallback.
55144
- * @security All use of this module is security-sensitive and should go through
55145
- * security review.
55146
- */
55147
- /**
55148
- * The Trusted Types policy, or null if Trusted Types are not
55149
- * enabled/supported, or undefined if the policy has not been created yet.
55150
- */
55151
- let policy$1;
55152
- /**
55153
- * Returns the Trusted Types policy, or null if Trusted Types are not
55154
- * enabled/supported. The first call to this function will create the policy.
55155
- */
55156
- function getPolicy$1() {
55157
- if (policy$1 === undefined) {
55158
- policy$1 = null;
55159
- if (_global$1.trustedTypes) {
55160
- try {
55161
- policy$1 = _global$1.trustedTypes.createPolicy('angular', {
55162
- createHTML: (s) => s,
55163
- createScript: (s) => s,
55164
- createScriptURL: (s) => s,
55165
- });
55166
- }
55167
- catch {
55168
- // trustedTypes.createPolicy throws if called with a name that is
55169
- // already registered, even in report-only mode. Until the API changes,
55170
- // catch the error not to break the applications functionally. In such
55171
- // cases, the code will fall back to using strings.
55172
- }
55173
- }
55174
- }
55175
- return policy$1;
55176
- }
55177
55055
  /**
55178
55056
  * Unsafely promote a string to a TrustedHTML, falling back to strings when
55179
55057
  * Trusted Types are not available.
@@ -55184,7 +55062,7 @@ function getPolicy$1() {
55184
55062
  * element.innerHTML.
55185
55063
  */
55186
55064
  function trustedHTMLFromString(html) {
55187
- return getPolicy$1()?.createHTML(html) || html;
55065
+ return html;
55188
55066
  }
55189
55067
  /**
55190
55068
  * Unsafely promote a string to a TrustedScriptURL, falling back to strings
@@ -55196,49 +55074,7 @@ function trustedHTMLFromString(html) {
55196
55074
  * assigning to script.src.
55197
55075
  */
55198
55076
  function trustedScriptURLFromString(url) {
55199
- return getPolicy$1()?.createScriptURL(url) || url;
55200
- }
55201
-
55202
- /**
55203
- * @fileoverview
55204
- * A module to facilitate use of a Trusted Types policy internally within
55205
- * Angular specifically for bypassSecurityTrust* and custom sanitizers. It
55206
- * lazily constructs the Trusted Types policy, providing helper utilities for
55207
- * promoting strings to Trusted Types. When Trusted Types are not available,
55208
- * strings are used as a fallback.
55209
- * @security All use of this module is security-sensitive and should go through
55210
- * security review.
55211
- */
55212
- /**
55213
- * The Trusted Types policy, or null if Trusted Types are not
55214
- * enabled/supported, or undefined if the policy has not been created yet.
55215
- */
55216
- let policy$2;
55217
- /**
55218
- * Returns the Trusted Types policy, or null if Trusted Types are not
55219
- * enabled/supported. The first call to this function will create the policy.
55220
- */
55221
- function getPolicy$2() {
55222
- if (policy$2 === undefined) {
55223
- policy$2 = null;
55224
- if (_global$1.trustedTypes) {
55225
- try {
55226
- policy$2 = _global$1.trustedTypes
55227
- .createPolicy('angular#unsafe-bypass', {
55228
- createHTML: (s) => s,
55229
- createScript: (s) => s,
55230
- createScriptURL: (s) => s,
55231
- });
55232
- }
55233
- catch {
55234
- // trustedTypes.createPolicy throws if called with a name that is
55235
- // already registered, even in report-only mode. Until the API changes,
55236
- // catch the error not to break the applications functionally. In such
55237
- // cases, the code will fall back to using strings.
55238
- }
55239
- }
55240
- }
55241
- return policy$2;
55077
+ return url;
55242
55078
  }
55243
55079
  /**
55244
55080
  * Unsafely promote a string to a TrustedHTML, falling back to strings when
@@ -55249,7 +55085,7 @@ function getPolicy$2() {
55249
55085
  * bypassSecurityTrust* functions.
55250
55086
  */
55251
55087
  function trustedHTMLFromStringBypass(html) {
55252
- return getPolicy$2()?.createHTML(html) || html;
55088
+ return html;
55253
55089
  }
55254
55090
  /**
55255
55091
  * Unsafely promote a string to a TrustedScript, falling back to strings when
@@ -55260,7 +55096,7 @@ function trustedHTMLFromStringBypass(html) {
55260
55096
  * bypassSecurityTrust* functions.
55261
55097
  */
55262
55098
  function trustedScriptFromStringBypass(script) {
55263
- return getPolicy$2()?.createScript(script) || script;
55099
+ return script;
55264
55100
  }
55265
55101
  /**
55266
55102
  * Unsafely promote a string to a TrustedScriptURL, falling back to strings
@@ -55271,7 +55107,7 @@ function trustedScriptFromStringBypass(script) {
55271
55107
  * bypassSecurityTrust* functions.
55272
55108
  */
55273
55109
  function trustedScriptURLFromStringBypass(url) {
55274
- return getPolicy$2()?.createScriptURL(url) || url;
55110
+ return url;
55275
55111
  }
55276
55112
 
55277
55113
  class SafeValueImpl {
@@ -94344,45 +94180,6 @@ let AbstractJsEmitterVisitor$1 = class AbstractJsEmitterVisitor extends Abstract
94344
94180
  this.visitAllObjects(param => ctx.print(null, param.name), params, ctx, ',');
94345
94181
  }
94346
94182
  };
94347
-
94348
- /**
94349
- * @fileoverview
94350
- * A module to facilitate use of a Trusted Types policy within the JIT
94351
- * compiler. It lazily constructs the Trusted Types policy, providing helper
94352
- * utilities for promoting strings to Trusted Types. When Trusted Types are not
94353
- * available, strings are used as a fallback.
94354
- * @security All use of this module is security-sensitive and should go through
94355
- * security review.
94356
- */
94357
- /**
94358
- * The Trusted Types policy, or null if Trusted Types are not
94359
- * enabled/supported, or undefined if the policy has not been created yet.
94360
- */
94361
- let policy$3;
94362
- /**
94363
- * Returns the Trusted Types policy, or null if Trusted Types are not
94364
- * enabled/supported. The first call to this function will create the policy.
94365
- */
94366
- function getPolicy$3() {
94367
- if (policy$3 === undefined) {
94368
- const trustedTypes = _global$2['trustedTypes'];
94369
- policy$3 = null;
94370
- if (trustedTypes) {
94371
- try {
94372
- policy$3 = trustedTypes.createPolicy('angular#unsafe-jit', {
94373
- createScript: (s) => s,
94374
- });
94375
- }
94376
- catch {
94377
- // trustedTypes.createPolicy throws if called with a name that is
94378
- // already registered, even in report-only mode. Until the API changes,
94379
- // catch the error not to break the applications functionally. In such
94380
- // cases, the code will fall back to using strings.
94381
- }
94382
- }
94383
- }
94384
- return policy$3;
94385
- }
94386
94183
  /**
94387
94184
  * Unsafely promote a string to a TrustedScript, falling back to strings when
94388
94185
  * Trusted Types are not available.
@@ -94391,7 +94188,7 @@ function getPolicy$3() {
94391
94188
  * interpreted and executed as a script by a browser, e.g. when calling eval.
94392
94189
  */
94393
94190
  function trustedScriptFromString$1(script) {
94394
- return getPolicy$3()?.createScript(script) || script;
94191
+ return script;
94395
94192
  }
94396
94193
  /**
94397
94194
  * Unsafely call the Function constructor with the given string arguments.
