@wavemaker/angular-codegen 12.0.0-next.45057 → 12.0.0-next.45061
Sign up to get free protection for your applications and to get access to all the features.
- angular-codegen/angular-app/package-lock.json +4462 -3472
- angular-codegen/angular-app/package.json +5 -4
- angular-codegen/angular-app/src/framework/services/customwidget-config-provider.service.ts +13 -0
- angular-codegen/angular-app/src/framework/util/page-util.ts +3 -1
- angular-codegen/dependencies/expression-parser.cjs.js +40 -1
- angular-codegen/dependencies/pipe-provider.cjs.js +292 -36
- angular-codegen/dependencies/transpilation-mobile.cjs.js +137 -8
- angular-codegen/dependencies/transpilation-web.cjs.js +137 -8
- angular-codegen/package-lock.json +1 -1
- angular-codegen/package.json +2 -2
- angular-codegen/src/codegen.js +1 -1
- angular-codegen/src/gen-components.js +1 -1
- angular-codegen/src/gen-customwidget-config.js +1 -0
- angular-codegen/src/handlebar-helpers.js +1 -1
- angular-codegen/src/pages-util.js +1 -1
- angular-codegen/templates/app.module.ts.hbs +5 -1
- angular-codegen/templates/component.config.ts.hbs +1 -0
- angular-codegen/templates/customwidget/customwidget-config.ts.hbs +6 -0
- angular-codegen/templates/customwidget/customwidget.component.script.js.hbs +3 -0
- angular-codegen/templates/customwidget/customwidget.component.ts.hbs +44 -0
- angular-codegen/templates/page/page.module.ts.hbs +6 -0
@@ -45,9 +45,9 @@
|
|
45
45
|
"@metrichor/jmespath": "0.3.1",
|
46
46
|
"@wavemaker/focus-trap": "1.0.1",
|
47
47
|
"@wavemaker/nvd3": "1.8.11",
|
48
|
-
"@wavemaker/foundation-css": "12.0.0-next.
|
49
|
-
"@wavemaker/custom-widgets-m3": "12.0.0-next.
|
50
|
-
"@wavemaker/variables": "12.0.0-next.
|
48
|
+
"@wavemaker/foundation-css": "12.0.0-next.45061",
|
49
|
+
"@wavemaker/custom-widgets-m3": "12.0.0-next.45061",
|
50
|
+
"@wavemaker/variables": "12.0.0-next.45061",
|
51
51
|
"@ztree/ztree_v3": "3.5.48",
|
52
52
|
"angular-imask": "^7.6.1",
|
53
53
|
"angular2-websocket": "0.9.7",
|
@@ -72,7 +72,7 @@
|
|
72
72
|
"tslib": "2.4.1",
|
73
73
|
"x2js": "3.4.4",
|
74
74
|
"zone.js": "0.14.7",
|
75
|
-
"@wavemaker/app-ng-runtime": "12.0.0-next.
|
75
|
+
"@wavemaker/app-ng-runtime": "12.0.0-next.45061"
|
76
76
|
},
|
77
77
|
"devDependencies": {
|
78
78
|
"@ampproject/rollup-plugin-closure-compiler": "^0.27.0",
|
@@ -87,6 +87,7 @@
|
|
87
87
|
"@rollup/plugin-commonjs": "24.0.0",
|
88
88
|
"@rollup/plugin-multi-entry": "6.0.0",
|
89
89
|
"@rollup/plugin-node-resolve": "15.0.1",
|
90
|
+
"@rollup/plugin-typescript": "^8.3.3",
|
90
91
|
"@types/jest": "^29.5.12",
|
91
92
|
"@types/jquery": "3.3.22",
|
92
93
|
"@types/lodash-es": "4.17.12",
|
@@ -0,0 +1,13 @@
|
|
1
|
+
import { Injectable } from '@angular/core';
|
2
|
+
|
3
|
+
import { CustomwidgetConfigProvider } from '@wm/runtime/base';
|
4
|
+
|
5
|
+
import { getCustomWidgetConfig } from '../util/page-util';
|
6
|
+
|
7
|
+
@Injectable()
|
8
|
+
export class CustomwidgetConfigProviderService extends CustomwidgetConfigProvider {
|
9
|
+
|
10
|
+
public getConfig(widgetname: string): Promise<any> {
|
11
|
+
return Promise.resolve(getCustomWidgetConfig(widgetname));
|
12
|
+
}
|
13
|
+
}
|
@@ -1,5 +1,7 @@
|
|
1
1
|
const prefabConfigs = new Map<string, any>();
|
2
|
+
const customWidgetConfigs = new Map<string, any>();
|
2
3
|
|
3
4
|
export const registerPrefabConfig = (prefabName: string, config: any) => prefabConfigs.set(prefabName, config);
|
4
5
|
export const getPrefabConfig = prefabName => prefabConfigs.get(prefabName);
|
5
|
-
|
6
|
+
export const registerCustomWidgetConfig = (customWidget: string, config: any) => customWidgetConfigs.set(customWidget, config);
|
7
|
+
export const getCustomWidgetConfig = customWidget => customWidgetConfigs.get(customWidget);
|
@@ -4975,6 +4975,45 @@ class AbstractJsEmitterVisitor extends AbstractEmitterVisitor {
|
|
4975
4975
|
this.visitAllObjects(param => ctx.print(null, param.name), params, ctx, ',');
|
4976
4976
|
}
|
4977
4977
|
}
|
4978
|
+
|
4979
|
+
/**
|
4980
|
+
* @fileoverview
|
4981
|
+
* A module to facilitate use of a Trusted Types policy within the JIT
|
4982
|
+
* compiler. It lazily constructs the Trusted Types policy, providing helper
|
4983
|
+
* utilities for promoting strings to Trusted Types. When Trusted Types are not
|
4984
|
+
* available, strings are used as a fallback.
