Skip to content

Add EdDSA signature verification step to detect and avoid outputting faulty signatures #32

Add EdDSA signature verification step to detect and avoid outputting faulty signatures

Add EdDSA signature verification step to detect and avoid outputting faulty signatures #32

Triggered via pull request November 23, 2023 12:41
Status Failure
Total duration 3m 8s
Artifacts

benchmark.yml

on: pull_request
Time and memory usage benchmark
2m 56s
Time and memory usage benchmark
Fit to window
Zoom out
Zoom in

Annotations

3 errors
Time benchmark (attempt #1): performance regression detected for test 'openpgp.generateKey': test/benchmarks/time.js#L1
Previous value was 84.85 and current value is 28.34. It is 2.994001411432604x worse, exceeding the failure threshold of 1.50.
Time benchmark (attempt #1): performance regression detected for test 'openpgp.sign': test/benchmarks/time.js#L1
Previous value was 284 and current value is 109. It is 2.6055045871559632x worse, exceeding the failure threshold of 1.50.
Time and memory usage benchmark
2 of 2 alerts exceeded the failure threshold `1.50` specified by fail-threshold input: # **Performance Alert** Possible performance regression was detected for benchmark **'Time benchmark'**. Benchmark result of this commit is worse than the previous benchmark result exceeding threshold `1.30`. | Benchmark suite | Current: 7c3cf989c3b479cd51dc54deeaf0aceee168e517 | Previous: 743217216c654bb9ab961fec2e42fe20b153f5b5 | Ratio | |-|-|-|-| | `openpgp.generateKey` | `28.34` ops/sec (`±3.08%`) | `84.85` ops/sec (`±1.92%`) | `2.99` | | `openpgp.sign` | `109` ops/sec (`±3.47%`) | `284` ops/sec (`±3.18%`) | `2.61` | This comment was automatically generated by [workflow](https://github.com/ProtonMail/openpgpjs/actions?query=workflow%3APerformance%20Regression%20Test).