@@ -142015,7 +141812,6 @@ var FormWidgetType$1;
142015
141812
  FormWidgetType["CHIPS"] = "chips";
142016
141813
  FormWidgetType["COLORPICKER"] = "colorpicker";
142017
141814
  FormWidgetType["CURRENCY"] = "currency";
142018
- FormWidgetType["CUSTOMWIDGET"] = "custom-widget";
142019
141815
  FormWidgetType["DATE"] = "date";
142020
141816
  FormWidgetType["DATETIME"] = "datetime";
142021
141817
  FormWidgetType["NUMBER"] = "number";
@@ -143756,7 +143552,6 @@ var ComponentType$1;
143756
143552
  ComponentType[ComponentType["PAGE"] = 0] = "PAGE";
143757
143553
  ComponentType[ComponentType["PREFAB"] = 1] = "PREFAB";
143758
143554
  ComponentType[ComponentType["PARTIAL"] = 2] = "PARTIAL";
143759
- ComponentType[ComponentType["WIDGET"] = 3] = "WIDGET";
143760
143555
  })(ComponentType$1 || (ComponentType$1 = {}));
143761
143556
  var Operation$1;
143762
143557
  (function (Operation) {
@@ -143845,14 +143640,6 @@ const REGEX$1 = {
143845
143640
  const NUMBER_TYPES$1 = ['int', DataType$1.INTEGER, DataType$1.FLOAT, DataType$1.DOUBLE, DataType$1.LONG, DataType$1.SHORT, DataType$1.BYTE, DataType$1.BIG_INTEGER, DataType$1.BIG_DECIMAL];
143846
143641
  const now$2 = new Date();
143847
143642
  const CURRENT_DATE$1 = 'CURRENT_DATE';
143848
- const getNavClass$1 = (suffix) => {
143849
- const APP_NAV_CLASS_PREFIX = 'app-nav-';
143850
- return APP_NAV_CLASS_PREFIX + suffix;
143851
- };
143852
- const getSheetPositionClass$1 = (suffix) => {
143853
- const SHEET_POSITION_CLASS_PREFIX = 'sheet-position-';
143854
- return SHEET_POSITION_CLASS_PREFIX + suffix;
143855
- };
143856
143643
  const isDefined$1 = v => 'undefined' !== typeof v;
143857
143644
  const isObject$3 = v => null !== v && 'object' === typeof v;
143858
143645
  const toBoolean$1 = (val, identity) => ((val && val !== 'false') ? true : (identity ? val === identity : false));
@@ -144484,7 +144271,6 @@ const isEqualWithFields$1 = (obj1, obj2, compareBy) => {
144484
144271
  // compareBy can be 'id' or 'id1, id2' or 'id1, id2:id3'
144485
144272
  // Split the compareby comma separated values
144486
144273
  let _compareBy = isArray$2(compareBy) ? compareBy : split$1(compareBy, ',');
144487
- //@ts-ignore
144488
144274
  _compareBy = map$2(_compareBy, trim$1);
144489
144275
  return isEqualWith$1(obj1, obj2, function (o1, o2) {
144490
144276
  return every$1(_compareBy, function (cb) {
@@ -145302,11 +145088,9 @@ var Utils$1 = /*#__PURE__*/Object.freeze({
145302
145088
  getFormattedDate: getFormattedDate$1,
145303
145089
  getMomentLocaleObject: getMomentLocaleObject$1,
145304
145090
  getNativeDateObject: getNativeDateObject$1,
145305
- getNavClass: getNavClass$1,
145306
145091
  getResourceURL: getResourceURL$1,
145307
145092
  getRouteNameFromLink: getRouteNameFromLink$1,
145308
145093
  getSessionStorageItem: getSessionStorageItem$1,
145309
- getSheetPositionClass: getSheetPositionClass$1,
145310
145094
  getUrlParams: getUrlParams$1,
145311
145095
  getValidDateObject: getValidDateObject$1,
145312
145096
  getValidJSON: getValidJSON$1,
@@ -153690,45 +153474,6 @@ class AbstractJsEmitterVisitor extends AbstractEmitterVisitor {
153690
153474
  this.visitAllObjects(param => ctx.print(null, param.name), params, ctx, ',');
153691
153475
  }
153692
153476
  }
153693
-
153694
- /**
153695
- * @fileoverview
153696
- * A module to facilitate use of a Trusted Types policy within the JIT
153697
- * compiler. It lazily constructs the Trusted Types policy, providing helper
153698
- * utilities for promoting strings to Trusted Types. When Trusted Types are not
153699
- * available, strings are used as a fallback.
153700
- * @security All use of this module is security-sensitive and should go through
153701
- * security review.
153702
- */
153703
- /**
153704
- * The Trusted Types policy, or null if Trusted Types are not
153705
- * enabled/supported, or undefined if the policy has not been created yet.
153706
- */
153707
- let policy;
153708
- /**
153709
- * Returns the Trusted Types policy, or null if Trusted Types are not
153710
- * enabled/supported. The first call to this function will create the policy.
153711
- */
153712
- function getPolicy() {
153713
- if (policy === undefined) {
153714
- const trustedTypes = _global['trustedTypes'];
153715
- policy = null;
153716
- if (trustedTypes) {
153717
- try {
153718
- policy = trustedTypes.createPolicy('angular#unsafe-jit', {
153719
- createScript: (s) => s,
153720
- });
153721
- }
153722
- catch {
153723
- // trustedTypes.createPolicy throws if called with a name that is
153724
- // already registered, even in report-only mode. Until the API changes,
153725
- // catch the error not to break the applications functionally. In such
153726
- // cases, the code will fall back to using strings.
