@wix/duplexer-js 2.0.5 → 2.0.6
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/src/environments/web/transports.js +17 -1
- package/dist/src/environments/web/transports.js.map +1 -1
- package/dist/statics/duplexer.bundle.js +3 -1
- package/dist/statics/duplexer.bundle.js.map +1 -1
- package/dist/statics/duplexer.bundle.min.js +1 -1
- package/dist/statics/duplexer.bundle.min.js.map +1 -1
- package/dist/test/environments/web.spec.js +35 -0
- package/dist/test/environments/web.spec.js.map +1 -1
- package/package.json +2 -2
|
@@ -46,6 +46,22 @@ function httpUrl(baseUrl) {
|
|
|
46
46
|
return "".concat(protocol).concat(baseUrl);
|
|
47
47
|
}
|
|
48
48
|
function isSSL() {
|
|
49
|
-
|
|
49
|
+
if (typeof self === 'undefined') {
|
|
50
|
+
return false;
|
|
51
|
+
}
|
|
52
|
+
if (self.location.protocol !== 'http:') {
|
|
53
|
+
return true;
|
|
54
|
+
}
|
|
55
|
+
// HTTP iframe inside HTTPS parent — browsers enforce parent's security context.
|
|
56
|
+
try {
|
|
57
|
+
if (self !== self.top && self.top.location.protocol !== 'http:') {
|
|
58
|
+
return true;
|
|
59
|
+
}
|
|
60
|
+
}
|
|
61
|
+
catch (_e) {
|
|
62
|
+
// Cross-origin parent — can't read its protocol, assume secure to be safe.
|
|
63
|
+
return true;
|
|
64
|
+
}
|
|
65
|
+
return false;
|
|
50
66
|
}
|
|
51
67
|
//# sourceMappingURL=transports.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"transports.js","sourceRoot":"","sources":["../../../../src/environments/web/transports.ts"],"names":[],"mappings":";;;;;AAAA,wEAAkD;AAClD,8EAAuD;AAEvD,0FAAmE;AAEnE,sEAG2C;AAE3C,SAAwB,UAAU,CAAC,IAAoB;;IACrD,IAAI,UAAU,GAAe,EAAE,CAAC;IAChC,IAAM,EAAE,GAAG,eAAe,CAAC,IAAI,CAAC,CAAC;IACjC,IAAM,eAAe,GAAG,qBAAqB,CAAC,IAAI,CAAC,CAAC;IAEpD,sBAAsB;
|
|
1
|
+
{"version":3,"file":"transports.js","sourceRoot":"","sources":["../../../../src/environments/web/transports.ts"],"names":[],"mappings":";;;;;AAAA,wEAAkD;AAClD,8EAAuD;AAEvD,0FAAmE;AAEnE,sEAG2C;AAE3C,SAAwB,UAAU,CAAC,IAAoB;;IACrD,IAAI,UAAU,GAAe,EAAE,CAAC;IAChC,IAAM,EAAE,GAAG,eAAe,CAAC,IAAI,CAAC,CAAC;IACjC,IAAM,eAAe,GAAG,qBAAqB,CAAC,IAAI,CAAC,CAAC;IAEpD,sBAAsB;IACtB,IAAM,eAAe,GACnB,OAAO,OAAO,KAAK,WAAW;QAC9B,OAAO,CAAA,MAAA,OAAO,CAAC,GAAG,0CAAE,yBAAyB,CAAA,KAAK,QAAQ;QACxD,CAAC,CAAC,OAAO,CAAC,GAAG,CAAC,yBAAyB;QACvC,CAAC,CAAC,SAAS,CAAC;IAEhB,IAAI,eAAe,KAAK,WAAW,EAAE,CAAC;QACpC,UAAU,GAAG,CAAC,IAAA,gCAAa,EAAC,EAAE,CAAC,CAAC,CAAC;IACnC,CAAC;SAAM,IAAI,eAAe,KAAK,MAAM,EAAE,CAAC;QACtC,UAAU,GAAG,CAAC,IAAA,gCAAa,EAAC,eAAe,CAAC,CAAC,CAAC;IAChD,CAAC;SAAM,IAAI,mBAAS,CAAC,WAAW,EAAE,EAAE,CAAC;QACnC,UAAU,GAAG,CAAC,IAAA,gCAAa,EAAC,EAAE,CAAC,EAAE,IAAA,kCAAe,EAAC,eAAe,CAAC,CAAC,CAAC;IACrE,CAAC;SAAM,CAAC;QACN,UAAU,GAAG,CAAC,IAAA,gCAAa,EAAC,eAAe,CAAC,CAAC,CAAC;IAChD,CAAC;IAED,OAAO,IAAI,4BAAiB,CAAC,UAAU,CAAC,CAAC;AAC3C,CAAC;AAvBD,6BAuBC;AAED,SAAS,eAAe,CAAC,IAAoB;IAC3C,IAAM,QAAQ,GAAG,KAAK,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC,OAAO,CAAC;IAC9C,IAAM,GAAG,GAAG,UAAG,QAAQ,SAAG,IAAI,CAAC,OAAO,CAAE,CAAC;IACzC,OAAO,IAAI,mBAAS,CAAC,GAAG,EAAE,IAAI,CAAC,eAAe,EAAE,IAAI,CAAC,YAAY,CAAC,CAAC;AACrE,CAAC;AAED,SAAS,qBAAqB,CAAC,IAAoB;IACjD,IAAM,GAAG,GAAG,OAAO,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;IAClC,OAAO,IAAI,sBAAW,CAAC,GAAG,EAAE,IAAI,CAAC,eAAe,EAAE,IAAI,CAAC,YAAY,CAAC,CAAC;AACvE,CAAC;AAED,SAAS,OAAO,CAAC,OAAe;IAC9B,IAAM,QAAQ,GAAG,KAAK,EAAE,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;IAClD,OAAO,UAAG,QAAQ,SAAG,OAAO,CAAE,CAAC;AACjC,CAAC;AAED,SAAS,KAAK;IACZ,IAAI,OAAO,IAAI,KAAK,WAAW,EAAE,CAAC;QAChC,OAAO,KAAK,CAAC;IACf,CAAC;IACD,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,KAAK,OAAO,EAAE,CAAC;QACvC,OAAO,IAAI,CAAC;IACd,CAAC;IACD,gFAAgF;IAChF,IAAI,CAAC;QACH,IAAI,IAAI,KAAK,IAAI,CAAC,GAAG,IAAI,IAAI,CAAC,GAAI,CAAC,QAAQ,CAAC,QAAQ,KAAK,OAAO,EAAE,CAAC;YACjE,OAAO,IAAI,CAAC;QACd,CAAC;IACH,CAAC;IAAC,OAAO,EAAE,EAAE,CAAC;QACZ,2EAA2E;QAC3E,OAAO,IAAI,CAAC;IACd,CAAC;IACD,OAAO,KAAK,CAAC;AACf,CAAC"}
|
|
@@ -921,7 +921,9 @@ const BACKOFF_INITIAL=150;function primaryPreset(transport){return aStrategyBuil
|
|
|
921
921
|
;// CONCATENATED MODULE: ./environments/web/transports.ts
|
|
922
922
|
/* provided dependency */ var transports_process = __webpack_require__(/*! process */ 158);
|
|
923
923
|
function transports(opts){var _process$env;let strategies=[];const ws=createWebSocket(opts);const httpLongPolling=createHttpLongPolling(opts);// tests purposes only
|
|
924
|
-
const forcedTransport=typeof transports_process!=='undefined'&&typeof((_process$env=transports_process.env)==null?void 0:_process$env.DUPLEXER_FORCED_TRANSPORT)==='string'?transports_process.env.DUPLEXER_FORCED_TRANSPORT:undefined;if(forcedTransport==='websocket'){strategies=[primaryPreset(ws)];}else if(forcedTransport==='http'){strategies=[primaryPreset(httpLongPolling)];}else if(WS.isSupported()){strategies=[primaryPreset(ws),secondaryPreset(httpLongPolling)];}else{strategies=[primaryPreset(httpLongPolling)];}return new TransportsManager(strategies);}function createWebSocket(opts){const protocol=isSSL()?'wss://':'ws://';const url=`${protocol}${opts.baseUrl}`;return new WS(url,opts.instanceUpdater,opts.siteRevision);}function createHttpLongPolling(opts){const url=httpUrl(opts.baseUrl);return new HttpPolling(url,opts.instanceUpdater,opts.siteRevision);}function httpUrl(baseUrl){const protocol=isSSL()?'https://':'http://';return`${protocol}${baseUrl}`;}function isSSL(){
|
|
924
|
+
const forcedTransport=typeof transports_process!=='undefined'&&typeof((_process$env=transports_process.env)==null?void 0:_process$env.DUPLEXER_FORCED_TRANSPORT)==='string'?transports_process.env.DUPLEXER_FORCED_TRANSPORT:undefined;if(forcedTransport==='websocket'){strategies=[primaryPreset(ws)];}else if(forcedTransport==='http'){strategies=[primaryPreset(httpLongPolling)];}else if(WS.isSupported()){strategies=[primaryPreset(ws),secondaryPreset(httpLongPolling)];}else{strategies=[primaryPreset(httpLongPolling)];}return new TransportsManager(strategies);}function createWebSocket(opts){const protocol=isSSL()?'wss://':'ws://';const url=`${protocol}${opts.baseUrl}`;return new WS(url,opts.instanceUpdater,opts.siteRevision);}function createHttpLongPolling(opts){const url=httpUrl(opts.baseUrl);return new HttpPolling(url,opts.instanceUpdater,opts.siteRevision);}function httpUrl(baseUrl){const protocol=isSSL()?'https://':'http://';return`${protocol}${baseUrl}`;}function isSSL(){if(typeof self==='undefined'){return false;}if(self.location.protocol!=='http:'){return true;}// HTTP iframe inside HTTPS parent — browsers enforce parent's security context.
|
|
925
|
+
try{if(self!==self.top&&self.top.location.protocol!=='http:'){return true;}}catch(_e){// Cross-origin parent — can't read its protocol, assume secure to be safe.
|
|
926
|
+
return true;}return false;}
|
|
925
927
|
;// CONCATENATED MODULE: ./environments/web/environment.ts
|
|
926
928
|
function aWebEnvironment(opts){const network=new WebNetwork();const transportsManager=transports({baseUrl:opts.url,instanceUpdater:opts.instanceUpdater,siteRevision:opts.siteRevision});return new Environment({transportsManager,network});}
|
|
927
929
|
;// CONCATENATED MODULE: ./utils/timer.ts
|