ruby-changes:71684
From: Burdette <ko1@a...>
Date: Sat, 9 Apr 2022 04:25:56 +0900 (JST)
Subject: [ruby-changes:71684] 70415071e8 (master): Fix some RDoc links (#5778)
https://git.ruby-lang.org/ruby.git/commit/?id=70415071e8 From 70415071e82964bbd9cbf9391806ce7f396cf2a2 Mon Sep 17 00:00:00 2001 From: Burdette Lamar <BurdetteLamar@Y...> Date: Fri, 8 Apr 2022 14:25:38 -0500 Subject: Fix some RDoc links (#5778) --- io.c | 19 ++++++++++--------- process.c | 2 +- string.c | 22 +++++++++++----------- 3 files changed, 22 insertions(+), 21 deletions(-) diff --git a/io.c b/io.c index a33cf6ae53..32704d9d17 100644 --- a/io.c +++ b/io.c @@ -7423,7 +7423,7 @@ static VALUE popen_finish(VALUE port, VALUE klass); https://github.com/ruby/ruby/blob/trunk/io.c#L7423 * whose $stdin and $stdout are connected to a new stream +io+. * * This method has potential security vulnerabilities if called with untrusted input; - * see {Command Injection}[command_injection.rdoc]. + * see {Command Injection}[rdoc-ref:command_injection.rdoc]. * * If no block is given, returns the new stream, * which depending on given +mode+ may be open for reading, writing, or both. @@ -9901,7 +9901,7 @@ argf_readlines(int argc, VALUE *argv, VALUE argf) https://github.com/ruby/ruby/blob/trunk/io.c#L9901 * sets global variable <tt>$?</tt> to the process status. * * This method has potential security vulnerabilities if called with untrusted input; - * see {Command Injection}[command_injection.rdoc]. + * see {Command Injection}[rdoc-ref:command_injection.rdoc]. * * Examples: * @@ -11292,7 +11292,7 @@ io_s_foreach(VALUE v) https://github.com/ruby/ruby/blob/trunk/io.c#L11292 * * When called from class \IO (but not subclasses of \IO), * this method has potential security vulnerabilities if called with untrusted input; - * see {Command Injection}[command_injection.rdoc]. + * see {Command Injection}[rdoc-ref:command_injection.rdoc]. * * The first argument must be a string that is one of the following: * @@ -11302,7 +11302,8 @@ io_s_foreach(VALUE v) https://github.com/ruby/ruby/blob/trunk/io.c#L11302 * - Command: if +self+ is the class \IO, * and if the string starts with the pipe character, * the rest of the string is a command to be executed as a subprocess. - * See the {Note on Security}[@Note+on+Security]. + * This usage has potential security vulnerabilities if called with untrusted input; + * see {Command Injection}[rdoc-ref:command_injection.rdoc]. * * With only argument +path+ given, parses lines from the file at the given +path+, * as determined by the default line separator, @@ -11407,7 +11408,7 @@ io_s_readlines(VALUE v) https://github.com/ruby/ruby/blob/trunk/io.c#L11408 * * When called from class \IO (but not subclasses of \IO), * this method has potential security vulnerabilities if called with untrusted input; - * see {Command Injection}[command_injection.rdoc]. + * see {Command Injection}[rdoc-ref:command_injection.rdoc]. * * The first argument must be a string; * its meaning depends on whether it starts with the pipe character (<tt>'|'</tt>): @@ -11512,7 +11513,7 @@ seek_before_access(VALUE argp) https://github.com/ruby/ruby/blob/trunk/io.c#L11513 * * When called from class \IO (but not subclasses of \IO), * this method has potential security vulnerabilities if called with untrusted input; - * see {Command Injection}[command_injection.rdoc]. + * see {Command Injection}[rdoc-ref:command_injection.rdoc]. * * The first argument must be a string; * its meaning depends on whether it starts with the pipe character (<tt>'|'</tt>): @@ -11589,7 +11590,7 @@ rb_io_s_read(int argc, VALUE *argv, VALUE io) https://github.com/ruby/ruby/blob/trunk/io.c#L11590 * * When called from class \IO (but not subclasses of \IO), * this method has potential security vulnerabilities if called with untrusted input; - * see {Command Injection}[command_injection.rdoc]. + * see {Command Injection}[rdoc-ref:command_injection.rdoc]. * */ @@ -11694,7 +11695,7 @@ io_s_write(int argc, VALUE *argv, VALUE klass, int binary) https://github.com/ruby/ruby/blob/trunk/io.c#L11695 * * When called from class \IO (but not subclasses of \IO), * this method has potential security vulnerabilities if called with untrusted input; - * see {Command Injection}[command_injection.rdoc]. + * see {Command Injection}[rdoc-ref:command_injection.rdoc]. * * The first argument must be a string; * its meaning depends on whether it starts with the pipe character (<tt>'|'</tt>): @@ -11761,7 +11762,7 @@ rb_io_s_write(int argc, VALUE *argv, VALUE io) https://github.com/ruby/ruby/blob/trunk/io.c#L11762 * * When called from class \IO (but not subclasses of \IO), * this