Skip to content

Commit 50872c3

Browse files
committed
test: update snapshot
1 parent 260e9b9 commit 50872c3

File tree

1 file changed

+25
-24
lines changed

1 file changed

+25
-24
lines changed

test/workerd.test.ts

Lines changed: 25 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -9,29 +9,30 @@ describe("tests in workerd", () => {
99
},
1010
});
1111
expect(exitCode).toBe(0);
12-
expect(stderr.replaceAll(/\(node:\d+\) /g, "")).toMatchInlineSnapshot(`
13-
"workerd/server/server.c++:4370: debug: [ TEST ] tests:crypto_getRandomValues
14-
workerd/server/server.c++:4378: debug: [ PASS ] tests:crypto_getRandomValues
15-
workerd/server/server.c++:4370: debug: [ TEST ] tests:unenv_polyfills_buffer
16-
workerd/server/server.c++:4378: debug: [ PASS ] tests:unenv_polyfills_buffer
17-
workerd/server/server.c++:4370: debug: [ TEST ] tests:unenv_polyfills_path
18-
workerd/server/server.c++:4378: debug: [ PASS ] tests:unenv_polyfills_path
19-
workerd/server/server.c++:4370: debug: [ TEST ] tests:url_parse
20-
[DeprecationWarning] [unenv] [node:url] DEP0169: \`url.parse()\` behavior is not standardized and prone to errors that have security implications. Use the WHATWG URL API instead. CVEs are not issued for \`url.parse()\` vulnerabilities.
21-
workerd/server/server.c++:4378: debug: [ PASS ] tests:url_parse
22-
workerd/server/server.c++:4370: debug: [ TEST ] tests:workerd_dns
23-
workerd/server/server.c++:4378: debug: [ PASS ] tests:workerd_dns
24-
workerd/server/server.c++:4370: debug: [ TEST ] tests:workerd_implements_buffer
25-
workerd/server/server.c++:4378: debug: [ PASS ] tests:workerd_implements_buffer
26-
workerd/server/server.c++:4370: debug: [ TEST ] tests:workerd_modules
27-
workerd/server/server.c++:4378: debug: [ PASS ] tests:workerd_modules
28-
workerd/server/server.c++:4370: debug: [ TEST ] tests:workerd_net
29-
workerd/server/server.c++:4378: debug: [ PASS ] tests:workerd_net
30-
workerd/server/server.c++:4370: debug: [ TEST ] tests:workerd_path
31-
workerd/server/server.c++:4378: debug: [ PASS ] tests:workerd_path
32-
workerd/server/server.c++:4370: debug: [ TEST ] tests:workerd_timers
33-
workerd/server/server.c++:4378: debug: [ PASS ] tests:workerd_timers
34-
"
35-
`);
12+
expect(stderr.replaceAll(/\(node:\d+\) |^.+: debug: /gm, ""))
13+
.toMatchInlineSnapshot(`
14+
"[ TEST ] tests:crypto_getRandomValues
15+
[ PASS ] tests:crypto_getRandomValues
16+
[ TEST ] tests:unenv_polyfills_buffer
17+
[ PASS ] tests:unenv_polyfills_buffer
18+
[ TEST ] tests:unenv_polyfills_path
19+
[ PASS ] tests:unenv_polyfills_path
20+
[ TEST ] tests:url_parse
21+
[DeprecationWarning] [unenv] [node:url] DEP0169: \`url.parse()\` behavior is not standardized and prone to errors that have security implications. Use the WHATWG URL API instead. CVEs are not issued for \`url.parse()\` vulnerabilities.
22+
[ PASS ] tests:url_parse
23+
[ TEST ] tests:workerd_dns
24+
[ PASS ] tests:workerd_dns
25+
[ TEST ] tests:workerd_implements_buffer
26+
[ PASS ] tests:workerd_implements_buffer
27+
[ TEST ] tests:workerd_modules
28+
[ PASS ] tests:workerd_modules
29+
[ TEST ] tests:workerd_net
30+
[ PASS ] tests:workerd_net
31+
[ TEST ] tests:workerd_path
32+
[ PASS ] tests:workerd_path
33+
[ TEST ] tests:workerd_timers
34+
[ PASS ] tests:workerd_timers
35+
"
36+
`);
3637
});
3738
});

0 commit comments

Comments
 (0)