@wavemaker/angular-codegen 12.0.0-next.45055 → 12.0.0-next.45058

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -45,9 +45,9 @@
45
45
  "@metrichor/jmespath": "0.3.1",
46
46
  "@wavemaker/focus-trap": "1.0.1",
47
47
  "@wavemaker/nvd3": "1.8.11",
48
- "@wavemaker/foundation-css": "12.0.0-next.45055",
49
- "@wavemaker/custom-widgets-m3": "12.0.0-next.45055",
50
- "@wavemaker/variables": "12.0.0-next.45055",
48
+ "@wavemaker/foundation-css": "12.0.0-next.45058",
49
+ "@wavemaker/custom-widgets-m3": "12.0.0-next.45058",
50
+ "@wavemaker/variables": "12.0.0-next.45058",
51
51
  "@ztree/ztree_v3": "3.5.48",
52
52
  "angular-imask": "^7.6.1",
53
53
  "angular2-websocket": "0.9.7",
@@ -72,7 +72,7 @@
72
72
  "tslib": "2.4.1",
73
73
  "x2js": "3.4.4",
74
74
  "zone.js": "0.14.7",
75
- "@wavemaker/app-ng-runtime": "12.0.0-next.45055"
75
+ "@wavemaker/app-ng-runtime": "12.0.0-next.45058"
76
76
  },
77
77
  "devDependencies": {
78
78
  "@ampproject/rollup-plugin-closure-compiler": "^0.27.0",
@@ -87,6 +87,7 @@
87
87
  "@rollup/plugin-commonjs": "24.0.0",
88
88
  "@rollup/plugin-multi-entry": "6.0.0",
89
89
  "@rollup/plugin-node-resolve": "15.0.1",
90
+ "@rollup/plugin-typescript": "^8.3.3",
90
91
  "@types/jest": "^29.5.12",
91
92
  "@types/jquery": "3.3.22",
92
93
  "@types/lodash-es": "4.17.12",
@@ -0,0 +1,13 @@
1
+ import { Injectable } from '@angular/core';
2
+
3
+ import { CustomwidgetConfigProvider } from '@wm/runtime/base';
4
+
5
+ import { getCustomWidgetConfig } from '../util/page-util';
6
+
7
+ @Injectable()
8
+ export class CustomwidgetConfigProviderService extends CustomwidgetConfigProvider {
9
+
10
+ public getConfig(widgetname: string): Promise<any> {
11
+ return Promise.resolve(getCustomWidgetConfig(widgetname));
12
+ }
13
+ }
@@ -1,5 +1,7 @@
1
1
  const prefabConfigs = new Map<string, any>();
2
+ const customWidgetConfigs = new Map<string, any>();
2
3
 
