@wavemaker/angular-codegen 12.0.0-next.45057 → 12.0.0-next.45058
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- angular-codegen/angular-app/package-lock.json +4462 -3472
- angular-codegen/angular-app/package.json +5 -4
- angular-codegen/angular-app/src/framework/services/customwidget-config-provider.service.ts +13 -0
- angular-codegen/angular-app/src/framework/util/page-util.ts +3 -1
- angular-codegen/dependencies/expression-parser.cjs.js +40 -1
- angular-codegen/dependencies/pipe-provider.cjs.js +292 -36
- angular-codegen/dependencies/transpilation-mobile.cjs.js +137 -8
- angular-codegen/dependencies/transpilation-web.cjs.js +137 -8
- angular-codegen/package-lock.json +1 -1
- angular-codegen/package.json +2 -2
- angular-codegen/src/codegen.js +1 -1
- angular-codegen/src/gen-components.js +1 -1
- angular-codegen/src/gen-customwidget-config.js +1 -0
- angular-codegen/src/handlebar-helpers.js +1 -1
- angular-codegen/src/pages-util.js +1 -1
- angular-codegen/templates/app.module.ts.hbs +5 -1
- angular-codegen/templates/component.config.ts.hbs +1 -0
- angular-codegen/templates/customwidget/customwidget-config.ts.hbs +6 -0
- angular-codegen/templates/customwidget/customwidget.component.script.js.hbs +3 -0
- angular-codegen/templates/customwidget/customwidget.component.ts.hbs +44 -0
- angular-codegen/templates/page/page.module.ts.hbs +6 -0
@@ -45,9 +45,9 @@
|
|
45
45
|
"@metrichor/jmespath": "0.3.1",
|
46
46
|
"@wavemaker/focus-trap": "1.0.1",
|
47
47
|
"@wavemaker/nvd3": "1.8.11",
|
48
|
-
"@wavemaker/foundation-css": "12.0.0-next.
|
49
|
-
"@wavemaker/custom-widgets-m3": "12.0.0-next.
|
50
|
-
"@wavemaker/variables": "12.0.0-next.
|
48
|
+
"@wavemaker/foundation-css": "12.0.0-next.45058",
|
49
|
+
"@wavemaker/custom-widgets-m3": "12.0.0-next.45058",
|
50
|
+
"@wavemaker/variables": "12.0.0-next.45058",
|
51
51
|
"@ztree/ztree_v3": "3.5.48",
|
52
52
|
"angular-imask": "^7.6.1",
|
53
53
|
"angular2-websocket": "0.9.7",
|
@@ -72,7 +72,7 @@
|
|
72
72
|
"tslib": "2.4.1",
|
73
73
|
"x2js": "3.4.4",
|
74
74
|
"zone.js": "0.14.7",
|
75
|
-
"@wavemaker/app-ng-runtime": "12.0.0-next.
|
75
|
+
"@wavemaker/app-ng-runtime": "12.0.0-next.45058"
|
76
76
|
},
|
77
77
|
"devDependencies": {
|
78
78
|
"@ampproject/rollup-plugin-closure-compiler": "^0.27.0",
|
@@ -87,6 +87,7 @@
|
|
87
87
|
"@rollup/plugin-commonjs": "24.0.0",
|
88
88
|
"@rollup/plugin-multi-entry": "6.0.0",
|
89
89
|
"@rollup/plugin-node-resolve": "15.0.1",
|
90
|
+
"@rollup/plugin-typescript": "^8.3.3",
|
90
91
|
"@types/jest": "^29.5.12",
|
91
92
|
"@types/jquery": "3.3.22",
|
92
93
|
"@types/lodash-es": "4.17.12",
|
@@ -0,0 +1,13 @@
|
|
1
|
+
import { Injectable } from '@angular/core';
|
2
|
+
|
3
|
+
import { CustomwidgetConfigProvider } from '@wm/runtime/base';
|
4
|
+
|
5
|
+
import { getCustomWidgetConfig } from '../util/page-util';
|
6
|
+
|
7
|
+
@Injectable()
|
8
|
+
export class CustomwidgetConfigProviderService extends CustomwidgetConfigProvider {
|
9
|
+
|
10
|
+
public getConfig(widgetname: string): Promise<any> {
|
11
|
+
return Promise.resolve(getCustomWidgetConfig(widgetname));
|
12
|
+
}
|
13
|
+
}
|
@@ -1,5 +1,7 @@
|
|
1
1
|
const prefabConfigs = new Map<string, any>();
|
2
|
+
const customWidgetConfigs = new Map<string, any>();
|
2
3
|
|
3
4
|
export const registerPrefabConfig = (prefabName: string, config: any) => prefabConfigs.set(prefabName, config);
|
4
5
|
export const getPrefabConfig = prefabName => prefabConfigs.get(prefabName);
|
5
|
-
|
6
|
+
export const registerCustomWidgetConfig = (customWidget: string, config: any) => customWidgetConfigs.set(customWidget, config);
|
7
|
+
export const getCustomWidgetConfig = customWidget => customWidgetConfigs.get(customWidget);
|
@@ -4975,6 +4975,45 @@ class AbstractJsEmitterVisitor extends AbstractEmitterVisitor {
|
|
4975
4975
|
this.visitAllObjects(param => ctx.print(null, param.name), params, ctx, ',');
|
4976
4976
|
}
|
4977
4977
|
}
|
4978
|
+
|
4979
|
+
/**
|
4980
|
+
* @fileoverview
|
4981
|
+
* A module to facilitate use of a Trusted Types policy within the JIT
|
4982
|
+
* compiler. It lazily constructs the Trusted Types policy, providing helper
|
4983
|
+
* utilities for promoting strings to Trusted Types. When Trusted Types are not
|
4984
|
+
* available, strings are used as a fallback.
|
4985
|
+
* @security All use of this module is security-sensitive and should go through
|
4986
|
+
* security review.
|
4987
|
+
*/
|
4988
|
+
/**
|
4989
|
+
* The Trusted Types policy, or null if Trusted Types are not
|
4990
|
+
* enabled/supported, or undefined if the policy has not been created yet.
|
4991
|
+
*/
|
4992
|
+
let policy;
|
4993
|
+
/**
|
4994
|
+
* Returns the Trusted Types policy, or null if Trusted Types are not
|
4995
|
+
* enabled/supported. The first call to this function will create the policy.
|
4996
|
+
*/
|
4997
|
+
function getPolicy() {
|
4998
|
+
if (policy === undefined) {
|
4999
|
+
const trustedTypes = _global['trustedTypes'];
|
5000
|
+
policy = null;
|
5001
|
+
if (trustedTypes) {
|
5002
|
+
try {
|
5003
|
+
policy = trustedTypes.createPolicy('angular#unsafe-jit', {
|
5004
|
+
createScript: (s) => s,
|
5005
|
+
});
|
5006
|
+
}
|
5007
|
+
catch {
|
5008
|
+
// trustedTypes.createPolicy throws if called with a name that is
|
5009
|
+
// already registered, even in report-only mode. Until the API changes,
|
5010
|
+
// catch the error not to break the applications functionally. In such
|
5011
|
+
// cases, the code will fall back to using strings.
|
5012
|
+
}
|
5013
|
+
}
|
5014
|
+
}
|
5015
|
+
return policy;
|
5016
|
+
}
|
4978
5017
|
/**
|
4979
5018
|
* Unsafely promote a string to a TrustedScript, falling back to strings when
|
4980
5019
|
* Trusted Types are not available.
|
@@ -4983,7 +5022,7 @@ class AbstractJsEmitterVisitor extends AbstractEmitterVisitor {
|
|
4983
5022
|
* interpreted and executed as a script by a browser, e.g. when calling eval.
|
4984
5023
|
*/
|
4985
5024
|
function trustedScriptFromString(script) {
|
4986
|
-
return script;
|
5025
|
+
return getPolicy()?.createScript(script) || script;
|
4987
5026
|
}
|
4988
5027
|
/**
|
4989
5028
|
* Unsafely call the Function constructor with the given string arguments.
|
@@ -10454,6 +10454,46 @@ const PRESERVE_HOST_CONTENT$1 = new InjectionToken$1((typeof ngDevMode === 'unde
|
|
10454
10454
|
* is enabled.
|
10455
10455
|
*/
|
10456
10456
|
const IS_I18N_HYDRATION_ENABLED$1 = new InjectionToken$1((typeof ngDevMode === 'undefined' || !!ngDevMode ? 'IS_I18N_HYDRATION_ENABLED' : ''));
|
10457
|
+
|
10458
|
+
/**
|
10459
|
+
* @fileoverview
|
10460
|
+
* A module to facilitate use of a Trusted Types policy internally within
|
10461
|
+
* Angular. It lazily constructs the Trusted Types policy, providing helper
|
10462
|
+
* utilities for promoting strings to Trusted Types. When Trusted Types are not
|
10463
|
+
* available, strings are used as a fallback.
|
10464
|
+
* @security All use of this module is security-sensitive and should go through
|
10465
|
+
* security review.
|
10466
|
+
*/
|
10467
|
+
/**
|
10468
|
+
* The Trusted Types policy, or null if Trusted Types are not
|
10469
|
+
* enabled/supported, or undefined if the policy has not been created yet.
|
10470
|
+
*/
|
10471
|
+
let policy$1$1;
|
10472
|
+
/**
|
10473
|
+
* Returns the Trusted Types policy, or null if Trusted Types are not
|
10474
|
+
* enabled/supported. The first call to this function will create the policy.
|
10475
|
+
*/
|
10476
|
+
function getPolicy$1$1() {
|
10477
|
+
if (policy$1$1 === undefined) {
|
10478
|
+
policy$1$1 = null;
|
10479
|
+
if (_global$3.trustedTypes) {
|
10480
|
+
try {
|
10481
|
+
policy$1$1 = _global$3.trustedTypes.createPolicy('angular', {
|
10482
|
+
createHTML: (s) => s,
|
10483
|
+
createScript: (s) => s,
|
10484
|
+
createScriptURL: (s) => s,
|
10485
|
+
});
|
10486
|
+
}
|
10487
|
+
catch {
|
10488
|
+
// trustedTypes.createPolicy throws if called with a name that is
|
10489
|
+
// already registered, even in report-only mode. Until the API changes,
|
10490
|
+
// catch the error not to break the applications functionally. In such
|
10491
|
+
// cases, the code will fall back to using strings.
|
10492
|
+
}
|
10493
|
+
}
|
10494
|
+
}
|
10495
|
+
return policy$1$1;
|
10496
|
+
}
|
10457
10497
|
/**
|
10458
10498
|
* Unsafely promote a string to a TrustedHTML, falling back to strings when
|
10459
10499
|
* Trusted Types are not available.
|
@@ -10464,7 +10504,7 @@ const IS_I18N_HYDRATION_ENABLED$1 = new InjectionToken$1((typeof ngDevMode === '
|
|
10464
10504
|
* element.innerHTML.
|
10465
10505
|
*/
|
10466
10506
|
function trustedHTMLFromString$1(html) {
|
10467
|
-
return html;
|
10507
|
+
return getPolicy$1$1()?.createHTML(html) || html;
|
10468
10508
|
}
|
10469
10509
|
/**
|
10470
10510
|
* Unsafely promote a string to a TrustedScriptURL, falling back to strings
|
@@ -10476,7 +10516,49 @@ function trustedHTMLFromString$1(html) {
|
|
10476
10516
|
* assigning to script.src.
|
10477
10517
|
*/
|
10478
10518
|
function trustedScriptURLFromString$1(url) {
|
10479
|
-
return url;
|
10519
|
+
return getPolicy$1$1()?.createScriptURL(url) || url;
|
10520
|
+
}
|
10521
|
+
|
10522
|
+
/**
|
10523
|
+
* @fileoverview
|
10524
|
+
* A module to facilitate use of a Trusted Types policy internally within
|
10525
|
+
* Angular specifically for bypassSecurityTrust* and custom sanitizers. It
|
10526
|
+
* lazily constructs the Trusted Types policy, providing helper utilities for
|
10527
|
+
* promoting strings to Trusted Types. When Trusted Types are not available,
|
10528
|
+
* strings are used as a fallback.
|
10529
|
+
* @security All use of this module is security-sensitive and should go through
|
10530
|
+
* security review.
|
10531
|
+
*/
|
10532
|
+
/**
|
10533
|
+
* The Trusted Types policy, or null if Trusted Types are not
|
10534
|
+
* enabled/supported, or undefined if the policy has not been created yet.
|
10535
|
+
*/
|
10536
|
+
let policy$4;
|
10537
|
+
/**
|
10538
|
+
* Returns the Trusted Types policy, or null if Trusted Types are not
|
10539
|
+
* enabled/supported. The first call to this function will create the policy.
|
10540
|
+
*/
|
10541
|
+
function getPolicy$4() {
|
10542
|
+
if (policy$4 === undefined) {
|
10543
|
+
policy$4 = null;
|
10544
|
+
if (_global$3.trustedTypes) {
|
10545
|
+
try {
|
10546
|
+
policy$4 = _global$3.trustedTypes
|
10547
|
+
.createPolicy('angular#unsafe-bypass', {
|
10548
|
+
createHTML: (s) => s,
|
10549
|
+
createScript: (s) => s,
|
10550
|
+
createScriptURL: (s) => s,
|
10551
|
+
});
|
10552
|
+
}
|
10553
|
+
catch {
|
10554
|
+
// trustedTypes.createPolicy throws if called with a name that is
|
10555
|
+
// already registered, even in report-only mode. Until the API changes,
|
10556
|
+
// catch the error not to break the applications functionally. In such
|
10557
|
+
// cases, the code will fall back to using strings.
|
10558
|
+
}
|
10559
|
+
}
|
10560
|
+
}
|
10561
|
+
return policy$4;
|
10480
10562
|
}
|
10481
10563
|
/**
|
10482
10564
|
* Unsafely promote a string to a TrustedHTML, falling back to strings when
|
@@ -10487,7 +10569,7 @@ function trustedScriptURLFromString$1(url) {
|
|
10487
10569
|
* bypassSecurityTrust* functions.
|
10488
10570
|
*/
|
10489
10571
|
function trustedHTMLFromStringBypass$1(html) {
|
10490
|
-
return html;
|
10572
|
+
return getPolicy$4()?.createHTML(html) || html;
|
10491
10573
|
}
|
10492
10574
|
/**
|
10493
10575
|
* Unsafely promote a string to a TrustedScript, falling back to strings when
|
@@ -10498,7 +10580,7 @@ function trustedHTMLFromStringBypass$1(html) {
|
|
10498
10580
|
* bypassSecurityTrust* functions.
|
10499
10581
|
*/
|
10500
10582
|
function trustedScriptFromStringBypass$1(script) {
|
10501
|
-
return script;
|
10583
|
+
return getPolicy$4()?.createScript(script) || script;
|
10502
10584
|
}
|
10503
10585
|
/**
|
10504
10586
|
* Unsafely promote a string to a TrustedScriptURL, falling back to strings
|
@@ -10509,7 +10591,7 @@ function trustedScriptFromStringBypass$1(script) {
|
|
10509
10591
|
* bypassSecurityTrust* functions.
|
10510
10592
|
*/
|
10511
10593
|
function trustedScriptURLFromStringBypass$1(url) {
|
10512
|
-
return url;
|
10594
|
+
return getPolicy$4()?.createScriptURL(url) || url;
|
10513
10595
|
}
|
10514
10596
|
|
10515
10597
|
let SafeValueImpl$1 = class SafeValueImpl {
|
@@ -55052,6 +55134,46 @@ const PRESERVE_HOST_CONTENT = new InjectionToken((typeof ngDevMode === 'undefine
|
|
55052
55134
|
* is enabled.
|
55053
55135
|
*/
|
55054
55136
|
const IS_I18N_HYDRATION_ENABLED = new InjectionToken((typeof ngDevMode === 'undefined' || !!ngDevMode ? 'IS_I18N_HYDRATION_ENABLED' : ''));
|
55137
|
+
|
55138
|
+
/**
|
55139
|
+
* @fileoverview
|
55140
|
+
* A module to facilitate use of a Trusted Types policy internally within
|
55141
|
+
* Angular. It lazily constructs the Trusted Types policy, providing helper
|
55142
|
+
* utilities for promoting strings to Trusted Types. When Trusted Types are not
|
55143
|
+
* available, strings are used as a fallback.
|
55144
|
+
* @security All use of this module is security-sensitive and should go through
|
55145
|
+
* security review.
|
55146
|
+
*/
|
55147
|
+
/**
|
55148
|
+
* The Trusted Types policy, or null if Trusted Types are not
|
55149
|
+
* enabled/supported, or undefined if the policy has not been created yet.
|
55150
|
+
*/
|
55151
|
+
let policy$1;
|
55152
|
+
/**
|
55153
|
+
* Returns the Trusted Types policy, or null if Trusted Types are not
|
55154
|
+
* enabled/supported. The first call to this function will create the policy.
|
55155
|
+
*/
|
55156
|
+
function getPolicy$1() {
|
55157
|
+
if (policy$1 === undefined) {
|
55158
|
+
policy$1 = null;
|
55159
|
+
if (_global$1.trustedTypes) {
|
55160
|
+
try {
|
55161
|
+
policy$1 = _global$1.trustedTypes.createPolicy('angular', {
|
55162
|
+
createHTML: (s) => s,
|
55163
|
+
createScript: (s) => s,
|
55164
|
+
createScriptURL: (s) => s,
|
55165
|
+
});
|
55166
|
+
}
|
55167
|
+
catch {
|
55168
|
+
// trustedTypes.createPolicy throws if called with a name that is
|
55169
|
+
// already registered, even in report-only mode. Until the API changes,
|
55170
|
+
// catch the error not to break the applications functionally. In such
|
55171
|
+
// cases, the code will fall back to using strings.
|
55172
|
+
}
|
55173
|
+
}
|
55174
|
+
}
|
55175
|
+
return policy$1;
|
55176
|
+
}
|
55055
55177
|
/**
|
55056
55178
|
* Unsafely promote a string to a TrustedHTML, falling back to strings when
|
55057
55179
|
* Trusted Types are not available.
|
@@ -55062,7 +55184,7 @@ const IS_I18N_HYDRATION_ENABLED = new InjectionToken((typeof ngDevMode === 'unde
|
|
55062
55184
|
* element.innerHTML.
|
55063
55185
|
*/
|
55064
55186
|
function trustedHTMLFromString(html) {
|
55065
|
-
return html;
|
55187
|
+
return getPolicy$1()?.createHTML(html) || html;
|
55066
55188
|
}
|
55067
55189
|
/**
|
55068
55190
|
* Unsafely promote a string to a TrustedScriptURL, falling back to strings
|
@@ -55074,7 +55196,49 @@ function trustedHTMLFromString(html) {
|
|
55074
55196
|
* assigning to script.src.
|
55075
55197
|
*/
|
55076
55198
|
function trustedScriptURLFromString(url) {
|
55077
|
-
return url;
|
55199
|
+
return getPolicy$1()?.createScriptURL(url) || url;
|
55200
|
+
}
|
55201
|
+
|
55202
|
+
/**
|
55203
|
+
* @fileoverview
|
55204
|
+
* A module to facilitate use of a Trusted Types policy internally within
|
55205
|
+
* Angular specifically for bypassSecurityTrust* and custom sanitizers. It
|
55206
|
+
* lazily constructs the Trusted Types policy, providing helper utilities for
|
55207
|
+
* promoting strings to Trusted Types. When Trusted Types are not available,
|
55208
|
+
* strings are used as a fallback.
|
55209
|
+
* @security All use of this module is security-sensitive and should go through
|
55210
|
+
* security review.
|
55211
|
+
*/
|
55212
|
+
/**
|
55213
|
+
* The Trusted Types policy, or null if Trusted Types are not
|
55214
|
+
* enabled/supported, or undefined if the policy has not been created yet.
|
55215
|
+
*/
|
55216
|
+
let policy$2;
|
55217
|
+
/**
|
55218
|
+
* Returns the Trusted Types policy, or null if Trusted Types are not
|
55219
|
+
* enabled/supported. The first call to this function will create the policy.
|
55220
|
+
*/
|
55221
|
+
function getPolicy$2() {
|
55222
|
+
if (policy$2 === undefined) {
|
55223
|
+
policy$2 = null;
|
55224
|
+
if (_global$1.trustedTypes) {
|
55225
|
+
try {
|
55226
|
+
policy$2 = _global$1.trustedTypes
|
55227
|
+
.createPolicy('angular#unsafe-bypass', {
|
55228
|
+
createHTML: (s) => s,
|
55229
|
+
createScript: (s) => s,
|
55230
|
+
createScriptURL: (s) => s,
|
55231
|
+
});
|
55232
|
+
}
|
55233
|
+
catch {
|
55234
|
+
// trustedTypes.createPolicy throws if called with a name that is
|
55235
|
+
// already registered, even in report-only mode. Until the API changes,
|
55236
|
+
// catch the error not to break the applications functionally. In such
|
55237
|
+
// cases, the code will fall back to using strings.