method has potential security vulnerabilities if called with untrusted input; - * see {Command Injection}[command_injection.rdoc]. + * see {Command Injection}[rdoc-ref:command_injection.rdoc]. * */ diff --git a/process.c b/process.c index da663f9765..b0991755cb 100644 --- a/process.c +++ b/process.c @@ -4773,7 +4773,7 @@ rb_spawn(int argc, const VALUE *argv) https://github.com/ruby/ruby/blob/trunk/process.c#L4773 * _command..._ is one of following forms. * * This method has potential security vulnerabilities if called with untrusted input; - * see {Command Injection}[command_injection.rdoc]. + * see {Command Injection}[rdoc-ref:command_injection.rdoc]. * * [<code>commandline</code>] * command line string which is passed to the standard shell diff --git a/string.c b/string.c index 262f67840d..c05ed052d8 100644 --- a/string.c +++ b/string.c @@ -3660,7 +3660,7 @@ static VALUE str_casecmp_p(VALUE str1, VALUE str2); https://github.com/ruby/ruby/blob/trunk/string.c#L3660 * 'foo'.casecmp('FOO') # => 0 * 'foo'.casecmp(1) # => nil * - * See {Case Mapping}[case_mapping.rdoc]. + * See {Case Mapping}[rdoc-ref:case_mapping.rdoc]. * * Related: String#casecmp?. * @@ -3750,7 +3750,7 @@ str_casecmp(VALUE str1, VALUE str2) https://github.com/ruby/ruby/blob/trunk/string.c#L3750 * * 'foo'.casecmp?(1) # => nil * - * See {Case Mapping}[case_mapping.rdoc]. + * See {Case Mapping}[rdoc-ref:case_mapping.rdoc]. * * Related: String#casecmp. * @@ -7330,7 +7330,7 @@ upcase_single(VALUE str) https://github.com/ruby/ruby/blob/trunk/string.c#L7330 * s.upcase! # => nil * * The casing may be affected by the given +options+; - * see {Case Mapping}[case_mapping.rdoc]. + * see {Case Mapping}[rdoc-ref:case_mapping.rdoc]. * * Related: String#upcase, String#downcase, String#downcase!. * @@ -7369,7 +7369,7 @@ rb_str_upcase_bang(int argc, VALUE *argv, VALUE str) https://github.com/ruby/ruby/blob/trunk/string.c#L7369 * s.upcase # => "HELLO WORLD!" * * The casing may be affected by the given +options+; - * see {Case Mapping}[case_mapping.rdoc]. + * see {Case Mapping}[rdoc-ref:case_mapping.rdoc]. * * Related: String#upcase!, String#downcase, String#downcase!. * @@ -7432,7 +7432,7 @@ downcase_single(VALUE str) https://github.com/ruby/ruby/blob/trunk/string.c#L7432 * s.downcase! # => nil * * The casing may be affected by the given +options+; - * see {Case Mapping}[case_mapping.rdoc]. + * see {Case Mapping}[rdoc-ref:case_mapping.rdoc]. * * Related: String#downcase, String#upcase, String#upcase!. * @@ -7471,7 +7471,7 @@ rb_str_downcase_bang(int argc, VALUE *argv, VALUE str) https://github.com/ruby/ruby/blob/trunk/string.c#L7471 * s.downcase # => "hello world!" * * The casing may be affected by the given +options+; - * see {Case Mapping}[case_mapping.rdoc]. + * see {Case Mapping}[rdoc-ref:case_mapping.rdoc]. * * Related: String#downcase!, String#upcase, String#upcase!. * @@ -7517,7 +7517,7 @@ rb_str_downcase(int argc, VALUE *argv, VALUE str) https://github.com/ruby/ruby/blob/trunk/string.c#L7517 * s.capitalize! # => nil * * The casing may be affected by the given +options+; - * see {Case Mapping}[case_mapping.rdoc]. + * see {Case Mapping}[rdoc-ref:case_mapping.rdoc]. * * Related: String#capitalize. * @@ -7555,7 +7555,7 @@ rb_str_capitalize_bang(int argc, VALUE *argv, VALUE str) https://github.com/ruby/ruby/blob/trunk/string.c#L7555 * s.capitalize # => "Hello world!" * * The casing may be affected by the given +options+; - * see {Case Mapping}[case_mapping.rdoc]. + * see {Case Mapping}[rdoc-ref:case_mapping.rdoc]. * * Related: String#capitalize!. * @@ -7596,7 +7596,7 @@ rb_str_capitalize(int argc, VALUE *argv, VALUE str) https://github.com/ruby/ruby/blob/trunk/string.c#L7596 * ''.swapcase! # => nil * * The casing may be affected by the given +options+; - * see {Case Mapping}[case_mapping.rdoc]. + * see {Case Mapping}[rdoc-ref:case_mapping.rdoc]. * * Related: String#swapcase. * @@ -7633,7 +7633,7 @@ rb_str_swapcase_bang(int argc, VALUE *argv, VALUE str) https://github.com/ruby/ruby/blob/trunk/string.c#L7633 * s.swapcase # => "hELLO wORLD!" * * The casing may be affected by the given +options+; - * see {Case Mapping}[case_mapping.rdoc]. + * see {Case Mapping}[rdoc-ref:case_mapping.rdoc]. * * Related: String#swapcase!. * @@ -11582,7 +11582,7 @@ sym_casecmp(VALUE sym, VALUE other) https://github.com/ruby/ruby/blob/trunk/string.c#L11582 * sym.casecmp?(other_sym) # => nil * :foo.casecmp?(2) # => nil * - * See {Case Mapping}[case_mapping.rdoc]. + * See {Case Mapping}[rdoc-ref:case_mapping.rdoc]. * * Related: Symbol#casecmp. * -- cgit v1.2.1 -- ML: ruby-changes@q... Info: http://www.atdot.net/~ko1/quickml/