3
4
  export const registerPrefabConfig = (prefabName: string, config: any) => prefabConfigs.set(prefabName, config);
4
5
  export const getPrefabConfig = prefabName => prefabConfigs.get(prefabName);
5
-
6
+ export const registerCustomWidgetConfig = (customWidget: string, config: any) => customWidgetConfigs.set(customWidget, config);
7
+ export const getCustomWidgetConfig = customWidget => customWidgetConfigs.get(customWidget);
@@ -4975,6 +4975,45 @@ class AbstractJsEmitterVisitor extends AbstractEmitterVisitor {
4975
4975
  this.visitAllObjects(param => ctx.print(null, param.name), params, ctx, ',');
4976
4976
  }
4977
4977
  }
4978
+
4979
+ /**
4980
+ * @fileoverview
4981
+ * A module to facilitate use of a Trusted Types policy within the JIT
4982
+ * compiler. It lazily constructs the Trusted Types policy, providing helper
4983
+ * utilities for promoting strings to Trusted Types. When Trusted Types are not
4984
+ * available, strings are used as a fallback.
4985
+ * @security All use of this module is security-sensitive and should go through
4986
+ * security review.
4987
+ */
4988
+ /**
4989
+ * The Trusted Types policy, or null if Trusted Types are not
4990
+ * enabled/supported, or undefined if the policy has not been created yet.
4991
+ */
4992
+ let policy;
4993
+ /**
4994
+ * Returns the Trusted Types policy, or null if Trusted Types are not
4995
+ * enabled/supported. The first call to this function will create the policy.
4996
+ */
4997
+ function getPolicy() {
4998
+ if (policy === undefined) {
4999
+ const trustedTypes = _global['trustedTypes'];
5000
+ policy = null;
5001
+ if (trustedTypes) {
5002
+ try {
5003
+ policy = trustedTypes.createPolicy('angular#unsafe-jit', {
5004
+ createScript: (s) => s,
5005
+ });
5006
+ }
5007
+ catch {
5008
+ // trustedTypes.createPolicy throws if called with a name that is
5009
+ // already registered, even in report-only mode. Until the API changes,
5010
+ // catch the error not to break the applications functionally. In such
5011
+ // cases, the code will fall back to using strings.
5012
+ }
5013
+ }
5014
+ }
5015
+ return policy;
5016
+ }
4978
5017
  /**
4979
5018
  * Unsafely promote a string to a TrustedScript, falling back to strings when
4980
5019
  * Trusted Types are not available.
@@ -4983,7 +5022,7 @@ class AbstractJsEmitterVisitor extends AbstractEmitterVisitor {
4983
5022
  * interpreted and executed as a script by a browser, e.g. when calling eval.
4984
5023
  */
4985
5024
  function trustedScriptFromString(script) {
4986
- return script;
5025
+ return getPolicy()?.createScript(script) || script;
4987
5026
  }
4988
5027
  /**
4989
5028
  * Unsafely call the Function constructor with the given string arguments.
@@ -10454,6 +10454,46 @@ const PRESERVE_HOST_CONTENT$1 = new InjectionToken$1((typeof ngDevMode === 'unde
10454
10454
  * is enabled.
10455
10455
  */
10456
10456
  const IS_I18N_HYDRATION_ENABLED$1 = new InjectionToken$1((typeof ngDevMode === 'undefined' || !!ngDevMode ? 'IS_I18N_HYDRATION_ENABLED' : ''));
10457
+
10458
+ /**
10459
+ * @fileoverview
10460
+ * A module to facilitate use of a Trusted Types policy internally within
10461
+ * Angular. It lazily constructs the Trusted Types policy, providing helper
10462
+ * utilities for promoting strings to Trusted Types. When Trusted Types are not
10463
+ * available, strings are used as a fallback.
10464
+ * @security All use of this module is security-sensitive and should go through
10465
+ * security review.
10466
+ */
10467
+ /**
10468
+ * The Trusted Types policy, or null if Trusted Types are not
10469
+ * enabled/supported, or undefined if the policy has not been created yet.
10470
+ */
10471
+ let policy$1$1;
10472
+ /**
10473
+ * Returns the Trusted Types policy, or null if Trusted Types are not
10474
+ * enabled/supported. The first call to this function will create the policy.
10475
+ */
10476
+ function getPolicy$1$1() {
10477
+ if (policy$1$1 === undefined) {
10478
+ policy$1$1 = null;
10479
+ if (_global$3.trustedTypes) {
10480
+ try {
10481
+ policy$1$1 = _global$3.trustedTypes.createPolicy('angular', {
10482
+ createHTML: (s) => s,
10483
+ createScript: (s) => s,
10484
+ createScriptURL: (s) => s,
10485
+ });
10486
+ }
10487
+ catch {
10488
+ // trustedTypes.createPolicy throws if called with a name that is
10489
+ // already registered, even in report-only mode. Until the API changes,
10490
+ // catch the error not to break the applications functionally. In such
10491
+ // cases, the code will fall back to using strings.
10492
+ }
10493
+ }
10494
+ }
10495
+ return policy$1$1;
10496
+ }
10457
10497
  /**
10458
10498
  * Unsafely promote a string to a TrustedHTML, falling back to strings when
10459
10499
  * Trusted Types are not available.
@@ -10464,7 +10504,7 @@ const IS_I18N_HYDRATION_ENABLED$1 = new InjectionToken$1((typeof ngDevMode === '
10464
10504
  * element.innerHTML.
10465
10505
  */
10466
10506
  function trustedHTMLFromString$1(html) {
10467
- return html;
10507
+ return getPolicy$1$1()?.createHTML(html) || html;
10468
10508
  }
10469
10509
  /**
10470
10510
  * Unsafely promote a string to a TrustedScriptURL, falling back to strings
@@ -10476,7 +10516,49 @@ function trustedHTMLFromString$1(html) {
10476
10516
  * assigning to script.src.
10477
10517
  */
10478
10518
  function trustedScriptURLFromString$1(url) {
10479
- return url;
10519
+ return getPolicy$1$1()?.createScriptURL(url) || url;
10520
+ }
10521
+
10522
+ /**
10523
+ * @fileoverview
10524
+ * A module to facilitate use of a Trusted Types policy internally within
10525
+ * Angular specifically for bypassSecurityTrust* and custom sanitizers. It
10526
+ * lazily constructs the Trusted Types policy, providing helper utilities for
10527
+ * promoting strings to Trusted Types. When Trusted Types are not available,
10528
+ * strings are used as a fallback.
10529
+ * @security All use of this module is security-sensitive and should go through
10530
+ * security review.
10531
+ */
10532
+ /**
10533
+ * The Trusted Types policy, or null if Trusted Types are not
10534
+ * enabled/supported, or undefined if the policy has not been created yet.
10535
+ */
10536
+ let policy$4;
10537
+ /**
10538
+ * Returns the Trusted Types policy, or null if Trusted Types are not
10539
+ * enabled/supported. The first call to this function will create the policy.
10540
+ */
10541
+ function getPolicy$4() {
10542
+ if (policy$4 === undefined) {
10543
+ policy$4 = null;
10544
+ if (_global$3.trustedTypes) {
10545
+ try {
10546
+ policy$4 = _global$3.trustedTypes
10547
+ .createPolicy('angular#unsafe-bypass', {
10548
+ createHTML: (s) => s,
10549
+ createScript: (s) => s,
10550
+ createScriptURL: (s) => s,
10551
+ });
10552
+ }
10553
+ catch {
10554
+ // trustedTypes.createPolicy throws if called with a name that is
10555
+ // already registered, even in report-only mode. Until the API changes,
10556
+ // catch the error not to break the applications functionally. In such
10557
+ // cases, the code will fall back to using strings.
10558
+ }
10559
+ }
10560
+ }
10561
+ return policy$4;
10480
10562
  }
10481
10563
  /**
10482
10564
  * Unsafely promote a string to a TrustedHTML, falling back to strings when
@@ -10487,7 +10569,7 @@ function trustedScriptURLFromString$1(url) {
10487
10569
  * bypassSecurityTrust* functions.
10488
10570
  */
10489
10571
  function trustedHTMLFromStringBypass$1(html) {
10490
- return html;
10572
+ return getPolicy$4()?.createHTML(html) || html;
10491
10573
  }
10492
10574
  /**
10493
10575
  * Unsafely promote a string to a TrustedScript, falling back to strings when
@@ -10498,7 +10580,7 @@ function trustedHTMLFromStringBypass$1(html) {
10498
10580
  * bypassSecurityTrust* functions.
10499
10581
  */
10500
10582
  function trustedScriptFromStringBypass$1(script) {
10501
- return script;
10583
+ return getPolicy$4()?.createScript(script) || script;
10502
10584
  }
10503
10585
  /**
10504
10586
  * Unsafely promote a string to a TrustedScriptURL, falling back to strings
@@ -10509,7 +10591,7 @@ function trustedScriptFromStringBypass$1(script) {
10509
10591
  * bypassSecurityTrust* functions.
10510
10592
  */
10511
10593
  function trustedScriptURLFromStringBypass$1(url) {
10512
- return url;
10594
+ return getPolicy$4()?.createScriptURL(url) || url;
10513
10595
  }
10514
10596
 
