[ 23225]
Mark a test that relies on tainting behavior as TODO on Windows.
Should have been part of integration 23310, but for
http://www.google.com/search?q=%66%75%63%6Bing+perforce
p4raw-link: @23225 on //depot/perl:
83176b6e7e89da2ccf0713207f5666901eb76192
p4raw-id: //depot/maint-5.8/perl@23311
p4raw-integrated: from //depot/perl@23310 'copy in' t/comp/opsubs.t
(@23215..)
# qx operator
can_ok( 'main', "qx" );
eval "qx('unqualified')";
-like( $@, qr/^Insecure/, "qx('unqualified') doesn't work" );
+TODO: {
+ local $TODO = $^O eq 'MSWin32' ? "Tainting of PATH not working of Windows" : $TODO;
+ like( $@, qr/^Insecure/, "qx('unqualified') doesn't work" );
+}
is( main::qx('main'), "qx-main", "main::qx() is func" );
is( &qx('amper'), "qx-amper", "&qx() is func" );