@signalwire/js 4.0.0-dev-20260410155733 → 4.0.0-dev-20260410161202
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/browser.mjs +7 -7
- package/dist/browser.mjs.map +1 -1
- package/dist/browser.umd.js +7 -7
- package/dist/browser.umd.js.map +1 -1
- package/dist/index.cjs +7 -7
- package/dist/index.cjs.map +1 -1
- package/dist/index.d.cts.map +1 -1
- package/dist/index.d.mts.map +1 -1
- package/dist/index.mjs +7 -7
- package/dist/index.mjs.map +1 -1
- package/package.json +1 -1
package/dist/browser.mjs
CHANGED
|
@@ -11134,10 +11134,10 @@ var StorageManager = class {
|
|
|
11134
11134
|
//#region src/containers/DependencyContainer.ts
|
|
11135
11135
|
var DependencyContainer = class {
|
|
11136
11136
|
constructor() {
|
|
11137
|
+
this.persistSession = false;
|
|
11137
11138
|
this._webSocketConstructor = typeof WebSocket !== "undefined" ? WebSocket : void 0;
|
|
11138
11139
|
this._baseURL = this.apiHost;
|
|
11139
11140
|
this._credential = {};
|
|
11140
|
-
this.persistSession = false;
|
|
11141
11141
|
}
|
|
11142
11142
|
get subscriberId() {
|
|
11143
11143
|
return this.subscriber.id;
|
|
@@ -11275,7 +11275,7 @@ const computeJwkThumbprint = async (jwk) => {
|
|
|
11275
11275
|
});
|
|
11276
11276
|
return base64url(await crypto.subtle.digest("SHA-256", new TextEncoder().encode(canonical)));
|
|
11277
11277
|
};
|
|
11278
|
-
function openDpopDB() {
|
|
11278
|
+
async function openDpopDB() {
|
|
11279
11279
|
return new Promise((resolve, reject) => {
|
|
11280
11280
|
const request = indexedDB.open(DPOP_DB_NAME, DPOP_DB_VERSION);
|
|
11281
11281
|
request.onupgradeneeded = () => {
|
|
@@ -11283,7 +11283,7 @@ function openDpopDB() {
|
|
|
11283
11283
|
if (!db.objectStoreNames.contains(DPOP_STORE_NAME)) db.createObjectStore(DPOP_STORE_NAME);
|
|
11284
11284
|
};
|
|
11285
11285
|
request.onsuccess = () => resolve(request.result);
|
|
11286
|
-
request.onerror = () => reject(request.error);
|
|
11286
|
+
request.onerror = () => reject(request.error ?? /* @__PURE__ */ new Error("Failed to open IndexedDB"));
|
|
11287
11287
|
});
|
|
11288
11288
|
}
|
|
11289
11289
|
async function loadKeyPairFromDB() {
|
|
@@ -11293,7 +11293,7 @@ async function loadKeyPairFromDB() {
|
|
|
11293
11293
|
const tx = db.transaction(DPOP_STORE_NAME, "readonly");
|
|
11294
11294
|
const req = tx.objectStore(DPOP_STORE_NAME).get(DPOP_KEY_ID);
|
|
11295
11295
|
req.onsuccess = () => resolve(req.result ?? null);
|
|
11296
|
-
req.onerror = () => reject(req.error);
|
|
11296
|
+
req.onerror = () => reject(req.error ?? /* @__PURE__ */ new Error("Failed to load key pair from IndexedDB"));
|
|
11297
11297
|
tx.oncomplete = () => db.close();
|
|
11298
11298
|
});
|
|
11299
11299
|
} catch (error) {
|
|
@@ -11313,7 +11313,7 @@ async function saveKeyPairToDB(keyPair) {
|
|
|
11313
11313
|
};
|
|
11314
11314
|
tx.onerror = () => {
|
|
11315
11315
|
db.close();
|
|
11316
|
-
reject(tx.error);
|
|
11316
|
+
reject(tx.error ?? /* @__PURE__ */ new Error("Failed to save key pair to IndexedDB"));
|
|
11317
11317
|
};
|
|
11318
11318
|
});
|
|
11319
11319
|
} catch (error) {
|
|
@@ -11332,7 +11332,7 @@ async function deleteKeyPairFromDB() {
|
|
|
11332
11332
|
};
|
|
11333
11333
|
tx.onerror = () => {
|
|
11334
11334
|
db.close();
|
|
11335
|
-
reject(tx.error);
|
|
11335
|
+
reject(tx.error ?? /* @__PURE__ */ new Error("Failed to delete key pair from IndexedDB"));
|
|
11336
11336
|
};
|
|
11337
11337
|
});
|
|
11338
11338
|
} catch (error) {
|
|
@@ -20228,7 +20228,7 @@ var SignalWire = class extends Destroyable {
|
|
|
20228
20228
|
const cached = await this._deps.storage.getItem("sw:cached_credential", scope);
|
|
20229
20229
|
if (cached?.token) {
|
|
20230
20230
|
logger$1.debug(`[SignalWire] Using cached credential from ${scope}Storage`);
|
|
20231
|
-
return this.validateCredentials(void 0, cached);
|
|
20231
|
+
return await this.validateCredentials(void 0, cached);
|
|
20232
20232
|
}
|
|
20233
20233
|
} catch {}
|
|
20234
20234
|
throw new InvalidCredentialsError("No credential provider and no cached session. Provide a CredentialProvider or enable persistSession with a prior login.");
|