@wavemaker/angular-codegen 12.0.0-next.45057 → 12.0.0-next.45058

Sign up to get free protection for your applications and to get access to all the features.
@@ -45,9 +45,9 @@
45
45
  "@metrichor/jmespath": "0.3.1",
46
46
  "@wavemaker/focus-trap": "1.0.1",
47
47
  "@wavemaker/nvd3": "1.8.11",
48
- "@wavemaker/foundation-css": "12.0.0-next.45057",
49
- "@wavemaker/custom-widgets-m3": "12.0.0-next.45057",
50
- "@wavemaker/variables": "12.0.0-next.45057",
48
+ "@wavemaker/foundation-css": "12.0.0-next.45058",
49
+ "@wavemaker/custom-widgets-m3": "12.0.0-next.45058",
50
+ "@wavemaker/variables": "12.0.0-next.45058",
51
51
  "@ztree/ztree_v3": "3.5.48",
52
52
  "angular-imask": "^7.6.1",
53
53
  "angular2-websocket": "0.9.7",
@@ -72,7 +72,7 @@
72
72
  "tslib": "2.4.1",
73
73
  "x2js": "3.4.4",
74
74
  "zone.js": "0.14.7",
75
- "@wavemaker/app-ng-runtime": "12.0.0-next.45057"
75
+ "@wavemaker/app-ng-runtime": "12.0.0-next.45058"
76
76
  },
77
77
  "devDependencies": {
78
78
  "@ampproject/rollup-plugin-closure-compiler": "^0.27.0",
@@ -87,6 +87,7 @@
87
87
  "@rollup/plugin-commonjs": "24.0.0",
88
88
  "@rollup/plugin-multi-entry": "6.0.0",
89
89
  "@rollup/plugin-node-resolve": "15.0.1",
90
+ "@rollup/plugin-typescript": "^8.3.3",
90
91
  "@types/jest": "^29.5.12",
91
92
  "@types/jquery": "3.3.22",
92
93
  "@types/lodash-es": "4.17.12",
@@ -0,0 +1,13 @@
1
+ import { Injectable } from '@angular/core';
2
+
3
+ import { CustomwidgetConfigProvider } from '@wm/runtime/base';
4
+
5
+ import { getCustomWidgetConfig } from '../util/page-util';
6
+
7
+ @Injectable()
8
+ export class CustomwidgetConfigProviderService extends CustomwidgetConfigProvider {
9
+
10
+ public getConfig(widgetname: string): Promise<any> {
11
+ return Promise.resolve(getCustomWidgetConfig(widgetname));
12
+ }
13
+ }
@@ -1,5 +1,7 @@
1
1
  const prefabConfigs = new Map<string, any>();
2
+ const customWidgetConfigs = new Map<string, any>();
2
3
 
