@wavemaker/angular-codegen 12.0.0-next.45057 → 12.0.0-next.45058

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -45,9 +45,9 @@
45
45
  "@metrichor/jmespath": "0.3.1",
46
46
  "@wavemaker/focus-trap": "1.0.1",
47
47
  "@wavemaker/nvd3": "1.8.11",
48
- "@wavemaker/foundation-css": "12.0.0-next.45057",
49
- "@wavemaker/custom-widgets-m3": "12.0.0-next.45057",
50
- "@wavemaker/variables": "12.0.0-next.45057",
48
+ "@wavemaker/foundation-css": "12.0.0-next.45058",
49
+ "@wavemaker/custom-widgets-m3": "12.0.0-next.45058",
50
+ "@wavemaker/variables": "12.0.0-next.45058",
51
51
  "@ztree/ztree_v3": "3.5.48",
52
52
  "angular-imask": "^7.6.1",
53
53
  "angular2-websocket": "0.9.7",
@@ -72,7 +72,7 @@
72
72
  "tslib": "2.4.1",
73
73
  "x2js": "3.4.4",
74
74
  "zone.js": "0.14.7",
75
- "@wavemaker/app-ng-runtime": "12.0.0-next.45057"
75
+ "@wavemaker/app-ng-runtime": "12.0.0-next.45058"
76
76
  },
77
77
  "devDependencies": {
78
78
  "@ampproject/rollup-plugin-closure-compiler": "^0.27.0",
@@ -87,6 +87,7 @@
87
87
  "@rollup/plugin-commonjs": "24.0.0",
88
88
  "@rollup/plugin-multi-entry": "6.0.0",
89
89
  "@rollup/plugin-node-resolve": "15.0.1",
90
+ "@rollup/plugin-typescript": "^8.3.3",
90
91
  "@types/jest": "^29.5.12",
91
92
  "@types/jquery": "3.3.22",
92
93
  "@types/lodash-es": "4.17.12",
@@ -0,0 +1,13 @@
1
+ import { Injectable } from '@angular/core';
2
+
3
+ import { CustomwidgetConfigProvider } from '@wm/runtime/base';
4
+
5
+ import { getCustomWidgetConfig } from '../util/page-util';
6
+
7
+ @Injectable()
8
+ export class CustomwidgetConfigProviderService extends CustomwidgetConfigProvider {
9
+
10
+ public getConfig(widgetname: string): Promise<any> {
11
+ return Promise.resolve(getCustomWidgetConfig(widgetname));
12
+ }
13
+ }
@@ -1,5 +1,7 @@
1
1
  const prefabConfigs = new Map<string, any>();
2
+ const customWidgetConfigs = new Map<string, any>();
2
3
 
