From b1f1b6927dae9b3768a8ff67119435e96354e906 Mon Sep 17 00:00:00 2001 From: Glenn Rice Date: Fri, 7 Jul 2023 09:27:28 -0500 Subject: [PATCH] Fix a warning that is being emitted due to the hack added in #2098 This just assigns the result of calling `%+` to a dummy variable to avoid the warning that perl gives stating that this is a useless use of a variable in void context. --- lib/WeBWorK/CourseEnvironment.pm | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/lib/WeBWorK/CourseEnvironment.pm b/lib/WeBWorK/CourseEnvironment.pm index ac1efeaeee..f057b1f140 100644 --- a/lib/WeBWorK/CourseEnvironment.pm +++ b/lib/WeBWorK/CourseEnvironment.pm @@ -104,7 +104,7 @@ sub new { # The following line is a work around for a bug that occurs on some systems. See # https://rt.cpan.org/Public/Bug/Display.html?id=77916 and # https://github.com/openwebwork/webwork2/pull/2098#issuecomment-1619812699. - %+; + my %dummy = %+; my $safe = Safe->new; $safe->permit('rand');