From bd55dffe2deafedeb9ac5f750dda46e3a2247018 Mon Sep 17 00:00:00 2001 From: Eric Wong Date: Sat, 13 Jun 2020 20:27:04 +0000 Subject: t/imapd: quiet overload warning from Mail::IMAPClient Mail::IMAPClient understandably stumbles into a warning by our bogus test request. Just silence it on our end since it's not normal operation for Mail::IMAPClient. --- t/imapd.t | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-) (limited to 't') diff --git a/t/imapd.t b/t/imapd.t index aba3ed82..edfc5204 100644 --- a/t/imapd.t +++ b/t/imapd.t @@ -148,10 +148,16 @@ is_deeply(scalar $mic->flags('1'), [], '->flags works'); my $exp = $mic->fetch_hash(1, 'UID'); $ret = $mic->fetch_hash('559:*', 'UID'); is_deeply($ret, $exp, 'beginning range too big'); - for my $r (qw(559:558 558:559)) { - $ret = $mic->fetch_hash($r, 'UID'); + { + my @w; # Mail::IMAPClient hits a warning via overload + local $SIG{__WARN__} = sub { push @w, @_ }; + $ret = $mic->fetch_hash(my $r = '559:558', 'UID'); is_deeply($ret, {}, "out-of-range UID FETCH $r"); + @w = grep(!/\boverload\.pm\b/, @w); + is_deeply(\@w, [], 'no unexpected warning'); } + $ret = $mic->fetch_hash(my $r = '558:559', 'UID'); + is_deeply($ret, {}, "out-of-range UID FETCH $r"); } for my $r ('1:*', '1') { -- cgit v1.2.3-24-ge0c7