From 8488977598828f0a09f59a7415e6ad15ee5be101 Mon Sep 17 00:00:00 2001 From: Will Budic Date: Sat, 29 Nov 2025 21:54:59 +1100 Subject: [PATCH] Implemented Cocoon CNF specific NOTES ccolumn compress and encrypt with blowfish. --- tests/testCocoonCodeGeneration.pl | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/tests/testCocoonCodeGeneration.pl b/tests/testCocoonCodeGeneration.pl index f5c97fd..4b45b81 100644 --- a/tests/testCocoonCodeGeneration.pl +++ b/tests/testCocoonCodeGeneration.pl @@ -37,8 +37,12 @@ use Syntax::Keyword::Try; try { my $idx = Cocoon::_getHeaderColumnIndexes($coco->getCocoonTable()); $test->evaluate("Alias 'jspare' decrypted notes checks?",$row[$idx->{notes}],"Example 1 entry"); - - + #I wonder what are the chances (one in two million?) it will generate an existing code, for the next to fail? + + open(my $fh, "<:perlio", $0 ) or die "Can't open $0 -> $!"; + read $fh, my $content, -s $fh; + close $fh; + $coco->register("Bubba Cuba", "cuba" , $coco->passCodeGenerate(), $content,undef); # $test->done(); # -- 2.34.1