3
4
  export const registerPrefabConfig = (prefabName: string, config: any) => prefabConfigs.set(prefabName, config);
4
5
  export const getPrefabConfig = prefabName => prefabConfigs.get(prefabName);
5
-
6
+ export const registerCustomWidgetConfig = (customWidget: string, config: any) => customWidgetConfigs.set(customWidget, config);
7
+ export const getCustomWidgetConfig = customWidget => customWidgetConfigs.get(customWidget);
@@ -4975,6 +4975,45 @@ class AbstractJsEmitterVisitor extends AbstractEmitterVisitor {
4975
4975
  this.visitAllObjects(param => ctx.print(null, param.name), params, ctx, ',');
4976
4976
  }
4977
4977
  }
4978
+
4979
+ /**
4980
+ * @fileoverview
4981
+ * A module to facilitate use of a Trusted Types policy within the JIT
4982
+ * compiler. It lazily constructs the Trusted Types policy, providing helper
4983
+ * utilities for promoting strings to Trusted Types. When Trusted Types are not
4984
+ * available, strings are used as a fallback.
4985
+ * @security All use of this module is security-sensitive and should go through
4986
+ * security review.
4987
+ */
4988
+ /**
4989
+ * The Trusted Types policy, or null if Trusted Types are not
4990
+ * enabled/supported, or undefined if the policy has not been created yet.
4991
+ */
4992
+ let policy;
4993
+ /**
4994
+ * Returns the Trusted Types policy, or null if Trusted Types are not
4995
+ * enabled/supported. The first call to this function will create the policy.
4996
+ */
4997
+ function getPolicy() {
4998
+ if (policy === undefined) {
4999
+ const trustedTypes = _global['trustedTypes'];
5000
+ policy = null;
5001
+ if (trustedTypes) {
5002
+ try {
5003
+ policy = trustedTypes.createPolicy('angular#unsafe-jit', {
5004
+ createScript: (s) => s,
5005
+ });
5006
+ }
5007
+ catch {
5008
+ // trustedTypes.createPolicy throws if called with a name that is
5009
+ // already registered, even in report-only mode. Until the API changes,
5010
+ // catch the error not to break the applications functionally. In such
5011
+ // cases, the code will fall back to using strings.
5012
+ }
5013
+ }
5014
+ }
5015
+ return policy;
5016
+ }
4978
5017
  /**
4979
5018
  * Unsafely promote a string to a TrustedScript, falling back to strings when
4980
5019
  * Trusted Types are not available.
@@ -4983,7 +5022,7 @@ class AbstractJsEmitterVisitor extends AbstractEmitterVisitor {
4983
5022
  * interpreted and executed as a script by a browser, e.g. when calling eval.
4984
5023
  */
4985
5024
  function trustedScriptFromString(script) {
4986
- return script;
5025
+ return getPolicy()?.createScript(script) || script;
4987
5026
  }
4988
5027
  /**
4989
5028
  * Unsafely call the Function constructor with the given string arguments.
@@ -10454,6 +10454,46 @@ const PRESERVE_HOST_CONTENT$1 = new InjectionToken$1((typeof ngDevMode === 'unde
10454
10454
  * is enabled.
10455
10455
  */
10456
10456
  const IS_I18N_HYDRATION_ENABLED$1 = new InjectionToken$1((typeof ngDevMode === 'undefined' || !!ngDevMode ? 'IS_I18N_HYDRATION_ENABLED' : ''));
10457
+
10458
+ /**
10459
+ * @fileoverview
10460
+ * A module to facilitate use of a Trusted Types policy internally within
10461
+ * Angular. It lazily constructs the Trusted Types policy, providing helper
10462
+ * utilities for promoting strings to Trusted Types. When Trusted Types are not
10463
+ * available, strings are used as a fallback.
10464
+ * @security All use of this module is security-sensitive and should go through
10465
+ * security review.
10466
+ */
10467
+ /**
10468
+ * The Trusted Types policy, or null if Trusted Types are not
10469
+ * enabled/supported, or undefined if the policy has not been created yet.
10470
+ */
10471
+ let policy$1$1;
10472
+ /**
10473
+ * Returns the Trusted Types policy, or null if Trusted Types are not
10474
+ * enabled/supported. The first call to this function will create the policy.
10475
+ */
10476
+ function getPolicy$1$1() {
10477
+ if (policy$1$1 === undefined) {
10478
+ policy$1$1 = null;
10479
+ if (_global$3.trustedTypes) {
10480
+ try {
10481
+ policy$1$1 = _global$3.trustedTypes.createPolicy('angular', {
10482
+ createHTML: (s) => s,
10483
+ createScript: (s) => s,
10484
+ createScriptURL: (s) => s,
10485
+ });
10486
+ }
10487
+ catch {
10488
+ // trustedTypes.createPolicy throws if called with a name that is
10489
+ // already registered, even in report-only mode. Until the API changes,
10490
+ // catch the error not to break the applications functionally. In such
10491
+ // cases, the code will fall back to using strings.
10492
+ }
10493
+ }
10494
+ }
10495
+ return policy$1$1;
10496
+ }
10457
10497
  /**
10458
10498
  * Unsafely promote a string to a TrustedHTML, falling back to strings when
10459
10499
  * Trusted Types are not available.
@@ -10464,7 +10504,7 @@ const IS_I18N_HYDRATION_ENABLED$1 = new InjectionToken$1((typeof ngDevMode === '
10464
10504
  * element.innerHTML.
10465
10505
  */
10466
10506
  function trustedHTMLFromString$1(html) {
10467
- return html;
10507
+ return getPolicy$1$1()?.createHTML(html) || html;
10468
10508
  }
10469
10509
  /**
10470
10510
  * Unsafely promote a string to a TrustedScriptURL, falling back to strings
@@ -10476,7 +10516,49 @@ function trustedHTMLFromString$1(html) {
10476
10516
  * assigning to script.src.
10477
10517
  */
10478
10518
  function trustedScriptURLFromString$1(url) {
10479
- return url;
10519
+ return getPolicy$1$1()?.createScriptURL(url) || url;
10520
+ }
10521
+
10522
+ /**
10523
+ * @fileoverview
10524
+ * A module to facilitate use of a Trusted Types policy internally within
10525
+ * Angular specifically for bypassSecurityTrust* and custom sanitizers. It
10526
+ * lazily constructs the Trusted Types policy, providing helper utilities for
10527
+ * promoting strings to Trusted Types. When Trusted Types are not available,
10528
+ * strings are used as a fallback.
10529
+ * @security All use of this module is security-sensitive and should go through
10530
+ * security review.
10531
+ */
10532
+ /**
10533
+ * The Trusted Types policy, or null if Trusted Types are not
10534
+ * enabled/supported, or undefined if the policy has not been created yet.
10535
+ */
10536
+ let policy$4;
10537
+ /**
10538
+ * Returns the Trusted Types policy, or null if Trusted Types are not
10539
+ * enabled/supported. The first call to this function will create the policy.
10540
+ */
10541
+ function getPolicy$4() {
10542
+ if (policy$4 === undefined) {
10543
+ policy$4 = null;
10544
+ if (_global$3.trustedTypes) {
10545
+ try {
10546
+ policy$4 = _global$3.trustedTypes
10547
+ .createPolicy('angular#unsafe-bypass', {
10548
+ createHTML: (s) => s,
10549
+ createScript: (s) => s,
10550
+ createScriptURL: (s) => s,
10551
+ });
10552
+ }
10553
+ catch {
10554
+ // trustedTypes.createPolicy throws if called with a name that is
10555
+ // already registered, even in report-only mode. Until the API changes,
10556
+ // catch the error not to break the applications functionally. In such
10557
+ // cases, the code will fall back to using strings.
10558
+ }
10559
+ }
10560
+ }
10561
+ return policy$4;
10480
10562
  }
10481
10563
  /**
10482
10564
  * Unsafely promote a string to a TrustedHTML, falling back to strings when
@@ -10487,7 +10569,7 @@ function trustedScriptURLFromString$1(url) {
10487
10569
  * bypassSecurityTrust* functions.
10488
10570
  */
10489
10571
  function trustedHTMLFromStringBypass$1(html) {
10490
- return html;
10572
+ return getPolicy$4()?.createHTML(html) || html;
10491
10573
  }
10492
10574
  /**
10493
10575
  * Unsafely promote a string to a TrustedScript, falling back to strings when
@@ -10498,7 +10580,7 @@ function trustedHTMLFromStringBypass$1(html) {
10498
10580
  * bypassSecurityTrust* functions.
10499
10581
  */
10500
10582
  function trustedScriptFromStringBypass$1(script) {
10501
- return script;
10583
+ return getPolicy$4()?.createScript(script) || script;
10502
10584
  }
10503
10585
  /**
10504
10586
  * Unsafely promote a string to a TrustedScriptURL, falling back to strings
@@ -10509,7 +10591,7 @@ function trustedScriptFromStringBypass$1(script) {
10509
10591
  * bypassSecurityTrust* functions.
10510
10592
  */
10511
10593
  function trustedScriptURLFromStringBypass$1(url) {
10512
- return url;
10594
+ return getPolicy$4()?.createScriptURL(url) || url;
10513
10595
  }
10514
10596
 
