From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on dcvr.yhbt.net X-Spam-Level: X-Spam-Status: No, score=-4.0 required=3.0 tests=ALL_TRUSTED,BAYES_00 shortcircuit=no autolearn=ham autolearn_force=no version=3.4.2 Received: from localhost (dcvr.yhbt.net [127.0.0.1]) by dcvr.yhbt.net (Postfix) with ESMTP id A41C91F5AE for ; Sat, 13 Jun 2020 20:27:04 +0000 (UTC) From: Eric Wong To: meta@public-inbox.org Subject: [PATCH] t/imapd: quiet overload warning from Mail::IMAPClient Date: Sat, 13 Jun 2020 20:27:04 +0000 Message-Id: <20200613202704.25602-1-e@yhbt.net> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit List-Id: Mail::IMAPClient understandably stumbles into a warning by our bogus test request. Just silence it on our end since it's not normal operation for Mail::IMAPClient. --- t/imapd.t | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-) diff --git a/t/imapd.t b/t/imapd.t index f5ca8b7e..56dd80a7 100644 --- a/t/imapd.t +++ b/t/imapd.t @@ -147,10 +147,16 @@ is_deeply(scalar $mic->flags('1'), [], '->flags works'); my $exp = $mic->fetch_hash(1, 'UID'); $ret = $mic->fetch_hash('559:*', 'UID'); is_deeply($ret, $exp, 'beginning range too big'); - for my $r (qw(559:558 558:559)) { - $ret = $mic->fetch_hash($r, 'UID'); + { + my @w; # Mail::IMAPClient hits a warning via overload + local $SIG{__WARN__} = sub { push @w, @_ }; + $ret = $mic->fetch_hash(my $r = '559:558', 'UID'); is_deeply($ret, {}, "out-of-range UID FETCH $r"); + @w = grep(!/\boverload\.pm\b/, @w); + is_deeply(\@w, [], 'no unexpected warning'); } + $ret = $mic->fetch_hash(my $r = '558:559', 'UID'); + is_deeply($ret, {}, "out-of-range UID FETCH $r"); } for my $r ('1:*', '1') {