|
55238
|
+
}
|
55239
|
+
}
|
55240
|
+
}
|
55241
|
+
return policy$2;
|
55078
55242
|
}
|
55079
55243
|
/**
|
55080
55244
|
* Unsafely promote a string to a TrustedHTML, falling back to strings when
|
@@ -55085,7 +55249,7 @@ function trustedScriptURLFromString(url) {
|
|
55085
55249
|
* bypassSecurityTrust* functions.
|
55086
55250
|
*/
|
55087
55251
|
function trustedHTMLFromStringBypass(html) {
|
55088
|
-
return html;
|
55252
|
+
return getPolicy$2()?.createHTML(html) || html;
|
55089
55253
|
}
|
55090
55254
|
/**
|
55091
55255
|
* Unsafely promote a string to a TrustedScript, falling back to strings when
|
@@ -55096,7 +55260,7 @@ function trustedHTMLFromStringBypass(html) {
|
|
55096
55260
|
* bypassSecurityTrust* functions.
|
55097
55261
|
*/
|
55098
55262
|
function trustedScriptFromStringBypass(script) {
|
55099
|
-
return script;
|
55263
|
+
return getPolicy$2()?.createScript(script) || script;
|
55100
55264
|
}
|
55101
55265
|
/**
|
55102
55266
|
* Unsafely promote a string to a TrustedScriptURL, falling back to strings
|
@@ -55107,7 +55271,7 @@ function trustedScriptFromStringBypass(script) {
|
|
55107
55271
|
* bypassSecurityTrust* functions.
|
55108
55272
|
*/
|
55109
55273
|
function trustedScriptURLFromStringBypass(url) {
|
55110
|
-
return url;
|
55274
|
+
return getPolicy$2()?.createScriptURL(url) || url;
|
55111
55275
|
}
|
55112
55276
|
|
55113
55277
|
class SafeValueImpl {
|
@@ -94180,6 +94344,45 @@ let AbstractJsEmitterVisitor$1 = class AbstractJsEmitterVisitor extends Abstract
|
|
94180
94344
|
this.visitAllObjects(param => ctx.print(null, param.name), params, ctx, ',');
|
94181
94345
|
}
|
94182
94346
|
};
|
94347
|
+
|
94348
|
+
/**
|
94349
|
+
* @fileoverview
|
94350
|
+
* A module to facilitate use of a Trusted Types policy within the JIT
|
94351
|
+
* compiler. It lazily constructs the Trusted Types policy, providing helper
|
94352
|
+
* utilities for promoting strings to Trusted Types. When Trusted Types are not
|
94353
|
+
* available, strings are used as a fallback.
|
94354
|
+
* @security All use of this module is security-sensitive and should go through
|
94355
|
+
* security review.
|
94356
|
+
*/
|
94357
|
+
/**
|
94358
|
+
* The Trusted Types policy, or null if Trusted Types are not
|
94359
|
+
* enabled/supported, or undefined if the policy has not been created yet.
|
94360
|
+
*/
|
94361
|
+
let policy$3;
|
94362
|
+
/**
|
94363
|
+
* Returns the Trusted Types policy, or null if Trusted Types are not
|
94364
|
+
* enabled/supported. The first call to this function will create the policy.
|
94365
|
+
*/
|
94366
|
+
function getPolicy$3() {
|
94367
|
+
if (policy$3 === undefined) {
|
94368
|
+
const trustedTypes = _global$2['trustedTypes'];
|
94369
|
+
policy$3 = null;
|
94370
|
+
if (trustedTypes) {
|
94371
|
+
try {
|
94372
|
+
policy$3 = trustedTypes.createPolicy('angular#unsafe-jit', {
|
94373
|
+
createScript: (s) => s,
|
94374
|
+
});
|
94375
|
+
}
|
94376
|
+
catch {
|
94377
|
+
// trustedTypes.createPolicy throws if called with a name that is
|
94378
|
+
// already registered, even in report-only mode. Until the API changes,
|
94379
|
+
// catch the error not to break the applications functionally. In such
|
94380
|
+
// cases, the code will fall back to using strings.
|
94381
|
+
}
|
94382
|
+
}
|
94383
|
+
}
|
94384
|
+
return policy$3;
|
94385
|
+
}
|
94183
94386
|
/**
|
94184
94387
|
* Unsafely promote a string to a TrustedScript, falling back to strings when
|
94185
94388
|
* Trusted Types are not available.
|
@@ -94188,7 +94391,7 @@ let AbstractJsEmitterVisitor$1 = class AbstractJsEmitterVisitor extends Abstract
|
|
94188
94391
|
* interpreted and executed as a script by a browser, e.g. when calling eval.
|
94189
94392
|
*/
|
94190
94393
|
function trustedScriptFromString$1(script) {
|
94191
|
-
return script;
|
94394
|
+
return getPolicy$3()?.createScript(script) || script;
|
94192
94395
|
}
|
94193
94396
|
/**
|
94194
94397
|
* Unsafely call the Function constructor with the given string arguments.
|
@@ -126221,15 +126424,15 @@ var dataViewCtorString$1 = toSource$1(DataView$1$1),
|
|
126221
126424
|
* @param {*} value The value to query.
|
126222
126425
|
* @returns {string} Returns the `toStringTag`.
