@@ -491,7 +491,7 @@ shaka.media.DrmEngine.prototype.attach = function(video) {
491491 const setServerCertificate = this . setServerCertificate ( ) ;
492492
493493 return Promise . all ( [ setMediaKeys , setServerCertificate ] ) . then ( ( ) => {
494- if ( this . isDestroying_ ) { return Promise . reject ( ) ; }
494+ if ( this . isDestroying_ ) { return ; }
495495
496496 this . createOrLoad ( ) ;
497497 if ( ! this . currentDrmInfo_ . initData . length &&
@@ -504,7 +504,7 @@ shaka.media.DrmEngine.prototype.attach = function(video) {
504504 }
505505 } ) . catch ( ( error ) => {
506506 if ( this . isDestroying_ ) { return ; }
507- return Promise . reject ( error ) ;
507+ throw error ;
508508 } ) ;
509509} ;
510510
@@ -530,11 +530,11 @@ shaka.media.DrmEngine.prototype.setServerCertificate = async function() {
530530 ' system. The server certificate has been ignored.' ) ;
531531 }
532532 } catch ( exception ) {
533- return Promise . reject ( new shaka . util . Error (
533+ throw new shaka . util . Error (
534534 shaka . util . Error . Severity . CRITICAL ,
535535 shaka . util . Error . Category . DRM ,
536536 shaka . util . Error . Code . INVALID_SERVER_CERTIFICATE ,
537- exception . message ) ) ;
537+ exception . message ) ;
538538 }
539539 }
540540} ;
@@ -873,21 +873,21 @@ shaka.media.DrmEngine.prototype.queryMediaKeys_ = function(configsByKeySystem) {
873873 if ( hasLicenseServer != shouldHaveLicenseServer ) return ;
874874
875875 p = p . catch ( ( ) => {
876- if ( this . isDestroying_ ) { return ; }
876+ if ( this . isDestroying_ ) { return null ; }
877877 return navigator . requestMediaKeySystemAccess ( keySystem , [ config ] ) ;
878878 } ) ;
879879 } ) ;
880880 } ) ;
881881
882882 p = p . catch ( ( ) => {
883- return Promise . reject ( new shaka . util . Error (
883+ throw new shaka . util . Error (
884884 shaka . util . Error . Severity . CRITICAL ,
885885 shaka . util . Error . Category . DRM ,
886- shaka . util . Error . Code . REQUESTED_KEY_SYSTEM_CONFIG_UNAVAILABLE ) ) ;
886+ shaka . util . Error . Code . REQUESTED_KEY_SYSTEM_CONFIG_UNAVAILABLE ) ;
887887 } ) ;
888888
889889 p = p . then ( ( mediaKeySystemAccess ) => {
890- if ( this . isDestroying_ ) { return Promise . reject ( ) ; }
890+ if ( this . isDestroying_ ) { return null ; }
891891
892892 // Get the set of supported content types from the audio and video
893893 // capabilities. Avoid duplicates so that it is easier to read what is
@@ -915,16 +915,16 @@ shaka.media.DrmEngine.prototype.queryMediaKeys_ = function(configsByKeySystem) {
915915 configsByKeySystem . get ( mediaKeySystemAccess . keySystem ) ) ;
916916
917917 if ( ! this . currentDrmInfo_ . licenseServerUri ) {
918- return Promise . reject ( new shaka . util . Error (
918+ throw new shaka . util . Error (
919919 shaka . util . Error . Severity . CRITICAL ,
920920 shaka . util . Error . Category . DRM ,
921921 shaka . util . Error . Code . NO_LICENSE_SERVER_GIVEN ,
922- this . currentDrmInfo_ . keySystem ) ) ;
922+ this . currentDrmInfo_ . keySystem ) ;
923923 }
924924
925925 return mediaKeySystemAccess . createMediaKeys ( ) ;
926926 } ) . then ( ( mediaKeys ) => {
927- if ( this . isDestroying_ ) { return Promise . reject ( ) ; }
927+ if ( this . isDestroying_ ) { return ; }
928928 shaka . log . info ( 'Created MediaKeys object for key system' ,
929929 this . currentDrmInfo_ . keySystem ) ;
930930
@@ -937,15 +937,15 @@ shaka.media.DrmEngine.prototype.queryMediaKeys_ = function(configsByKeySystem) {
937937 this . currentDrmInfo_ = null ;
938938 this . supportedTypes_ . clear ( ) ;
939939 if ( exception instanceof shaka . util . Error ) {
940- return Promise . reject ( exception ) ;
940+ throw exception ;
941941 }
942942
943943 // We failed to create MediaKeys. This generally shouldn't happen.
944- return Promise . reject ( new shaka . util . Error (
944+ throw new shaka . util . Error (
945945 shaka . util . Error . Severity . CRITICAL ,
946946 shaka . util . Error . Category . DRM ,
947947 shaka . util . Error . Code . FAILED_TO_CREATE_CDM ,
948- exception . message ) ) ;
948+ exception . message ) ;
949949 } ) ;
950950
951951 instigator . reject ( ) ;
@@ -1041,7 +1041,7 @@ shaka.media.DrmEngine.prototype.loadOfflineSession_ = function(sessionId) {
10411041 this . activeSessions_ . set ( session , metadata ) ;
10421042
10431043 return session . load ( sessionId ) . then ( ( present ) => {
1044- if ( this . isDestroying_ ) { return Promise . reject ( ) ; }
1044+ if ( this . isDestroying_ ) { return null ; }
10451045 shaka . log . v2 ( 'Loaded offline session' , sessionId , present ) ;
10461046
10471047 if ( ! present ) {
@@ -1051,7 +1051,7 @@ shaka.media.DrmEngine.prototype.loadOfflineSession_ = function(sessionId) {
10511051 shaka . util . Error . Severity . CRITICAL ,
10521052 shaka . util . Error . Category . DRM ,
10531053 shaka . util . Error . Code . OFFLINE_SESSION_REMOVED ) ) ;
1054- return ;
1054+ return null ;
10551055 }
10561056
10571057 // TODO: We should get a key status change event. Remove once Chrome CDM
0 commit comments