3
4
  export const registerPrefabConfig = (prefabName: string, config: any) => prefabConfigs.set(prefabName, config);
4
5
  export const getPrefabConfig = prefabName => prefabConfigs.get(prefabName);
5
-
6
+ export const registerCustomWidgetConfig = (customWidget: string, config: any) => customWidgetConfigs.set(customWidget, config);
7
+ export const getCustomWidgetConfig = customWidget => customWidgetConfigs.get(customWidget);
@@ -4975,6 +4975,45 @@ class AbstractJsEmitterVisitor extends AbstractEmitterVisitor {
4975
4975
  this.visitAllObjects(param => ctx.print(null, param.name), params, ctx, ',');
4976
4976
  }
4977
4977
  }
4978
+
4979
+ /**
4980
+ * @fileoverview
4981
+ * A module to facilitate use of a Trusted Types policy within the JIT
4982
+ * compiler. It lazily constructs the Trusted Types policy, providing helper
4983
+ * utilities for promoting strings to Trusted Types. When Trusted Types are not
4984
+ * available, strings are used as a fallback.
4985
+ * @security All use of this module is security-sensitive and should go through
4986
+ * security review.
4987
+ */
4988
+ /**
4989
+ * The Trusted Types policy, or null if Trusted Types are not
4990
+ * enabled/supported, or undefined if the policy has not been created yet.
4991
+ */
4992
+ let policy;
4993
+ /**
4994
+ * Returns the Trusted Types policy, or null if Trusted Types are not
4995
+ * enabled/supported. The first call to this function will create the policy.
4996
+ */
4997
+ function getPolicy() {
4998
+ if (policy === undefined) {
4999
+ const trustedTypes = _global['trustedTypes'];
5000
+ policy = null;
5001
+ if (trustedTypes) {
5002
+ try {
5003
+ policy = trustedTypes.createPolicy('angular#unsafe-jit', {
5004
+ createScript: (s) => s,
5005
+ });
5006
+ }
5007
+ catch {
5008
+ // trustedTypes.createPolicy throws if called with a name that is
5009
+ // already registered, even in report-only mode. Until the API changes,
5010
+ // catch the error not to break the applications functionally. In such
5011
+ // cases, the code will fall back to using strings.
5012
+ }
5013
+ }
5014
+ }
5015
+ return policy;
5016
+ }
4978
5017
  /**
4979
5018
  * Unsafely promote a string to a TrustedScript, falling back to strings when
4980
5019
  * Trusted Types are not available.
@@ -4983,7 +5022,7 @@ class AbstractJsEmitterVisitor extends AbstractEmitterVisitor {
4983
5022
  * interpreted and executed as a script by a browser, e.g. when calling eval.
4984
5023
  */
4985
5024
  function trustedScriptFromString(script) {
4986
- return script;
5025
+ return getPolicy()?.createScript(script) || script;
4987
5026
  }
4988
5027
  /**
4989
5028
  * Unsafely call the Function constructor with the given string arguments.
@@ -10454,6 +10454,46 @@ const PRESERVE_HOST_CONTENT$1 = new InjectionToken$1((typeof ngDevMode === 'unde
10454
10454
  * is enabled.
10455
10455
  */
10456
10456
  const IS_I18N_HYDRATION_ENABLED$1 = new InjectionToken$1((typeof ngDevMode === 'undefined' || !!ngDevMode ? 'IS_I18N_HYDRATION_ENABLED' : ''));
10457
+
10458
+ /**
10459
+ * @fileoverview
10460
+ * A module to facilitate use of a Trusted Types policy internally within
10461
+ * Angular. It lazily constructs the Trusted Types policy, providing helper
10462
+ * utilities for promoting strings to Trusted Types. When Trusted Types are not
10463
+ * available, strings are used as a fallback.
10464
+ * @security All use of this module is security-sensitive and should go through
10465
+ * security review.
10466
+ */
10467
+ /**
10468
+ * The Trusted Types policy, or null if Trusted Types are not
10469
+ * enabled/supported, or undefined if the policy has not been created yet.
10470
+ */
10471
+ let policy$1$1;
10472
+ /**
10473
+ * Returns the Trusted Types policy, or null if Trusted Types are not
10474
+ * enabled/supported. The first call to this function will create the policy.
10475
+ */
10476
+ function getPolicy$1$1() {
10477
+ if (policy$1$1 === undefined) {
10478
+ policy$1$1 = null;
10479
+ if (_global$3.trustedTypes) {
10480
+ try {
10481
+ policy$1$1 = _global$3.trustedTypes.createPolicy('angular', {
10482
+ createHTML: (s) => s,
10483
+ createScript: (s) => s,
10484
+ createScriptURL: (s) => s,
10485
+ });
10486
+ }
10487
+ catch {
10488
+ // trustedTypes.createPolicy throws if called with a name that is
10489
+ // already registered, even in report-only mode. Until the API changes,
10490
+ // catch the error not to break the applications functionally. In such
10491
+ // cases, the code will fall back to using strings.
10492
+ }
10493
+ }
10494
+ }
10495
+ return policy$1$1;
10496
+ }
10457
10497
  /**
10458
10498
  * Unsafely promote a string to a TrustedHTML, falling back to strings when
10459
10499
  * Trusted Types are not available.
@@ -10464,7 +10504,7 @@ const IS_I18N_HYDRATION_ENABLED$1 = new InjectionToken$1((typeof ngDevMode === '
10464
10504
  * element.innerHTML.
10465
10505
  */
10466
10506
  function trustedHTMLFromString$1(html) {
10467
- return html;
10507
+ return getPolicy$1$1()?.createHTML(html) || html;
10468
10508
  }
10469
10509
  /**
10470
10510
  * Unsafely promote a string to a TrustedScriptURL, falling back to strings
@@ -10476,7 +10516,49 @@ function trustedHTMLFromString$1(html) {
10476
10516
  * assigning to script.src.
10477
10517
  */
10478
10518
  function trustedScriptURLFromString$1(url) {
10479
- return url;
10519
+ return getPolicy$1$1()?.createScriptURL(url) || url;
10520
+ }
10521
+
10522
+ /**
10523
+ * @fileoverview
10524
+ * A module to facilitate use of a Trusted Types policy internally within
10525
+ * Angular specifically for bypassSecurityTrust* and custom sanitizers. It
10526
+ * lazily constructs the Trusted Types policy, providing helper utilities for
10527
+ * promoting strings to Trusted Types. When Trusted Types are not available,
10528
+ * strings are used as a fallback.
10529
+ * @security All use of this module is security-sensitive and should go through
10530
+ * security review.
10531
+ */
10532
+ /**
10533
+ * The Trusted Types policy, or null if Trusted Types are not
10534
+ * enabled/supported, or undefined if the policy has not been created yet.
10535
+ */
10536
+ let policy$4;
10537
+ /**
10538
+ * Returns the Trusted Types policy, or null if Trusted Types are not
10539
+ * enabled/supported. The first call to this function will create the policy.
10540
+ */
10541
+ function getPolicy$4() {
10542
+ if (policy$4 === undefined) {
10543
+ policy$4 = null;
10544
+ if (_global$3.trustedTypes) {
10545
+ try {
10546
+ policy$4 = _global$3.trustedTypes
10547
+ .createPolicy('angular#unsafe-bypass', {
10548
+ createHTML: (s) => s,
10549
+ createScript: (s) => s,
10550
+ createScriptURL: (s) => s,
10551
+ });
10552
+ }
10553
+ catch {
10554
+ // trustedTypes.createPolicy throws if called with a name that is
10555
+ // already registered, even in report-only mode. Until the API changes,
10556
+ // catch the error not to break the applications functionally. In such
10557
+ // cases, the code will fall back to using strings.
10558
+ }
10559
+ }
10560
+ }
10561
+ return policy$4;
10480
10562
  }
10481
10563
  /**
10482
10564
  * Unsafely promote a string to a TrustedHTML, falling back to strings when
@@ -10487,7 +10569,7 @@ function trustedScriptURLFromString$1(url) {
10487
10569
  * bypassSecurityTrust* functions.
10488
10570
  */
10489
10571
  function trustedHTMLFromStringBypass$1(html) {
10490
- return html;
10572
+ return getPolicy$4()?.createHTML(html) || html;
10491
10573
  }
10492
10574
  /**
10493
10575
  * Unsafely promote a string to a TrustedScript, falling back to strings when
@@ -10498,7 +10580,7 @@ function trustedHTMLFromStringBypass$1(html) {
10498
10580
  * bypassSecurityTrust* functions.
10499
10581
  */
10500
10582
  function trustedScriptFromStringBypass$1(script) {
10501
- return script;
10583
+ return getPolicy$4()?.createScript(script) || script;
10502
10584
  }
10503
10585
  /**
10504
10586
  * Unsafely promote a string to a TrustedScriptURL, falling back to strings
@@ -10509,7 +10591,7 @@ function trustedScriptFromStringBypass$1(script) {
10509
10591
  * bypassSecurityTrust* functions.
10510
10592
  */
10511
10593
  function trustedScriptURLFromStringBypass$1(url) {
10512
- return url;
10594
+ return getPolicy$4()?.createScriptURL(url) || url;
10513
10595
  }
10514
10596
 