10515
10597
  let SafeValueImpl$1 = class SafeValueImpl {
@@ -55052,6 +55134,46 @@ const PRESERVE_HOST_CONTENT = new InjectionToken((typeof ngDevMode === 'undefine
55052
55134
  * is enabled.
55053
55135
  */
55054
55136
  const IS_I18N_HYDRATION_ENABLED = new InjectionToken((typeof ngDevMode === 'undefined' || !!ngDevMode ? 'IS_I18N_HYDRATION_ENABLED' : ''));
55137
+
55138
+ /**
55139
+ * @fileoverview
55140
+ * A module to facilitate use of a Trusted Types policy internally within
55141
+ * Angular. It lazily constructs the Trusted Types policy, providing helper
55142
+ * utilities for promoting strings to Trusted Types. When Trusted Types are not
55143
+ * available, strings are used as a fallback.
55144
+ * @security All use of this module is security-sensitive and should go through
55145
+ * security review.
55146
+ */
55147
+ /**
55148
+ * The Trusted Types policy, or null if Trusted Types are not
55149
+ * enabled/supported, or undefined if the policy has not been created yet.
55150
+ */
55151
+ let policy$1;
55152
+ /**
55153
+ * Returns the Trusted Types policy, or null if Trusted Types are not
55154
+ * enabled/supported. The first call to this function will create the policy.
55155
+ */
55156
+ function getPolicy$1() {
55157
+ if (policy$1 === undefined) {
55158
+ policy$1 = null;
55159
+ if (_global$1.trustedTypes) {
55160
+ try {
55161
+ policy$1 = _global$1.trustedTypes.createPolicy('angular', {
55162
+ createHTML: (s) => s,
55163
+ createScript: (s) => s,
55164
+ createScriptURL: (s) => s,
55165
+ });
55166
+ }
55167
+ catch {
55168
+ // trustedTypes.createPolicy throws if called with a name that is
55169
+ // already registered, even in report-only mode. Until the API changes,
55170
+ // catch the error not to break the applications functionally. In such
55171
+ // cases, the code will fall back to using strings.
55172
+ }
55173
+ }
55174
+ }
55175
+ return policy$1;
55176
+ }
55055
55177
  /**
55056
55178
  * Unsafely promote a string to a TrustedHTML, falling back to strings when
55057
55179
  * Trusted Types are not available.
@@ -55062,7 +55184,7 @@ const IS_I18N_HYDRATION_ENABLED = new InjectionToken((typeof ngDevMode === 'unde
55062
55184
  * element.innerHTML.
55063
55185
  */
55064
55186
  function trustedHTMLFromString(html) {
55065
- return html;
55187
+ return getPolicy$1()?.createHTML(html) || html;
55066
55188
  }
55067
55189
  /**
55068
55190
  * Unsafely promote a string to a TrustedScriptURL, falling back to strings
@@ -55074,7 +55196,49 @@ function trustedHTMLFromString(html) {
55074
55196
  * assigning to script.src.
55075
55197
  */
55076
55198
  function trustedScriptURLFromString(url) {
55077
- return url;
55199
+ return getPolicy$1()?.createScriptURL(url) || url;
55200
+ }
55201
+
55202
+ /**
55203
+ * @fileoverview
55204
+ * A module to facilitate use of a Trusted Types policy internally within
55205
+ * Angular specifically for bypassSecurityTrust* and custom sanitizers. It
55206
+ * lazily constructs the Trusted Types policy, providing helper utilities for
55207
+ * promoting strings to Trusted Types. When Trusted Types are not available,
55208
+ * strings are used as a fallback.
55209
+ * @security All use of this module is security-sensitive and should go through
55210
+ * security review.
55211
+ */
55212
+ /**
55213
+ * The Trusted Types policy, or null if Trusted Types are not
55214
+ * enabled/supported, or undefined if the policy has not been created yet.
55215
+ */
55216
+ let policy$2;
55217
+ /**
55218
+ * Returns the Trusted Types policy, or null if Trusted Types are not
55219
+ * enabled/supported. The first call to this function will create the policy.
55220
+ */
55221
+ function getPolicy$2() {
55222
+ if (policy$2 === undefined) {
55223
+ policy$2 = null;
55224
+ if (_global$1.trustedTypes) {
55225
+ try {
55226
+ policy$2 = _global$1.trustedTypes
55227
+ .createPolicy('angular#unsafe-bypass', {
55228
+ createHTML: (s) => s,
55229
+ createScript: (s) => s,
55230
+ createScriptURL: (s) => s,
55231
+ });
55232
+ }
55233
+ catch {
55234
+ // trustedTypes.createPolicy throws if called with a name that is
55235
+ // already registered, even in report-only mode. Until the API changes,
55236
+ // catch the error not to break the applications functionally. In such
55237
+ // cases, the code will fall back to using strings.
55238
+ }
55239
+ }
55240
+ }
55241
+ return policy$2;
55078
55242
  }
55079
55243
  /**
55080
55244
  * Unsafely promote a string to a TrustedHTML, falling back to strings when
@@ -55085,7 +55249,7 @@ function trustedScriptURLFromString(url) {
55085
55249
  * bypassSecurityTrust* functions.
55086
55250
  */
55087
55251
  function trustedHTMLFromStringBypass(html) {
55088
- return html;
55252
+ return getPolicy$2()?.createHTML(html) || html;
55089
55253
  }
55090
55254
  /**
55091
55255
  * Unsafely promote a string to a TrustedScript, falling back to strings when
@@ -55096,7 +55260,7 @@ function trustedHTMLFromStringBypass(html) {
55096
55260
  * bypassSecurityTrust* functions.
55097
55261
  */
55098
55262
  function trustedScriptFromStringBypass(script) {
55099
- return script;
55263
+ return getPolicy$2()?.createScript(script) || script;
55100
55264
  }
55101
55265
  /**
55102
55266
  * Unsafely promote a string to a TrustedScriptURL, falling back to strings
@@ -55107,7 +55271,7 @@ function trustedScriptFromStringBypass(script) {
55107
55271
  * bypassSecurityTrust* functions.
55108
55272
  */
55109
55273
  function trustedScriptURLFromStringBypass(url) {
55110
- return url;
55274
+ return getPolicy$2()?.createScriptURL(url) || url;
55111
55275
  }
55112
55276
 
