Back
From: metabase:user:320bfe00-2aae-11df-837a-5e0a49663a4f
Subject: PASS FormValidator-LazyWay-0.20 v5.22.2 RC1 GNU/Linux
Date: 2016-04-22T20:57:21Z
This distribution has been tested as part of the CPAN Testers
project, supporting the Perl programming language. See
http://wiki.cpantesters.org/ for more information or email
questions to cpan-testers-discuss@perl.org
--
Dear Daisuke Komatsu,
This is a computer-generated report for FormValidator-LazyWay-0.20
on perl 5.22.2, created by CPAN-Reporter-1.2017.
Thank you for uploading your work to CPAN. Congratulations!
All tests were successful.
Sections of this report:
* Tester comments
* Program output
* Prerequisites
* Environment and other context
------------------------------
TESTER COMMENTS
------------------------------
Additional comments from tester:
this report is from an automated smoke testing program
and was not reviewed by a human for accuracy
------------------------------
PROGRAM OUTPUT
------------------------------
Output from '/usr/bin/make test':
PERL_DL_NONLAZY=1 "/tmp/basesmoker-reloperl-Gsi3/bin/perl" "-MExtUtils::Command::MM" "-MTest::Harness" "-e" "undef *Test::Harness::Switches; test_harness(0, 'inc', 'blib/lib', 'blib/arch')" t/01-login-sample.t t/02-regex_map.t t/03-inquery.t t/filter-at-regexp.t t/filter-encode.t t/filter-unify.t t/filter.t t/fix.t t/fixed-class-datetime.t t/fixed-class-uri.t t/input_value_0_is_not_false.t t/lazyway-check-conv-profile.t t/lazyway-check-dependencies.t t/lazyway-check-remove-empty-fields.t t/lazyway-check-required-fields.t t/lazyway-check-set-default.t t/lazyway-check-set-error-message.t t/lazyway-check-set-unknown.t t/lazyway-check-validation-block-append_error_message.t t/lazyway-check-validation-block-get-validator-method.t t/lazyway-new.t t/lazyway-result-class-overwrite.t t/lazyway-result-custom-invalid.t t/lazyway-result-fixed.t t/merge.t t/message-get-label.t t/message-set-lang.t t/message.t t/message_fail.t t/regex_map_multihit.t t/rule-datetime-date.t t/rule-datetime-datetime.t t/rule-datetime-time.t t/rule-japanese-hiragana-bytes.t t/rule-japanese-hiragana.t t/rule-japanese-katakana-bytes.t t/rule-japanese-katakana.t t/rule-net-http.t t/rule-net-https.t t/rule-net-uri.t t/rule-net-url.t t/rule-number-float.t t/rule-number-int.t t/rule-number-range.t t/rule-number-ufloat.t t/rule-number-uint.t t/rule-object-boolean.t t/rule-object-regexp.t t/rule-object-true.t t/rule-string-alphabet.t t/rule-string-ascii.t t/rule-string-length.t t/rule-string-nonsymbol_ascii.t t/rule-string-number.t t/rule.t t/setting-unicode.t t/stash.t t/utils-arrayify.t t/utils-check-profile-syntax.t t/utils-get-input-as-hash.t t/utils-remove-empty-fields.t
CGI::param called in list context from /tmp/loop_over_bdir-9721-l3QIwI/FormValidator-LazyWay-0.20-0/blib/lib/FormValidator/LazyWay/Utils.pm line 119, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /home/sand/src/perl/repoperls/installed-perls/host/k93x64sid/v5.22.2-RC1/fae6/lib/site_perl/5.22.2/CGI.pm line 407.
t/01-login-sample.t ...................................... ok
CGI::param called in list context from /tmp/loop_over_bdir-9721-l3QIwI/FormValidator-LazyWay-0.20-0/blib/lib/FormValidator/LazyWay/Utils.pm line 119, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /home/sand/src/perl/repoperls/installed-perls/host/k93x64sid/v5.22.2-RC1/fae6/lib/site_perl/5.22.2/CGI.pm line 407.
t/02-regex_map.t ......................................... ok
CGI::param called in list context from /tmp/loop_over_bdir-9721-l3QIwI/FormValidator-LazyWay-0.20-0/blib/lib/FormValidator/LazyWay/Utils.pm line 119, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /home/sand/src/perl/repoperls/installed-perls/host/k93x64sid/v5.22.2-RC1/fae6/lib/site_perl/5.22.2/CGI.pm line 407.
t/03-inquery.t ........................................... ok
CGI::param called in list context from /tmp/loop_over_bdir-9721-l3QIwI/FormValidator-LazyWay-0.20-0/blib/lib/FormValidator/LazyWay/Utils.pm line 119, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /home/sand/src/perl/repoperls/installed-perls/host/k93x64sid/v5.22.2-RC1/fae6/lib/site_perl/5.22.2/CGI.pm line 407, <DATA> line 1.
t/filter-at-regexp.t ..................................... ok
CGI::param called in list context from /tmp/loop_over_bdir-9721-l3QIwI/FormValidator-LazyWay-0.20-0/blib/lib/FormValidator/LazyWay/Utils.pm line 119, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /home/sand/src/perl/repoperls/installed-perls/host/k93x64sid/v5.22.2-RC1/fae6/lib/site_perl/5.22.2/CGI.pm line 407, <DATA> line 1.
t/filter-encode.t ........................................ ok
CGI::param called in list context from /tmp/loop_over_bdir-9721-l3QIwI/FormValidator-LazyWay-0.20-0/blib/lib/FormValidator/LazyWay/Utils.pm line 119, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /home/sand/src/perl/repoperls/installed-perls/host/k93x64sid/v5.22.2-RC1/fae6/lib/site_perl/5.22.2/CGI.pm line 407, <DATA> line 1.
t/filter-unify.t ......................................... ok
t/filter.t ............................................... ok
t/fix.t .................................................. ok
CGI::param called in list context from /tmp/loop_over_bdir-9721-l3QIwI/FormValidator-LazyWay-0.20-0/blib/lib/FormValidator/LazyWay/Utils.pm line 119, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /home/sand/src/perl/repoperls/installed-perls/host/k93x64sid/v5.22.2-RC1/fae6/lib/site_perl/5.22.2/CGI.pm line 407.
t/fixed-class-datetime.t ................................. ok
CGI::param called in list context from /tmp/loop_over_bdir-9721-l3QIwI/FormValidator-LazyWay-0.20-0/blib/lib/FormValidator/LazyWay/Utils.pm line 119, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /home/sand/src/perl/repoperls/installed-perls/host/k93x64sid/v5.22.2-RC1/fae6/lib/site_perl/5.22.2/CGI.pm line 407, <DATA> line 1.
t/fixed-class-uri.t ...................................... ok
t/input_value_0_is_not_false.t ........................... ok
t/lazyway-check-conv-profile.t ........................... ok
CGI::param called in list context from /tmp/loop_over_bdir-9721-l3QIwI/FormValidator-LazyWay-0.20-0/blib/lib/FormValidator/LazyWay/Utils.pm line 119, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /home/sand/src/perl/repoperls/installed-perls/host/k93x64sid/v5.22.2-RC1/fae6/lib/site_perl/5.22.2/CGI.pm line 407.
t/lazyway-check-dependencies.t ........................... ok
t/lazyway-check-remove-empty-fields.t .................... ok
t/lazyway-check-required-fields.t ........................ ok
t/lazyway-check-set-default.t ............................ ok
t/lazyway-check-set-error-message.t ...................... ok
t/lazyway-check-set-unknown.t ............................ ok
t/lazyway-check-validation-block-append_error_message.t .. ok
t/lazyway-check-validation-block-get-validator-method.t .. ok
t/lazyway-new.t .......................................... ok
CGI::param called in list context from /tmp/loop_over_bdir-9721-l3QIwI/FormValidator-LazyWay-0.20-0/blib/lib/FormValidator/LazyWay/Utils.pm line 119, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /home/sand/src/perl/repoperls/installed-perls/host/k93x64sid/v5.22.2-RC1/fae6/lib/site_perl/5.22.2/CGI.pm line 407, <DATA> line 1.
