From bd55dffe2deafedeb9ac5f750dda46e3a2247018 Mon Sep 17 00:00:00 2001
From: Eric Wong <e@yhbt.net>
Date: Sat, 13 Jun 2020 20:27:04 +0000
Subject: [PATCH] t/imapd: quiet overload warning from Mail::IMAPClient

Mail::IMAPClient understandably stumbles into a warning
by our bogus test request.  Just silence it on our end
since it's not normal operation for Mail::IMAPClient.
---
 t/imapd.t | 10 ++++++++--
 1 file changed, 8 insertions(+), 2 deletions(-)

diff --git a/t/imapd.t b/t/imapd.t
index aba3ed82..edfc5204 100644
--- a/t/imapd.t
+++ b/t/imapd.t
@@ -148,10 +148,16 @@ is_deeply(scalar $mic->flags('1'), [], '->flags works');
 	my $exp = $mic->fetch_hash(1, 'UID');
 	$ret = $mic->fetch_hash('559:*', 'UID');
 	is_deeply($ret, $exp, 'beginning range too big');
-	for my $r (qw(559:558 558:559)) {
-		$ret = $mic->fetch_hash($r, 'UID');
+	{
+		my @w; # Mail::IMAPClient hits a warning via overload
+		local $SIG{__WARN__} = sub { push @w, @_ };
+		$ret = $mic->fetch_hash(my $r = '559:558', 'UID');
 		is_deeply($ret, {}, "out-of-range UID FETCH $r");
+		@w = grep(!/\boverload\.pm\b/, @w);
+		is_deeply(\@w, [], 'no unexpected warning');
 	}
+	$ret = $mic->fetch_hash(my $r = '558:559', 'UID');
+	is_deeply($ret, {}, "out-of-range UID FETCH $r");
 }
 
 for my $r ('1:*', '1') {
-- 
2.50.0