|
126223
126426
|
*/
|
126224
|
-
var getTag$
|
126427
|
+
var getTag$1 = baseGetTag$1;
|
126225
126428
|
|
126226
126429
|
// Fallback for data views, maps, sets, and weak maps in IE 11 and promises in Node.js < 6.
|
126227
|
-
if ((DataView$1$1 && getTag$
|
126228
|
-
(Map$1$1 && getTag$
|
126229
|
-
(Promise$1$1 && getTag$
|
126230
|
-
(Set$1$1 && getTag$
|
126231
|
-
(WeakMap$1$1 && getTag$
|
126232
|
-
getTag$
|
126430
|
+
if ((DataView$1$1 && getTag$1(new DataView$1$1(new ArrayBuffer(1))) != dataViewTag$3$1) ||
|
126431
|
+
(Map$1$1 && getTag$1(new Map$1$1) != mapTag$8$1) ||
|
126432
|
+
(Promise$1$1 && getTag$1(Promise$1$1.resolve()) != promiseTag$1) ||
|
126433
|
+
(Set$1$1 && getTag$1(new Set$1$1) != setTag$8$1) ||
|
126434
|
+
(WeakMap$1$1 && getTag$1(new WeakMap$1$1) != weakMapTag$2$1)) {
|
126435
|
+
getTag$1 = function(value) {
|
126233
126436
|
var result = baseGetTag$1(value),
|
126234
126437
|
Ctor = result == objectTag$2$1 ? value.constructor : undefined,
|
126235
126438
|
ctorString = Ctor ? toSource$1(Ctor) : '';
|
@@ -126247,7 +126450,7 @@ if ((DataView$1$1 && getTag$2(new DataView$1$1(new ArrayBuffer(1))) != dataViewT
|
|
126247
126450
|
};
|
126248
126451
|
}
|
126249
126452
|
|
126250
|
-
var getTag$1$1 = getTag$
|
126453
|
+
var getTag$1$1 = getTag$1;
|
126251
126454
|
|
126252
126455
|
/** Used for built-in method references. */
|
126253
126456
|
var objectProto$c$1 = Object.prototype;
|
@@ -143643,7 +143846,14 @@ const REGEX$1 = {
|
|
143643
143846
|
const NUMBER_TYPES$1 = ['int', DataType$1.INTEGER, DataType$1.FLOAT, DataType$1.DOUBLE, DataType$1.LONG, DataType$1.SHORT, DataType$1.BYTE, DataType$1.BIG_INTEGER, DataType$1.BIG_DECIMAL];
|
143644
143847
|
const now$2 = new Date();
|
143645
143848
|
const CURRENT_DATE$1 = 'CURRENT_DATE';
|
143646
|
-
const
|
143849
|
+
const getNavClass$1 = (suffix) => {
|
143850
|
+
const APP_NAV_CLASS_PREFIX = 'app-nav-';
|
143851
|
+
return APP_NAV_CLASS_PREFIX + suffix;
|
143852
|
+
};
|
143853
|
+
const getSheetPositionClass$1 = (suffix) => {
|
143854
|
+
const SHEET_POSITION_CLASS_PREFIX = 'sheet-position-';
|
143855
|
+
return SHEET_POSITION_CLASS_PREFIX + suffix;
|
143856
|
+
};
|
143647
143857
|
const isDefined$1 = v => 'undefined' !== typeof v;
|
143648
143858
|
const isObject$3 = v => null !== v && 'object' === typeof v;
|
143649
143859
|
const toBoolean$1 = (val, identity) => ((val && val !== 'false') ? true : (identity ? val === identity : false));
|
@@ -145052,7 +145262,6 @@ const findViewParent$1 = (lView) => {
|
|
145052
145262
|
|
145053
145263
|
var Utils$1 = /*#__PURE__*/Object.freeze({
|
145054
145264
|
__proto__: null,
|
145055
|
-
APP_NAV: APP_NAV$1,
|
145056
145265
|
AppConstants: AppConstants$1,
|
145057
145266
|
VALIDATOR: VALIDATOR$1,
|
145058
145267
|
_WM_APP_PROJECT: _WM_APP_PROJECT$1,
|
@@ -145092,9 +145301,11 @@ var Utils$1 = /*#__PURE__*/Object.freeze({
|
|
145092
145301
|
getFormattedDate: getFormattedDate$1,
|
145093
145302
|
getMomentLocaleObject: getMomentLocaleObject$1,
|
145094
145303
|
getNativeDateObject: getNativeDateObject$1,
|
145304
|
+
getNavClass: getNavClass$1,
|
145095
145305
|
getResourceURL: getResourceURL$1,
|
145096
145306
|
getRouteNameFromLink: getRouteNameFromLink$1,
|
145097
145307
|
getSessionStorageItem: getSessionStorageItem$1,
|
145308
|
+
getSheetPositionClass: getSheetPositionClass$1,
|
145098
145309
|
getUrlParams: getUrlParams$1,
|
145099
145310
|
getValidDateObject: getValidDateObject$1,
|
145100
145311
|
getValidJSON: getValidJSON$1,
|
@@ -153477,6 +153688,45 @@ class AbstractJsEmitterVisitor extends AbstractEmitterVisitor {
|
|
153477
153688
|
this.visitAllObjects(param => ctx.print(null, param.name), params, ctx, ',');
|
153478
153689
|
}
|
153479
153690
|
}
|
153691
|
+
|
153692
|
+
/**
|
153693
|
+
* @fileoverview
|
153694
|
+
* A module to facilitate use of a Trusted Types policy within the JIT
|
153695
|
+
* compiler. It lazily constructs the Trusted Types policy, providing helper
|
153696
|
+
* utilities for promoting strings to Trusted Types. When Trusted Types are not
|
153697
|
+
* available, strings are used as a fallback.
