irchtml Tue Feb 17 21:51:09 2004 EDT
Modified files:
/phpdoc/en language-snippets.ent
/phpdoc/en/reference/exec/functions exec.xml passthru.xml
system.xml
Log:
added entities for system/passthru (bug #27076)
moved common notes to language-snippets.ent
http://cvs.php.net/diff.php/phpdoc/en/language-snippets.ent?r1=1.75&r2=1.76&ty=u
Index: phpdoc/en/language-snippets.ent
diff -u phpdoc/en/language-snippets.ent:1.75 phpdoc/en/language-snippets.ent:1.76
--- phpdoc/en/language-snippets.ent:1.75 Tue Feb 17 13:49:39 2004
+++ phpdoc/en/language-snippets.ent Tue Feb 17 21:51:08 2004
@@ -1,4 +1,4 @@
-<!-- $Revision: 1.75 $ -->
+<!-- $Revision: 1.76 $ -->
<!ENTITY warn.experimental '<warning><simpara>This extension is
<emphasis>EXPERIMENTAL</emphasis>. The behaviour of this extension --
@@ -128,6 +128,17 @@
array containing an object reference and a method name can also be
supplied.</simpara></note>'>
+<!ENTITY warn.escapeshell '<warning><para>If you are going to allow data coming
+from user input to be passed to this function, then you should be using
+<function>escapeshellarg</function> or <function>escapeshellcmd</function>
+to make sure that users cannot trick the system into executing arbitrary
+commands.</para></warning>'>
+
+<!ENTITY note.exec-bg '<note><para>If you start a program using this function
+and want to leave it running in the background, you have to make sure that the
+output of that program is redirected to a file or some other output stream or
+else PHP will hang until the execution of the program ends.</para></note>'>
+
<!-- Notes for safe-mode limited functions: -->
<!ENTITY note.sm.disabled '<note><simpara>&sm.disabled;</simpara></note>'>
@@ -157,6 +168,12 @@
all words following the initial command string are treated as a single argument.
Thus,
<literal>echo y | echo x</literal> becomes <literal>echo "y | echo
x"</literal>.</simpara></warning>'>
+<!ENTITY note.exec-path '<note><simpara>When
+<link linkend="features.safe-mode">safe mode</link> is enabled, you can only
+execute executables within the <link
linkend="ini.safe-mode-exec-dir">safe_mode_exec_dir</link>.
+For practical reasons it is currently not allowed to have <literal>..</literal>
+components in the path to the executable. </simpara></note>'>
+
<!ENTITY sm.uidcheck.dir 'Checks whether the directory in which
you are about to operate has the same UID (owner) as the script that is being
executed.'>
http://cvs.php.net/diff.php/phpdoc/en/reference/exec/functions/exec.xml?r1=1.9&r2=1.10&ty=u
Index: phpdoc/en/reference/exec/functions/exec.xml
diff -u phpdoc/en/reference/exec/functions/exec.xml:1.9
phpdoc/en/reference/exec/functions/exec.xml:1.10
--- phpdoc/en/reference/exec/functions/exec.xml:1.9 Tue Feb 17 13:55:55 2004
+++ phpdoc/en/reference/exec/functions/exec.xml Tue Feb 17 21:51:09 2004
@@ -1,5 +1,5 @@
<?xml version="1.0" encoding="iso-8859-1"?>
-<!-- $Revision: 1.9 $ -->
+<!-- $Revision: 1.10 $ -->
<!-- splitted from ./en/functions/exec.xml, last change in rev 1.2 -->
<refentry id="function.exec">
<refnamediv>
@@ -39,32 +39,9 @@
return status of the executed command will be written to this
variable.
</para>
- <warning>
- <para>
- If you are going to allow data coming from user input to be passed to
- this function, then you should be using
- <function>escapeshellarg</function> or
- <function>escapeshellcmd</function> to make sure that users cannot trick
- the system into executing arbitrary commands.
- </para>
- </warning>
- <note>
- <para>
- If you start a program using this function and want to leave it running
- in the background, you have to make sure that the output of that program
- is redirected to a file or some other output stream or else PHP will
- hang until the execution of the program ends.
- </para>
- </note>
- <note>
- <simpara>
- When <link linkend="features.safe-mode">safe mode</link> is enabled, you
- can only execute executables within the <link
- linkend="ini.safe-mode-exec-dir">safe_mode_exec_dir</link>. For
- practical reasons it's currently not allowed to have
- <literal>..</literal> components in the path to the executable.
- </simpara>
- </note>
+ &warn.escapeshell;
+ ¬e.exec-bg;
+ ¬e.exec-path;
&warn.sm.exec;
<para>
See also <function>system</function>,
http://cvs.php.net/diff.php/phpdoc/en/reference/exec/functions/passthru.xml?r1=1.3&r2=1.4&ty=u
Index: phpdoc/en/reference/exec/functions/passthru.xml
diff -u phpdoc/en/reference/exec/functions/passthru.xml:1.3
phpdoc/en/reference/exec/functions/passthru.xml:1.4
--- phpdoc/en/reference/exec/functions/passthru.xml:1.3 Wed Dec 31 05:39:42 2003
+++ phpdoc/en/reference/exec/functions/passthru.xml Tue Feb 17 21:51:09 2004
@@ -1,5 +1,5 @@
<?xml version="1.0" encoding="iso-8859-1"?>
-<!-- $Revision: 1.3 $ -->
+<!-- $Revision: 1.4 $ -->
<!-- splitted from ./en/functions/exec.xml, last change in rev 1.2 -->
<refentry id="function.passthru">
<refnamediv>
@@ -30,32 +30,10 @@
then calling a pbmplus program to output a gif, you can create
PHP scripts that output images directly.
</para>
- <warning>
- <para>
- If you are going to allow data coming from user input to be passed to
- this function, then you should be using
- <function>escapeshellarg</function> or
- <function>escapeshellcmd</function> to make sure that users cannot trick
- the system into executing arbitrary commands.
- </para>
- </warning>
- <note>
- <para>
- If you start a program using this function and want to leave it running
- in the background, you have to make sure that the output of that program
- is redirected to a file or some other output stream or else PHP will
- hang until the execution of the program ends.
- </para>
- </note>
- <note>
- <simpara>
- When <link linkend="features.safe-mode">safe mode</link> is enabled, you
- can only execute executables within the <link
- linkend="ini.safe-mode-exec-dir">safe_mode_exec_dir</link>. For
- practical reasons it's currently not allowed to have
- <literal>..</literal> components in the path to the executable.
- </simpara>
- </note>
+ &warn.escapeshell;
+ ¬e.exec-bg;
+ ¬e.exec-path;
+ &warn.sm.exec;
<para>
See also <function>exec</function>, <function>system</function>,
<function>popen</function>, <function>escapeshellcmd</function>,
http://cvs.php.net/diff.php/phpdoc/en/reference/exec/functions/system.xml?r1=1.7&r2=1.8&ty=u
Index: phpdoc/en/reference/exec/functions/system.xml
diff -u phpdoc/en/reference/exec/functions/system.xml:1.7
phpdoc/en/reference/exec/functions/system.xml:1.8
--- phpdoc/en/reference/exec/functions/system.xml:1.7 Tue Feb 17 13:55:55 2004
+++ phpdoc/en/reference/exec/functions/system.xml Tue Feb 17 21:51:09 2004
@@ -1,5 +1,5 @@
<?xml version="1.0" encoding="iso-8859-1"?>
-<!-- $Revision: 1.7 $ -->
+<!-- $Revision: 1.8 $ -->
<!-- splitted from ./en/functions/exec.xml, last change in rev 1.24 -->
<refentry id="function.system">
<refnamediv>
@@ -21,23 +21,8 @@
status code of the executed command will be written to this
variable.
</para>
- <warning>
- <para>
- If you are going to allow data coming from user input to be passed to
- this function, then you should be using
- <function>escapeshellarg</function> or
- <function>escapeshellcmd</function> to make sure that users cannot trick
- the system into executing arbitrary commands.
- </para>
- </warning>
- <note>
- <para>
- If you start a program using this function and want to leave it running
- in the background, you have to make sure that the output of that program
- is redirected to a file or some other output stream or else PHP will
- hang until the execution of the program ends.
- </para>
- </note>
+ &warn.escapeshell;
+ ¬e.exec-bg;
<para>
The <function>system</function> call also tries to automatically
flush the web server's output buffer after each line of output if
@@ -75,15 +60,7 @@
</programlisting>
</example>
</para>
- <note>
- <simpara>
- When <link linkend="features.safe-mode">safe mode</link> is enabled, you
- can only execute executables within the <link
- linkend="ini.safe-mode-exec-dir">safe_mode_exec_dir</link>. For
- practical reasons it's currently not allowed to have
- <literal>..</literal> components in the path to the executable.
- </simpara>
- </note>
+ ¬e.exec-path;
&warn.sm.exec;
<para>
See also <function>exec</function>,