@lwrjs/client-modules 0.21.8 → 0.22.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,2 +1,2 @@
1
1
  const e=[];let o;const n=globalThis,t=n.LWR;t.define||t.env?n.LWR=Object.freeze({define:t.define,env:t.env}):delete n.LWR;const a={addLoaderPlugin:()=>{console.warn("API is not supported in ESM format")},handleStaleModule:function(n){e.push(n),o||(o=new WebSocket(`ws://${location.host}`),o.addEventListener("message",(async o=>{const n=o.data,t=JSON.parse(n);if("moduleUpdate"===t.eventType){const{oldHash:o,newHash:n,module:{specifier:a}}=t.payload;for(let t=0;t<e.length;t++){if(null!==(0,e[t])({name:a,oldHash:o,newHash:n}))break}}})))},appMetadata:function(){const{appId:e,bootstrapModule:o,rootComponent:n,rootComponents:a}=t;return{appId:e,bootstrapModule:o,rootComponent:n,rootComponents:a}}(),addServerDataCallback:function(e){}};export{a as services};
2
- //# sourceMappingURL=servicesESM.js.map
2
+ //# sourceMappingURL=servicesESM.js.map
@@ -54,7 +54,7 @@ async function waitForSuccessfulPing(socketUrl) {
54
54
  // If the dev server comes back online, it resolves with a 404 HTTP response.
55
55
  await fetch(`http://${socketUrl}`);
56
56
  break;
57
- } catch (error) {
57
+ } catch {
58
58
  await new Promise((resolve) => setTimeout(resolve, 1_000));
59
59
  }
60
60
  }
@@ -1349,6 +1349,7 @@ function isGaterEnabledFeature$LWS(featureName$LWS) {
1349
1349
  return gaterEnabledFeatures$LWS.has(fullName$LWS(featureName$LWS));
1350
1350
  }
1351
1351
  const ENABLE_MAX_PERF_MODE_GATE$LWS = 'enableMaxPerfMode';
1352
+ const ENABLE_SANDBOX_CREATED_INSTRUMENTATION_GATE$LWS = 'enableSandboxCreatedInstrumentation';
1352
1353
  const ENABLE_SANDBOXED_SAMEORIGIN_IFRAME_GATE$LWS = 'enableSandboxedSameOriginIframe';
1353
1354
  const omnistudioPredicates$LWS = [key$LWS => key$LWS === 'omnistudio', key$LWS => ReflectApply$LWS$1(StringProtoStartsWith$LWS, key$LWS, ['devopsimpkg']), key$LWS => ReflectApply$LWS$1(RegExpProtoTest$LWS$1, /^devops\d{3}gs0/, [key$LWS]) // Matches devops001gs0, devops002gs0, etc
1354
1355
  ];
@@ -1508,7 +1509,7 @@ const {
1508
1509
  const PromiseResolve$LWS = PromiseCtor$LWS.resolve.bind(PromiseCtor$LWS);
1509
1510
  const PromiseReject$LWS = PromiseCtor$LWS.reject.bind(PromiseCtor$LWS);
1510
1511
  const trustedResources$LWS = toSafeSet$LWS(new SetCtor$LWS$1());
1511
- /*! version: 0.26.2 */
1512
+ /*! version: 0.26.4 */
1512
1513
 
1513
1514
  /*!
1514
1515
  * Copyright (C) 2019 salesforce.com, inc.
@@ -2289,7 +2290,7 @@ const {
2289
2290
  const XhrProtoResponseTextGetter$LWS = ObjectLookupOwnGetter$LWS$1(XhrProto$LWS, 'responseText');
2290
2291
  const XhrProtoStatusGetter$LWS = ObjectLookupOwnGetter$LWS$1(XhrProto$LWS, 'status');
2291
2292
  ObjectLookupOwnSetter$LWS(XhrProto$LWS, 'withCredentials');
2292
- /*! version: 0.26.2 */
2293
+ /*! version: 0.26.4 */
2293
2294
 