10515
10597
  let SafeValueImpl$1 = class SafeValueImpl {
@@ -55052,6 +55134,46 @@ const PRESERVE_HOST_CONTENT = new InjectionToken((typeof ngDevMode === 'undefine
55052
55134
  * is enabled.
55053
55135
  */
55054
55136
  const IS_I18N_HYDRATION_ENABLED = new InjectionToken((typeof ngDevMode === 'undefined' || !!ngDevMode ? 'IS_I18N_HYDRATION_ENABLED' : ''));
55137
+
55138
+ /**
55139
+ * @fileoverview
55140
+ * A module to facilitate use of a Trusted Types policy internally within
55141
+ * Angular. It lazily constructs the Trusted Types policy, providing helper
55142
+ * utilities for promoting strings to Trusted Types. When Trusted Types are not
55143
+ * available, strings are used as a fallback.
55144
+ * @security All use of this module is security-sensitive and should go through
55145
+ * security review.
55146
+ */
55147
+ /**
55148
+ * The Trusted Types policy, or null if Trusted Types are not
55149
+ * enabled/supported, or undefined if the policy has not been created yet.
55150
+ */
55151
+ let policy$1;
55152
+ /**
55153
+ * Returns the Trusted Types policy, or null if Trusted Types are not
55154
+ * enabled/supported. The first call to this function will create the policy.
55155
+ */
55156
+ function getPolicy$1() {
55157
+ if (policy$1 === undefined) {
55158
+ policy$1 = null;
55159
+ if (_global$1.trustedTypes) {
55160
+ try {
55161
+ policy$1 = _global$1.trustedTypes.createPolicy('angular', {
55162
+ createHTML: (s) => s,
55163
+ createScript: (s) => s,
55164
+ createScriptURL: (s) => s,
55165
+ });
55166
+ }
55167
+ catch {
55168
+ // trustedTypes.createPolicy throws if called with a name that is
55169
+ // already registered, even in report-only mode. Until the API changes,
55170
+ // catch the error not to break the applications functionally. In such
55171
+ // cases, the code will fall back to using strings.
55172
+ }
55173
+ }
55174
+ }
55175
+ return policy$1;
55176
+ }
55055
55177
  /**
55056
55178
  * Unsafely promote a string to a TrustedHTML, falling back to strings when
55057
55179
  * Trusted Types are not available.
@@ -55062,7 +55184,7 @@ const IS_I18N_HYDRATION_ENABLED = new InjectionToken((typeof ngDevMode === 'unde
55062
55184
  * element.innerHTML.
55063
55185
  */
55064
55186
  function trustedHTMLFromString(html) {
55065
- return html;
55187
+ return getPolicy$1()?.createHTML(html) || html;
55066
55188
  }
55067
55189
  /**
55068
55190
  * Unsafely promote a string to a TrustedScriptURL, falling back to strings
@@ -55074,7 +55196,49 @@ function trustedHTMLFromString(html) {
55074
55196
  * assigning to script.src.
55075
55197
  */
55076
55198
  function trustedScriptURLFromString(url) {
55077
- return url;
55199
+ return getPolicy$1()?.createScriptURL(url) || url;
55200
+ }
55201
+
55202
+ /**
55203
+ * @fileoverview
55204
+ * A module to facilitate use of a Trusted Types policy internally within
55205
+ * Angular specifically for bypassSecurityTrust* and custom sanitizers. It
55206
+ * lazily constructs the Trusted Types policy, providing helper utilities for
55207
+ * promoting strings to Trusted Types. When Trusted Types are not available,
55208
+ * strings are used as a fallback.
55209
+ * @security All use of this module is security-sensitive and should go through
55210
+ * security review.
55211
+ */
55212
+ /**
55213
+ * The Trusted Types policy, or null if Trusted Types are not
55214
+ * enabled/supported, or undefined if the policy has not been created yet.
55215
+ */
55216
+ let policy$2;
55217
+ /**
55218
+ * Returns the Trusted Types policy, or null if Trusted Types are not
55219
+ * enabled/supported. The first call to this function will create the policy.
55220
+ */
55221
+ function getPolicy$2() {
55222
+ if (policy$2 === undefined) {
55223
+ policy$2 = null;
55224
+ if (_global$1.trustedTypes) {
55225
+ try {
55226
+ policy$2 = _global$1.trustedTypes
55227
+ .createPolicy('angular#unsafe-bypass', {
55228
+ createHTML: (s) => s,
55229
+ createScript: (s) => s,
55230
+ createScriptURL: (s) => s,
55231
+ });
55232
+ }
55233
+ catch {
55234
+ // trustedTypes.createPolicy throws if called with a name that is
55235
+ // already registered, even in report-only mode. Until the API changes,
55236
+ // catch the error not to break the applications functionally. In such
55237
+ // cases, the code will fall back to using strings.
55238
+ }
55239
+ }
55240
+ }
55241
+ return policy$2;
55078
55242
  }
55079
55243
  /**
55080
55244
  * Unsafely promote a string to a TrustedHTML, falling back to strings when
@@ -55085,7 +55249,7 @@ function trustedScriptURLFromString(url) {
55085
55249
  * bypassSecurityTrust* functions.
55086
55250
  */
55087
55251
  function trustedHTMLFromStringBypass(html) {
55088
- return html;
55252
+ return getPolicy$2()?.createHTML(html) || html;
55089
55253
  }
55090
55254
  /**
55091
55255
  * Unsafely promote a string to a TrustedScript, falling back to strings when
@@ -55096,7 +55260,7 @@ function trustedHTMLFromStringBypass(html) {
55096
55260
  * bypassSecurityTrust* functions.
55097
55261
  */
55098
55262
  function trustedScriptFromStringBypass(script) {
55099
- return script;
55263
+ return getPolicy$2()?.createScript(script) || script;
55100
55264
  }
55101
55265
  /**
55102
55266
  * Unsafely promote a string to a TrustedScriptURL, falling back to strings
@@ -55107,7 +55271,7 @@ function trustedScriptFromStringBypass(script) {
55107
55271
  * bypassSecurityTrust* functions.
55108
55272
  */
55109
55273
  function trustedScriptURLFromStringBypass(url) {
55110
- return url;
55274
+ return getPolicy$2()?.createScriptURL(url) || url;
55111
55275
  }
55112
55276
 
