Skip to content

test: remove y22 versions (#273) #1430

test: remove y22 versions (#273)

test: remove y22 versions (#273) #1430

Triggered via push January 15, 2025 12:11
Status Success
Total duration 47s
Artifacts

infection.yml

on: push
Infection
41s
Infection
Fit to window
Zoom out
Zoom in

Annotations

7 warnings
Infection
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
Infection: src/Client/Http/RequestFactory.php#L112
Escaped Mutant for Mutator "ConcatOperandRemoval": @@ @@ } try { $body = new MultipartStream($streamElements); - $request = $request->withBody($body)->withHeader('Content-Type', 'multipart/form-data; boundary=' . $body->getBoundary()); + $request = $request->withBody($body)->withHeader('Content-Type', 'multipart/form-data; boundary='); } catch (InvalidArgumentException) { absurd(); }
Infection: src/Client/PsrClickHouseClient.php#L62
Escaped Mutant for Mutator "MethodCallRemoval": @@ @@ } public function executeQueryWithParams(string $query, array $params, array $settings = []): void { - $this->executeRequest($this->sqlFactory->createWithParameters($query, $params), params: $params, settings: $settings); + } public function select(string $query, Format $outputFormat, array $settings = []): Output {
Infection: src/Exception/ServerError.php#L20
Escaped Mutant for Mutator "PregMatchRemoveCaret": @@ @@ public static function fromResponse(ResponseInterface $response): self { $bodyContent = $response->getBody()->__toString(); - return new self($bodyContent, code: preg_match('~^Code: (\d+). DB::Exception:~', $bodyContent, $matches) === 1 ? (int) $matches[1] : 0); + return new self($bodyContent, code: preg_match('~Code: (\d+). DB::Exception:~', $bodyContent, $matches) === 1 ? (int) $matches[1] : 0); } }
Infection: src/Exception/ServerError.php#L20
Escaped Mutant for Mutator "IncrementInteger": @@ @@ public static function fromResponse(ResponseInterface $response): self { $bodyContent = $response->getBody()->__toString(); - return new self($bodyContent, code: preg_match('~^Code: (\d+). DB::Exception:~', $bodyContent, $matches) === 1 ? (int) $matches[1] : 0); + return new self($bodyContent, code: preg_match('~^Code: (\d+). DB::Exception:~', $bodyContent, $matches) === 1 ? (int) $matches[1] : 1); } }
Infection: src/Snippet/DatabaseSize.php#L34
Escaped Mutant for Mutator "Coalesce": @@ @@ SELECT sum(bytes) AS size FROM system.parts WHERE active AND database=:database - CLICKHOUSE, ['database' => $databaseName ?? Expression::new('currentDatabase()')], $format); + CLICKHOUSE, ['database' => Expression::new('currentDatabase()') ?? $databaseName], $format); return (int) $currentDatabase->data[0]['size']; } }
Infection: src/Sql/ValueFormatter.php#L103
Escaped Mutant for Mutator "UnwrapArrayMap": @@ @@ $firstValue = $value[array_key_first($value)]; $mapper = is_array($firstValue) ? function ($value): string { assert(is_array($value)); - return sprintf('(%s)', implode(',', array_map(fn($val) => $this->format($val), $value))); + return sprintf('(%s)', implode(',', $value)); } : fn($value): string => $value === null ? 'NULL' : $this->format($value); return implode(',', array_map($mapper, $value)); }