55113
55277
  class SafeValueImpl {
@@ -94180,6 +94344,45 @@ let AbstractJsEmitterVisitor$1 = class AbstractJsEmitterVisitor extends Abstract
94180
94344
  this.visitAllObjects(param => ctx.print(null, param.name), params, ctx, ',');
94181
94345
  }
94182
94346
  };
94347
+
94348
+ /**
94349
+ * @fileoverview
94350
+ * A module to facilitate use of a Trusted Types policy within the JIT
94351
+ * compiler. It lazily constructs the Trusted Types policy, providing helper
94352
+ * utilities for promoting strings to Trusted Types. When Trusted Types are not
94353
+ * available, strings are used as a fallback.
94354
+ * @security All use of this module is security-sensitive and should go through
94355
+ * security review.
94356
+ */
94357
+ /**
94358
+ * The Trusted Types policy, or null if Trusted Types are not
94359
+ * enabled/supported, or undefined if the policy has not been created yet.
94360
+ */
94361
+ let policy$3;
94362
+ /**
94363
+ * Returns the Trusted Types policy, or null if Trusted Types are not
94364
+ * enabled/supported. The first call to this function will create the policy.
94365
+ */
94366
+ function getPolicy$3() {
94367
+ if (policy$3 === undefined) {
94368
+ const trustedTypes = _global$2['trustedTypes'];
94369
+ policy$3 = null;
94370
+ if (trustedTypes) {
94371
+ try {
94372
+ policy$3 = trustedTypes.createPolicy('angular#unsafe-jit', {
94373
+ createScript: (s) => s,
94374
+ });
94375
+ }
94376
+ catch {
94377
+ // trustedTypes.createPolicy throws if called with a name that is
94378
+ // already registered, even in report-only mode. Until the API changes,
94379
+ // catch the error not to break the applications functionally. In such
94380
+ // cases, the code will fall back to using strings.
94381
+ }
94382
+ }
94383
+ }
94384
+ return policy$3;
94385
+ }
94183
94386
  /**
94184
94387
  * Unsafely promote a string to a TrustedScript, falling back to strings when
94185
94388
  * Trusted Types are not available.
@@ -94188,7 +94391,7 @@ let AbstractJsEmitterVisitor$1 = class AbstractJsEmitterVisitor extends Abstract
94188
94391
  * interpreted and executed as a script by a browser, e.g. when calling eval.
94189
94392
  */
94190
94393
  function trustedScriptFromString$1(script) {
94191
- return script;
94394
+ return getPolicy$3()?.createScript(script) || script;
94192
94395
  }
94193
94396
  /**
94194
94397
  * Unsafely call the Function constructor with the given string arguments.
@@ -126221,15 +126424,15 @@ var dataViewCtorString$1 = toSource$1(DataView$1$1),
126221
126424
  * @param {*} value The value to query.
126222
126425
  * @returns {string} Returns the `toStringTag`.
126223
126426
  */
126224
- var getTag$2 = baseGetTag$1;
126427
+ var getTag$1 = baseGetTag$1;
126225
126428
 
