}
undef %FETCH_NEED;
-my $valid_range = '[0-9]+|[0-9]+:[0-9]+|[0-9]+:\*';
+my $valid_range = '[0-9]+|[0-9]+:[0-9]+|[0-9]+:\*|\*';
$valid_range = qr/\A(?:$valid_range)(?:,(?:$valid_range))*\z/;
sub do_greet {
# just let the caller do an out-of-range query if a single
# UID is out-of-range
++$beg if ($beg <= $uid_base || $end > $uid_end);
+ } elsif ($range eq '*') {
+ $beg = $end = $self->{ibx}->over(1)->max;
+ uid_clamp($self, \$beg, \$end);
} else {
return 'BAD fetch range';
}
is_deeply($ret, {}, "out-of-range UID FETCH $r");
}
-for my $r ('1:*', '1') {
+for my $r ('1:*', '1', '*') {
$ret = $mic->fetch_hash($r, 'RFC822') or BAIL_OUT "FETCH $@";
is_deeply([keys %$ret], [1]);
like($ret->{1}->{RFC822}, qr/\r\n\r\nThis is a test/, 'read full');