From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on dcvr.yhbt.net X-Spam-Level: X-Spam-Status: No, score=-3.9 required=3.0 tests=ALL_TRUSTED,AWL,BAYES_00 shortcircuit=no autolearn=ham autolearn_force=no version=3.4.2 Received: from localhost (dcvr.yhbt.net [127.0.0.1]) by dcvr.yhbt.net (Postfix) with ESMTP id 3C17D1F8C4; Sun, 7 Feb 2021 10:40:02 +0000 (UTC) Date: Sun, 7 Feb 2021 09:40:02 -0100 From: Eric Wong To: meta@public-inbox.org Subject: [PATCH 21/19] lei q: fix arbitrary --mua command handling Message-ID: <20210207104002.GA29852@dcvr> References: <20210207085201.13871-1-e@80x24.org> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20210207085201.13871-1-e@80x24.org> List-Id: Perl doesn't seem to warn for shadowed variables, here :x --- lib/PublicInbox/LEI.pm | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/lib/PublicInbox/LEI.pm b/lib/PublicInbox/LEI.pm index 00affe82..e95a674b 100644 --- a/lib/PublicInbox/LEI.pm +++ b/lib/PublicInbox/LEI.pm @@ -731,7 +731,7 @@ sub start_mua { # TODO: help wanted: other common FOSS MUAs } else { require Text::ParseWords; - my @cmd = Text::ParseWords::shellwords($mua); + @cmd = Text::ParseWords::shellwords($mua); # mutt uses '%f' for open-hook with compressed mbox, we follow @cmd = map { $_ eq '%f' ? ($replaced = $mfolder) : $_ } @cmd; }