126226
126429
  // Fallback for data views, maps, sets, and weak maps in IE 11 and promises in Node.js < 6.
126227
- if ((DataView$1$1 && getTag$2(new DataView$1$1(new ArrayBuffer(1))) != dataViewTag$3$1) ||
126228
- (Map$1$1 && getTag$2(new Map$1$1) != mapTag$8$1) ||
126229
- (Promise$1$1 && getTag$2(Promise$1$1.resolve()) != promiseTag$1) ||
126230
- (Set$1$1 && getTag$2(new Set$1$1) != setTag$8$1) ||
126231
- (WeakMap$1$1 && getTag$2(new WeakMap$1$1) != weakMapTag$2$1)) {
126232
- getTag$2 = function(value) {
126430
+ if ((DataView$1$1 && getTag$1(new DataView$1$1(new ArrayBuffer(1))) != dataViewTag$3$1) ||
126431
+ (Map$1$1 && getTag$1(new Map$1$1) != mapTag$8$1) ||
126432
+ (Promise$1$1 && getTag$1(Promise$1$1.resolve()) != promiseTag$1) ||
126433
+ (Set$1$1 && getTag$1(new Set$1$1) != setTag$8$1) ||
126434
+ (WeakMap$1$1 && getTag$1(new WeakMap$1$1) != weakMapTag$2$1)) {
126435
+ getTag$1 = function(value) {
126233
126436
  var result = baseGetTag$1(value),
126234
126437
  Ctor = result == objectTag$2$1 ? value.constructor : undefined,
126235
126438
  ctorString = Ctor ? toSource$1(Ctor) : '';
@@ -126247,7 +126450,7 @@ if ((DataView$1$1 && getTag$2(new DataView$1$1(new ArrayBuffer(1))) != dataViewT
126247
126450
  };
126248
126451
  }
126249
126452
 
