You are viewing a plain text version of this content. The canonical link for it is here.
Posted to notifications@freemarker.apache.org by dd...@apache.org on 2020/10/13 20:01:31 UTC
[freemarker] branch 2.3-gae updated: (Manual: Was using an element
unsupported by Docgen)
This is an automated email from the ASF dual-hosted git repository.
ddekany pushed a commit to branch 2.3-gae
in repository https://gitbox.apache.org/repos/asf/freemarker.git
The following commit(s) were added to refs/heads/2.3-gae by this push:
new 6d326b0 (Manual: Was using an element unsupported by Docgen)
6d326b0 is described below
commit 6d326b07f1c0d8168bf5f1c84d696dbbcc0e608b
Author: ddekany <dd...@apache.org>
AuthorDate: Tue Oct 13 22:01:24 2020 +0200
(Manual: Was using an element unsupported by Docgen)
---
src/manual/en_US/book.xml | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/src/manual/en_US/book.xml b/src/manual/en_US/book.xml
index 4d5fba3..a83ec5d 100644
--- a/src/manual/en_US/book.xml
+++ b/src/manual/en_US/book.xml
@@ -19173,7 +19173,7 @@ Filer for positives:
linkend="ref_builtin_interpret"><literal>interpret</literal>
built-in</link> instead.)</para>
- <important>
+ <warning>
<para>Do not use this to evaluate JSON! For that use the <link
linkend="ref_builtin_eval_json"><literal>eval_json</literal>
built-in</link> instead. While FTL expression language looks
@@ -19181,7 +19181,7 @@ Filer for positives:
expressions can access variables, and call Java methods on them,
so if you <literal>?eval</literal> strings coming from untrusted
source, it can become an attack vector.</para>
- </important>
+ </warning>
<para>The evaluated expression sees the same variables (such as
locals) that are visible at the place of the invocation of