55113
55277
  class SafeValueImpl {
@@ -94180,6 +94344,45 @@ let AbstractJsEmitterVisitor$1 = class AbstractJsEmitterVisitor extends Abstract
94180
94344
  this.visitAllObjects(param => ctx.print(null, param.name), params, ctx, ',');
94181
94345
  }
94182
94346
  };
94347
+
94348
+ /**
94349
+ * @fileoverview
94350
+ * A module to facilitate use of a Trusted Types policy within the JIT
94351
+ * compiler. It lazily constructs the Trusted Types policy, providing helper
94352
+ * utilities for promoting strings to Trusted Types. When Trusted Types are not
94353
+ * available, strings are used as a fallback.
94354
+ * @security All use of this module is security-sensitive and should go through
94355
+ * security review.
94356
+ */
94357
+ /**
94358
+ * The Trusted Types policy, or null if Trusted Types are not
94359
+ * enabled/supported, or undefined if the policy has not been created yet.
94360
+ */
94361
+ let policy$3;
94362
+ /**
94363
+ * Returns the Trusted Types policy, or null if Trusted Types are not
94364
+ * enabled/supported. The first call to this function will create the policy.
94365
+ */
94366
+ function getPolicy$3() {
94367
+ if (policy$3 === undefined) {
94368
+ const trustedTypes = _global$2['trustedTypes'];
94369
+ policy$3 = null;
94370
+ if (trustedTypes) {
94371
+ try {
94372
+ policy$3 = trustedTypes.createPolicy('angular#unsafe-jit', {
94373
+ createScript: (s) => s,
94374
+ });
94375
+ }
94376
+ catch {
94377
+ // trustedTypes.createPolicy throws if called with a name that is
94378
+ // already registered, even in report-only mode. Until the API changes,
94379
+ // catch the error not to break the applications functionally. In such
94380
+ // cases, the code will fall back to using strings.
94381
+ }
94382
+ }
94383
+ }
94384
+ return policy$3;
94385
+ }
94183
94386
  /**
94184
94387
  * Unsafely promote a string to a TrustedScript, falling back to strings when
94185
94388
  * Trusted Types are not available.
@@ -94188,7 +94391,7 @@ let AbstractJsEmitterVisitor$1 = class AbstractJsEmitterVisitor extends Abstract
94188
94391
  * interpreted and executed as a script by a browser, e.g. when calling eval.
94189
94392
  */
94190
94393
  function trustedScriptFromString$1(script) {
94191
- return script;
94394
+ return getPolicy$3()?.createScript(script) || script;
94192
94395
  }
94193
94396
  /**
94194
94397
  * Unsafely call the Function constructor with the given string arguments.
@@ -126221,15 +126424,15 @@ var dataViewCtorString$1 = toSource$1(DataView$1$1),
126221
126424
  * @param {*} value The value to query.
126222
126425
  * @returns {string} Returns the `toStringTag`.
126223
126426
  */
126224
- var getTag$2 = baseGetTag$1;
126427
+ var getTag$1 = baseGetTag$1;
126225
126428
 