126250
- var getTag$1$1 = getTag$2;
126453
+ var getTag$1$1 = getTag$1;
126251
126454
 
126252
126455
  /** Used for built-in method references. */
126253
126456
  var objectProto$c$1 = Object.prototype;
@@ -143643,6 +143846,14 @@ const REGEX$1 = {
143643
143846
  const NUMBER_TYPES$1 = ['int', DataType$1.INTEGER, DataType$1.FLOAT, DataType$1.DOUBLE, DataType$1.LONG, DataType$1.SHORT, DataType$1.BYTE, DataType$1.BIG_INTEGER, DataType$1.BIG_DECIMAL];
143644
143847
  const now$2 = new Date();
143645
143848
  const CURRENT_DATE$1 = 'CURRENT_DATE';
143849
+ const getNavClass$1 = (suffix) => {
143850
+ const APP_NAV_CLASS_PREFIX = 'app-nav-';
143851
+ return APP_NAV_CLASS_PREFIX + suffix;
143852
+ };
143853
+ const getSheetPositionClass$1 = (suffix) => {
143854
+ const SHEET_POSITION_CLASS_PREFIX = 'sheet-position-';
143855
+ return SHEET_POSITION_CLASS_PREFIX + suffix;
143856
+ };
143646
143857
  const isDefined$1 = v => 'undefined' !== typeof v;
143647
143858
  const isObject$3 = v => null !== v && 'object' === typeof v;
143648
143859
  const toBoolean$1 = (val, identity) => ((val && val !== 'false') ? true : (identity ? val === identity : false));
@@ -145090,9 +145301,11 @@ var Utils$1 = /*#__PURE__*/Object.freeze({
145090
145301
  getFormattedDate: getFormattedDate$1,
145091
145302
  getMomentLocaleObject: getMomentLocaleObject$1,
145092
145303
  getNativeDateObject: getNativeDateObject$1,
145304
+ getNavClass: getNavClass$1,
145093
145305
  getResourceURL: getResourceURL$1,
145094
145306
  getRouteNameFromLink: getRouteNameFromLink$1,
145095
145307
  getSessionStorageItem: getSessionStorageItem$1,
145308
+ getSheetPositionClass: getSheetPositionClass$1,
145096
145309
  getUrlParams: getUrlParams$1,
145097
145310
  getValidDateObject: getValidDateObject$1,
145098
145311
  getValidJSON: getValidJSON$1,
@@ -153475,6 +153688,45 @@ class AbstractJsEmitterVisitor extends AbstractEmitterVisitor {
153475
153688
  this.visitAllObjects(param => ctx.print(null, param.name), params, ctx, ',');
153476
153689
  }
153477
153690
  }
153691
+
153692
+ /**
153693
+ * @fileoverview
153694
+ * A module to facilitate use of a Trusted Types policy within the JIT
153695
+ * compiler. It lazily constructs the Trusted Types policy, providing helper
153696
+ * utilities for promoting strings to Trusted Types. When Trusted Types are not
153697
+ * available, strings are used as a fallback.
153698
+ * @security All use of this module is security-sensitive and should go through
153699
+ * security review.
153700
+ */
153701
+ /**
153702
+ * The Trusted Types policy, or null if Trusted Types are not
153703
+ * enabled/supported, or undefined if the policy has not been created yet.
153704
+ */
153705
+ let policy;
153706
+ /**
153707
+ * Returns the Trusted Types policy, or null if Trusted Types are not
153708
+ * enabled/supported. The first call to this function will create the policy.
153709
+ */
153710
+ function getPolicy() {
153711
+ if (policy === undefined) {
153712
+ const trustedTypes = _global['trustedTypes'];
153713
+ policy = null;
153714
+ if (trustedTypes) {
153715
+ try {
153716
+ policy = trustedTypes.createPolicy('angular#unsafe-jit', {
153717
+ createScript: (s) => s,
153718
+ });
153719
+ }
153720
+ catch {
153721
+ // trustedTypes.createPolicy throws if called with a name that is
153722
+ // already registered, even in report-only mode. Until the API changes,
153723
+ // catch the error not to break the applications functionally. In such
153724
+ // cases, the code will fall back to using strings.
153725
+ }
153726
+ }
153727
+ }
153728
+ return policy;
153729
+ }
153478
153730
  /**
153479
153731
  * Unsafely promote a string to a TrustedScript, falling back to strings when
153480
153732
  * Trusted Types are not available.
@@ -153483,7 +153735,7 @@ class AbstractJsEmitterVisitor extends AbstractEmitterVisitor {
153483
153735
  * interpreted and executed as a script by a browser, e.g. when calling eval.
153484
153736
  */
153485
153737
  function trustedScriptFromString(script) {
153486
- return script;
153738
+ return getPolicy()?.createScript(script) || script;
153487
153739
  }
153488
153740
  /**
153489
153741
  * Unsafely call the Function constructor with the given string arguments.
@@ -185542,8 +185794,6 @@ if ((DataView$1 && getTag(new DataView$1(new ArrayBuffer(1))) != dataViewTag$3)
185542
185794
  };
185543
185795
  }
185544
185796
 