t/lazyway-result-class-overwrite.t ....................... ok
CGI::param called in list context from /tmp/loop_over_bdir-9721-l3QIwI/FormValidator-LazyWay-0.20-0/blib/lib/FormValidator/LazyWay/Utils.pm line 119, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /home/sand/src/perl/repoperls/installed-perls/host/k93x64sid/v5.22.2-RC1/fae6/lib/site_perl/5.22.2/CGI.pm line 407, <DATA> line 1.
t/lazyway-result-custom-invalid.t ........................ ok
CGI::param called in list context from /tmp/loop_over_bdir-9721-l3QIwI/FormValidator-LazyWay-0.20-0/blib/lib/FormValidator/LazyWay/Utils.pm line 119, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /home/sand/src/perl/repoperls/installed-perls/host/k93x64sid/v5.22.2-RC1/fae6/lib/site_perl/5.22.2/CGI.pm line 407.
t/lazyway-result-fixed.t ................................. ok
CGI::param called in list context from /tmp/loop_over_bdir-9721-l3QIwI/FormValidator-LazyWay-0.20-0/blib/lib/FormValidator/LazyWay/Utils.pm line 119, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /home/sand/src/perl/repoperls/installed-perls/host/k93x64sid/v5.22.2-RC1/fae6/lib/site_perl/5.22.2/CGI.pm line 407, <DATA> line 1.
t/merge.t ................................................ ok
t/message-get-label.t .................................... ok
t/message-set-lang.t ..................................... ok
t/message.t .............................................. ok
t/message_fail.t ......................................... ok
CGI::param called in list context from /tmp/loop_over_bdir-9721-l3QIwI/FormValidator-LazyWay-0.20-0/blib/lib/FormValidator/LazyWay/Utils.pm line 119, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /home/sand/src/perl/repoperls/installed-perls/host/k93x64sid/v5.22.2-RC1/fae6/lib/site_perl/5.22.2/CGI.pm line 407, <DATA> line 1.
t/regex_map_multihit.t ................................... ok
t/rule-datetime-date.t ................................... ok
t/rule-datetime-datetime.t ............................... ok
t/rule-datetime-time.t ................................... ok
t/rule-japanese-hiragana-bytes.t ......................... ok
t/rule-japanese-hiragana.t ............................... ok
t/rule-japanese-katakana-bytes.t ......................... ok
t/rule-japanese-katakana.t ............................... ok
t/rule-net-http.t ........................................ ok
t/rule-net-https.t ....................................... ok
t/rule-net-uri.t ......................................... ok
t/rule-net-url.t ......................................... ok
t/rule-number-float.t .................................... ok
t/rule-number-int.t ...................................... ok
t/rule-number-range.t .................................... ok
t/rule-number-ufloat.t ................................... ok
t/rule-number-uint.t ..................................... ok
t/rule-object-boolean.t .................................. ok
t/rule-object-regexp.t ................................... ok
t/rule-object-true.t ..................................... ok
t/rule-string-alphabet.t ................................. ok
t/rule-string-ascii.t .................................... ok
t/rule-string-length.t ................................... ok
t/rule-string-nonsymbol_ascii.t .......................... ok
t/rule-string-number.t ................................... ok
t/rule.t ................................................. ok
t/setting-unicode.t ...................................... ok
CGI::param called in list context from /tmp/loop_over_bdir-9721-l3QIwI/FormValidator-LazyWay-0.20-0/blib/lib/FormValidator/LazyWay/Utils.pm line 119, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /home/sand/src/perl/repoperls/installed-perls/host/k93x64sid/v5.22.2-RC1/fae6/lib/site_perl/5.22.2/CGI.pm line 407, <DATA> line 1.
t/stash.t ................................................ ok
t/utils-arrayify.t ....................................... ok
t/utils-check-profile-syntax.t ........................... ok
CGI::param called in list context from /tmp/loop_over_bdir-9721-l3QIwI/FormValidator-LazyWay-0.20-0/blib/lib/FormValidator/LazyWay/Utils.pm line 119, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /home/sand/src/perl/repoperls/installed-perls/host/k93x64sid/v5.22.2-RC1/fae6/lib/site_perl/5.22.2/CGI.pm line 407.
t/utils-get-input-as-hash.t .............................. ok
t/utils-remove-empty-fields.t ............................ ok
All tests successful.