10515
10597
  let SafeValueImpl$1 = class SafeValueImpl {
@@ -55052,6 +55134,46 @@ const PRESERVE_HOST_CONTENT = new InjectionToken((typeof ngDevMode === 'undefine
55052
55134
  * is enabled.
55053
55135
  */
55054
55136
  const IS_I18N_HYDRATION_ENABLED = new InjectionToken((typeof ngDevMode === 'undefined' || !!ngDevMode ? 'IS_I18N_HYDRATION_ENABLED' : ''));
55137
+
55138
+ /**
55139
+ * @fileoverview
55140
+ * A module to facilitate use of a Trusted Types policy internally within
55141
+ * Angular. It lazily constructs the Trusted Types policy, providing helper
55142
+ * utilities for promoting strings to Trusted Types. When Trusted Types are not
55143
+ * available, strings are used as a fallback.
55144
+ * @security All use of this module is security-sensitive and should go through
55145
+ * security review.
55146
+ */
55147
+ /**
55148
+ * The Trusted Types policy, or null if Trusted Types are not
55149
+ * enabled/supported, or undefined if the policy has not been created yet.
55150
+ */
55151
+ let policy$1;
55152
+ /**
55153
+ * Returns the Trusted Types policy, or null if Trusted Types are not
55154
+ * enabled/supported. The first call to this function will create the policy.
55155
+ */
55156
+ function getPolicy$1() {
55157
+ if (policy$1 === undefined) {
55158
+ policy$1 = null;
55159
+ if (_global$1.trustedTypes) {
55160
+ try {
55161
+ policy$1 = _global$1.trustedTypes.createPolicy('angular', {
55162
+ createHTML: (s) => s,
55163
+ createScript: (s) => s,
55164
+ createScriptURL: (s) => s,
55165
+ });
55166
+ }
55167
+ catch {
55168
+ // trustedTypes.createPolicy throws if called with a name that is
55169
+ // already registered, even in report-only mode. Until the API changes,
55170
+ // catch the error not to break the applications functionally. In such
55171
+ // cases, the code will fall back to using strings.
55172
+ }
55173
+ }
55174
+ }
55175
+ return policy$1;
55176
+ }
55055
55177
  /**
55056
55178
  * Unsafely promote a string to a TrustedHTML, falling back to strings when
55057
55179
  * Trusted Types are not available.
@@ -55062,7 +55184,7 @@ const IS_I18N_HYDRATION_ENABLED = new InjectionToken((typeof ngDevMode === 'unde
55062
55184
  * element.innerHTML.
55063
55185
  */
55064
55186
  function trustedHTMLFromString(html) {
55065
- return html;
55187
+ return getPolicy$1()?.createHTML(html) || html;
55066
55188
  }
55067
55189
  /**
55068
55190
  * Unsafely promote a string to a TrustedScriptURL, falling back to strings
@@ -55074,7 +55196,49 @@ function trustedHTMLFromString(html) {
55074
55196
  * assigning to script.src.
55075
55197
  */
55076
55198
  function trustedScriptURLFromString(url) {
55077
- return url;
55199
+ return getPolicy$1()?.createScriptURL(url) || url;
55200
+ }
55201
+
55202
+ /**
55203
+ * @fileoverview
55204
+ * A module to facilitate use of a Trusted Types policy internally within
55205
+ * Angular specifically for bypassSecurityTrust* and custom sanitizers. It
55206
+ * lazily constructs the Trusted Types policy, providing helper utilities for
55207
+ * promoting strings to Trusted Types. When Trusted Types are not available,
55208
+ * strings are used as a fallback.
55209
+ * @security All use of this module is security-sensitive and should go through
55210
+ * security review.
55211
+ */
55212
+ /**
55213
+ * The Trusted Types policy, or null if Trusted Types are not
55214
+ * enabled/supported, or undefined if the policy has not been created yet.
55215
+ */
55216
+ let policy$2;
55217
+ /**
55218
+ * Returns the Trusted Types policy, or null if Trusted Types are not
55219
+ * enabled/supported. The first call to this function will create the policy.
55220
+ */
55221
+ function getPolicy$2() {
55222
+ if (policy$2 === undefined) {
55223
+ policy$2 = null;
55224
+ if (_global$1.trustedTypes) {
55225
+ try {
55226
+ policy$2 = _global$1.trustedTypes
55227
+ .createPolicy('angular#unsafe-bypass', {
55228
+ createHTML: (s) => s,
55229
+ createScript: (s) => s,
55230
+ createScriptURL: (s) => s,
55231
+ });
55232
+ }
55233
+ catch {
55234
+ // trustedTypes.createPolicy throws if called with a name that is
55235
+ // already registered, even in report-only mode. Until the API changes,
55236
+ // catch the error not to break the applications functionally. In such
55237
+ // cases, the code will fall back to using strings.
55238
+ }
55239
+ }
55240
+ }
55241
+ return policy$2;
55078
55242
  }
55079
55243
  /**
55080
55244
  * Unsafely promote a string to a TrustedHTML, falling back to strings when
@@ -55085,7 +55249,7 @@ function trustedScriptURLFromString(url) {
55085
55249
  * bypassSecurityTrust* functions.
55086
55250
  */
55087
55251
  function trustedHTMLFromStringBypass(html) {
55088
- return html;
55252
+ return getPolicy$2()?.createHTML(html) || html;
55089
55253
  }
55090
55254
  /**
55091
55255
  * Unsafely promote a string to a TrustedScript, falling back to strings when
@@ -55096,7 +55260,7 @@ function trustedHTMLFromStringBypass(html) {
55096
55260
  * bypassSecurityTrust* functions.
55097
55261
  */
55098
55262
  function trustedScriptFromStringBypass(script) {
55099
- return script;
55263
+ return getPolicy$2()?.createScript(script) || script;
55100
55264
  }
55101
55265
  /**
55102
55266
  * Unsafely promote a string to a TrustedScriptURL, falling back to strings
@@ -55107,7 +55271,7 @@ function trustedScriptFromStringBypass(script) {
55107
55271
  * bypassSecurityTrust* functions.
55108
55272
  */
55109
55273
  function trustedScriptURLFromStringBypass(url) {
55110
- return url;
55274
+ return getPolicy$2()?.createScriptURL(url) || url;
55111
55275
  }
55112
55276
 
55113
55277
  class SafeValueImpl {
@@ -94180,6 +94344,45 @@ let AbstractJsEmitterVisitor$1 = class AbstractJsEmitterVisitor extends Abstract
94180
94344
  this.visitAllObjects(param => ctx.print(null, param.name), params, ctx, ',');
94181
94345
  }
94182
94346
  };
94347
+
94348
+ /**
94349
+ * @fileoverview
94350
+ * A module to facilitate use of a Trusted Types policy within the JIT
94351
+ * compiler. It lazily constructs the Trusted Types policy, providing helper
94352
+ * utilities for promoting strings to Trusted Types. When Trusted Types are not
94353
+ * available, strings are used as a fallback.
94354
+ * @security All use of this module is security-sensitive and should go through
94355
+ * security review.
94356
+ */
94357
+ /**
94358
+ * The Trusted Types policy, or null if Trusted Types are not
94359
+ * enabled/supported, or undefined if the policy has not been created yet.
94360
+ */
94361
+ let policy$3;
94362
+ /**
94363
+ * Returns the Trusted Types policy, or null if Trusted Types are not
94364
+ * enabled/supported. The first call to this function will create the policy.
94365
+ */
94366
+ function getPolicy$3() {
94367
+ if (policy$3 === undefined) {
94368
+ const trustedTypes = _global$2['trustedTypes'];
94369
+ policy$3 = null;
94370
+ if (trustedTypes) {
94371
+ try {
94372
+ policy$3 = trustedTypes.createPolicy('angular#unsafe-jit', {
94373
+ createScript: (s) => s,
94374
+ });
94375
+ }
94376
+ catch {
94377
+ // trustedTypes.createPolicy throws if called with a name that is
94378
+ // already registered, even in report-only mode. Until the API changes,
94379
+ // catch the error not to break the applications functionally. In such
94380
+ // cases, the code will fall back to using strings.
94381
+ }
94382
+ }
94383
+ }
94384
+ return policy$3;
94385
+ }
94183
94386
  /**
94184
94387
  * Unsafely promote a string to a TrustedScript, falling back to strings when
94185
94388
  * Trusted Types are not available.
@@ -94188,7 +94391,7 @@ let AbstractJsEmitterVisitor$1 = class AbstractJsEmitterVisitor extends Abstract
94188
94391
  * interpreted and executed as a script by a browser, e.g. when calling eval.
94189
94392
  */
94190
94393
  function trustedScriptFromString$1(script) {
94191
- return script;
94394
+ return getPolicy$3()?.createScript(script) || script;
94192
94395
  }
94193
94396
  /**
94194
94397
  * Unsafely call the Function constructor with the given string arguments.
@@ -126221,15 +126424,15 @@ var dataViewCtorString$1 = toSource$1(DataView$1$1),
126221
126424
  * @param {*} value The value to query.
126222
126425
  * @returns {string} Returns the `toStringTag`.
126223
126426
  */
126224
- var getTag$2 = baseGetTag$1;
126427
+ var getTag$1 = baseGetTag$1;
126225
126428
 
