- From: Peter Beverloo <notifications@github.com>
- Date: Mon, 21 Aug 2017 11:01:44 -0700
- To: w3c/push-api <push-api@noreply.github.com>
- Cc: Subscribed <subscribed@noreply.github.com>
Received on Monday, 21 August 2017 18:02:24 UTC
Yes, they're exposed. The following would work: ```javascript self.addEventListener('push', event => { const decoder = new TextDecoder('utf-8', { fatal: true }); try { decoder.decode(event.data.arrayBuffer()); } catch (e) { /* do something with |e| */ } }); ``` Let me close this based on prior art and the availability of a way to get the exceptions if necessary. Happy to reconsider if you disagree! -- You are receiving this because you are subscribed to this thread. Reply to this email directly or view it on GitHub: https://github.com/w3c/push-api/issues/276#issuecomment-323811516
Received on Monday, 21 August 2017 18:02:24 UTC