|
4985
|
+
* @security All use of this module is security-sensitive and should go through
|
4986
|
+
* security review.
|
4987
|
+
*/
|
4988
|
+
/**
|
4989
|
+
* The Trusted Types policy, or null if Trusted Types are not
|
4990
|
+
* enabled/supported, or undefined if the policy has not been created yet.
|
4991
|
+
*/
|
4992
|
+
let policy;
|
4993
|
+
/**
|
4994
|
+
* Returns the Trusted Types policy, or null if Trusted Types are not
|
4995
|
+
* enabled/supported. The first call to this function will create the policy.
|
4996
|
+
*/
|
4997
|
+
function getPolicy() {
|
4998
|
+
if (policy === undefined) {
|
4999
|
+
const trustedTypes = _global['trustedTypes'];
|
5000
|
+
policy = null;
|
5001
|
+
if (trustedTypes) {
|
5002
|
+
try {
|
5003
|
+
policy = trustedTypes.createPolicy('angular#unsafe-jit', {
|
5004
|
+
createScript: (s) => s,
|
5005
|
+
});
|
5006
|
+
}
|
5007
|
+
catch {
|
5008
|
+
// trustedTypes.createPolicy throws if called with a name that is
|
5009
|
+
// already registered, even in report-only mode. Until the API changes,
|
5010
|
+
// catch the error not to break the applications functionally. In such
|
5011
|
+
// cases, the code will fall back to using strings.
|
5012
|
+
}
|
5013
|
+
}
|
5014
|
+
}
|
5015
|
+
return policy;
|
5016
|
+
}
|
4978
5017
|
/**
|
4979
5018
|
* Unsafely promote a string to a TrustedScript, falling back to strings when
|
4980
5019
|
* Trusted Types are not available.
|
@@ -4983,7 +5022,7 @@ class AbstractJsEmitterVisitor extends AbstractEmitterVisitor {
|
|
4983
5022
|
* interpreted and executed as a script by a browser, e.g. when calling eval.
|
4984
5023
|
*/
|
4985
5024
|
function trustedScriptFromString(script) {
|
4986
|
-
return script;
|
5025
|
+
return getPolicy()?.createScript(script) || script;
|
4987
5026
|
}
|
4988
5027
|
/**
|
4989
5028
|
* Unsafely call the Function constructor with the given string arguments.
|
@@ -10454,6 +10454,46 @@ const PRESERVE_HOST_CONTENT$1 = new InjectionToken$1((typeof ngDevMode === 'unde
|
|
10454
10454
|
* is enabled.
|
10455
10455
|
*/
|
10456
10456
|
const IS_I18N_HYDRATION_ENABLED$1 = new InjectionToken$1((typeof ngDevMode === 'undefined' || !!ngDevMode ? 'IS_I18N_HYDRATION_ENABLED' : ''));
|
10457
|
+
|
10458
|
+
/**
|
10459
|
+
* @fileoverview
|
10460
|
+
* A module to facilitate use of a Trusted Types policy internally within
|
10461
|
+
* Angular. It lazily constructs the Trusted Types policy, providing helper
|
10462
|
+
* utilities for promoting strings to Trusted Types. When Trusted Types are not
|
10463
|
+
* available, strings are used as a fallback.
|
10464
|
+
* @security All use of this module is security-sensitive and should go through
|
10465
|
+
* security review.
|
10466
|
+
*/
|
10467
|
+
/**
|
10468
|
+
* The Trusted Types policy, or null if Trusted Types are not
|
10469
|
+
* enabled/supported, or undefined if the policy has not been created yet.
|
10470
|
+
*/
|
10471
|
+
let policy$1$1;
|
10472
|
+
/**
|
10473
|
+
* Returns the Trusted Types policy, or null if Trusted Types are not
|
10474
|
+
* enabled/supported. The first call to this function will create the policy.
|
10475
|
+
*/
|
10476
|
+
function getPolicy$1$1() {
|
10477
|
+
if (policy$1$1 === undefined) {
|
10478
|
+
policy$1$1 = null;
|
10479
|
+
if (_global$3.trustedTypes) {
|
10480
|
+
try {
|
10481
|
+
policy$1$1 = _global$3.trustedTypes.createPolicy('angular', {
|
10482
|
+
createHTML: (s) => s,
|
10483
|
+
createScript: (s) => s,
|
10484
|
+
createScriptURL: (s) => s,
|
10485
|
+
});
|
10486
|
+
}
|
10487
|
+
catch {
|
10488
|
+
// trustedTypes.createPolicy throws if called with a name that is
|
10489
|
+
// already registered, even in report-only mode. Until the API changes,
|
10490
|
+
// catch the error not to break the applications functionally. In such
|
10491
|
+
// cases, the code will fall back to using strings.
|
10492
|
+
}
|
10493
|
+
}
|
10494
|
+
}
|
10495
|
+
return policy$1$1;
|
10496
|
+
}
|
10457
10497
|
/**
|
10458
10498
|
* Unsafely promote a string to a TrustedHTML, falling back to strings when
|
10459
10499
|
* Trusted Types are not available.