126226
126429
  // Fallback for data views, maps, sets, and weak maps in IE 11 and promises in Node.js < 6.
126227
- if ((DataView$1$1 && getTag$2(new DataView$1$1(new ArrayBuffer(1))) != dataViewTag$3$1) ||
126228
- (Map$1$1 && getTag$2(new Map$1$1) != mapTag$8$1) ||
126229
- (Promise$1$1 && getTag$2(Promise$1$1.resolve()) != promiseTag$1) ||
126230
- (Set$1$1 && getTag$2(new Set$1$1) != setTag$8$1) ||
126231
- (WeakMap$1$1 && getTag$2(new WeakMap$1$1) != weakMapTag$2$1)) {
126232
- getTag$2 = function(value) {
126430
+ if ((DataView$1$1 && getTag$1(new DataView$1$1(new ArrayBuffer(1))) != dataViewTag$3$1) ||
126431
+ (Map$1$1 && getTag$1(new Map$1$1) != mapTag$8$1) ||
126432
+ (Promise$1$1 && getTag$1(Promise$1$1.resolve()) != promiseTag$1) ||
126433
+ (Set$1$1 && getTag$1(new Set$1$1) != setTag$8$1) ||
126434
+ (WeakMap$1$1 && getTag$1(new WeakMap$1$1) != weakMapTag$2$1)) {
126435
+ getTag$1 = function(value) {
126233
126436
  var result = baseGetTag$1(value),
126234
126437
  Ctor = result == objectTag$2$1 ? value.constructor : undefined,
126235
126438
  ctorString = Ctor ? toSource$1(Ctor) : '';
@@ -126247,7 +126450,7 @@ if ((DataView$1$1 && getTag$2(new DataView$1$1(new ArrayBuffer(1))) != dataViewT
126247
126450
  };
126248
126451
  }
126249
126452
 
126250
- var getTag$1$1 = getTag$2;
126453
+ var getTag$1$1 = getTag$1;
126251
126454
 
126252
126455
  /** Used for built-in method references. */
126253
126456
  var objectProto$c$1 = Object.prototype;
@@ -143643,7 +143846,14 @@ const REGEX$1 = {
143643
143846
  const NUMBER_TYPES$1 = ['int', DataType$1.INTEGER, DataType$1.FLOAT, DataType$1.DOUBLE, DataType$1.LONG, DataType$1.SHORT, DataType$1.BYTE, DataType$1.BIG_INTEGER, DataType$1.BIG_DECIMAL];
143644
143847
  const now$2 = new Date();
143645
143848
  const CURRENT_DATE$1 = 'CURRENT_DATE';
143646
- const APP_NAV$1 = 'app-nav';
143849
+ const getNavClass$1 = (suffix) => {
143850
+ const APP_NAV_CLASS_PREFIX = 'app-nav-';
143851
+ return APP_NAV_CLASS_PREFIX + suffix;
143852
+ };
143853
+ const getSheetPositionClass$1 = (suffix) => {
143854
+ const SHEET_POSITION_CLASS_PREFIX = 'sheet-position-';
143855
+ return SHEET_POSITION_CLASS_PREFIX + suffix;
143856
+ };
143647
143857
  const isDefined$1 = v => 'undefined' !== typeof v;
143648
143858
  const isObject$3 = v => null !== v && 'object' === typeof v;
143649
143859
  const toBoolean$1 = (val, identity) => ((val && val !== 'false') ? true : (identity ? val === identity : false));
@@ -145052,7 +145262,6 @@ const findViewParent$1 = (lView) => {
145052
145262
 
145053
145263
  var Utils$1 = /*#__PURE__*/Object.freeze({
145054
145264
  __proto__: null,
145055
- APP_NAV: APP_NAV$1,
145056
145265
  AppConstants: AppConstants$1,
145057
145266
  VALIDATOR: VALIDATOR$1,
145058
145267
  _WM_APP_PROJECT: _WM_APP_PROJECT$1,
@@ -145092,9 +145301,11 @@ var Utils$1 = /*#__PURE__*/Object.freeze({
145092
145301
  getFormattedDate: getFormattedDate$1,
145093
145302
  getMomentLocaleObject: getMomentLocaleObject$1,
145094
145303
  getNativeDateObject: getNativeDateObject$1,
145304
+ getNavClass: getNavClass$1,
145095
145305
  getResourceURL: getResourceURL$1,
145096
145306
  getRouteNameFromLink: getRouteNameFromLink$1,
145097
145307
  getSessionStorageItem: getSessionStorageItem$1,
145308
+ getSheetPositionClass: getSheetPositionClass$1,
145098
145309
  getUrlParams: getUrlParams$1,
145099
145310
  getValidDateObject: getValidDateObject$1,
145100
145311
  getValidJSON: getValidJSON$1,
@@ -153477,6 +153688,45 @@ class AbstractJsEmitterVisitor extends AbstractEmitterVisitor {
153477
153688
  this.visitAllObjects(param => ctx.print(null, param.name), params, ctx, ',');
153478
153689
  }
153479
153690
  }
153691
+
153692
+ /**
153693
+ * @fileoverview
153694
+ * A module to facilitate use of a Trusted Types policy within the JIT
153695
+ * compiler. It lazily constructs the Trusted Types policy, providing helper
153696
+ * utilities for promoting strings to Trusted Types. When Trusted Types are not
153697
+ * available, strings are used as a fallback.
153698
+ * @security All use of this module is security-sensitive and should go through
153699
+ * security review.
153700
+ */
153701
+ /**
153702
+ * The Trusted Types policy, or null if Trusted Types are not
153703
+ * enabled/supported, or undefined if the policy has not been created yet.
153704
+ */
153705
+ let policy;
153706
+ /**
153707
+ * Returns the Trusted Types policy, or null if Trusted Types are not
153708
+ * enabled/supported. The first call to this function will create the policy.
153709
+ */
153710
+ function getPolicy() {
153711
+ if (policy === undefined) {
153712
+ const trustedTypes = _global['trustedTypes'];
153713
+ policy = null;
153714
+ if (trustedTypes) {
153715
+ try {
153716
+ policy = trustedTypes.createPolicy('angular#unsafe-jit', {
153717
+ createScript: (s) => s,
153718
+ });
153719
+ }
153720
+ catch {
153721
+ // trustedTypes.createPolicy throws if called with a name that is
153722
+ // already registered, even in report-only mode. Until the API changes,
153723
+ // catch the error not to break the applications functionally. In such
153724
+ // cases, the code will fall back to using strings.
153725
+ }
153726
+ }
153727
+ }
153728
+ return policy;
153729
+ }
153480
153730
  /**
153481
153731
  * Unsafely promote a string to a TrustedScript, falling back to strings when
153482
153732
  * Trusted Types are not available.
@@ -153485,7 +153735,7 @@ class AbstractJsEmitterVisitor extends AbstractEmitterVisitor {
153485
153735
  * interpreted and executed as a script by a browser, e.g. when calling eval.
153486
153736
  */
153487
153737
  function trustedScriptFromString(script) {
153488
- return script;
153738
+ return getPolicy()?.createScript(script) || script;
153489
153739
  }
153490
153740
  /**
153491
153741
  * Unsafely call the Function constructor with the given string arguments.
@@ -185544,8 +185794,6 @@ if ((DataView$1 && getTag(new DataView$1(new ArrayBuffer(1))) != dataViewTag$3)
185544
185794
  };
185545
185795
  }
185546
185796
 
