Improve debugging experience for minified / obfuscated code #5529
bhackett1024
started this conversation in
General
Replies: 1 comment
-
Moving this to a discussion and including some more folks Curious @Narendrasss + @geoffreylitt if you have thoughts on this For me, providing a simple way to edit minified variables would be useful. For instance, changing |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
This is a low priority wishlist type feature, but it can be hard at times to understand what code is executing when it has been minified and/or obfuscated.
For example, the recording below is one I made of yarn, to see why
yarn jest
worked in a package that did not include jest as a script in its package.json. The version of yarn I'm using has minified source, and while I was able to find the place where it spawned the subprocess and passed in the "jest" script to run, figuring out where that script path came from eventually led to a wad of&&
and,
andawait
expressions chained together, and I gave up. It would be really neat to pick apart the control flow here and understand what this code is doing.https://app.replay.io/recording/replay-of-yarn-311cjs--53cbe7d6-f6d2-4a96-9d73-64373082b18f?point=1947111326353493799816159821825554&time=2133.3545232273837&hasFrames=true#
Beta Was this translation helpful? Give feedback.
All reactions