126226
126429
  // Fallback for data views, maps, sets, and weak maps in IE 11 and promises in Node.js < 6.
126227
- if ((DataView$1$1 && getTag$2(new DataView$1$1(new ArrayBuffer(1))) != dataViewTag$3$1) ||
126228
- (Map$1$1 && getTag$2(new Map$1$1) != mapTag$8$1) ||
126229
- (Promise$1$1 && getTag$2(Promise$1$1.resolve()) != promiseTag$1) ||
126230
- (Set$1$1 && getTag$2(new Set$1$1) != setTag$8$1) ||
126231
- (WeakMap$1$1 && getTag$2(new WeakMap$1$1) != weakMapTag$2$1)) {
126232
- getTag$2 = function(value) {
126430
+ if ((DataView$1$1 && getTag$1(new DataView$1$1(new ArrayBuffer(1))) != dataViewTag$3$1) ||
126431
+ (Map$1$1 && getTag$1(new Map$1$1) != mapTag$8$1) ||
126432
+ (Promise$1$1 && getTag$1(Promise$1$1.resolve()) != promiseTag$1) ||
126433
+ (Set$1$1 && getTag$1(new Set$1$1) != setTag$8$1) ||
126434
+ (WeakMap$1$1 && getTag$1(new WeakMap$1$1) != weakMapTag$2$1)) {
126435
+ getTag$1 = function(value) {
126233
126436
  var result = baseGetTag$1(value),
126234
126437
  Ctor = result == objectTag$2$1 ? value.constructor : undefined,
126235
126438
  ctorString = Ctor ? toSource$1(Ctor) : '';
@@ -126247,7 +126450,7 @@ if ((DataView$1$1 && getTag$2(new DataView$1$1(new ArrayBuffer(1))) != dataViewT
126247
126450
  };
126248
126451
  }
126249
126452
 