185547
- var getTag$1 = getTag;
185548
-
185549
185797
  /** Used for built-in method references. */
185550
185798
  var objectProto$c = Object.prototype;
185551
185799
 
@@ -185738,7 +185986,7 @@ var mapTag$6 = '[object Map]';
185738
185986
  * @returns {boolean} Returns `true` if `value` is a map, else `false`.
185739
185987
  */
185740
185988
  function baseIsMap(value) {
185741
- return isObjectLike(value) && getTag$1(value) == mapTag$6;
185989
+ return isObjectLike(value) && getTag(value) == mapTag$6;
185742
185990
  }
185743
185991
 
185744
185992
  /* Node.js helper references. */
@@ -185774,7 +186022,7 @@ var setTag$6 = '[object Set]';
185774
186022
  * @returns {boolean} Returns `true` if `value` is a set, else `false`.
185775
186023
  */
185776
186024
  function baseIsSet(value) {
185777
- return isObjectLike(value) && getTag$1(value) == setTag$6;
186025
+ return isObjectLike(value) && getTag(value) == setTag$6;
185778
186026
  }
185779
186027
 
185780
186028
  /* Node.js helper references. */
@@ -185887,7 +186135,7 @@ function baseClone(value, bitmask, customizer, key, object, stack) {
185887
186135
  return copyArray(value, result);
185888
186136
  }
185889
186137
  } else {
185890
- var tag = getTag$1(value),
186138
+ var tag = getTag(value),
185891
186139
  isFunc = tag == funcTag || tag == genTag;
185892
186140
 
185893
186141
  if (isBuffer(value)) {
@@ -186595,8 +186843,8 @@ var hasOwnProperty$9 = objectProto$a.hasOwnProperty;
186595
186843
  function baseIsEqualDeep(object, other, bitmask, customizer, equalFunc, stack) {
186596
186844
  var objIsArr = isArray(object),
186597
186845
  othIsArr = isArray(other),
186598
- objTag = objIsArr ? arrayTag : getTag$1(object),
186599
- othTag = othIsArr ? arrayTag : getTag$1(other);
186846
+ objTag = objIsArr ? arrayTag : getTag(object),
186847
+ othTag = othIsArr ? arrayTag : getTag(other);
186600
186848
 