|
153698
|
+
* @security All use of this module is security-sensitive and should go through
|
153699
|
+
* security review.
|
153700
|
+
*/
|
153701
|
+
/**
|
153702
|
+
* The Trusted Types policy, or null if Trusted Types are not
|
153703
|
+
* enabled/supported, or undefined if the policy has not been created yet.
|
153704
|
+
*/
|
153705
|
+
let policy;
|
153706
|
+
/**
|
153707
|
+
* Returns the Trusted Types policy, or null if Trusted Types are not
|
153708
|
+
* enabled/supported. The first call to this function will create the policy.
|
153709
|
+
*/
|
153710
|
+
function getPolicy() {
|
153711
|
+
if (policy === undefined) {
|
153712
|
+
const trustedTypes = _global['trustedTypes'];
|
153713
|
+
policy = null;
|
153714
|
+
if (trustedTypes) {
|
153715
|
+
try {
|
153716
|
+
policy = trustedTypes.createPolicy('angular#unsafe-jit', {
|
153717
|
+
createScript: (s) => s,
|
153718
|
+
});
|
153719
|
+
}
|
153720
|
+
catch {
|
153721
|
+
// trustedTypes.createPolicy throws if called with a name that is
|
153722
|
+
// already registered, even in report-only mode. Until the API changes,
|
153723
|
+
// catch the error not to break the applications functionally. In such
|
153724
|
+
// cases, the code will fall back to using strings.
|
153725
|
+
}
|
153726
|
+
}
|
153727
|
+
}
|
153728
|
+
return policy;
|
153729
|
+
}
|
153480
153730
|
/**
|
153481
153731
|
* Unsafely promote a string to a TrustedScript, falling back to strings when
|
153482
153732
|
* Trusted Types are not available.
|
@@ -153485,7 +153735,7 @@ class AbstractJsEmitterVisitor extends AbstractEmitterVisitor {
|
|
153485
153735
|
* interpreted and executed as a script by a browser, e.g. when calling eval.
|
153486
153736
|
*/
|
153487
153737
|
function trustedScriptFromString(script) {
|
153488
|
-
return script;
|
153738
|
+
return getPolicy()?.createScript(script) || script;
|
153489
153739
|
}
|
153490
153740
|
/**
|
153491
153741
|
* Unsafely call the Function constructor with the given string arguments.
|
@@ -185544,8 +185794,6 @@ if ((DataView$1 && getTag(new DataView$1(new ArrayBuffer(1))) != dataViewTag$3)
|
|
185544
185794
|
};
|
185545
185795
|
}
|
185546
185796
|
|
185547
|
-
var getTag$1 = getTag;
|
185548
|
-
|
185549
185797
|
/** Used for built-in method references. */
|
185550
185798
|
var objectProto$c = Object.prototype;
|
185551
185799
|
|
@@ -185738,7 +185986,7 @@ var mapTag$6 = '[object Map]';
|
|
185738
185986
|
* @returns {boolean} Returns `true` if `value` is a map, else `false`.
|
185739
185987
|
*/
|
185740
185988
|
function baseIsMap(value) {
|
185741
|
-
return isObjectLike(value) && getTag
|
185989
|
+
return isObjectLike(value) && getTag(value) == mapTag$6;
|
185742
185990
|
}
|
185743
185991
|
|
185744
185992
|
/* Node.js helper references. */
|
@@ -185774,7 +186022,7 @@ var setTag$6 = '[object Set]';
|
|
185774
186022
|
* @returns {boolean} Returns `true` if `value` is a set, else `false`.