185545
- var getTag$1 = getTag;
185546
-
185547
185797
  /** Used for built-in method references. */
185548
185798
  var objectProto$c = Object.prototype;
185549
185799
 
@@ -185736,7 +185986,7 @@ var mapTag$6 = '[object Map]';
185736
185986
  * @returns {boolean} Returns `true` if `value` is a map, else `false`.
185737
185987
  */
185738
185988
  function baseIsMap(value) {
185739
- return isObjectLike(value) && getTag$1(value) == mapTag$6;
185989
+ return isObjectLike(value) && getTag(value) == mapTag$6;
185740
185990
  }
185741
185991
 
185742
185992
  /* Node.js helper references. */
@@ -185772,7 +186022,7 @@ var setTag$6 = '[object Set]';
185772
186022
  * @returns {boolean} Returns `true` if `value` is a set, else `false`.
185773
186023
  */
185774
186024
  function baseIsSet(value) {
185775
- return isObjectLike(value) && getTag$1(value) == setTag$6;
186025
+ return isObjectLike(value) && getTag(value) == setTag$6;
185776
186026
  }
185777
186027
 
185778
186028
  /* Node.js helper references. */
@@ -185885,7 +186135,7 @@ function baseClone(value, bitmask, customizer, key, object, stack) {
185885
186135
  return copyArray(value, result);
185886
186136
  }
185887
186137
  } else {
185888
- var tag = getTag$1(value),
186138
+ var tag = getTag(value),
185889
186139
  isFunc = tag == funcTag || tag == genTag;
185890
186140
 
185891
186141
  if (isBuffer(value)) {
@@ -186593,8 +186843,8 @@ var hasOwnProperty$9 = objectProto$a.hasOwnProperty;
186593
186843
  function baseIsEqualDeep(object, other, bitmask, customizer, equalFunc, stack) {
186594
186844
  var objIsArr = isArray(object),
186595
186845
  othIsArr = isArray(other),
186596
- objTag = objIsArr ? arrayTag : getTag$1(object),
186597
- othTag = othIsArr ? arrayTag : getTag$1(other);
186846
+ objTag = objIsArr ? arrayTag : getTag(object),
186847
+ othTag = othIsArr ? arrayTag : getTag(other);
186598
186848
 