186601
186849
  objTag = objTag == argsTag ? objectTag : objTag;
186602
186850
  othTag = othTag == argsTag ? objectTag : othTag;
@@ -188671,7 +188919,7 @@ var mapTag$3 = '[object Map]',
188671
188919
  */
188672
188920
  function createToPairs(keysFunc) {
188673
188921
  return function(object) {
188674
- var tag = getTag$1(object);
188922
+ var tag = getTag(object);
188675
188923
  if (tag == mapTag$3) {
188676
188924
  return mapToArray(object);
188677
188925
  }
@@ -190918,7 +191166,7 @@ function isEmpty(value) {
190918
191166
  isBuffer(value) || isTypedArray(value) || isArguments(value))) {
190919
191167
  return !value.length;
190920
191168
  }
190921
- var tag = getTag$1(value);
191169
+ var tag = getTag(value);
190922
191170
  if (tag == mapTag$2 || tag == setTag$2) {
190923
191171
  return !value.size;
190924
191172
  }
@@ -191406,7 +191654,7 @@ var weakMapTag = '[object WeakMap]';
191406
191654
  * // => false
191407
191655
  */
191408
191656
  function isWeakMap(value) {
191409
- return isObjectLike(value) && getTag$1(value) == weakMapTag;
191657
+ return isObjectLike(value) && getTag(value) == weakMapTag;
191410
191658
  }
191411
191659
 
191412
191660
  /** `Object#toString` result references. */
@@ -192377,7 +192625,7 @@ function toArray(value) {
192377
192625
  if (symIterator$1 && value[symIterator$1]) {
192378
192626
  return iteratorToArray(value[symIterator$1]());
192379
192627
  }
192380
- var tag = getTag$1(value),
192628
+ var tag = getTag(value),
192381
192629
  func = tag == mapTag$1 ? mapToArray : (tag == setTag$1 ? setToArray : values);
192382
192630
 
192383
192631
  return func(value);
@@ -194716,7 +194964,7 @@ function size(collection) {
194716
194964
  if (isArrayLike(collection)) {
194717
194965
  return isString(collection) ? stringSize(collection) : collection.length;
194718
194966
  }
194719
- var tag = getTag$1(collection);
194967
+ var tag = getTag(collection);
194720
194968
  if (tag == mapTag || tag == setTag) {
194721
194969
  return collection.size;
194722
194970
  }
@@ -201875,7 +202123,14 @@ const REGEX = {
201875
202123
  const NUMBER_TYPES = ['int', DataType.INTEGER, DataType.FLOAT, DataType.DOUBLE, DataType.LONG, DataType.SHORT, DataType.BYTE, DataType.BIG_INTEGER, DataType.BIG_DECIMAL];
201876
202124
  const now = new Date();
201877
202125
  const CURRENT_DATE = 'CURRENT_DATE';
201878
- const APP_NAV = 'app-nav';
202126
+ const getNavClass = (suffix) => {
202127
+ const APP_NAV_CLASS_PREFIX = 'app-nav-';
202128
+ return APP_NAV_CLASS_PREFIX + suffix;
202129
+ };
202130
+ const getSheetPositionClass = (suffix) => {
202131
+ const SHEET_POSITION_CLASS_PREFIX = 'sheet-position-';
202132
+ return SHEET_POSITION_CLASS_PREFIX + suffix;
202133
+ };
201879
202134
  const isDefined = v => 'undefined' !== typeof v;
201880
202135
  const isObject = v => null !== v && 'object' === typeof v;
201881
202136
  const toBoolean = (val, identity) => ((val && val !== 'false') ? true : (identity ? val === identity : false));
@@ -203284,7 +203539,6 @@ const findViewParent = (lView) => {
203284
203539
 
203285
203540
  var Utils = /*#__PURE__*/Object.freeze({
203286
203541
  __proto__: null,
203287
- APP_NAV: APP_NAV,
203288
203542
  AppConstants: AppConstants,
203289
203543
  VALIDATOR: VALIDATOR,
203290
203544
  _WM_APP_PROJECT: _WM_APP_PROJECT,
@@ -203324,9 +203578,11 @@ var Utils = /*#__PURE__*/Object.freeze({
203324
203578
  getFormattedDate: getFormattedDate,
203325
203579
  getMomentLocaleObject: getMomentLocaleObject,
203326
203580
  getNativeDateObject: getNativeDateObject,
203581
+ getNavClass: getNavClass,
203327
203582
  getResourceURL: getResourceURL,
203328
203583
  getRouteNameFromLink: getRouteNameFromLink,
203329
203584
  getSessionStorageItem: getSessionStorageItem,
203585
+ getSheetPositionClass: getSheetPositionClass,
203330
203586
  getUrlParams: getUrlParams,
203331
203587
  getValidDateObject: getValidDateObject,
203332
203588
  getValidJSON: getValidJSON,