-
Notifications
You must be signed in to change notification settings - Fork 2
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
chore: Cleanup bundle analyzer for release (#173)
- Loading branch information
1 parent
a251183
commit 8bdad73
Showing
30 changed files
with
280 additions
and
180 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,3 @@ | ||
# Bundle Analyzer CLI Example | ||
|
||
This directory includes an example calling the Codecov CLI for bundle analysis using the bundle-analyzer. |
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
33 changes: 33 additions & 0 deletions
33
examples/bundle-analyzer-lib-cjs/example-dist/assets/index-1dca144e.js
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,33 @@ | ||
(function () { | ||
const t = document.createElement("link").relList; | ||
if (t && t.supports && t.supports("modulepreload")) return; | ||
for (const e of document.querySelectorAll('link[rel="modulepreload"]')) i(e); | ||
new MutationObserver((e) => { | ||
for (const r of e) | ||
if (r.type === "childList") | ||
for (const o of r.addedNodes) | ||
o.tagName === "LINK" && o.rel === "modulepreload" && i(o); | ||
}).observe(document, { childList: !0, subtree: !0 }); | ||
function n(e) { | ||
const r = {}; | ||
return ( | ||
e.integrity && (r.integrity = e.integrity), | ||
e.referrerPolicy && (r.referrerPolicy = e.referrerPolicy), | ||
e.crossOrigin === "use-credentials" | ||
? (r.credentials = "include") | ||
: e.crossOrigin === "anonymous" | ||
? (r.credentials = "omit") | ||
: (r.credentials = "same-origin"), | ||
r | ||
); | ||
} | ||
function i(e) { | ||
if (e.ep) return; | ||
e.ep = !0; | ||
const r = n(e); | ||
fetch(e.href, r); | ||
} | ||
})(); | ||
document.querySelector("#app").innerHTML = ` | ||
Hello ${{}.VITE_HELLO}. | ||
`; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,14 @@ | ||
<!doctype html> | ||
<html lang="en"> | ||
<head> | ||
<meta charset="UTF-8" /> | ||
<link rel="icon" type="image/svg+xml" href="/vite.svg" /> | ||
<meta name="viewport" content="width=device-width, initial-scale=1.0" /> | ||
<title>Vite + TS</title> | ||
<script type="module" crossorigin src="/assets/index-1dca144e.js"></script> | ||
</head> | ||
<body> | ||
<div id="app"></div> | ||
|
||
</body> | ||
</html> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,5 @@ | ||
# Bundle Analyzer Library Import (ESM) Example | ||
|
||
This directory includes an example calling the bundle-analyzer exported library for bundle analysis. | ||
|
||
This example runs in an ESM environment. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
33 changes: 33 additions & 0 deletions
33
examples/bundle-analyzer-lib-esm/example-dist/assets/index-1dca144e.js
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,33 @@ | ||
(function () { | ||
const t = document.createElement("link").relList; | ||
if (t && t.supports && t.supports("modulepreload")) return; | ||
for (const e of document.querySelectorAll('link[rel="modulepreload"]')) i(e); | ||
new MutationObserver((e) => { | ||
for (const r of e) | ||
if (r.type === "childList") | ||
for (const o of r.addedNodes) | ||
o.tagName === "LINK" && o.rel === "modulepreload" && i(o); | ||
}).observe(document, { childList: !0, subtree: !0 }); | ||
function n(e) { | ||
const r = {}; | ||
return ( | ||
e.integrity && (r.integrity = e.integrity), | ||
e.referrerPolicy && (r.referrerPolicy = e.referrerPolicy), | ||
e.crossOrigin === "use-credentials" | ||
? (r.credentials = "include") | ||
: e.crossOrigin === "anonymous" | ||
? (r.credentials = "omit") | ||
: (r.credentials = "same-origin"), | ||
r | ||
); | ||
} | ||
function i(e) { | ||
if (e.ep) return; | ||
e.ep = !0; | ||
const r = n(e); | ||
fetch(e.href, r); | ||
} | ||
})(); | ||
document.querySelector("#app").innerHTML = ` | ||
Hello ${{}.VITE_HELLO}. | ||
`; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,14 @@ | ||
<!doctype html> | ||
<html lang="en"> | ||
<head> | ||
<meta charset="UTF-8" /> | ||
<link rel="icon" type="image/svg+xml" href="/vite.svg" /> | ||
<meta name="viewport" content="width=device-width, initial-scale=1.0" /> | ||
<title>Vite + TS</title> | ||
<script type="module" crossorigin src="/assets/index-1dca144e.js"></script> | ||
</head> | ||
<body> | ||
<div id="app"></div> | ||
|
||
</body> | ||
</html> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file was deleted.
Oops, something went wrong.
This file was deleted.
Oops, something went wrong.
This file was deleted.
Oops, something went wrong.
Oops, something went wrong.