- From: Peter Beverloo <notifications@github.com>
- Date: Mon, 21 Aug 2017 11:01:44 -0700
- To: w3c/push-api <push-api@noreply.github.com>
- Cc: Subscribed <subscribed@noreply.github.com>
Received on Monday, 21 August 2017 18:02:24 UTC
Yes, they're exposed. The following would work:
```javascript
self.addEventListener('push', event => {
const decoder = new TextDecoder('utf-8', {
fatal: true
});
try {
decoder.decode(event.data.arrayBuffer());
} catch (e) {
/* do something with |e| */
}
});
```
Let me close this based on prior art and the availability of a way to get the exceptions if necessary. Happy to reconsider if you disagree!
--
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/w3c/push-api/issues/276#issuecomment-323811516
Received on Monday, 21 August 2017 18:02:24 UTC