Skip to content

Commit af52adc

Browse files
authored
Merge pull request #2823 from ruby/ruby-4.0.1
Ruby 4.0.1
2 parents 87ab8ac + 404d136 commit af52adc

File tree

3 files changed

+1
-28
lines changed

3 files changed

+1
-28
lines changed

.github/workflows/comments.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ jobs:
1616
- uses: actions/checkout@v6
1717
- uses: ruby/setup-ruby@v1
1818
with:
19-
ruby-version: "4.0.0"
19+
ruby-version: "4.0.1"
2020
bundler: none
2121
- name: Install dependencies
2222
run: |

core/io.rbs

Lines changed: 0 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -2329,10 +2329,6 @@ class IO < Object
23292329
# Behaves like IO.read, except that the stream is opened in binary mode with
23302330
# ASCII-8BIT encoding.
23312331
#
2332-
# When called from class IO (but not subclasses of IO), this method has
2333-
# potential security vulnerabilities if called with untrusted input; see
2334-
# [Command Injection](rdoc-ref:security/command_injection.rdoc).
2335-
#
23362332
def self.binread: (path name, ?Integer? length, ?Integer offset) -> String
23372333

23382334
# <!--
@@ -2342,10 +2338,6 @@ class IO < Object
23422338
# Behaves like IO.write, except that the stream is opened in binary mode with
23432339
# ASCII-8BIT encoding.
23442340
#
2345-
# When called from class IO (but not subclasses of IO), this method has
2346-
# potential security vulnerabilities if called with untrusted input; see
2347-
# [Command Injection](rdoc-ref:security/command_injection.rdoc).
2348-
#
23492341
def self.binwrite: (path name, _ToS string, ?Integer offset, ?mode: String mode) -> Integer
23502342

23512343
# <!--
@@ -2582,10 +2574,6 @@ class IO < Object
25822574
# -->
25832575
# Calls the block with each successive line read from the stream.
25842576
#
2585-
# When called from class IO (but not subclasses of IO), this method has
2586-
# potential security vulnerabilities if called with untrusted input; see
2587-
# [Command Injection](rdoc-ref:security/command_injection.rdoc).
2588-
#
25892577
# The first argument must be a string that is the path to a file.
25902578
#
25912579
# With only argument `path` given, parses lines from the file at the given
@@ -2739,10 +2727,6 @@ class IO < Object
27392727
# Opens the stream, reads and returns some or all of its content, and closes the
27402728
# stream; returns `nil` if no bytes were read.
27412729
#
2742-
# When called from class IO (but not subclasses of IO), this method has
2743-
# potential security vulnerabilities if called with untrusted input; see
2744-
# [Command Injection](rdoc-ref:security/command_injection.rdoc).
2745-
#
27462730
# The first argument must be a string that is the path to a file.
27472731
#
27482732
# With only argument `path` given, reads in text mode and returns the entire
@@ -2782,10 +2766,6 @@ class IO < Object
27822766
# -->
27832767
# Returns an array of all lines read from the stream.
27842768
#
2785-
# When called from class IO (but not subclasses of IO), this method has
2786-
# potential security vulnerabilities if called with untrusted input; see
2787-
# [Command Injection](rdoc-ref:security/command_injection.rdoc).
2788-
#
27892769
# The first argument must be a string that is the path to a file.
27902770
#
27912771
# With only argument `path` given, parses lines from the file at the given
@@ -3007,10 +2987,6 @@ class IO < Object
30072987
# Opens the stream, writes the given `data` to it, and closes the stream;
30082988
# returns the number of bytes written.
30092989
#
3010-
# When called from class IO (but not subclasses of IO), this method has
3011-
# potential security vulnerabilities if called with untrusted input; see
3012-
# [Command Injection](rdoc-ref:security/command_injection.rdoc).
3013-
#
30142990
# The first argument must be a string that is the path to a file.
30152991
#
30162992
# With only argument `path` given, writes the given `data` to the file at that

core/kernel.rbs

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1253,9 +1253,6 @@ module Kernel : BasicObject
12531253
# -->
12541254
# Creates an IO object connected to the given file.
12551255
#
1256-
# This method has potential security vulnerabilities if called with untrusted
1257-
# input; see [Command Injection](rdoc-ref:security/command_injection.rdoc).
1258-
#
12591256
# With no block given, file stream is returned:
12601257
#
12611258
# open('t.txt') # => #<File:t.txt>

0 commit comments

Comments
 (0)