Files=61, Tests=345, 6 wallclock secs ( 0.10 usr 0.26 sys + 4.07 cusr 0.74 csys = 5.17 CPU)
Result: PASS
------------------------------
PREREQUISITES
------------------------------
Prerequisite modules loaded:
requires:
Module Need Have
-------------------------- ---- -------
Class::Accessor::Fast 0 0.34
Data::Validate::URI 0 0.07
DateTime::Format::Strptime 0 1.67
Email::Valid 0 1.200
Email::Valid::Loose 0 0.05
Perl6::Junction 0 1.60000
Test::Base 0 0.88
Test::Base::Filter 0 0
Test::Exception 0 0.43
UNIVERSAL::require 0 0.18
URI 0 1.71
YAML 0 1.15
YAML::Syck 0 1.29
build_requires:
Module Need Have
-------------------------- ---- -------
ExtUtils::MakeMaker 6.36 7.12
Test::Base 0 0.88
Test::Base::Filter 0 0
Test::Exception 0 0.43
YAML 0 1.15
YAML::Syck 0 1.29
configure_requires:
Module Need Have
-------------------------- ---- -------
ExtUtils::MakeMaker 6.36 7.12
------------------------------
ENVIRONMENT AND OTHER CONTEXT
------------------------------
Environment variables:
AUTOMATED_TESTING = 1
LANG = C
PATH = /usr/lib/ccache:/home/sand/bin:/usr/local/bin:/usr/lib/ccache:/usr/bin:/bin:/usr/games:/usr/local/perl/bin:/usr/X11/bin:/sbin:/usr/sbin
PERL5LIB = /tmp/loop_over_bdir-9721-l3QIwI/FusionInventory-Agent-2.3.17-0/blib/arch:/tmp/loop_over_bdir-9721-l3QIwI/FusionInventory-Agent-2.3.17-0/blib/lib
PERL5OPT =
PERL5_CPANPLUS_IS_RUNNING = 15332
PERL5_CPAN_IS_RUNNING = 15332
PERL_CANARY_STABILITY_NOPROMPT = 1
PERL_MM_USE_DEFAULT = 1
SHELL = /usr/bin/zsh
TERM = screen
Perl special variables (and OS-specific diagnostics, for MSWin32):
$^X = /tmp/basesmoker-reloperl-Gsi3/bin/perl
$UID/$EUID = 1005 / 1005
$GID = 1005 1005
$EGID = 1005 1005
Perl module toolchain versions installed:
Module Have
------------------- --------
CPAN 2.12
CPAN::Meta 2.150005
Cwd 3.62
ExtUtils::CBuilder 0.280224
ExtUtils::Command 7.12
ExtUtils::Install 2.04
ExtUtils::MakeMaker 7.12
ExtUtils::Manifest 1.70
ExtUtils::ParseXS 3.28
File::Spec 3.62
JSON 2.90
JSON::PP 2.27300
Module::Build 0.4216
Module::Signature 0.79
Parse::CPAN::Meta 1.4417
Test::Harness 3.36
Test::More 1.001014
YAML 1.15
YAML::Syck 1.29
version 0.9916
--
Summary of my perl5 (revision 5 version 22 subversion 2) configuration:
Commit id: 1b027307a936ccbc52a7291729dae1c16f10576a
Platform:
osname=linux, osvers=4.4.0-1-amd64, archname=x86_64-linux-thread-multi
uname='linux k93x64sid 4.4.0-1-amd64 #1 smp debian 4.4.6-1 (2016-03-17) x86_64 gnulinux '
config_args='-Dprefix=/home/sand/src/perl/repoperls/installed-perls/host/k93x64sid/v5.22.2-RC1/fae6 -Dmyhostname=k93x64sid -Dinstallusrbinperl=n -Uversiononly -Dusedevel -des -Ui_db -Dlibswanted=cl pthread socket inet nsl gdbm dbm malloc dl ld sun m crypt sec util c cposix posix ucb BSD gdbm_compat -Duseithreads -Uuselongdouble'
hint=recommended, useposix=true, d_sigaction=define