2294
2295
  /*!
2295
2296
  * Copyright (C) 2019 salesforce.com, inc.
@@ -2364,7 +2365,7 @@ function sanitizeURLForElement$LWS(url$LWS) {
2364
2365
  function sanitizeURLString$LWS(urlString$LWS) {
2365
2366
  return urlString$LWS === '' ? urlString$LWS : ReflectApply$LWS$1(StringProtoReplace$LWS, urlString$LWS, [newlinesAndTabsRegExp$LWS, '']);
2366
2367
  }
2367
- /*! version: 0.26.2 */
2368
+ /*! version: 0.26.4 */
2368
2369
 
2369
2370
  /*! @license DOMPurify 3.2.4 | (c) Cure53 and other contributors | Released under the Apache license 2.0 and Mozilla Public License 2.0 | github.com/cure53/DOMPurify/blob/3.2.4/LICENSE */
2370
2371
 
@@ -3776,7 +3777,7 @@ try {
3776
3777
  // swallow
3777
3778
  }
3778
3779
  const trusted = createPolicy('trusted', policyOptions);
3779
- /*! version: 0.26.2 */
3780
+ /*! version: 0.26.4 */
3780
3781
 
3781
3782
  /*!
3782
3783
  * Copyright (C) 2019 salesforce.com, inc.
@@ -4041,7 +4042,7 @@ function blobSanitizer$LWS(sandboxKey$LWS) {
4041
4042
  }
4042
4043
  return getSanitizerForConfig$LWS(sandboxKey$LWS, 'STRING_BLOB_HTML');
4043
4044
  }
4044
- /*! version: 0.26.2 */
4045
+ /*! version: 0.26.4 */
4045
4046
 
4046
4047
  /*!
4047
4048
  * Copyright (C) 2023 salesforce.com, inc.
@@ -4238,7 +4239,7 @@ function createScriptSrcURLSetter$LWS(targetElement$LWS) {
4238
4239
  ReflectApply$LWS$1(ElementProtoSetAttributeNS$LWS, targetElement$LWS, [attributeNamespaceURI$LWS, attributeName$LWS, src$LWS]);
4239
4240
  };
4240
4241
  }
4241
- /*! version: 0.26.2 */
4242
+ /*! version: 0.26.4 */
4242
4243
 
4243
4244
  /*!
4244
4245
  * Copyright (C) 2019 salesforce.com, inc.
@@ -10473,7 +10474,16 @@ const SVGElementProtoBlockedProperties$LWS = ['nonce'];
10473
10474
  const UIEventProtoBlockedProperties$LWS = ['rangeParent'];
10474
10475
  const WindowBlockedProperties$LWS = ['find', 'requestFileSystem', 'webkitRequestFileSystem'];
10475
10476
  const XSLTProcessorProtoBlockedProperties$LWS = ['transformToDocument', 'transformToFragment'];
10476
- /*! version: 0.26.2 */
10477
+ /*! version: 0.26.4 */
10478
+
10479
+ /*!
10480
+ * Copyright (C) 2021 salesforce.com, inc.
10481
+ */
10482
+ let pdpSchema$LWS;
10483
+ function getPdpSchema$LWS() {
10484
+ return pdpSchema$LWS;
10485
+ }
10486
+ /*! version: 0.26.4 */
10477
10487
 
