diff options
author | Kaz Kylheku <kaz@kylheku.com> | 2021-06-02 08:15:08 -0700 |
---|---|---|
committer | Kaz Kylheku <kaz@kylheku.com> | 2021-06-02 08:15:08 -0700 |
commit | d178ddaac5b58c3a0d8b024884859d7ef3c24386 (patch) | |
tree | 428a60ab8836eb54218a7e61fd191cc6753c6eee /share | |
parent | 98a5ae664df526c18bac5d4597c3ae165cd0fd20 (diff) | |
download | txr-d178ddaac5b58c3a0d8b024884859d7ef3c24386.tar.gz txr-d178ddaac5b58c3a0d8b024884859d7ef3c24386.tar.bz2 txr-d178ddaac5b58c3a0d8b024884859d7ef3c24386.zip |
json: fix two test cases for Windows.
* tests/010/json.tl: on Windows characters are limited to the
BMP range 0 to #\xFFFF. The character escape \x10437 is out
of range, and so throws an error, simply from that syntax
being read. The two test cases which use this character are
clumped into their own test form, which is executed
conditionally on wide characters being more than two bytes.
Because the expression is still parsed on Windows, we read the
troublesome character from a string at run-time, and
interpolate it.
Diffstat (limited to 'share')
0 files changed, 0 insertions, 0 deletions