You are viewing a plain text version of this content. The canonical link for it is here.
Posted to notifications@freemarker.apache.org by dd...@apache.org on 2020/10/13 20:01:31 UTC

[freemarker] branch 2.3-gae updated: (Manual: Was using an element unsupported by Docgen)

This is an automated email from the ASF dual-hosted git repository.

ddekany pushed a commit to branch 2.3-gae
in repository https://gitbox.apache.org/repos/asf/freemarker.git


The following commit(s) were added to refs/heads/2.3-gae by this push:
     new 6d326b0  (Manual: Was using an element unsupported by Docgen)
6d326b0 is described below

commit 6d326b07f1c0d8168bf5f1c84d696dbbcc0e608b
Author: ddekany <dd...@apache.org>
AuthorDate: Tue Oct 13 22:01:24 2020 +0200

    (Manual: Was using an element unsupported by Docgen)
---
 src/manual/en_US/book.xml | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/src/manual/en_US/book.xml b/src/manual/en_US/book.xml
index 4d5fba3..a83ec5d 100644
--- a/src/manual/en_US/book.xml
+++ b/src/manual/en_US/book.xml
@@ -19173,7 +19173,7 @@ Filer for positives:
           linkend="ref_builtin_interpret"><literal>interpret</literal>
           built-in</link> instead.)</para>
 
-          <important>
+          <warning>
             <para>Do not use this to evaluate JSON! For that use the <link
             linkend="ref_builtin_eval_json"><literal>eval_json</literal>
             built-in</link> instead. While FTL expression language looks
@@ -19181,7 +19181,7 @@ Filer for positives:
             expressions can access variables, and call Java methods on them,
             so if you <literal>?eval</literal> strings coming from untrusted
             source, it can become an attack vector.</para>
-          </important>
+          </warning>
 
           <para>The evaluated expression sees the same variables (such as
           locals) that are visible at the place of the invocation of