Skip to content

Conversation

@pboling
Copy link
Contributor

@pboling pboling commented Jul 23, 2025

No description provided.

- Support debug for debugging with Ruby >= 2.7
- Support byebug for debugging with Ruby < 2.7
…d matrix

- all current jruby and truffleruby are compatible with Ruby 3.1 at minimum, thus are supported by latest bundler
- Use strip_heredoc uniformly in acceptance tests
- Differences in handling of whitespace between versions of Ruby are often seen as minor, and go unnoticed unless tests explicitly test white space as appraisal's test suite does.
* 🐛 Ruby < 3.0 compat: Bifurcate the Modern Double Splat

* 🐛 Ruby < 3.0 compat: Bifurcate the Modern Double Splat (redux)

* 🐛 Ruby < 3.0 compat: Bifurcate the Modern Double Splat (redux deux)

* 🐛 Ruby < 3.0 compat: Bifurcate the Modern Double Splat (tiga)

* 🐛 Ruby < 3.0 compat: Bifurcate the Modern Double Splat (empat)
* 🐛 Ruby < 3.0 compat: Bifurcate the Modern Double Splat

* 🐛 Ruby < 3.0 compat: Bifurcate the Modern Double Splat (redux)

* 🐛 Ruby < 3.0 compat: Bifurcate the Modern Double Splat (redux deux)

* 🐛 Ruby < 3.0 compat: Bifurcate the Modern Double Splat (tiga)

* 🐛 Ruby < 3.0 compat: Bifurcate the Modern Double Splat (empat)

* 🚨 Style/SymbolArray: EnforcedStyle: brackets

- Ruby < 2 compat
* 🐛 Ruby < 3.0 compat: Bifurcate the Modern Double Splat

* 🐛 Ruby < 3.0 compat: Bifurcate the Modern Double Splat (redux)

* 🐛 Ruby < 3.0 compat: Bifurcate the Modern Double Splat (redux deux)

* 🐛 Ruby < 3.0 compat: Bifurcate the Modern Double Splat (tiga)

* 🐛 Ruby < 3.0 compat: Bifurcate the Modern Double Splat (empat)

* 🚨 Style/SymbolArray: EnforcedStyle: brackets

- Ruby < 2 compat

* 💚 Pend spec failure

- Possibly due to bundler issue on MRI and JRuby engines
- ruby/rubygems#8518

* 💚 skip tests that are known to fail on old bundler versions

* 💚 turn off truffleruby-head for now
✨ Support eval_gemfile & other stories
@pboling pboling closed this Jul 23, 2025
@github-advanced-security
Copy link

This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation.

def self.prefix_path(path)
if path !~ /^(?:\/|\S:)/ && path !~ /^\S+:\/\// && path !~ /^\S+@\S+:/
cleaned_path = path.gsub(/(^|\/)\.(?:\/|$)/, "\\1")
if path !~ %r{^(?:/|\S:)} && path !~ %r{^\S+://} && path !~ /^\S+@\S+:/

Check failure

Code scanning / CodeQL

Polynomial regular expression used on uncontrolled data High

This
regular expression
that depends on a
library input
may run slow on strings starting with '!@' and with many repetitions of '!@'.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant