-
-
Notifications
You must be signed in to change notification settings - Fork 562
feat(codegen): expose with_source_text
function
#10768
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(codegen): expose with_source_text
function
#10768
Conversation
How to use the Graphite Merge QueueAdd either label to this PR to merge it via the merge queue:
You must have a Graphite account in order to use the merge queue. Sign up using this link. An organization admin has enabled the Graphite Merge Queue in this repository. Please do not merge from GitHub as this will restart CI on PRs being processed by the merge queue. This stack of pull requests is managed by Graphite. Learn more about stacking. |
WalkthroughA new public method 📜 Recent review detailsConfiguration used: CodeRabbit UI 📒 Files selected for processing (1)
🚧 Files skipped from review as they are similar to previous changes (1)
⏰ Context from checks skipped due to timeout of 90000ms (15)
✨ Finishing Touches
🪧 TipsChatThere are 3 ways to chat with CodeRabbit:
SupportNeed help? Create a ticket on our support page for assistance with any issues or questions. Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments. CodeRabbit Commands (Invoked using PR comments)
Other keywords and placeholders
CodeRabbit Configuration File (
|
CodSpeed Instrumentation Performance ReportMerging #10768 will not alter performanceComparing Summary
|
fece43f
to
3eb558b
Compare
Merge activity
|
<
8000
a title="feat(codegen): expose `with_source_text` function (#10768)
it is unsafe to call `print_expression` as the source text may be empty. in this case, the end user would experience panics when printing certain expressions, as it requires referencing the source text" data-pjax="true" class="Link--secondary markdown-title" href="/oxc-project/oxc/pull/10768/commits/2d13b49216df62dff35bc88e6fd4c1d81134506d">feat(codegen): expose with_source_text
function (#10768)
it is unsafe to call `print_expression` as the source text may be empty. in this case, the end user would experience panics when printing certain expressions, as it requires referencing the source text
3eb558b
to
2d13b49
Compare
it is unsafe to call
print_expression
as the source text may be empty. in this case, the end user would experience panics when printing certain expressions, as it requires referencing the source text