|
@@ -10464,7 +10504,7 @@ const IS_I18N_HYDRATION_ENABLED$1 = new InjectionToken$1((typeof ngDevMode === '
|
|
10464
10504
|
* element.innerHTML.
|
10465
10505
|
*/
|
10466
10506
|
function trustedHTMLFromString$1(html) {
|
10467
|
-
return html;
|
10507
|
+
return getPolicy$1$1()?.createHTML(html) || html;
|
10468
10508
|
}
|
10469
10509
|
/**
|
10470
10510
|
* Unsafely promote a string to a TrustedScriptURL, falling back to strings
|
@@ -10476,7 +10516,49 @@ function trustedHTMLFromString$1(html) {
|
|
10476
10516
|
* assigning to script.src.
|
10477
10517
|
*/
|
10478
10518
|
function trustedScriptURLFromString$1(url) {
|
10479
|
-
return url;
|
10519
|
+
return getPolicy$1$1()?.createScriptURL(url) || url;
|
10520
|
+
}
|
10521
|
+
|
10522
|
+
/**
|
10523
|
+
* @fileoverview
|
10524
|
+
* A module to facilitate use of a Trusted Types policy internally within
|
10525
|
+
* Angular specifically for bypassSecurityTrust* and custom sanitizers. It
|
10526
|
+
* lazily constructs the Trusted Types policy, providing helper utilities for
|
10527
|
+
* promoting strings to Trusted Types. When Trusted Types are not available,
|
10528
|
+
* strings are used as a fallback.
|
10529
|
+
* @security All use of this module is security-sensitive and should go through
|
10530
|
+
* security review.
|
10531
|
+
*/
|
10532
|
+
/**
|
10533
|
+
* The Trusted Types policy, or null if Trusted Types are not
|
10534
|
+
* enabled/supported, or undefined if the policy has not been created yet.
|
10535
|
+
*/
|
10536
|
+
let policy$4;
|
10537
|
+
/**
|
10538
|
+
* Returns the Trusted Types policy, or null if Trusted Types are not
|
10539
|
+
* enabled/supported. The first call to this function will create the policy.
|
10540
|
+
*/
|
10541
|
+
function getPolicy$4() {
|
10542
|
+
if (policy$4 === undefined) {
|
10543
|
+
policy$4 = null;
|
10544
|
+
if (_global$3.trustedTypes) {
|
10545
|
+
try {
|
10546
|
+
policy$4 = _global$3.trustedTypes
|
10547
|
+
.createPolicy('angular#unsafe-bypass', {
|
10548
|
+
createHTML: (s) => s,
|
10549
|
+
createScript: (s) => s,
|
10550
|
+
createScriptURL: (s) => s,
|
10551
|
+
});
|
10552
|
+
}
|
10553
|
+
catch {
|
10554
|
+
// trustedTypes.createPolicy throws if called with a name that is
|
10555
|
+
// already registered, even in report-only mode. Until the API changes,
|
10556
|
+
// catch the error not to break the applications functionally. In such
|
10557
|
+
// cases, the code will fall back to using strings.
|
10558
|
+
}
|
10559
|
+
}
|
10560
|
+
}
|
10561
|
+
return policy$4;
|
10480
10562
|
}
|
10481
10563
|
/**
|
10482
10564
|
* Unsafely promote a string to a TrustedHTML, falling back to strings when
|
@@ -10487,7 +10569,7 @@ function trustedScriptURLFromString$1(url) {
|
|
10487
10569
|
* bypassSecurityTrust* functions.
|
10488
10570
|
*/
|
10489
10571
|
function trustedHTMLFromStringBypass$1(html) {
|
10490
|
-
return html;
|
10572
|
+
return getPolicy$4()?.createHTML(html) || html;
|
10491
10573
|
}
|
10492
10574
|
/**
|
10493
10575
|
* Unsafely promote a string to a TrustedScript, falling back to strings when
|
@@ -10498,7 +10580,7 @@ function trustedHTMLFromStringBypass$1(html) {
|
|
10498
10580
|
* bypassSecurityTrust* functions.
|
10499
10581
|
*/
|
10500
10582
|
function trustedScriptFromStringBypass$1(script) {
|
10501
|
-
return script;
|
10583
|
+
return getPolicy$4()?.createScript(script) || script;
|
10502
10584
|
}
|
10503
10585
|
/**
|
10504
10586
|
* Unsafely promote a string to a TrustedScriptURL, falling back to strings
|
@@ -10509,7 +10591,7 @@ function trustedScriptFromStringBypass$1(script) {
|
|
10509
10591
|
* bypassSecurityTrust* functions.
|
10510
10592
|
*/
|
10511
10593
|
function trustedScriptURLFromStringBypass$1(url) {
|
10512
|
-
return url;
|
10594
|
+
return getPolicy$4()?.createScriptURL(url) || url;
|
10513
10595
|
}
|
10514
10596
|
|
10515
10597
|
let SafeValueImpl$1 = class SafeValueImpl {
|
@@ -55052,6 +55134,46 @@ const PRESERVE_HOST_CONTENT = new InjectionToken((typeof ngDevMode === 'undefine
|
|
55052
55134
|
* is enabled.
