Skip to content

test: fix flaky test with new date #1474

test: fix flaky test with new date

test: fix flaky test with new date #1474

Triggered via pull request January 27, 2025 14:44
@simPodsimPod
synchronize #285
flaky
Status Success
Total duration 1m 0s
Artifacts

infection.yml

on: pull_request
Infection
52s
Infection
Fit to window
Zoom out
Zoom in

Annotations

11 warnings
Infection
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
Infection: src/Client/Http/RequestFactory.php#L65
Escaped Mutant for Mutator "Identical": @@ @@ { $query = http_build_query($requestSettings->settings + $additionalOptions, '', '&', PHP_QUERY_RFC3986); if ($this->uri === null) { - $uri = $query === '' ? '' : '?' . $query; + $uri = $query !== '' ? '' : '?' . $query; } else { $uriQuery = $this->uri->getQuery(); try {
Infection: src/Client/Http/RequestFactory.php#L65
Escaped Mutant for Mutator "Concat": @@ @@ { $query = http_build_query($requestSettings->settings + $additionalOptions, '', '&', PHP_QUERY_RFC3986); if ($this->uri === null) { - $uri = $query === '' ? '' : '?' . $query; + $uri = $query === '' ? '' : $query . '?'; } else { $uriQuery = $this->uri->getQuery(); try {
Infection: src/Client/Http/RequestFactory.php#L65
Escaped Mutant for Mutator "ConcatOperandRemoval": @@ @@ { $query = http_build_query($requestSettings->settings + $additionalOptions, '', '&', PHP_QUERY_RFC3986); if ($this->uri === null) { - $uri = $query === '' ? '' : '?' . $query; + $uri = $query === '' ? '' : $query; } else { $uriQuery = $this->uri->getQuery(); try {
Infection: src/Client/Http/RequestFactory.php#L65
Escaped Mutant for Mutator "ConcatOperandRemoval": @@ @@ { $query = http_build_query($requestSettings->settings + $additionalOptions, '', '&', PHP_QUERY_RFC3986); if ($this->uri === null) { - $uri = $query === '' ? '' : '?' . $query; + $uri = $query === '' ? '' : '?'; } else { $uriQuery = $this->uri->getQuery(); try {
Infection: src/Client/Http/RequestFactory.php#L65
Escaped Mutant for Mutator "Ternary": @@ @@ { $query = http_build_query($requestSettings->settings + $additionalOptions, '', '&', PHP_QUERY_RFC3986); if ($this->uri === null) { - $uri = $query === '' ? '' : '?' . $query; + $uri = $query === '' ? '?' . $query : ''; } else { $uriQuery = $this->uri->getQuery(); try {
Infection: src/Client/Http/RequestFactory.php#L98
Escaped Mutant for Mutator "IncrementInteger": @@ @@ } } /** @var array<string, Type> $paramToType */ - $paramToType = array_reduce(array_keys($matches[1]), static function (array $acc, string|int $k) use ($matches) { + $paramToType = array_reduce(array_keys($matches[2]), static function (array $acc, string|int $k) use ($matches) { $acc[$matches[1][$k]] = Type::fromString($matches[2][$k]); return $acc; }, []);
Infection: src/Client/Http/RequestFactory.php#L116
Escaped Mutant for Mutator "FalseValue": @@ @@ if ($type === null) { continue; } - $streamElements[] = ['name' => 'param_' . $name, 'contents' => $this->paramValueConverterRegistry->get($type)($value, $type, false)]; + $streamElements[] = ['name' => 'param_' . $name, 'contents' => $this->paramValueConverterRegistry->get($type)($value, $type, true)]; } try { $body = new MultipartStream($streamElements);
Infection: src/Client/PsrClickHouseAsyncClient.php#L122
Escaped Mutant for Mutator "NullSafeMethodCall": @@ @@ return $response; } return $processResponse($response); - }, fn() => $this->sqlLogger?->stopQuery($id)); + }, fn() => $this->sqlLogger->stopQuery($id)); } }
Infection: src/Client/PsrClickHouseClient.php#L69
Escaped Mutant for Mutator "MethodCallRemoval": @@ @@ } public function executeQueryWithParams(string $query, array $params, array $settings = []): void { - $this->executeRequest($this->sqlFactory->createWithParameters($query, $params), params: $params, settings: $settings); + } public function select(string $query, Format $outputFormat, array $settings = []): Output {
Infection: src/Exception/ServerError.php#L20
Escaped Mutant for Mutator "DecrementInteger": @@ @@ public static function fromResponse(ResponseInterface $response): self { $bodyContent = $response->getBody()->__toString(); - return new self($bodyContent, code: preg_match('~^Code: (\d+). DB::Exception:~', $bodyContent, $matches) === 1 ? (int) $matches[1] : 0); + return new self($bodyContent, code: preg_match('~^Code: (\d+). DB::Exception:~', $bodyContent, $matches) === 1 ? (int) $matches[1] : -1); } }