10478
10488
  /*!
10479
10489
  * Copyright (C) 2019 salesforce.com, inc.
@@ -10842,6 +10852,10 @@ function setEvalHelpers$LWS(evalHelpers$LWS) {
10842
10852
  lockerEvalHelpersValue$LWS = evalHelpers$LWS;
10843
10853
  }
10844
10854
  const CORE_SANDBOX_KEY$LWS = 'lws-core-sandbox';
10855
+ /** PDP product feature ID for LWS sandbox instrumentation. */
10856
+ const LWS_PDP_PRODUCT_FEATURE_ID$LWS = 'aJCEE0000000mLn4AI';
10857
+ /** PDP event name emitted when LWS creates a new sandbox. */
10858
+ const LWS_PDP_SANDBOX_CREATED_EVENT$LWS = 'lwsSandbox.created';
10845
10859
  const DEFAULT_ENDOWMENTS_DESCRIPTOR_MAP$LWS = {
10846
10860
  [SANDBOX_EVAL_CONTEXT_NAME$LWS]: {
10847
10861
  __proto__: null,
@@ -15821,7 +15835,7 @@ function toSourceText$LWS(value$LWS, sourceType$LWS) {
15821
15835
  // tools from mistaking the regexp or the replacement string for an
15822
15836
  // actual source mapping URL.
15823
15837
  /\/\/# sandbox(?=MappingURL=.*?\s*$)/, '//# source']);
15824
- sourceText$LWS = `\n//# LWS Version = "0.26.2"\n${sourceText$LWS}`;
15838
+ sourceText$LWS = `\n//# LWS Version = "0.26.4"\n${sourceText$LWS}`;
15825
15839
  return sourceType$LWS === 1 /* SourceType.Module */ && indexOfPragma$LWS(sourceText$LWS, 'use strict') === -1 ?
15826
15840
  // Append "'use strict'" to the extracted function body so it is
15827
15841
  // evaluated in strict mode.
@@ -16087,6 +16101,16 @@ function createRootWindowSandboxRecord$LWS({
16087
16101
  distortions$LWS.set(entryKey$LWS, entryValue$LWS);
16088
16102
  }
16089
16103
  rootSandboxRegistry$LWS[key$LWS] = record$LWS;
16104
+ // istanbul ignore next: instrumentation is not tested
16105
+ if (isGaterEnabledFeature$LWS(ENABLE_SANDBOX_CREATED_INSTRUMENTATION_GATE$LWS)) {
16106
+ const pdpSchema$LWS = getPdpSchema$LWS();
16107
+ if (pdpSchema$LWS) {
16108
+ instrumentation$LWS == null || instrumentation$LWS.log == null || instrumentation$LWS.log(pdpSchema$LWS, {
16109
+ eventName: LWS_PDP_SANDBOX_CREATED_EVENT$LWS,
16110
+ productFeatureId: LWS_PDP_PRODUCT_FEATURE_ID$LWS
16111
+ });
16112
+ }
16113
+ }
16090
16114
  return record$LWS;
16091
16115
  }
16092
16116
  function createOpaqueSecondaryWindowSandboxRecord$LWS({
@@ -16144,6 +16168,16 @@ function createOpaqueSecondaryWindowSandboxRecord$LWS({
16144
16168
  const originalOpaqueWindowPostMessage$LWS = opaqueWindowPostMessageDistortionEntry$LWS[0];
16145
16169
  distortions$LWS.set(originalOpaqueWindowPostMessage$LWS, proxyMaskFunctionDistortion$LWS(record$LWS, opaqueWindowPostMessageDistortionFactory$LWS, opaqueWindowPostMessageDistortionEntry$LWS[1], originalOpaqueWindowPostMessage$LWS));
16146
16170
  sandboxRegistry$LWS[key$LWS] = record$LWS;
16171
+ // istanbul ignore next: instrumentation is not tested
16172
+ if (isGaterEnabledFeature$LWS(ENABLE_SANDBOX_CREATED_INSTRUMENTATION_GATE$LWS)) {
16173
+ const pdpSchema$LWS = getPdpSchema$LWS();
16174
+ if (pdpSchema$LWS) {
16175
+ instrumentation$LWS == null || instrumentation$LWS.log == null || instrumentation$LWS.log(pdpSchema$LWS, {
16176
+ eventName: LWS_PDP_SANDBOX_CREATED_EVENT$LWS,
16177
+ productFeatureId: LWS_PDP_PRODUCT_FEATURE_ID$LWS
16178
+ });
16179
+ }
16180
+ }
16147
16181
  return record$LWS;
16148
16182
  }
16149
16183
  function createSecondaryWindowSandboxRecord$LWS({
@@ -16226,6 +16260,16 @@ function createSecondaryWindowSandboxRecord$LWS({
16226
16260
  distortions$LWS.set(entryKey$LWS, entryValue$LWS);
16227
16261
  }
16228
16262
  sandboxRegistry$LWS[key$LWS] = record$LWS;
16263
+ // istanbul ignore next: instrumentation is not tested
16264
+ if (isGaterEnabledFeature$LWS(ENABLE_SANDBOX_CREATED_INSTRUMENTATION_GATE$LWS)) {
16265
+ const pdpSchema$LWS = getPdpSchema$LWS();
16266
+ if (pdpSchema$LWS) {
16267
+ instrumentation$LWS == null || instrumentation$LWS.log == null || instrumentation$LWS.log(pdpSchema$LWS, {
16268
+ eventName: LWS_PDP_SANDBOX_CREATED_EVENT$LWS,
16269
+ productFeatureId: LWS_PDP_PRODUCT_FEATURE_ID$LWS
16270
+ });
16271
+ }
16272
+ }
16229
16273
  if (seenGlobalObject$LWS) {
16230
16274
  return record$LWS;
16231
16275
  }
@@ -16514,7 +16558,7 @@ function wrapPlatformResourceLoader$LWS(dep$LWS, key$LWS) {
16514
16558
  depRegistry$LWS.set(dep$LWS, secureDep$LWS);
16515
16559
  return secureDep$LWS;
16516
16560
  }
16517
- /*! version: 0.26.2 */
16561
+ /*! version: 0.26.4 */
16518
16562
 