|
55053
55135
|
*/
|
55054
55136
|
const IS_I18N_HYDRATION_ENABLED = new InjectionToken((typeof ngDevMode === 'undefined' || !!ngDevMode ? 'IS_I18N_HYDRATION_ENABLED' : ''));
|
55137
|
+
|
55138
|
+
/**
|
55139
|
+
* @fileoverview
|
55140
|
+
* A module to facilitate use of a Trusted Types policy internally within
|
55141
|
+
* Angular. It lazily constructs the Trusted Types policy, providing helper
|
55142
|
+
* utilities for promoting strings to Trusted Types. When Trusted Types are not
|
55143
|
+
* available, strings are used as a fallback.
|
55144
|
+
* @security All use of this module is security-sensitive and should go through
|
55145
|
+
* security review.
|
55146
|
+
*/
|
55147
|
+
/**
|
55148
|
+
* The Trusted Types policy, or null if Trusted Types are not
|
55149
|
+
* enabled/supported, or undefined if the policy has not been created yet.
|
55150
|
+
*/
|
55151
|
+
let policy$1;
|
55152
|
+
/**
|
55153
|
+
* Returns the Trusted Types policy, or null if Trusted Types are not
|
55154
|
+
* enabled/supported. The first call to this function will create the policy.
|
55155
|
+
*/
|
55156
|
+
function getPolicy$1() {
|
55157
|
+
if (policy$1 === undefined) {
|
55158
|
+
policy$1 = null;
|
55159
|
+
if (_global$1.trustedTypes) {
|
55160
|
+
try {
|
55161
|
+
policy$1 = _global$1.trustedTypes.createPolicy('angular', {
|
55162
|
+
createHTML: (s) => s,
|
55163
|
+
createScript: (s) => s,
|
55164
|
+
createScriptURL: (s) => s,
|
55165
|
+
});
|
55166
|
+
}
|
55167
|
+
catch {
|
55168
|
+
// trustedTypes.createPolicy throws if called with a name that is
|
55169
|
+
// already registered, even in report-only mode. Until the API changes,
|
55170
|
+
// catch the error not to break the applications functionally. In such
|
55171
|
+
// cases, the code will fall back to using strings.
|
55172
|
+
}
|
55173
|
+
}
|
55174
|
+
}
|
55175
|
+
return policy$1;
|
55176
|
+
}
|
55055
55177
|
/**
|
55056
55178
|
* Unsafely promote a string to a TrustedHTML, falling back to strings when
|
55057
55179
|
* Trusted Types are not available.
|
@@ -55062,7 +55184,7 @@ const IS_I18N_HYDRATION_ENABLED = new InjectionToken((typeof ngDevMode === 'unde
|
|
55062
55184
|
* element.innerHTML.
|
55063
55185
|
*/
|
55064
55186
|
function trustedHTMLFromString(html) {
|
55065
|
-
return html;
|
55187
|
+
return getPolicy$1()?.createHTML(html) || html;
|
55066
55188
|
}
|
55067
55189
|
/**
|
55068
55190
|
* Unsafely promote a string to a TrustedScriptURL, falling back to strings
|
@@ -55074,7 +55196,49 @@ function trustedHTMLFromString(html) {
|
|
55074
55196
|
* assigning to script.src.
|
55075
55197
|
*/
|
55076
55198
|
function trustedScriptURLFromString(url) {
|
55077
|
-
return url;
|
55199
|
+
return getPolicy$1()?.createScriptURL(url) || url;
|
55200
|
+
}
|
55201
|
+
|
55202
|
+
/**
|
55203
|
+
* @fileoverview
|
55204
|
+
* A module to facilitate use of a Trusted Types policy internally within
|
55205
|
+
* Angular specifically for bypassSecurityTrust* and custom sanitizers. It
|
55206
|
+
* lazily constructs the Trusted Types policy, providing helper utilities for
|
55207
|
+
* promoting strings to Trusted Types. When Trusted Types are not available,
|
55208
|
+
* strings are used as a fallback.
|
55209
|
+
* @security All use of this module is security-sensitive and should go through
|
55210
|
+
* security review.
|
55211
|
+
*/
|
55212
|
+
/**
|
55213
|
+
* The Trusted Types policy, or null if Trusted Types are not
|
55214
|
+
* enabled/supported, or undefined if the policy has not been created yet.
|
55215
|
+
*/
|
55216
|
+
let policy$2;
|
55217
|
+
/**
|
55218
|
+
* Returns the Trusted Types policy, or null if Trusted Types are not
|
55219
|
+
* enabled/supported. The first call to this function will create the policy.
|
55220
|
+
*/
|
55221
|
+
function getPolicy$2() {
|
55222
|
+
if (policy$2 === undefined) {
|
55223
|
+
policy$2 = null;
|
55224
|
+
if (_global$1.trustedTypes) {
|
55225
|
+
try {
|
55226
|
+
policy$2 = _global$1.trustedTypes
|
55227
|
+
.createPolicy('angular#unsafe-bypass', {
|
55228
|
+
createHTML: (s) => s,
|
55229
|
+
createScript: (s) => s,
|
55230
|
+
createScriptURL: (s) => s,
|
55231
|
+
});
|
55232
|
+
}
|
55233
|
+
catch {
|
55234
|
+
// trustedTypes.createPolicy throws if called with a name that is
|
55235
|
+
// already registered, even in report-only mode. Until the API changes,
|
55236
|
+
// catch the error not to break the applications functionally. In such
|
55237
|
+
// cases, the code will fall back to using strings.
|
55238
|
+
}
|
55239
|
+
}
|
55240
|
+
}
|
55241
|
+
return policy$2;
|
55078
55242
|
}
|
55079
55243
|
/**
|
55080
55244
|
* Unsafely promote a string to a TrustedHTML, falling back to strings when
|
@@ -55085,7 +55249,7 @@ function trustedScriptURLFromString(url) {
|
|
55085
55249
|
* bypassSecurityTrust* functions.
|
55086
55250
|
*/
|
55087
55251
|
function trustedHTMLFromStringBypass(html) {
|
55088
|
-
return html;
|
55252
|
+
return getPolicy$2()?.createHTML(html) || html;
|
55089
55253
|
}
|
55090
55254
|
/**
|
55091
55255
|
* Unsafely promote a string to a TrustedScript, falling back to strings when
|
@@ -55096,7 +55260,7 @@ function trustedHTMLFromStringBypass(html) {
|
|
55096
55260
|
* bypassSecurityTrust* functions.
|
55097
55261
|
*/
|
55098
55262
|
function trustedScriptFromStringBypass(script) {
|
55099
|
-
return script;
|
55263
|
+
return getPolicy$2()?.createScript(script) || script;
|
55100
55264
|
}
|
55101
55265
|
/**
|
55102
55266
|
* Unsafely promote a string to a TrustedScriptURL, falling back to strings
|
@@ -55107,7 +55271,7 @@ function trustedScriptFromStringBypass(script) {
|
|
55107
55271
|
* bypassSecurityTrust* functions.
|
55108
55272
|
*/
|
55109
55273
|
function trustedScriptURLFromStringBypass(url) {
|
55110
|
-
return url;
|
55274
|
+
return getPolicy$2()?.createScriptURL(url) || url;
|
55111
55275
|
}
|
55112
55276
|
|
55113
55277
|
class SafeValueImpl {
|
@@ -94180,6 +94344,45 @@ let AbstractJsEmitterVisitor$1 = class AbstractJsEmitterVisitor extends Abstract
|
|
94180
94344
|
this.visitAllObjects(param => ctx.print(null, param.name), params, ctx, ',');
|
94181
94345
|
}
|
94182
94346
|
};
|
94347
|
+
|
94348
|
+
/**
|
94349
|
+
* @fileoverview
|
94350
|
+
* A module to facilitate use of a Trusted Types policy within the JIT
|
94351
|
+
* compiler. It lazily constructs the Trusted Types policy, providing helper
|
94352
|
+
* utilities for promoting strings to Trusted Types. When Trusted Types are not
|
94353
|
+
* available, strings are used as a fallback.
|
94354
|
+
* @security All use of this module is security-sensitive and should go through
|
94355
|
+
* security review.
|
94356
|
+
*/
|
94357
|
+
/**
|
94358
|
+
* The Trusted Types policy, or null if Trusted Types are not
|
94359
|
+
* enabled/supported, or undefined if the policy has not been created yet.
|
94360
|
+
*/
|
94361
|
+
let policy$3;
|
94362
|
+
/**
|
94363
|
+
* Returns the Trusted Types policy, or null if Trusted Types are not
|
94364
|
+
* enabled/supported. The first call to this function will create the policy.
|
94365
|
+
*/
|
94366
|
+
function getPolicy$3() {
|
94367
|
+
if (policy$3 === undefined) {
|
94368
|
+
const trustedTypes = _global$2['trustedTypes'];
|
94369
|
+
policy$3 = null;
|
94370
|
+
if (trustedTypes) {
|
94371
|
+
try {
|
94372
|
+
policy$3 = trustedTypes.createPolicy('angular#unsafe-jit', {
|
94373
|
+
createScript: (s) => s,
|
94374
|
+
});
|
94375
|
+
}
|
94376
|
+
catch {
|
94377
|
+
// trustedTypes.createPolicy throws if called with a name that is
|
94378
|
+
// already registered, even in report-only mode. Until the API changes,
|
94379
|
+
// catch the error not to break the applications functionally. In such
|
94380
|
+
// cases, the code will fall back to using strings.
|
94381
|
+
}
|
94382
|
+
}
|
94383
|
+
}
|
94384
|
+
return policy$3;
|
94385
|
+
}
|
94183
94386
|
/**
|
94184
94387
|
* Unsafely promote a string to a TrustedScript, falling back to strings when
|
94185
94388
|
* Trusted Types are not available.
|
@@ -94188,7 +94391,7 @@ let AbstractJsEmitterVisitor$1 = class AbstractJsEmitterVisitor extends Abstract
|
|
94188
94391
|
* interpreted and executed as a script by a browser, e.g. when calling eval.
|
94189
94392
|
*/
|
94190
94393
|
function trustedScriptFromString$1(script) {
|
94191
|
-
return script;
|
94394
|
+
return getPolicy$3()?.createScript(script) || script;
|
94192
94395
|
}
|
94193
94396
|
/**
|
94194
94397
|
* Unsafely call the Function constructor with the given string arguments.
|
@@ -126221,15 +126424,15 @@ var dataViewCtorString$1 = toSource$1(DataView$1$1),
|
|
126221
126424
|
* @param {*} value The value to query.
|
126222
126425
|
* @returns {string} Returns the `toStringTag`.
