Per-command dependency injection #2079
Annotations
6 warnings
Run Infection for added files only:
src/Command/CommandBase.php#L1500
Escaped Mutant for Mutator "ProtectedVisibility":
--- Original
+++ New
@@ @@
$this->logger->notice('Drush does not have an active database connection. Skipping cache:rebuild');
}
}
- protected function runDrushSqlSanitize(Closure $outputCallback, Checklist $checklist) : void
+ private function runDrushSqlSanitize(Closure $outputCallback, Checklist $checklist) : void
{
if ($this->getDrushDatabaseConnectionStatus()) {
$checklist->addItem('Sanitizing database via Drush');
|
Run Infection for added files only:
src/Command/CommandBase.php#L1502
Escaped Mutant for Mutator "MethodCallRemoval":
--- Original
+++ New
@@ @@
protected function runDrushSqlSanitize(Closure $outputCallback, Checklist $checklist) : void
{
if ($this->getDrushDatabaseConnectionStatus()) {
- $checklist->addItem('Sanitizing database via Drush');
+
$process = $this->localMachineHelper->execute(['drush', 'sql:sanitize', '--yes', '--no-interaction', '--verbose'], $outputCallback, $this->dir, FALSE);
if (!$process->isSuccessful()) {
throw new AcquiaCliException('Unable to sanitize Drupal database via Drush. {message}', ['message' => $process->getErrorOutput()]);
|
Run Infection for added files only:
src/Command/CommandBase.php#L1513
Escaped Mutant for Mutator "MethodCallRemoval":
--- Original
+++ New
@@ @@
if (!$process->isSuccessful()) {
throw new AcquiaCliException('Unable to sanitize Drupal database via Drush. {message}', ['message' => $process->getErrorOutput()]);
}
- $checklist->completePreviousItem();
+
$this->io->newLine();
$this->io->text('Your database was sanitized via <options=bold>drush sql:sanitize</>. This has changed all user passwords to randomly generated strings. To log in to your Drupal site, use <options=bold>drush uli</>');
} else {
|
Run Infection for added files only:
src/Command/CommandBase.php#L1514
Escaped Mutant for Mutator "MethodCallRemoval":
--- Original
+++ New
@@ @@
throw new AcquiaCliException('Unable to sanitize Drupal database via Drush. {message}', ['message' => $process->getErrorOutput()]);
}
$checklist->completePreviousItem();
- $this->io->newLine();
+
$this->io->text('Your database was sanitized via <options=bold>drush sql:sanitize</>. This has changed all user passwords to randomly generated strings. To log in to your Drupal site, use <options=bold>drush uli</>');
} else {
$this->logger->notice('Drush does not have an active database connection. Skipping sql:sanitize.');
|
Run Infection for added files only:
src/Command/CommandBase.php#L1515
Escaped Mutant for Mutator "MethodCallRemoval":
--- Original
+++ New
@@ @@
}
$checklist->completePreviousItem();
$this->io->newLine();
- $this->io->text('Your database was sanitized via <options=bold>drush sql:sanitize</>. This has changed all user passwords to randomly generated strings. To log in to your Drupal site, use <options=bold>drush uli</>');
+
} else {
$this->logger->notice('Drush does not have an active database connection. Skipping sql:sanitize.');
}
|
Run Infection for added files only:
src/Command/Pull/PullFilesCommand.php#L26
Escaped Mutant for Mutator "TrueValue":
--- Original
+++ New
@@ @@
{
parent::execute($input, $output);
$this->setDirAndRequireProjectCwd($input);
- $sourceEnvironment = $this->determineEnvironment($input, $output, TRUE);
+ $sourceEnvironment = $this->determineEnvironment($input, $output, false);
$this->pullFiles($input, $output, $sourceEnvironment);
return Command::SUCCESS;
}
}
|
The logs for this run have expired and are no longer available.
Loading