16519
16563
  const loaderDefine = (globalThis ).LWR.define;
16520
16564
 
@@ -1349,6 +1349,7 @@ function isGaterEnabledFeature$LWS(featureName$LWS) {
1349
1349
  return gaterEnabledFeatures$LWS.has(fullName$LWS(featureName$LWS));
1350
1350
  }
1351
1351
  const ENABLE_MAX_PERF_MODE_GATE$LWS = 'enableMaxPerfMode';
1352
+ const ENABLE_SANDBOX_CREATED_INSTRUMENTATION_GATE$LWS = 'enableSandboxCreatedInstrumentation';
1352
1353
  const ENABLE_SANDBOXED_SAMEORIGIN_IFRAME_GATE$LWS = 'enableSandboxedSameOriginIframe';
1353
1354
  const omnistudioPredicates$LWS = [key$LWS => key$LWS === 'omnistudio', key$LWS => ReflectApply$LWS$1(StringProtoStartsWith$LWS, key$LWS, ['devopsimpkg']), key$LWS => ReflectApply$LWS$1(RegExpProtoTest$LWS$1, /^devops\d{3}gs0/, [key$LWS]) // Matches devops001gs0, devops002gs0, etc
1354
1355
  ];
@@ -1508,7 +1509,7 @@ const {
1508
1509
  const PromiseResolve$LWS = PromiseCtor$LWS.resolve.bind(PromiseCtor$LWS);
1509
1510
  const PromiseReject$LWS = PromiseCtor$LWS.reject.bind(PromiseCtor$LWS);
1510
1511
  const trustedResources$LWS = toSafeSet$LWS(new SetCtor$LWS$1());
1511
- /*! version: 0.26.2 */
1512
+ /*! version: 0.26.4 */
1512
1513
 
1513
1514
  /*!
1514
1515
  * Copyright (C) 2019 salesforce.com, inc.
@@ -2289,7 +2290,7 @@ const {
2289
2290
  const XhrProtoResponseTextGetter$LWS = ObjectLookupOwnGetter$LWS$1(XhrProto$LWS, 'responseText');
2290
2291
  const XhrProtoStatusGetter$LWS = ObjectLookupOwnGetter$LWS$1(XhrProto$LWS, 'status');
2291
2292
  ObjectLookupOwnSetter$LWS(XhrProto$LWS, 'withCredentials');
2292
- /*! version: 0.26.2 */
2293
+ /*! version: 0.26.4 */
2293
2294
 