153727
- }
153728
- }
153729
- }
153730
- return policy;
153731
- }
153732
153477
  /**
153733
153478
  * Unsafely promote a string to a TrustedScript, falling back to strings when
153734
153479
  * Trusted Types are not available.
@@ -153737,7 +153482,7 @@ function getPolicy() {
153737
153482
  * interpreted and executed as a script by a browser, e.g. when calling eval.
153738
153483
  */
153739
153484
  function trustedScriptFromString(script) {
153740
- return getPolicy()?.createScript(script) || script;
153485
+ return script;
153741
153486
  }
153742
153487
  /**
153743
153488
  * Unsafely call the Function constructor with the given string arguments.
@@ -201361,7 +201106,6 @@ var FormWidgetType;
201361
201106
  FormWidgetType["CHIPS"] = "chips";
201362
201107
  FormWidgetType["COLORPICKER"] = "colorpicker";
201363
201108
  FormWidgetType["CURRENCY"] = "currency";
201364
- FormWidgetType["CUSTOMWIDGET"] = "custom-widget";
201365
201109
  FormWidgetType["DATE"] = "date";
201366
201110
  FormWidgetType["DATETIME"] = "datetime";
201367
201111
  FormWidgetType["NUMBER"] = "number";
@@ -202037,7 +201781,6 @@ var ComponentType;
202037
201781
  ComponentType[ComponentType["PAGE"] = 0] = "PAGE";
202038
201782
  ComponentType[ComponentType["PREFAB"] = 1] = "PREFAB";
202039
201783
  ComponentType[ComponentType["PARTIAL"] = 2] = "PARTIAL";
202040
- ComponentType[ComponentType["WIDGET"] = 3] = "WIDGET";
202041
201784
  })(ComponentType || (ComponentType = {}));
202042
201785
  var Operation;
202043
201786
  (function (Operation) {
@@ -202126,14 +201869,6 @@ const REGEX = {
202126
201869
  const NUMBER_TYPES = ['int', DataType.INTEGER, DataType.FLOAT, DataType.DOUBLE, DataType.LONG, DataType.SHORT, DataType.BYTE, DataType.BIG_INTEGER, DataType.BIG_DECIMAL];
202127
201870
  const now = new Date();
202128
201871
  const CURRENT_DATE = 'CURRENT_DATE';
202129
- const getNavClass = (suffix) => {
202130
- const APP_NAV_CLASS_PREFIX = 'app-nav-';
202131
- return APP_NAV_CLASS_PREFIX + suffix;
202132
- };
202133
- const getSheetPositionClass = (suffix) => {
202134
- const SHEET_POSITION_CLASS_PREFIX = 'sheet-position-';
202135
- return SHEET_POSITION_CLASS_PREFIX + suffix;
202136
- };
202137
201872
  const isDefined = v => 'undefined' !== typeof v;
202138
201873
  const isObject = v => null !== v && 'object' === typeof v;
202139
201874
  const toBoolean = (val, identity) => ((val && val !== 'false') ? true : (identity ? val === identity : false));
@@ -202765,7 +202500,6 @@ const isEqualWithFields = (obj1, obj2, compareBy) => {
202765
202500
  // compareBy can be 'id' or 'id1, id2' or 'id1, id2:id3'
202766
202501
  // Split the compareby comma separated values
202767
202502
  let _compareBy = isArray(compareBy) ? compareBy : split(compareBy, ',');
202768
- //@ts-ignore
202769
202503
  _compareBy = map(_compareBy, trim);
202770
202504
  return isEqualWith(obj1, obj2, function (o1, o2) {
202771
202505
  return every(_compareBy, function (cb) {
@@ -203583,11 +203317,9 @@ var Utils = /*#__PURE__*/Object.freeze({
203583
203317
  getFormattedDate: getFormattedDate,
203584
203318
  getMomentLocaleObject: getMomentLocaleObject,
203585
203319
  getNativeDateObject: getNativeDateObject,
203586
- getNavClass: getNavClass,
203587
203320
  getResourceURL: getResourceURL,
203588
203321
  getRouteNameFromLink: getRouteNameFromLink,
203589
203322
  getSessionStorageItem: getSessionStorageItem,
203590
- getSheetPositionClass: getSheetPositionClass,
203591
203323
  getUrlParams: getUrlParams,
203592
203324
  getValidDateObject: getValidDateObject,
203593
203325
  getValidJSON: getValidJSON,