Uh oh!
There was an error while loading.Please reload this page.
- Notifications
You must be signed in to change notification settings - Fork1.3k
perf(es/minifier): Limit infection analysis by the entry size#10006
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to ourterms of service andprivacy statement. We’ll occasionally send you account related emails.
Already on GitHub?Sign in to your account
Uh oh!
There was an error while loading.Please reload this page.
Conversation
changeset-botbot commentedFeb 6, 2025 • edited
Loading Uh oh!
There was an error while loading.Please reload this page.
edited
Uh oh!
There was an error while loading.Please reload this page.
🦋 Changeset detectedLatest commit:42557a0 The changes in this PR will be included in the next version bump. Not sure what this means?Click here to learn what changesets are. Click here if you're a maintainer who wants to add another changeset to this PR |
1a3a4b9
intoswc-project:mainUh oh!
There was an error while loading.Please reload this page.
codspeed-hqbot commentedFeb 7, 2025 • edited
Loading Uh oh!
There was an error while loading.Please reload this page.
edited
Uh oh!
There was an error while loading.Please reload this page.
CodSpeed Performance ReportMerging#10006 willimprove performances by 7.91%Comparing Summary
Benchmarks breakdown
|
Description:
In most real-world inputs, many infected identifiers typically mean we can't optimize it anyway. Because of the variable usage analysis result of the infected variable, we can't do any optimization to the original variable in most cases. So this PR stops the infection analyzer at a specific threshold.
Related issue:
es/minifier
: Infection collector should have skipping logic based on the size of hash map #10000