2294
2295
  /*!
2295
2296
  * Copyright (C) 2019 salesforce.com, inc.
@@ -2364,7 +2365,7 @@ function sanitizeURLForElement$LWS(url$LWS) {
2364
2365
  function sanitizeURLString$LWS(urlString$LWS) {
2365
2366
  return urlString$LWS === '' ? urlString$LWS : ReflectApply$LWS$1(StringProtoReplace$LWS, urlString$LWS, [newlinesAndTabsRegExp$LWS, '']);
2366
2367
  }
2367
- /*! version: 0.26.2 */
2368
+ /*! version: 0.26.4 */
2368
2369
 
2369
2370
  /*! @license DOMPurify 3.2.4 | (c) Cure53 and other contributors | Released under the Apache license 2.0 and Mozilla Public License 2.0 | github.com/cure53/DOMPurify/blob/3.2.4/LICENSE */
2370
2371
 
@@ -3776,7 +3777,7 @@ try {
3776
3777
  // swallow
3777
3778
  }
3778
3779
  const trusted = createPolicy('trusted', policyOptions);
3779
- /*! version: 0.26.2 */
3780
+ /*! version: 0.26.4 */
3780
3781
 
3781
3782
  /*!
3782
3783
  * Copyright (C) 2019 salesforce.com, inc.
@@ -4041,7 +4042,7 @@ function blobSanitizer$LWS(sandboxKey$LWS) {
4041
4042
  }
4042
4043
  return getSanitizerForConfig$LWS(sandboxKey$LWS, 'STRING_BLOB_HTML');
4043
4044
  }
4044
- /*! version: 0.26.2 */
4045
+ /*! version: 0.26.4 */
4045
4046
 
4046
4047
  /*!
4047
4048
  * Copyright (C) 2023 salesforce.com, inc.
@@ -4238,7 +4239,7 @@ function createScriptSrcURLSetter$LWS(targetElement$LWS) {
4238
4239
  ReflectApply$LWS$1(ElementProtoSetAttributeNS$LWS, targetElement$LWS, [attributeNamespaceURI$LWS, attributeName$LWS, src$LWS]);
4239
4240
  };
4240
4241
  }
4241
- /*! version: 0.26.2 */
4242
+ /*! version: 0.26.4 */
4242
4243
 
4243
4244
  /*!
4244
4245
  * Copyright (C) 2019 salesforce.com, inc.
@@ -10473,7 +10474,16 @@ const SVGElementProtoBlockedProperties$LWS = ['nonce'];
10473
10474
  const UIEventProtoBlockedProperties$LWS = ['rangeParent'];
10474
10475
  const WindowBlockedProperties$LWS = ['find', 'requestFileSystem', 'webkitRequestFileSystem'];
10475
10476
  const XSLTProcessorProtoBlockedProperties$LWS = ['transformToDocument', 'transformToFragment'];
10476
- /*! version: 0.26.2 */
10477
+ /*! version: 0.26.4 */
10478
+
10479
+ /*!
10480
+ * Copyright (C) 2021 salesforce.com, inc.
10481
+ */
10482
+ let pdpSchema$LWS;
10483
+ function getPdpSchema$LWS() {
10484
+ return pdpSchema$LWS;
10485
+ }
10486
+ /*! version: 0.26.4 */
10477
10487
 
