Skip to content

fix: allow int value as DateTime param (#289) #1487

fix: allow int value as DateTime param (#289)

fix: allow int value as DateTime param (#289) #1487

Triggered via push January 29, 2025 11:25
Status Success
Total duration 2m 5s
Artifacts

infection.yml

on: push
Fit to window
Zoom out
Zoom in

Annotations

10 warnings
Infection: src/Client/Http/RequestFactory.php#L39
Escaped Mutant for Mutator "LogicalAnd": @@ @@ /** @throws InvalidArgumentException */ public function __construct(private ParamValueConverterRegistry $paramValueConverterRegistry, private RequestFactoryInterface $requestFactory, private StreamFactoryInterface $streamFactory, UriFactoryInterface|null $uriFactory = null, UriInterface|string $uri = '') { - if ($uriFactory === null && $uri === '') { + if ($uriFactory === null || $uri === '') { $uri = null; } elseif (is_string($uri)) { if ($uriFactory === null) {
Infection: src/Client/Http/RequestFactory.php#L65
Escaped Mutant for Mutator "Identical": @@ @@ { $query = http_build_query($requestSettings->settings + $additionalOptions, '', '&', PHP_QUERY_RFC3986); if ($this->uri === null) { - $uri = $query === '' ? '' : '?' . $query; + $uri = $query !== '' ? '' : '?' . $query; } else { $uriQuery = $this->uri->getQuery(); try {
Infection: src/Client/Http/RequestFactory.php#L65
Escaped Mutant for Mutator "Concat": @@ @@ { $query = http_build_query($requestSettings->settings + $additionalOptions, '', '&', PHP_QUERY_RFC3986); if ($this->uri === null) { - $uri = $query === '' ? '' : '?' . $query; + $uri = $query === '' ? '' : $query . '?'; } else { $uriQuery = $this->uri->getQuery(); try {
Infection: src/Client/Http/RequestFactory.php#L65
Escaped Mutant for Mutator "ConcatOperandRemoval": @@ @@ { $query = http_build_query($requestSettings->settings + $additionalOptions, '', '&', PHP_QUERY_RFC3986); if ($this->uri === null) { - $uri = $query === '' ? '' : '?' . $query; + $uri = $query === '' ? '' : $query; } else { $uriQuery = $this->uri->getQuery(); try {
Infection: src/Client/Http/RequestFactory.php#L65
Escaped Mutant for Mutator "ConcatOperandRemoval": @@ @@ { $query = http_build_query($requestSettings->settings + $additionalOptions, '', '&', PHP_QUERY_RFC3986); if ($this->uri === null) { - $uri = $query === '' ? '' : '?' . $query; + $uri = $query === '' ? '' : '?'; } else { $uriQuery = $this->uri->getQuery(); try {
Infection: src/Client/Http/RequestFactory.php#L65
Escaped Mutant for Mutator "Ternary": @@ @@ { $query = http_build_query($requestSettings->settings + $additionalOptions, '', '&', PHP_QUERY_RFC3986); if ($this->uri === null) { - $uri = $query === '' ? '' : '?' . $query; + $uri = $query === '' ? '?' . $query : ''; } else { $uriQuery = $this->uri->getQuery(); try {
Infection: src/Client/Http/RequestFactory.php#L98
Escaped Mutant for Mutator "IncrementInteger": @@ @@ } } /** @var array<string, Type> $paramToType */ - $paramToType = array_reduce(array_keys($matches[1]), static function (array $acc, string|int $k) use ($matches) { + $paramToType = array_reduce(array_keys($matches[2]), static function (array $acc, string|int $k) use ($matches) { $acc[$matches[1][$k]] = Type::fromString($matches[2][$k]); return $acc; }, []);
Infection: src/Client/Http/RequestFactory.php#L116
Escaped Mutant for Mutator "FalseValue": @@ @@ if ($type === null) { continue; } - $streamElements[] = ['name' => 'param_' . $name, 'contents' => $this->paramValueConverterRegistry->get($type)($value, $type, false)]; + $streamElements[] = ['name' => 'param_' . $name, 'contents' => $this->paramValueConverterRegistry->get($type)($value, $type, true)]; } try { $body = new MultipartStream($streamElements);
Infection: src/Client/Http/RequestFactory.php#L123
Escaped Mutant for Mutator "ConcatOperandRemoval": @@ @@ } try { $body = new MultipartStream($streamElements); - $request = $request->withBody($body)->withHeader('Content-Type', 'multipart/form-data; boundary=' . $body->getBoundary()); + $request = $request->withBody($body)->withHeader('Content-Type', 'multipart/form-data; boundary='); } catch (InvalidArgumentException) { absurd(); }
Infection: src/Client/PsrClickHouseAsyncClient.php#L122
Escaped Mutant for Mutator "NullSafeMethodCall": @@ @@ return $response; } return $processResponse($response); - }, fn() => $this->sqlLogger?->stopQuery($id)); + }, fn() => $this->sqlLogger->stopQuery($id)); } }