Skip to content

Commit fca2136

Browse files
committed
doc(yank): when to yank
1 parent b4e82f0 commit fca2136

File tree

4 files changed

+32
-29
lines changed

4 files changed

+32
-29
lines changed

src/doc/man/cargo-yank.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -50,18 +50,19 @@ requirements, following a given release being yanked:
5050

5151
### When to yank
5252

53-
Crates should only be yanked in exceptional circumstances, for example,
54-
license/copyright issues, accidental inclusion of
55-
[PII](https://en.wikipedia.org/wiki/Personal_data), credentials, etc...
56-
In the case of security vulnerabilities, [RustSec](https://rustsec.org/) is
57-
typically a less disruptive mechanism to inform users and encourage them to
58-
upgrade, and avoids the possibility of significant downstream disruption
53+
Crates should only be yanked in exceptional circumstances, for example, an
54+
accidental publish, an unintentional SemVer breakages, or a significantly
55+
broken and unusable crate. In the case of security vulnerabilities, [RustSec]
56+
is typically a less disruptive mechanism to inform users and encourage them
57+
to upgrade, and avoids the possibility of significant downstream disruption
5958
irrespective of susceptibility to the vulnerability in question.
6059

6160
A common workflow is to yank a crate having already published a semver
6261
compatible version, to reduce the probability of preventing dependent
6362
crates from compiling.
6463

64+
[RustSec]: https://rustsec.org/
65+
6566
## OPTIONS
6667

6768
### Yank Options

src/doc/man/generated_txt/cargo-yank.txt

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -55,13 +55,12 @@ DESCRIPTION
5555

5656
When to yank
5757
Crates should only be yanked in exceptional circumstances, for example,
58-
license/copyright issues, accidental inclusion of PII
59-
<https://en.wikipedia.org/wiki/Personal_data>, credentials, etc… In
60-
the case of security vulnerabilities, RustSec <https://rustsec.org/> is
61-
typically a less disruptive mechanism to inform users and encourage them
62-
to upgrade, and avoids the possibility of significant downstream
63-
disruption irrespective of susceptibility to the vulnerability in
64-
question.
58+
an accidental publish, an unintentional SemVer breakages, or a
59+
significantly broken and unusable crate. In the case of security
60+
vulnerabilities, RustSec <https://rustsec.org/> is typically a less
61+
disruptive mechanism to inform users and encourage them to upgrade, and
62+
avoids the possibility of significant downstream disruption irrespective
63+
of susceptibility to the vulnerability in question.
6564

6665
A common workflow is to yank a crate having already published a semver
6766
compatible version, to reduce the probability of preventing dependent
@@ -169,3 +168,4 @@ EXAMPLES
169168

170169
SEE ALSO
171170
cargo(1), cargo-login(1), cargo-publish(1)
171+

src/doc/src/commands/cargo-yank.md

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -50,16 +50,18 @@ requirements, following a given release being yanked:
5050

5151
### When to yank
5252

53-
Crates should only be yanked in exceptional circumstances, for example,
54-
license/copyright issues, accidental inclusion of
55-
[PII](https://en.wikipedia.org/wiki/Personal_data), credentials, etc...
56-
In the case of security vulnerabilities, [RustSec](https://rustsec.org/) is
57-
typically a less disruptive mechanism to inform users and encourage them to
58-
upgrade, and avoids the possibility of significant downstream disruption
53+
Crates should only be yanked in exceptional circumstances, for example, an
54+
accidental publish, an unintentional SemVer breakages, or a significantly
55+
broken and unusable crate. In the case of security vulnerabilities, [RustSec]
56+
is typically a less disruptive mechanism to inform users and encourage them
57+
to upgrade, and avoids the possibility of significant downstream disruption
5958
irrespective of susceptibility to the vulnerability in question.
6059

61-
A common workflow is to yank a crate having already published a semver compatible version,
62-
to reduce the probability of preventing dependent crates from compiling.
60+
A common workflow is to yank a crate having already published a semver
61+
compatible version, to reduce the probability of preventing dependent
62+
crates from compiling.
63+
64+
[RustSec]: https://rustsec.org/
6365

6466
## OPTIONS
6567

src/etc/man/cargo-yank.1

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -81,16 +81,16 @@ T}
8181
.TE
8282
.sp
8383
.SS "When to yank"
84-
Crates should only be yanked in exceptional circumstances, for example,
85-
license/copyright issues, accidental inclusion of
86-
\fIPII\fR <https://en.wikipedia.org/wiki/Personal_data>, credentials, etc\[u2026]
87-
In the case of security vulnerabilities, \fIRustSec\fR <https://rustsec.org/> is
88-
typically a less disruptive mechanism to inform users and encourage them to
89-
upgrade, and avoids the possibility of significant downstream disruption
84+
Crates should only be yanked in exceptional circumstances, for example, an
85+
accidental publish, an unintentional SemVer breakages, or a significantly
86+
broken and unusable crate. In the case of security vulnerabilities, \fIRustSec\fR <https://rustsec.org/>
87+
is typically a less disruptive mechanism to inform users and encourage them
88+
to upgrade, and avoids the possibility of significant downstream disruption
9089
irrespective of susceptibility to the vulnerability in question.
9190
.sp
92-
A common workflow is to yank a crate having already published a semver compatible version,
93-
to reduce the probability of preventing dependent crates from compiling.
91+
A common workflow is to yank a crate having already published a semver
92+
compatible version, to reduce the probability of preventing dependent
93+
crates from compiling.
9494
.SH "OPTIONS"
9595
.SS "Yank Options"
9696
.sp

0 commit comments

Comments
 (0)