10478
10488
  /*!
10479
10489
  * Copyright (C) 2019 salesforce.com, inc.
@@ -10844,6 +10854,10 @@ function setEvalHelpers$LWS(evalHelpers$LWS) {
10844
10854
  lockerEvalHelpersValue$LWS = evalHelpers$LWS;
10845
10855
  }
10846
10856
  const CORE_SANDBOX_KEY$LWS = 'lws-core-sandbox';
10857
+ /** PDP product feature ID for LWS sandbox instrumentation. */
10858
+ const LWS_PDP_PRODUCT_FEATURE_ID$LWS = 'aJCEE0000000mLn4AI';
10859
+ /** PDP event name emitted when LWS creates a new sandbox. */
10860
+ const LWS_PDP_SANDBOX_CREATED_EVENT$LWS = 'lwsSandbox.created';
10847
10861
  const DEFAULT_ENDOWMENTS_DESCRIPTOR_MAP$LWS = {
10848
10862
  [SANDBOX_EVAL_CONTEXT_NAME$LWS]: {
10849
10863
  __proto__: null,
@@ -15823,7 +15837,7 @@ function toSourceText$LWS(value$LWS, sourceType$LWS) {
15823
15837
  // tools from mistaking the regexp or the replacement string for an
15824
15838
  // actual source mapping URL.
15825
15839
  /\/\/# sandbox(?=MappingURL=.*?\s*$)/, '//# source']);
15826
- sourceText$LWS = `\n//# LWS Version = "0.26.2"\n${sourceText$LWS}`;
15840
+ sourceText$LWS = `\n//# LWS Version = "0.26.4"\n${sourceText$LWS}`;
15827
15841
  return sourceType$LWS === 1 /* SourceType.Module */ && indexOfPragma$LWS(sourceText$LWS, 'use strict') === -1 ?
15828
15842
  // Append "'use strict'" to the extracted function body so it is
15829
15843
  // evaluated in strict mode.
@@ -16089,6 +16103,16 @@ function createRootWindowSandboxRecord$LWS({
16089
16103
  distortions$LWS.set(entryKey$LWS, entryValue$LWS);
16090
16104
  }
16091
16105
  rootSandboxRegistry$LWS[key$LWS] = record$LWS;
16106
+ // istanbul ignore next: instrumentation is not tested
16107
+ if (isGaterEnabledFeature$LWS(ENABLE_SANDBOX_CREATED_INSTRUMENTATION_GATE$LWS)) {
16108
+ const pdpSchema$LWS = getPdpSchema$LWS();
16109
+ if (pdpSchema$LWS) {
16110
+ instrumentation$LWS == null || instrumentation$LWS.log == null || instrumentation$LWS.log(pdpSchema$LWS, {
16111
+ eventName: LWS_PDP_SANDBOX_CREATED_EVENT$LWS,
16112
+ productFeatureId: LWS_PDP_PRODUCT_FEATURE_ID$LWS
16113
+ });
16114
+ }
16115
+ }
16092
16116
  return record$LWS;
16093
16117
  }
16094
16118
  function createOpaqueSecondaryWindowSandboxRecord$LWS({
@@ -16146,6 +16170,16 @@ function createOpaqueSecondaryWindowSandboxRecord$LWS({
16146
16170
  const originalOpaqueWindowPostMessage$LWS = opaqueWindowPostMessageDistortionEntry$LWS[0];
16147
16171
  distortions$LWS.set(originalOpaqueWindowPostMessage$LWS, proxyMaskFunctionDistortion$LWS(record$LWS, opaqueWindowPostMessageDistortionFactory$LWS, opaqueWindowPostMessageDistortionEntry$LWS[1], originalOpaqueWindowPostMessage$LWS));
16148
16172
  sandboxRegistry$LWS[key$LWS] = record$LWS;
16173
+ // istanbul ignore next: instrumentation is not tested
16174
+ if (isGaterEnabledFeature$LWS(ENABLE_SANDBOX_CREATED_INSTRUMENTATION_GATE$LWS)) {
16175
+ const pdpSchema$LWS = getPdpSchema$LWS();
16176
+ if (pdpSchema$LWS) {
16177
+ instrumentation$LWS == null || instrumentation$LWS.log == null || instrumentation$LWS.log(pdpSchema$LWS, {
16178
+ eventName: LWS_PDP_SANDBOX_CREATED_EVENT$LWS,
16179
+ productFeatureId: LWS_PDP_PRODUCT_FEATURE_ID$LWS
16180
+ });
16181
+ }
16182
+ }
16149
16183
  return record$LWS;
16150
16184
  }
16151
16185
  function createSecondaryWindowSandboxRecord$LWS({
@@ -16228,6 +16262,16 @@ function createSecondaryWindowSandboxRecord$LWS({
16228
16262
  distortions$LWS.set(entryKey$LWS, entryValue$LWS);
16229
16263
  }
16230
16264
  sandboxRegistry$LWS[key$LWS] = record$LWS;
16265
+ // istanbul ignore next: instrumentation is not tested
16266
+ if (isGaterEnabledFeature$LWS(ENABLE_SANDBOX_CREATED_INSTRUMENTATION_GATE$LWS)) {
16267
+ const pdpSchema$LWS = getPdpSchema$LWS();
16268
+ if (pdpSchema$LWS) {
16269
+ instrumentation$LWS == null || instrumentation$LWS.log == null || instrumentation$LWS.log(pdpSchema$LWS, {
16270
+ eventName: LWS_PDP_SANDBOX_CREATED_EVENT$LWS,
16271
+ productFeatureId: LWS_PDP_PRODUCT_FEATURE_ID$LWS
16272
+ });
16273
+ }
16274
+ }
16231
16275
  if (seenGlobalObject$LWS) {
16232
16276
  return record$LWS;
16233
16277
  }
@@ -16546,7 +16590,7 @@ function wrapPlatformResourceLoader$LWS(dep$LWS, key$LWS) {
16546
16590
  depRegistry$LWS.set(dep$LWS, secureDep$LWS);
16547
16591
  return secureDep$LWS;
16548
16592
  }
16549
- /*! version: 0.26.2 */
16593
+ /*! version: 0.26.4 */
16550
16594
 