useithreads=define, usemultiplicity=define
use64bitint=define, use64bitall=define, uselongdouble=undef
usemymalloc=n, bincompat5005=undef
Compiler:
cc='cc', ccflags ='-D_REENTRANT -D_GNU_SOURCE -fwrapv -fno-strict-aliasing -pipe -fstack-protector-strong -I/usr/local/include -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_FORTIFY_SOURCE=2',
optimize='-O2',
cppflags='-D_REENTRANT -D_GNU_SOURCE -fwrapv -fno-strict-aliasing -pipe -fstack-protector-strong -I/usr/local/include'
ccversion='', gccversion='5.3.1 20160409', gccosandvers=''
intsize=4, longsize=8, ptrsize=8, doublesize=8, byteorder=12345678, doublekind=3
d_longlong=define, longlongsize=8, d_longdbl=define, longdblsize=16, longdblkind=3
ivtype='long', ivsize=8, nvtype='double', nvsize=8, Off_t='off_t', lseeksize=8
alignbytes=8, prototype=define
Linker and Libraries:
ld='cc', ldflags =' -fstack-protector-strong -L/usr/local/lib'
libpth=/usr/local/lib /usr/lib/gcc/x86_64-linux-gnu/5/include-fixed /usr/include/x86_64-linux-gnu /usr/lib /lib/x86_64-linux-gnu /lib/../lib /usr/lib/x86_64-linux-gnu /usr/lib/../lib /lib
libs=-lpthread -lnsl -ldl -lm -lcrypt -lutil -lc
perllibs=-lpthread -lnsl -ldl -lm -lcrypt -lutil -lc
libc=libc-2.22.so, so=so, useshrplib=false, libperl=libperl.a
gnulibc_version='2.22'
Dynamic Linking:
dlsrc=dl_dlopen.xs, dlext=so, d_dlsymun=undef, ccdlflags='-Wl,-E'
cccdlflags='-fPIC', lddlflags='-shared -O2 -L/usr/local/lib -fstack-protector-strong'
Characteristics of this binary (from libperl):
Compile-time options: HAS_TIMES MULTIPLICITY PERLIO_LAYERS
PERL_DONT_CREATE_GVSV
PERL_HASH_FUNC_ONE_AT_A_TIME_HARD
PERL_IMPLICIT_CONTEXT PERL_MALLOC_WRAP
PERL_NEW_COPY_ON_WRITE PERL_PRESERVE_IVUV
PERL_USE_DEVEL USE_64_BIT_ALL USE_64_BIT_INT
USE_ITHREADS USE_LARGE_FILES USE_LOCALE
USE_LOCALE_COLLATE USE_LOCALE_CTYPE
USE_LOCALE_NUMERIC USE_LOCALE_TIME USE_PERLIO
USE_PERL_ATOF USE_REENTRANT_API
Locally applied patches:
RC1
Built under linux
Compiled at Apr 22 2016 06:31:48
%ENV:
PERL5LIB="/tmp/loop_over_bdir-9721-l3QIwI/FusionInventory-Agent-2.3.17-0/blib/arch:/tmp/loop_over_bdir-9721-l3QIwI/FusionInventory-Agent-2.3.17-0/blib/lib"
PERL5OPT=""
PERL5_CPANPLUS_IS_RUNNING="15332"
PERL5_CPAN_IS_RUNNING="15332"
PERL_CANARY_STABILITY_NOPROMPT="1"
PERL_MM_USE_DEFAULT="1"
@INC:
/tmp/loop_over_bdir-9721-l3QIwI/FusionInventory-Agent-2.3.17-0/blib/arch
/tmp/loop_over_bdir-9721-l3QIwI/FusionInventory-Agent-2.3.17-0/blib/lib
/home/sand/src/perl/repoperls/installed-perls/host/k93x64sid/v5.22.2-RC1/fae6/lib/site_perl/5.22.2/x86_64-linux-thread-multi
/home/sand/src/perl/repoperls/installed-perls/host/k93x64sid/v5.22.2-RC1/fae6/lib/site_perl/5.22.2
/home/sand/src/perl/repoperls/installed-perls/host/k93x64sid/v5.22.2-RC1/fae6/lib/5.22.2/x86_64-linux-thread-multi
/home/sand/src/perl/repoperls/installed-perls/host/k93x64sid/v5.22.2-RC1/fae6/lib/5.22.2
.