186599
186849
  objTag = objTag == argsTag ? objectTag : objTag;
186600
186850
  othTag = othTag == argsTag ? objectTag : othTag;
@@ -188669,7 +188919,7 @@ var mapTag$3 = '[object Map]',
188669
188919
  */
188670
188920
  function createToPairs(keysFunc) {
188671
188921
  return function(object) {
188672
- var tag = getTag$1(object);
188922
+ var tag = getTag(object);
188673
188923
  if (tag == mapTag$3) {
188674
188924
  return mapToArray(object);
188675
188925
  }
@@ -190916,7 +191166,7 @@ function isEmpty(value) {
190916
191166
  isBuffer(value) || isTypedArray(value) || isArguments(value))) {
190917
191167
  return !value.length;
190918
191168
  }
190919
- var tag = getTag$1(value);
191169
+ var tag = getTag(value);
190920
191170
  if (tag == mapTag$2 || tag == setTag$2) {
190921
191171
  return !value.size;
190922
191172
  }
@@ -191404,7 +191654,7 @@ var weakMapTag = '[object WeakMap]';
191404
191654
  * // => false
191405
191655
  */
191406
191656
  function isWeakMap(value) {
191407
- return isObjectLike(value) && getTag$1(value) == weakMapTag;
191657
+ return isObjectLike(value) && getTag(value) == weakMapTag;
191408
191658
  }
191409
191659
 
191410
191660
  /** `Object#toString` result references. */
@@ -192375,7 +192625,7 @@ function toArray(value) {
192375
192625
  if (symIterator$1 && value[symIterator$1]) {
192376
192626
  return iteratorToArray(value[symIterator$1]());
192377
192627
  }
192378
- var tag = getTag$1(value),
192628
+ var tag = getTag(value),
192379
192629
  func = tag == mapTag$1 ? mapToArray : (tag == setTag$1 ? setToArray : values);
192380
192630
 
192381
192631
  return func(value);
@@ -194714,7 +194964,7 @@ function size(collection) {
194714
194964
  if (isArrayLike(collection)) {
194715
194965
  return isString(collection) ? stringSize(collection) : collection.length;
194716
194966
  }
194717
- var tag = getTag$1(collection);
194967
+ var tag = getTag(collection);
194718
194968
  if (tag == mapTag || tag == setTag) {
194719
194969
  return collection.size;
194720
194970
  }
@@ -201873,6 +202123,14 @@ const REGEX = {
201873
202123
  const NUMBER_TYPES = ['int', DataType.INTEGER, DataType.FLOAT, DataType.DOUBLE, DataType.LONG, DataType.SHORT, DataType.BYTE, DataType.BIG_INTEGER, DataType.BIG_DECIMAL];
201874
202124
  const now = new Date();
201875
202125
  const CURRENT_DATE = 'CURRENT_DATE';
202126
+ const getNavClass = (suffix) => {
202127
+ const APP_NAV_CLASS_PREFIX = 'app-nav-';
202128
+ return APP_NAV_CLASS_PREFIX + suffix;
202129
+ };
202130
+ const getSheetPositionClass = (suffix) => {
202131
+ const SHEET_POSITION_CLASS_PREFIX = 'sheet-position-';
202132
+ return SHEET_POSITION_CLASS_PREFIX + suffix;
202133
+ };
201876
202134
  const isDefined = v => 'undefined' !== typeof v;
201877
202135
  const isObject = v => null !== v && 'object' === typeof v;
201878
202136
  const toBoolean = (val, identity) => ((val && val !== 'false') ? true : (identity ? val === identity : false));
@@ -203320,9 +203578,11 @@ var Utils = /*#__PURE__*/Object.freeze({
203320
203578
  getFormattedDate: getFormattedDate,
203321
203579
  getMomentLocaleObject: getMomentLocaleObject,
203322
203580
  getNativeDateObject: getNativeDateObject,
203581
+ getNavClass: getNavClass,
203323
203582
  getResourceURL: getResourceURL,
203324
203583
  getRouteNameFromLink: getRouteNameFromLink,
203325
203584
  getSessionStorageItem: getSessionStorageItem,
203585
+ getSheetPositionClass: getSheetPositionClass,
203326
203586
  getUrlParams: getUrlParams,
203327
203587
  getValidDateObject: getValidDateObject,
203328
203588
  getValidJSON: getValidJSON,