126250
- var getTag$1$1 = getTag$2;
126453
+ var getTag$1$1 = getTag$1;
126251
126454
 
126252
126455
  /** Used for built-in method references. */
126253
126456
  var objectProto$c$1 = Object.prototype;
@@ -143643,7 +143846,14 @@ const REGEX$1 = {
143643
143846
  const NUMBER_TYPES$1 = ['int', DataType$1.INTEGER, DataType$1.FLOAT, DataType$1.DOUBLE, DataType$1.LONG, DataType$1.SHORT, DataType$1.BYTE, DataType$1.BIG_INTEGER, DataType$1.BIG_DECIMAL];
143644
143847
  const now$2 = new Date();
143645
143848
  const CURRENT_DATE$1 = 'CURRENT_DATE';
143646
- const APP_NAV$1 = 'app-nav';
143849
+ const getNavClass$1 = (suffix) => {
143850
+ const APP_NAV_CLASS_PREFIX = 'app-nav-';
143851
+ return APP_NAV_CLASS_PREFIX + suffix;
143852
+ };
143853
+ const getSheetPositionClass$1 = (suffix) => {
143854
+ const SHEET_POSITION_CLASS_PREFIX = 'sheet-position-';
143855
+ return SHEET_POSITION_CLASS_PREFIX + suffix;
143856
+ };
143647
143857
  const isDefined$1 = v => 'undefined' !== typeof v;
143648
143858
  const isObject$3 = v => null !== v && 'object' === typeof v;
143649
143859
  const toBoolean$1 = (val, identity) => ((val && val !== 'false') ? true : (identity ? val === identity : false));
@@ -145052,7 +145262,6 @@ const findViewParent$1 = (lView) => {
145052
145262
 
145053
145263
  var Utils$1 = /*#__PURE__*/Object.freeze({
145054
145264
  __proto__: null,
145055
- APP_NAV: APP_NAV$1,
145056
145265
  AppConstants: AppConstants$1,
145057
145266
  VALIDATOR: VALIDATOR$1,
145058
145267
  _WM_APP_PROJECT: _WM_APP_PROJECT$1,
@@ -145092,9 +145301,11 @@ var Utils$1 = /*#__PURE__*/Object.freeze({
145092
145301
  getFormattedDate: getFormattedDate$1,
145093
145302
  getMomentLocaleObject: getMomentLocaleObject$1,
145094
145303
  getNativeDateObject: getNativeDateObject$1,
145304
+ getNavClass: getNavClass$1,
145095
145305
  getResourceURL: getResourceURL$1,
145096
145306
  getRouteNameFromLink: getRouteNameFromLink$1,
145097
145307
  getSessionStorageItem: getSessionStorageItem$1,
145308
+ getSheetPositionClass: getSheetPositionClass$1,
145098
145309
  getUrlParams: getUrlParams$1,
145099
145310
  getValidDateObject: getValidDateObject$1,
145100
145311
  getValidJSON: getValidJSON$1,
@@ -153477,6 +153688,45 @@ class AbstractJsEmitterVisitor extends AbstractEmitterVisitor {
153477
153688
  this.visitAllObjects(param => ctx.print(null, param.name), params, ctx, ',');
153478
153689
  }
153479
153690
  }
153691
+
153692
+ /**
153693
+ * @fileoverview
153694
+ * A module to facilitate use of a Trusted Types policy within the JIT
153695
+ * compiler. It lazily constructs the Trusted Types policy, providing helper
153696
+ * utilities for promoting strings to Trusted Types. When Trusted Types are not
153697
+ * available, strings are used as a fallback.
153698
+ * @security All use of this module is security-sensitive and should go through
153699
+ * security review.
153700
+ */
153701
+ /**
153702
+ * The Trusted Types policy, or null if Trusted Types are not
153703
+ * enabled/supported, or undefined if the policy has not been created yet.
153704
+ */
153705
+ let policy;
153706
+ /**
153707
+ * Returns the Trusted Types policy, or null if Trusted Types are not
153708
+ * enabled/supported. The first call to this function will create the policy.
153709
+ */
153710
+ function getPolicy() {
153711
+ if (policy === undefined) {
153712
+ const trustedTypes = _global['trustedTypes'];
153713
+ policy = null;
153714
+ if (trustedTypes) {
153715
+ try {
153716
+ policy = trustedTypes.createPolicy('angular#unsafe-jit', {
153717
+ createScript: (s) => s,
153718
+ });
153719
+ }
153720
+ catch {
153721
+ // trustedTypes.createPolicy throws if called with a name that is
153722
+ // already registered, even in report-only mode. Until the API changes,
153723
+ // catch the error not to break the applications functionally. In such
153724
+ // cases, the code will fall back to using strings.
153725
+ }
153726
+ }
153727
+ }
153728
+ return policy;
153729
+ }
153480
153730
  /**
153481
153731
  * Unsafely promote a string to a TrustedScript, falling back to strings when
153482
153732
  * Trusted Types are not available.
@@ -153485,7 +153735,7 @@ class AbstractJsEmitterVisitor extends AbstractEmitterVisitor {
153485
153735
  * interpreted and executed as a script by a browser, e.g. when calling eval.
153486
153736
  */
153487
153737
  function trustedScriptFromString(script) {
153488
- return script;
153738
+ return getPolicy()?.createScript(script) || script;
153489
153739
  }
153490
153740
  /**
153491
153741
  * Unsafely call the Function constructor with the given string arguments.
@@ -185544,8 +185794,6 @@ if ((DataView$1 && getTag(new DataView$1(new ArrayBuffer(1))) != dataViewTag$3)
185544
185794
  };
185545
185795
  }
185546
185796
 
