Skip to content

chore(deps): update codecov/codecov-action action to v5 (#270) #1424

chore(deps): update codecov/codecov-action action to v5 (#270)

chore(deps): update codecov/codecov-action action to v5 (#270) #1424

Triggered via push November 14, 2024 18:07
Status Success
Total duration 2m 0s
Artifacts

infection.yml

on: push
Infection
45s
Infection
Fit to window
Zoom out
Zoom in

Annotations

5 warnings
Infection: src/Client/Http/RequestFactory.php#L39
Escaped Mutant for Mutator "Identical": @@ @@ /** @throws InvalidArgumentException */ public function __construct(private ParamValueConverterRegistry $paramValueConverterRegistry, private RequestFactoryInterface $requestFactory, private StreamFactoryInterface $streamFactory, UriFactoryInterface|null $uriFactory = null, UriInterface|string $uri = '') { - if ($uriFactory === null && $uri === '') { + if ($uriFactory !== null && $uri === '') { $uri = null; } elseif (is_string($uri)) { if ($uriFactory === null) {
Infection: src/Client/Http/RequestFactory.php#L105
Escaped Mutant for Mutator "FalseValue": @@ @@ if ($type === null) { continue; } - $streamElements[] = ['name' => 'param_' . $name, 'contents' => $this->paramValueConverterRegistry->get($type)($value, $type, false)]; + $streamElements[] = ['name' => 'param_' . $name, 'contents' => $this->paramValueConverterRegistry->get($type)($value, $type, true)]; } try { $body = new MultipartStream($streamElements);
Infection: src/Client/PsrClickHouseClient.php#L62
Escaped Mutant for Mutator "MethodCallRemoval": @@ @@ } public function executeQueryWithParams(string $query, array $params, array $settings = []): void { - $this->executeRequest($this->sqlFactory->createWithParameters($query, $params), params: $params, settings: $settings); + } public function select(string $query, Format $outputFormat, array $settings = []): Output {
Infection: src/Exception/ServerError.php#L20
Escaped Mutant for Mutator "PregMatchRemoveCaret": @@ @@ public static function fromResponse(ResponseInterface $response): self { $bodyContent = $response->getBody()->__toString(); - return new self($bodyContent, code: preg_match('~^Code: (\d+). DB::Exception:~', $bodyContent, $matches) === 1 ? (int) $matches[1] : 0); + return new self($bodyContent, code: preg_match('~Code: (\d+). DB::Exception:~', $bodyContent, $matches) === 1 ? (int) $matches[1] : 0); } }
Infection: src/Sql/ValueFormatter.php#L103
Escaped Mutant for Mutator "UnwrapArrayMap": @@ @@ $firstValue = $value[array_key_first($value)]; $mapper = is_array($firstValue) ? function ($value): string { assert(is_array($value)); - return sprintf('(%s)', implode(',', array_map(fn($val) => $this->format($val), $value))); + return sprintf('(%s)', implode(',', $value)); } : fn($value): string => $value === null ? 'NULL' : $this->format($value); return implode(',', array_map($mapper, $value)); }