16551
16595
  export { $LWS, CORE_SANDBOX_KEY$LWS as CORE_SANDBOX_KEY, createRootWindowSandboxRecord$LWS as createRootWindowSandboxRecord, evaluateFunction$LWS as evaluateFunction, evaluateInCoreSandbox$LWS as evaluateInCoreSandbox, evaluateInSandbox$LWS as evaluateInSandbox, trusted, wrapDependency$LWS as wrapDependency };
16552
16596
  //# sourceMappingURL=lockerSandbox.js.map
package/package.json CHANGED
@@ -4,7 +4,7 @@
4
4
  "publishConfig": {
5
5
  "access": "public"
6
6
  },
7
- "version": "0.21.8",
7
+ "version": "0.22.2",
8
8
  "homepage": "https://developer.salesforce.com/docs/platform/lwr/overview",
9
9
  "repository": {
10
10
  "type": "git",
@@ -27,16 +27,17 @@
27
27
  ],
28
28
  "scripts": {
29
29
  "build:ts": "tsc -b",
30
- "build": "yarn build:ts && node ../../../bin/pack-lwc --dir modules build/modules && yarn build:locker && yarn build:bundle",
30
+ "build": "yarn build:ts && node ../../../bin/pack-lwc --dir modules build/modules && yarn build:locker && yarn build:bundle && yarn build:minify",
31
31
  "build:locker": "rollup --config ./scripts/rollup.config.locker.js",
32
- "build:bundle": "rollup --config scripts/rollup.moduleBundle.config.cjs"
32
+ "build:bundle": "rollup --config scripts/rollup.moduleBundle.config.cjs",
33
+ "build:minify": "node scripts/minify-bundles.mjs"
33
34
  },
34
35
  "dependencies": {
35
- "@locker/sandbox": "0.26.2",
36
- "@lwrjs/shared-utils": "0.21.8"
36
+ "@locker/sandbox": "0.26.4",
37
+ "@lwrjs/shared-utils": "0.22.2"
37
38
  },
38
39
  "devDependencies": {
39
- "@lwrjs/types": "0.21.8",
40
+ "@lwrjs/types": "0.22.2",
40
41
  "@rollup/plugin-node-resolve": "^15.2.3",
41
42
  "@rollup/plugin-sucrase": "^5.0.2",
42
43
  "@rollup/plugin-terser": "^0.4.4",
@@ -64,10 +65,10 @@
64
65
  ]
65
66
  },
66
67
  "engines": {
67
- "node": ">=20.0.0"
68
+ "node": ">=22.0.0"
68
69
  },
69
70
  "volta": {
70
71
  "extends": "../../../package.json"
71
72
  },
72
- "gitHead": "3665b85aad9402b59812e67570c0c6e3be093c00"
73
+ "gitHead": "30870e466e15e6691d238e75836e9266a45203e3"
73
74
  }