185547
- var getTag$1 = getTag;
185548
-
185549
185797
  /** Used for built-in method references. */
185550
185798
  var objectProto$c = Object.prototype;
185551
185799
 
@@ -185738,7 +185986,7 @@ var mapTag$6 = '[object Map]';
185738
185986
  * @returns {boolean} Returns `true` if `value` is a map, else `false`.
185739
185987
  */
185740
185988
  function baseIsMap(value) {
185741
- return isObjectLike(value) && getTag$1(value) == mapTag$6;
185989
+ return isObjectLike(value) && getTag(value) == mapTag$6;
185742
185990
  }
185743
185991
 
185744
185992
  /* Node.js helper references. */
@@ -185774,7 +186022,7 @@ var setTag$6 = '[object Set]';
185774
186022
  * @returns {boolean} Returns `true` if `value` is a set, else `false`.
185775
186023
  */
185776
186024
  function baseIsSet(value) {
185777
- return isObjectLike(value) && getTag$1(value) == setTag$6;
186025
+ return isObjectLike(value) && getTag(value) == setTag$6;
185778
186026
  }
185779
186027
 
185780
186028
  /* Node.js helper references. */
@@ -185887,7 +186135,7 @@ function baseClone(value, bitmask, customizer, key, object, stack) {
185887
186135
  return copyArray(value, result);
185888
186136
  }
185889
186137
  } else {
185890
- var tag = getTag$1(value),
186138
+ var tag = getTag(value),
185891
186139
  isFunc = tag == funcTag || tag == genTag;
185892
186140
 
185893
186141
  if (isBuffer(value)) {
@@ -186595,8 +186843,8 @@ var hasOwnProperty$9 = objectProto$a.hasOwnProperty;
186595
186843
  function baseIsEqualDeep(object, other, bitmask, customizer, equalFunc, stack) {
186596
186844
  var objIsArr = isArray(object),
186597
186845
  othIsArr = isArray(other),
186598
- objTag = objIsArr ? arrayTag : getTag$1(object),
186599
- othTag = othIsArr ? arrayTag : getTag$1(other);
186846
+ objTag = objIsArr ? arrayTag : getTag(object),
186847
+ othTag = othIsArr ? arrayTag : getTag(other);
186600
186848
 
