Update ekino/phpstan-banned-code requirement from ^1.0 to ^1.0 || ^2.… #67
infection.yml
on: push
0️⃣ Mutation Testing
6m 59s
Annotations
10 warnings
0️⃣ Mutation Testing:
src/Bundle/DependencyInjection/Compiler/AlgorithmCompilerPass.php#L19
Escaped Mutant for Mutator "LogicalNot":
@@ @@
#[Override]
public function process(ContainerBuilder $container): void
{
- if (!$container->hasDefinition(AlgorithmManagerFactory::class)) {
+ if ($container->hasDefinition(AlgorithmManagerFactory::class)) {
return;
}
$definition = $container->getDefinition(AlgorithmManagerFactory::class);
|
0️⃣ Mutation Testing:
src/Bundle/DependencyInjection/Compiler/AlgorithmCompilerPass.php#L26
Escaped Mutant for Mutator "Foreach_":
@@ @@
}
$definition = $container->getDefinition(AlgorithmManagerFactory::class);
$taggedAlgorithmServices = $container->findTaggedServiceIds('jose.algorithm');
- foreach ($taggedAlgorithmServices as $id => $tags) {
+ foreach ([] as $id => $tags) {
foreach ($tags as $attributes) {
if (!isset($attributes['alias'])) {
throw new InvalidArgumentException(sprintf('The algorithm "%s" does not have any "alias" attribute.', $id));
|
0️⃣ Mutation Testing:
src/Bundle/DependencyInjection/Compiler/AlgorithmCompilerPass.php#L27
Escaped Mutant for Mutator "Foreach_":
@@ @@
$definition = $container->getDefinition(AlgorithmManagerFactory::class);
$taggedAlgorithmServices = $container->findTaggedServiceIds('jose.algorithm');
foreach ($taggedAlgorithmServices as $id => $tags) {
- foreach ($tags as $attributes) {
+ foreach ([] as $attributes) {
if (!isset($attributes['alias'])) {
throw new InvalidArgumentException(sprintf('The algorithm "%s" does not have any "alias" attribute.', $id));
}
|
0️⃣ Mutation Testing:
src/Bundle/DependencyInjection/Source/Encryption/JWELoader.php#L43
Escaped Mutant for Mutator "MethodCallRemoval":
@@ @@
foreach ($itemConfig['tags'] as $id => $attributes) {
$definition->addTag($id, $attributes);
}
- $container->setDefinition($service_id, $definition);
+
$container->registerAliasForArgument($service_id, JWELoaderService::class, $name . 'JweLoader');
}
}
|
0️⃣ Mutation Testing:
src/Bundle/DependencyInjection/Source/Encryption/JWELoader.php#L44
Escaped Mutant for Mutator "Concat":
@@ @@
$definition->addTag($id, $attributes);
}
$container->setDefinition($service_id, $definition);
- $container->registerAliasForArgument($service_id, JWELoaderService::class, $name . 'JweLoader');
+ $container->registerAliasForArgument($service_id, JWELoaderService::class, 'JweLoader' . $name);
}
}
#[Override]
|
0️⃣ Mutation Testing:
src/Bundle/DependencyInjection/Source/Encryption/JWELoader.php#L44
Escaped Mutant for Mutator "ConcatOperandRemoval":
@@ @@
$definition->addTag($id, $attributes);
}
$container->setDefinition($service_id, $definition);
- $container->registerAliasForArgument($service_id, JWELoaderService::class, $name . 'JweLoader');
+ $container->registerAliasForArgument($service_id, JWELoaderService::class, 'JweLoader');
}
}
#[Override]
|
0️⃣ Mutation Testing:
src/Bundle/DependencyInjection/Source/Encryption/JWELoader.php#L44
Escaped Mutant for Mutator "ConcatOperandRemoval":
@@ @@
$definition->addTag($id, $attributes);
}
$container->setDefinition($service_id, $definition);
- $container->registerAliasForArgument($service_id, JWELoaderService::class, $name . 'JweLoader');
+ $container->registerAliasForArgument($service_id, JWELoaderService::class, $name);
}
}
#[Override]
|
0️⃣ Mutation Testing:
src/Bundle/DependencyInjection/Source/Encryption/JWELoader.php#L44
Escaped Mutant for Mutator "MethodCallRemoval":
@@ @@
$definition->addTag($id, $attributes);
}
$container->setDefinition($service_id, $definition);
- $container->registerAliasForArgument($service_id, JWELoaderService::class, $name . 'JweLoader');
+
}
}
#[Override]
|
0️⃣ Mutation Testing:
src/Bundle/DependencyInjection/Source/Encryption/JWELoader.php#L51
Escaped Mutant for Mutator "MethodCallRemoval":
@@ @@
#[Override]
public function getNodeDefinition(NodeDefinition $node): void
{
- $node->children()->arrayNode($this->name())->requiresAtLeastOneElement()->useAttributeAsKey('name')->arrayPrototype()->children()->booleanNode('is_public')->info('If true, the service will be public, else private.')->defaultTrue()->end()->arrayNode('encryption_algorithms')->info('A list of key encryption algorithm aliases.')->useAttributeAsKey('name')->isRequired()->scalarPrototype()->end()->end()->arrayNode('serializers')->info('A list of signature serializer aliases.')->useAttributeAsKey('name')->requiresAtLeastOneElement()->scalarPrototype()->end()->end()->arrayNode('header_checkers')->info('A list of header checker aliases.')->useAttributeAsKey('name')->treatNullLike([])->treatFalseLike([])->scalarPrototype()->end()->end()->arrayNode('tags')->info('A list of tags to be associated to the service.')->useAttributeAsKey('name')->treatNullLike([])->treatFalseLike([])->variablePrototype()->end()->end()->end()->end()->end()->end();
+
}
#[Override]
public function prepend(ContainerBuilder $container, array $config): array
|
0️⃣ Mutation Testing:
src/Bundle/DependencyInjection/Source/Encryption/JWESerializer.php#L27
Escaped Mutant for Mutator "Foreach_":
@@ @@
#[Override]
public function load(array $configs, ContainerBuilder $container): void
{
- foreach ($configs[$this->name()] as $name => $itemConfig) {
+ foreach ([] as $name => $itemConfig) {
$service_id = sprintf('jose.jwe_serializer.%s', $name);
$definition = new Definition(JWESerializerManager::class);
$definition->setFactory([new Reference(JWESerializerManagerFactory::class), 'create'])->setArguments([$itemConfig['serializers']])->addTag('jose.jwe_serializer_manager')->setPublic($itemConfig['is_public']);
|