|
126223
126426
|
*/
|
126224
|
-
var getTag$
|
126427
|
+
var getTag$1 = baseGetTag$1;
|
126225
126428
|
|
126226
126429
|
// Fallback for data views, maps, sets, and weak maps in IE 11 and promises in Node.js < 6.
|
126227
|
-
if ((DataView$1$1 && getTag$
|
126228
|
-
(Map$1$1 && getTag$
|
126229
|
-
(Promise$1$1 && getTag$
|
126230
|
-
(Set$1$1 && getTag$
|
126231
|
-
(WeakMap$1$1 && getTag$
|
126232
|
-
getTag$
|
126430
|
+
if ((DataView$1$1 && getTag$1(new DataView$1$1(new ArrayBuffer(1))) != dataViewTag$3$1) ||
|
126431
|
+
(Map$1$1 && getTag$1(new Map$1$1) != mapTag$8$1) ||
|
126432
|
+
(Promise$1$1 && getTag$1(Promise$1$1.resolve()) != promiseTag$1) ||
|
126433
|
+
(Set$1$1 && getTag$1(new Set$1$1) != setTag$8$1) ||
|
126434
|
+
(WeakMap$1$1 && getTag$1(new WeakMap$1$1) != weakMapTag$2$1)) {
|
126435
|
+
getTag$1 = function(value) {
|
126233
126436
|
var result = baseGetTag$1(value),
|
126234
126437
|
Ctor = result == objectTag$2$1 ? value.constructor : undefined,
|
126235
126438
|
ctorString = Ctor ? toSource$1(Ctor) : '';
|
@@ -126247,7 +126450,7 @@ if ((DataView$1$1 && getTag$2(new DataView$1$1(new ArrayBuffer(1))) != dataViewT
|
|
126247
126450
|
};
|
126248
126451
|
}
|
126249
126452
|
|
126250
|
-
var getTag$1$1 = getTag$
|
126453
|
+
var getTag$1$1 = getTag$1;
|
126251
126454
|
|
126252
126455
|
/** Used for built-in method references. */
|
126253
126456
|
var objectProto$c$1 = Object.prototype;
|
@@ -143643,7 +143846,14 @@ const REGEX$1 = {
|
|
143643
143846
|
const NUMBER_TYPES$1 = ['int', DataType$1.INTEGER, DataType$1.FLOAT, DataType$1.DOUBLE, DataType$1.LONG, DataType$1.SHORT, DataType$1.BYTE, DataType$1.BIG_INTEGER, DataType$1.BIG_DECIMAL];
|
143644
143847
|
const now$2 = new Date();
|
143645
143848
|
const CURRENT_DATE$1 = 'CURRENT_DATE';
|
143646
|
-
const
|
143849
|
+
const getNavClass$1 = (suffix) => {
|
143850
|
+
const APP_NAV_CLASS_PREFIX = 'app-nav-';
|
143851
|
+
return APP_NAV_CLASS_PREFIX + suffix;
|
143852
|
+
};
|
143853
|
+
const getSheetPositionClass$1 = (suffix) => {
|
143854
|
+
const SHEET_POSITION_CLASS_PREFIX = 'sheet-position-';
|
143855
|
+
return SHEET_POSITION_CLASS_PREFIX + suffix;
|
143856
|
+
};
|
143647
143857
|
const isDefined$1 = v => 'undefined' !== typeof v;
|
143648
143858
|
const isObject$3 = v => null !== v && 'object' === typeof v;
|
143649
143859
|
const toBoolean$1 = (val, identity) => ((val && val !== 'false') ? true : (identity ? val === identity : false));
|
@@ -145052,7 +145262,6 @@ const findViewParent$1 = (lView) => {
|
|
145052
145262
|
|
145053
145263
|
var Utils$1 = /*#__PURE__*/Object.freeze({
|
145054
145264
|
__proto__: null,
|
145055
|
-
APP_NAV: APP_NAV$1,
|
145056
145265
|
AppConstants: AppConstants$1,
|
145057
145266
|
VALIDATOR: VALIDATOR$1,
|
145058
145267
|
_WM_APP_PROJECT: _WM_APP_PROJECT$1,
|
@@ -145092,9 +145301,11 @@ var Utils$1 = /*#__PURE__*/Object.freeze({
|
|
145092
145301
|
getFormattedDate: getFormattedDate$1,
|
145093
145302
|
getMomentLocaleObject: getMomentLocaleObject$1,
|
145094
145303
|
getNativeDateObject: getNativeDateObject$1,
|
145304
|
+
getNavClass: getNavClass$1,
|
145095
145305
|
getResourceURL: getResourceURL$1,
|
145096
145306
|
getRouteNameFromLink: getRouteNameFromLink$1,
|
145097
145307
|
getSessionStorageItem: getSessionStorageItem$1,
|
145308
|
+
getSheetPositionClass: getSheetPositionClass$1,
|
145098
145309
|
getUrlParams: getUrlParams$1,
|
145099
145310
|
getValidDateObject: getValidDateObject$1,
|
145100
145311
|
getValidJSON: getValidJSON$1,
|
@@ -153477,6 +153688,45 @@ class AbstractJsEmitterVisitor extends AbstractEmitterVisitor {
|
|
153477
153688
|
this.visitAllObjects(param => ctx.print(null, param.name), params, ctx, ',');
|
153478
153689
|
}
|
153479
153690
|
}
|
153691
|
+
|
153692
|
+
/**
|
153693
|
+
* @fileoverview
|
153694
|
+
* A module to facilitate use of a Trusted Types policy within the JIT
|
153695
|
+
* compiler. It lazily constructs the Trusted Types policy, providing helper
|
153696
|
+
* utilities for promoting strings to Trusted Types. When Trusted Types are not
|
153697
|
+
* available, strings are used as a fallback.
|
153698
|
+
* @security All use of this module is security-sensitive and should go through
|
153699
|
+
* security review.
|
153700
|
+
*/
|
153701
|
+
/**
|
153702
|
+
* The Trusted Types policy, or null if Trusted Types are not
|
153703
|
+
* enabled/supported, or undefined if the policy has not been created yet.
|
153704
|
+
*/
|
153705
|
+
let policy;
|
153706
|
+
/**
|
153707
|
+
* Returns the Trusted Types policy, or null if Trusted Types are not
|
153708
|
+
* enabled/supported. The first call to this function will create the policy.
|
153709
|
+
*/
|
153710
|
+
function getPolicy() {
|
153711
|
+
if (policy === undefined) {
|
153712
|
+
const trustedTypes = _global['trustedTypes'];
|
153713
|
+
policy = null;
|
153714
|
+
if (trustedTypes) {
|
153715
|
+
try {
|
153716
|
+
policy = trustedTypes.createPolicy('angular#unsafe-jit', {
|
153717
|
+
createScript: (s) => s,
|
153718
|
+
});
|
153719
|
+
}
|
153720
|
+
catch {
|
153721
|
+
// trustedTypes.createPolicy throws if called with a name that is
|
153722
|
+
// already registered, even in report-only mode. Until the API changes,
|
153723
|
+
// catch the error not to break the applications functionally. In such
|
153724
|
+
// cases, the code will fall back to using strings.
|
153725
|
+
}
|
153726
|
+
}
|
153727
|
+
}
|
153728
|
+
return policy;
|
153729
|
+
}
|
153480
153730
|
/**
|
153481
153731
|
* Unsafely promote a string to a TrustedScript, falling back to strings when
|
153482
153732
|
* Trusted Types are not available.
|
@@ -153485,7 +153735,7 @@ class AbstractJsEmitterVisitor extends AbstractEmitterVisitor {
|
|
153485
153735
|
* interpreted and executed as a script by a browser, e.g. when calling eval.
|
153486
153736
|
*/
|
153487
153737
|
function trustedScriptFromString(script) {
|
153488
|
-
return script;
|
153738
|
+
return getPolicy()?.createScript(script) || script;
|
153489
153739
|
}
|
153490
153740
|
/**
|
153491
153741
|
* Unsafely call the Function constructor with the given string arguments.
|
@@ -185544,8 +185794,6 @@ if ((DataView$1 && getTag(new DataView$1(new ArrayBuffer(1))) != dataViewTag$3)
|
|
185544
185794
|
};
|
185545
185795
|
}
|
185546
185796
|
|
185547
|
-
var getTag$1 = getTag;
|
185548
|
-
|
185549
185797
|
/** Used for built-in method references. */
|
185550
185798
|
var objectProto$c = Object.prototype;
|
185551
185799
|
|
@@ -185738,7 +185986,7 @@ var mapTag$6 = '[object Map]';
|
|
185738
185986
|
* @returns {boolean} Returns `true` if `value` is a map, else `false`.
|
185739
185987
|
*/
|
185740
185988
|
function baseIsMap(value) {
|
185741
|
-
return isObjectLike(value) && getTag
|
185989
|
+
return isObjectLike(value) && getTag(value) == mapTag$6;
|
185742
185990
|
}
|
185743
185991
|
|
185744
185992
|
/* Node.js helper references. */
|
@@ -185774,7 +186022,7 @@ var setTag$6 = '[object Set]';
|
|
185774
186022
|
* @returns {boolean} Returns `true` if `value` is a set, else `false`.