186601
186849
  objTag = objTag == argsTag ? objectTag : objTag;
186602
186850
  othTag = othTag == argsTag ? objectTag : othTag;
@@ -188671,7 +188919,7 @@ var mapTag$3 = '[object Map]',
188671
188919
  */
188672
188920
  function createToPairs(keysFunc) {
188673
188921
  return function(object) {
188674
- var tag = getTag$1(object);
188922
+ var tag = getTag(object);
188675
188923
  if (tag == mapTag$3) {
188676
188924
  return mapToArray(object);
188677
188925
  }
@@ -190918,7 +191166,7 @@ function isEmpty(value) {
190918
191166
  isBuffer(value) || isTypedArray(value) || isArguments(value))) {
190919
191167
  return !value.length;
190920
191168
  }
190921
- var tag = getTag$1(value);
191169
+ var tag = getTag(value);
190922
191170
  if (tag == mapTag$2 || tag == setTag$2) {
190923
191171
  return !value.size;
190924
191172
  }
@@ -191406,7 +191654,7 @@ var weakMapTag = '[object WeakMap]';
191406
191654
  * // => false
191407
191655
  */
191408
191656
  function isWeakMap(value) {
191409
- return isObjectLike(value) && getTag$1(value) == weakMapTag;
191657
+ return isObjectLike(value) && getTag(value) == weakMapTag;
191410
191658
  }
191411
191659
 
191412
191660
  /** `Object#toString` result references. */
@@ -192377,7 +192625,7 @@ function toArray(value) {
192377
192625
  if (symIterator$1 && value[symIterator$1]) {
192378
192626
  return iteratorToArray(value[symIterator$1]());
192379
192627
  }
192380
- var tag = getTag$1(value),
192628
+ var tag = getTag(value),
192381
192629
  func = tag == mapTag$1 ? mapToArray : (tag == setTag$1 ? setToArray : values);
192382
192630
 
192383
192631
  return func(value);
@@ -194716,7 +194964,7 @@ function size(collection) {
194716
194964
  if (isArrayLike(collection)) {
194717
194965
  return isString(collection) ? stringSize(collection) : collection.length;
194718
194966
  }
194719
- var tag = getTag$1(collection);
194967
+ var tag = getTag(collection);
194720
194968
  if (tag == mapTag || tag == setTag) {
194721
194969
  return collection.size;
194722
194970
  }
@@ -201875,7 +202123,14 @@ const REGEX = {
201875
202123
  const NUMBER_TYPES = ['int', DataType.INTEGER, DataType.FLOAT, DataType.DOUBLE, DataType.LONG, DataType.SHORT, DataType.BYTE, DataType.BIG_INTEGER, DataType.BIG_DECIMAL];
201876
202124
  const now = new Date();
201877
202125
  const CURRENT_DATE = 'CURRENT_DATE';
201878
- const APP_NAV = 'app-nav';
202126
+ const getNavClass = (suffix) => {
202127
+ const APP_NAV_CLASS_PREFIX = 'app-nav-';
202128
+ return APP_NAV_CLASS_PREFIX + suffix;
202129
+ };
202130
+ const getSheetPositionClass = (suffix) => {
202131
+ const SHEET_POSITION_CLASS_PREFIX = 'sheet-position-';
202132
+ return SHEET_POSITION_CLASS_PREFIX + suffix;
202133
+ };
201879
202134
  const isDefined = v => 'undefined' !== typeof v;
201880
202135
  const isObject = v => null !== v && 'object' === typeof v;
201881
202136
  const toBoolean = (val, identity) => ((val && val !== 'false') ? true : (identity ? val === identity : false));
@@ -203284,7 +203539,6 @@ const findViewParent = (lView) => {
203284
203539
 
203285
203540
  var Utils = /*#__PURE__*/Object.freeze({
203286
203541
  __proto__: null,
203287
- APP_NAV: APP_NAV,
203288
203542
  AppConstants: AppConstants,
203289
203543
  VALIDATOR: VALIDATOR,
203290
203544
  _WM_APP_PROJECT: _WM_APP_PROJECT,
@@ -203324,9 +203578,11 @@ var Utils = /*#__PURE__*/Object.freeze({
203324
203578
  getFormattedDate: getFormattedDate,
203325
203579
  getMomentLocaleObject: getMomentLocaleObject,
203326
203580
  getNativeDateObject: getNativeDateObject,
203581
+ getNavClass: getNavClass,
203327
203582
  getResourceURL: getResourceURL,
203328
203583
  getRouteNameFromLink: getRouteNameFromLink,
203329
203584
  getSessionStorageItem: getSessionStorageItem,
203585
+ getSheetPositionClass: getSheetPositionClass,
203330
203586
  getUrlParams: getUrlParams,
203331
203587
  getValidDateObject: getValidDateObject,
203332
203588
  getValidJSON: getValidJSON,