[RELASE] Crawler version 11.0.11 #1622
Annotations
12 warnings
Your workflow is using a version of actions/cache that is scheduled for deprecation, actions/cache@v2. Please update your workflow to use either v3 or v4 of actions/cache to avoid interruptions. Learn more: https://github.blog/changelog/2024-12-05-notice-of-upcoming-releases-and-breaking-changes-for-github-actions/#actions-cache-v1-v2-and-actions-toolkit-cache-package-closing-down
|
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
|
Infection:
Classes/CrawlStrategy/GuzzleExecutionStrategy.php#L47
Escaped Mutant for Mutator "ArrayItemRemoval":
--- Original
+++ New
@@ @@
public function fetchUrlContents(UriInterface $url, string $crawlerId)
{
$reqHeaders = $this->buildRequestHeaders($crawlerId);
- $options = ['headers' => $reqHeaders];
+ $options = [];
if ($url->getUserInfo()) {
$options['auth'] = explode(':', $url->getUserInfo());
}
|
Infection:
Classes/CrawlStrategy/GuzzleExecutionStrategy.php#L92
Escaped Mutant for Mutator "ArrayItemRemoval":
--- Original
+++ New
@@ @@
*/
private function buildRequestHeaders(string $crawlerId) : array
{
- return ['Connection' => 'close', 'X-T3Crawler' => $crawlerId, 'User-Agent' => 'TYPO3 crawler'];
+ return ['X-T3Crawler' => $crawlerId, 'User-Agent' => 'TYPO3 crawler'];
}
}
|
Infection:
Classes/CrawlStrategy/SubProcessExecutionStrategy.php#L49
Escaped Mutant for Mutator "Ternary":
--- Original
+++ New
@@ @@
{
$configurationProvider = $configurationProvider ?? GeneralUtility::makeInstance(ExtensionConfigurationProvider::class);
$settings = $configurationProvider->getExtensionConfiguration();
- $this->extensionSettings = is_array($settings) ? $settings : [];
+ $this->extensionSettings = is_array($settings) ? [] : $settings;
}
/**
* Fetches a URL by calling a shell script.
|
Infection:
Classes/CrawlStrategy/SubProcessExecutionStrategy.php#L62
Escaped Mutant for Mutator "FalseValue":
--- Original
+++ New
@@ @@
{
$url = (string) $url;
$parsedUrl = parse_url($url);
- if ($parsedUrl === false) {
+ if ($parsedUrl === true) {
$this->logger->debug(sprintf('Could not parse_url() for string "%s"', $url), ['crawlerId' => $crawlerId]);
return false;
}
|
Infection:
Classes/CrawlStrategy/SubProcessExecutionStrategy.php#L70
Escaped Mutant for Mutator "LogicalNot":
--- Original
+++ New
@@ @@
$this->logger->debug(sprintf('Could not parse_url() for string "%s"', $url), ['crawlerId' => $crawlerId]);
return false;
}
- if (!isset($parsedUrl['scheme']) || !in_array($parsedUrl['scheme'], ['', 'http', 'https'], true)) {
+ if (isset($parsedUrl['scheme']) || !in_array($parsedUrl['scheme'], ['', 'http', 'https'], true)) {
$this->logger->debug(sprintf('Scheme does not match for url "%s"', $url), ['crawlerId' => $crawlerId]);
return false;
}
|
Infection:
Classes/CrawlStrategy/SubProcessExecutionStrategy.php#L70
Escaped Mutant for Mutator "ArrayItemRemoval":
--- Original
+++ New
@@ @@
$this->logger->debug(sprintf('Could not parse_url() for string "%s"', $url), ['crawlerId' => $crawlerId]);
return false;
}
- if (!isset($parsedUrl['scheme']) || !in_array($parsedUrl['scheme'], ['', 'http', 'https'], true)) {
+ if (!isset($parsedUrl['scheme']) || !in_array($parsedUrl['scheme'], ['http', 'https'], true)) {
$this->logger->debug(sprintf('Scheme does not match for url "%s"', $url), ['crawlerId' => $crawlerId]);
return false;
}
|
Infection:
Classes/CrawlStrategy/SubProcessExecutionStrategy.php#L70
Escaped Mutant for Mutator "LogicalNot":
--- Original
+++ New
@@ @@
$this->logger->debug(sprintf('Could not parse_url() for string "%s"', $url), ['crawlerId' => $crawlerId]);
return false;
}
- if (!isset($parsedUrl['scheme']) || !in_array($parsedUrl['scheme'], ['', 'http', 'https'], true)) {
+ if (!isset($parsedUrl['scheme']) || in_array($parsedUrl['scheme'], ['', 'http', 'https'], true)) {
$this->logger->debug(sprintf('Scheme does not match for url "%s"', $url), ['crawlerId' => $crawlerId]);
return false;
}
|
Infection:
Classes/CrawlStrategy/SubProcessExecutionStrategy.php#L70
Escaped Mutant for Mutator "LogicalOr":
--- Original
+++ New
@@ @@
$this->logger->debug(sprintf('Could not parse_url() for string "%s"', $url), ['crawlerId' => $crawlerId]);
return false;
}
- if (!isset($parsedUrl['scheme']) || !in_array($parsedUrl['scheme'], ['', 'http', 'https'], true)) {
+ if (!isset($parsedUrl['scheme']) && !in_array($parsedUrl['scheme'], ['', 'http', 'https'], true)) {
$this->logger->debug(sprintf('Scheme does not match for url "%s"', $url), ['crawlerId' => $crawlerId]);
return false;
}
|
Infection:
Classes/Crawler.php#L38
Escaped Mutant for Mutator "ConcatOperandRemoval":
--- Original
+++ New
@@ @@
private $processFilename;
public function __construct(?string $processFilename = null)
{
- $this->processFilename = $processFilename ?: Environment::getVarPath() . '/lock/tx_crawler.proc';
+ $this->processFilename = $processFilename ?: Environment::getVarPath();
$this->setDisabled(false);
$pathInfo = pathinfo($this->processFilename);
GeneralUtility::mkdir_deep($pathInfo['dirname']);
|
Infection:
Classes/Crawler.php#L38
Escaped Mutant for Mutator "ConcatOperandRemoval":
--- Original
+++ New
@@ @@
private $processFilename;
public function __construct(?string $processFilename = null)
{
- $this->processFilename = $processFilename ?: Environment::getVarPath() . '/lock/tx_crawler.proc';
+ $this->processFilename = $processFilename ?: '/lock/tx_crawler.proc';
$this->setDisabled(false);
$pathInfo = pathinfo($this->processFilename);
GeneralUtility::mkdir_deep($pathInfo['dirname']);
|
Loading