|
185775
186023
|
*/
|
185776
186024
|
function baseIsSet(value) {
|
185777
|
-
return isObjectLike(value) && getTag
|
186025
|
+
return isObjectLike(value) && getTag(value) == setTag$6;
|
185778
186026
|
}
|
185779
186027
|
|
185780
186028
|
/* Node.js helper references. */
|
@@ -185887,7 +186135,7 @@ function baseClone(value, bitmask, customizer, key, object, stack) {
|
|
185887
186135
|
return copyArray(value, result);
|
185888
186136
|
}
|
185889
186137
|
} else {
|
185890
|
-
var tag = getTag
|
186138
|
+
var tag = getTag(value),
|
185891
186139
|
isFunc = tag == funcTag || tag == genTag;
|
185892
186140
|
|
185893
186141
|
if (isBuffer(value)) {
|
@@ -186595,8 +186843,8 @@ var hasOwnProperty$9 = objectProto$a.hasOwnProperty;
|
|
186595
186843
|
function baseIsEqualDeep(object, other, bitmask, customizer, equalFunc, stack) {
|
186596
186844
|
var objIsArr = isArray(object),
|
186597
186845
|
othIsArr = isArray(other),
|
186598
|
-
objTag = objIsArr ? arrayTag : getTag
|
186599
|
-
othTag = othIsArr ? arrayTag : getTag
|
186846
|
+
objTag = objIsArr ? arrayTag : getTag(object),
|
186847
|
+
othTag = othIsArr ? arrayTag : getTag(other);
|
186600
186848
|
|
186601
186849
|
objTag = objTag == argsTag ? objectTag : objTag;
|
186602
186850
|
othTag = othTag == argsTag ? objectTag : othTag;
|
@@ -188671,7 +188919,7 @@ var mapTag$3 = '[object Map]',
|
|
188671
188919
|
*/
|
188672
188920
|
function createToPairs(keysFunc) {
|
188673
188921
|
return function(object) {
|
188674
|
-
var tag = getTag
|
188922
|
+
var tag = getTag(object);
|
188675
188923
|
if (tag == mapTag$3) {
|
188676
188924
|
return mapToArray(object);
|
188677
188925
|
}
|
@@ -190918,7 +191166,7 @@ function isEmpty(value) {
|
|
190918
191166
|
isBuffer(value) || isTypedArray(value) || isArguments(value))) {
|
190919
191167
|
return !value.length;
|
190920
191168
|
}
|
190921
|
-
var tag = getTag
|
191169
|
+
var tag = getTag(value);
|
190922
191170
|
if (tag == mapTag$2 || tag == setTag$2) {
|
190923
191171
|
return !value.size;
|
190924
191172
|
}
|
@@ -191406,7 +191654,7 @@ var weakMapTag = '[object WeakMap]';
|
|
191406
191654
|
* // => false
|
191407
191655
|
*/
|
191408
191656
|
function isWeakMap(value) {
|
191409
|
-
return isObjectLike(value) && getTag
|
191657
|
+
return isObjectLike(value) && getTag(value) == weakMapTag;
|
191410
191658
|
}
|
191411
191659
|
|
191412
191660
|
/** `Object#toString` result references. */
|
@@ -192377,7 +192625,7 @@ function toArray(value) {
|
|
192377
192625
|
if (symIterator$1 && value[symIterator$1]) {
|
192378
192626
|
return iteratorToArray(value[symIterator$1]());
|
192379
192627
|
}
|
192380
|
-
var tag = getTag
|
192628
|
+
var tag = getTag(value),
|
192381
192629
|
func = tag == mapTag$1 ? mapToArray : (tag == setTag$1 ? setToArray : values);
|
192382
192630
|
|
192383
192631
|
return func(value);
|
@@ -194716,7 +194964,7 @@ function size(collection) {
|
|
194716
194964
|
if (isArrayLike(collection)) {
|
194717
194965
|
return isString(collection) ? stringSize(collection) : collection.length;
|
194718
194966
|
}
|
194719
|
-
var tag = getTag
|
194967
|
+
var tag = getTag(collection);
|
194720
194968
|
if (tag == mapTag || tag == setTag) {
|
194721
194969
|
return collection.size;
|
194722
194970
|
}
|
@@ -201875,7 +202123,14 @@ const REGEX = {
|
|
201875
202123
|
const NUMBER_TYPES = ['int', DataType.INTEGER, DataType.FLOAT, DataType.DOUBLE, DataType.LONG, DataType.SHORT, DataType.BYTE, DataType.BIG_INTEGER, DataType.BIG_DECIMAL];
|
201876
202124
|
const now = new Date();
|
201877
202125
|
const CURRENT_DATE = 'CURRENT_DATE';
|
201878
|
-
const
|
202126
|
+
const getNavClass = (suffix) => {
|
202127
|
+
const APP_NAV_CLASS_PREFIX = 'app-nav-';
|
202128
|
+
return APP_NAV_CLASS_PREFIX + suffix;
|
202129
|
+
};
|
202130
|
+
const getSheetPositionClass = (suffix) => {
|
202131
|
+
const SHEET_POSITION_CLASS_PREFIX = 'sheet-position-';
|
202132
|
+
return SHEET_POSITION_CLASS_PREFIX + suffix;
|
202133
|
+
};
|
201879
202134
|
const isDefined = v => 'undefined' !== typeof v;
|
201880
202135
|
const isObject = v => null !== v && 'object' === typeof v;
|
201881
202136
|
const toBoolean = (val, identity) => ((val && val !== 'false') ? true : (identity ? val === identity : false));
|
@@ -203284,7 +203539,6 @@ const findViewParent = (lView) => {
|
|
203284
203539
|
|
203285
203540
|
var Utils = /*#__PURE__*/Object.freeze({
|
203286
203541
|
__proto__: null,
|
203287
|
-
APP_NAV: APP_NAV,
|
203288
203542
|
AppConstants: AppConstants,
|
203289
203543
|
VALIDATOR: VALIDATOR,
|
203290
203544
|
_WM_APP_PROJECT: _WM_APP_PROJECT,
|
@@ -203324,9 +203578,11 @@ var Utils = /*#__PURE__*/Object.freeze({
|
|
203324
203578
|
getFormattedDate: getFormattedDate,
|
203325
203579
|
getMomentLocaleObject: getMomentLocaleObject,
|
203326
203580
|
getNativeDateObject: getNativeDateObject,
|
203581
|
+
getNavClass: getNavClass,
|
203327
203582
|
getResourceURL: getResourceURL,
|
203328
203583
|
getRouteNameFromLink: getRouteNameFromLink,
|
203329
203584
|
getSessionStorageItem: getSessionStorageItem,
|
203585
|
+
getSheetPositionClass: getSheetPositionClass,
|
203330
203586
|
getUrlParams: getUrlParams,
|
203331
203587
|
getValidDateObject: getValidDateObject,
|
203332
203588
|
getValidJSON: getValidJSON,
|