|
185775
186023
|
*/
|
185776
186024
|
function baseIsSet(value) {
|
185777
|
-
return isObjectLike(value) && getTag
|
186025
|
+
return isObjectLike(value) && getTag(value) == setTag$6;
|
185778
186026
|
}
|
185779
186027
|
|
185780
186028
|
/* Node.js helper references. */
|
@@ -185887,7 +186135,7 @@ function baseClone(value, bitmask, customizer, key, object, stack) {
|
|
185887
186135
|
return copyArray(value, result);
|
185888
186136
|
}
|
185889
186137
|
} else {
|
185890
|
-
var tag = getTag
|
186138
|
+
var tag = getTag(value),
|
185891
186139
|
isFunc = tag == funcTag || tag == genTag;
|
185892
186140
|
|
185893
186141
|
if (isBuffer(value)) {
|
@@ -186595,8 +186843,8 @@ var hasOwnProperty$9 = objectProto$a.hasOwnProperty;
|
|
186595
186843
|
function baseIsEqualDeep(object, other, bitmask, customizer, equalFunc, stack) {
|
186596
186844
|
var objIsArr = isArray(object),
|
186597
186845
|
othIsArr = isArray(other),
|
186598
|
-
objTag = objIsArr ? arrayTag : getTag
|
186599
|
-
othTag = othIsArr ? arrayTag : getTag
|
186846
|
+
objTag = objIsArr ? arrayTag : getTag(object),
|
186847
|
+
othTag = othIsArr ? arrayTag : getTag(other);
|
186600
186848
|
|
186601
186849
|
objTag = objTag == argsTag ? objectTag : objTag;
|
186602
186850
|
othTag = othTag == argsTag ? objectTag : othTag;
|
@@ -188671,7 +188919,7 @@ var mapTag$3 = '[object Map]',
|
|
188671
188919
|
*/
|
188672
188920
|
function createToPairs(keysFunc) {
|
188673
188921
|
return function(object) {
|
188674
|
-
var tag = getTag
|
188922
|
+
var tag = getTag(object);
|
188675
188923
|
if (tag == mapTag$3) {
|
188676
188924
|
return mapToArray(object);
|
188677
188925
|
}
|
@@ -190918,7 +191166,7 @@ function isEmpty(value) {
|
|
190918
191166
|
isBuffer(value) || isTypedArray(value) || isArguments(value))) {
|
190919
191167
|
return !value.length;
|
190920
191168
|
}
|
190921
|
-
var tag = getTag
|
191169
|
+
var tag = getTag(value);
|
190922
191170
|
if (tag == mapTag$2 || tag == setTag$2) {
|
190923
191171
|
return !value.size;
|
190924
191172
|
}
|
@@ -191406,7 +191654,7 @@ var weakMapTag = '[object WeakMap]';
|
|
191406
191654
|
* // => false
|
191407
191655
|
*/
|
191408
191656
|
function isWeakMap(value) {
|
191409
|
-
return isObjectLike(value) && getTag
|
191657
|
+
return isObjectLike(value) && getTag(value) == weakMapTag;
|
191410
191658
|
}
|
191411
191659
|
|
191412
191660
|
/** `Object#toString` result references. */
|
@@ -192377,7 +192625,7 @@ function toArray(value) {
|
|
192377
192625
|
if (symIterator$1 && value[symIterator$1]) {
|
192378
192626
|
return iteratorToArray(value[symIterator$1]());
|
192379
192627
|
}
|
192380
|
-
var tag = getTag
|
192628
|
+
var tag = getTag(value),
|
192381
192629
|
func = tag == mapTag$1 ? mapToArray : (tag == setTag$1 ? setToArray : values);
|
192382
192630
|
|
192383
192631
|
return func(value);
|
@@ -194716,7 +194964,7 @@ function size(collection) {
|
|
194716
194964
|
if (isArrayLike(collection)) {
|
194717
194965
|
return isString(collection) ? stringSize(collection) : collection.length;
|
194718
194966
|
}
|
194719
|
-
var tag = getTag
|
194967
|
+
var tag = getTag(collection);
|
194720
194968
|
if (tag == mapTag || tag == setTag) {
|
194721
194969
|
return collection.size;
|
194722
194970
|
}
|
@@ -201875,7 +202123,14 @@ const REGEX = {
|
|
201875
202123
|
const NUMBER_TYPES = ['int', DataType.INTEGER, DataType.FLOAT, DataType.DOUBLE, DataType.LONG, DataType.SHORT, DataType.BYTE, DataType.BIG_INTEGER, DataType.BIG_DECIMAL];
|
201876
202124
|
const now = new Date();
|
201877
202125
|
const CURRENT_DATE = 'CURRENT_DATE';
|
201878
|
-
const
|
202126
|
+
const getNavClass = (suffix) => {
|
202127
|
+
const APP_NAV_CLASS_PREFIX = 'app-nav-';
|
202128
|
+
return APP_NAV_CLASS_PREFIX + suffix;
|
202129
|
+
};
|
202130
|
+
const getSheetPositionClass = (suffix) => {
|
202131
|
+
const SHEET_POSITION_CLASS_PREFIX = 'sheet-position-';
|
202132
|
+
return SHEET_POSITION_CLASS_PREFIX + suffix;
|
202133
|
+
};
|
201879
202134
|
const isDefined = v => 'undefined' !== typeof v;
|
201880
202135
|
const isObject = v => null !== v && 'object' === typeof v;
|
201881
202136
|
const toBoolean = (val, identity) => ((val && val !== 'false') ? true : (identity ? val === identity : false));
|
@@ -203284,7 +203539,6 @@ const findViewParent = (lView) => {
|
|
203284
203539
|
|
203285
203540
|
var Utils = /*#__PURE__*/Object.freeze({
|
203286
203541
|
__proto__: null,
|
203287
|
-
APP_NAV: APP_NAV,
|
203288
203542
|
AppConstants: AppConstants,
|
203289
203543
|
VALIDATOR: VALIDATOR,
|
203290
203544
|
_WM_APP_PROJECT: _WM_APP_PROJECT,
|
@@ -203324,9 +203578,11 @@ var Utils = /*#__PURE__*/Object.freeze({
|
|
203324
203578
|
getFormattedDate: getFormattedDate,
|
203325
203579
|
getMomentLocaleObject: getMomentLocaleObject,
|
203326
203580
|
getNativeDateObject: getNativeDateObject,
|
203581
|
+
getNavClass: getNavClass,
|
203327
203582
|
getResourceURL: getResourceURL,
|
203328
203583
|
getRouteNameFromLink: getRouteNameFromLink,
|
203329
203584
|
getSessionStorageItem: getSessionStorageItem,
|
203585
|
+
getSheetPositionClass: getSheetPositionClass,
|
203330
203586
|
getUrlParams: getUrlParams,
|
203331
203587
|
getValidDateObject: getValidDateObject,
|
203332
203588
|
getValidJSON: getValidJSON,
|