New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
dart2js: improve deobfuscation of minified stack traces #24168
Comments
Dropping to p3 to reflect no active work in the next few months. We should revisit later this year. |
Actually most of this work is now complete. The main missing item is to improve documentation for customers interested in the new features. Internally this is integrated with our build systems. External users need to use some of the deobfuscation tools we provide to take advantage of the inlining frame data. |
There is very little documentation at the moment, but if there is interest we can put something together and clean up some of the tools to make them available more easily. We have a set of tools under https://github.com/dart-lang/sdk/tree/master/pkg/dart2js_tools/ that help with debugging production stack traces. Given the source-map file we generate in dart2js, you can take an exception collected at runtime, and run it to the |
Thanks @sigmundch! @robbecker-wf is also a good point of contact for my team. We're not sure who is going to dig into this yet, but we'll follow up sometime next week. I imagine we'll take a stab at what you've linked us and see how far we get, but we're definitely interested in solidifying our story around this so any additional documentation in this area would be greatly appreciated! |
Maybe @yuanmwang-wf is interested as well. I believe he worked on a sourcemapper internal tool for us. |
Upcoming tasks to improve deobfuscation:
x_org_dartlang_dart2js
function
tokens do hold the enclosing function name.The text was updated successfully, but these errors were encountered: