File: remove-xkcd-mediaobjects.patch

package info (click to toggle)
php-doc 20250827~git.abe740d%2Bdfsg-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 71,968 kB
  • sloc: xml: 985,760; php: 25,504; javascript: 671; sh: 177; makefile: 37
file content (53 lines) | stat: -rw-r--r-- 1,841 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
Description: Remove xkcd mediaobjects
 Two xkcd images were removed from this package sources due to licensing issues
 (see d/copyright). This patch changes the references to the (no longer)
 embedded images to just reference the xkcd URLs.
Author: Athos Ribeiro <athos.ribeiro@canonical.com>
Forwarded: not-needed
Last-Update: 2022-10-03
---
This patch header follows DEP-3: http://dep.debian.net/deps/dep3/
--- a/en/language/control-structures/goto.xml
+++ b/en/language/control-structures/goto.xml
@@ -5,17 +5,8 @@
  <title>goto</title>
  <?phpdoc print-version-for="goto"?>
  <para>
-  <mediaobject>
-   <alt>What's the worse thing that could happen if you use goto?</alt>
-   <imageobject>
-    <imagedata fileref="en/language/figures/xkcd-goto.png" format="PNG"/>
-   </imageobject>
-   <caption>
-    <simpara>
-     Image courtesy of <link xlink:href="&url.xkcd;292">xkcd</link>
-    </simpara>
-   </caption>
-  </mediaobject>
+  What's the worse thing that could happen if you use goto (xkcd URL)?
+  <link xlink:href="&url.xkcd;292">xkcd</link>
  </para>
  <para>
   The <literal>goto</literal> operator can be used to jump to another
--- a/en/security/database.xml
+++ b/en/security/database.xml
@@ -338,17 +338,8 @@
      </para>
     </note>
     <para>
-     <mediaobject>
-      <alt>A funny example of the issues regarding SQL injection</alt>
-      <imageobject>
-       <imagedata fileref="en/security/figures/xkcd-bobby-tables.png" format="PNG"/>
-      </imageobject>
-      <caption>
-       <simpara>
-        Image courtesy of <link xlink:href="&url.xkcd;327">xkcd</link>
-       </simpara>
-      </caption>
-     </mediaobject>
+     A funny example of the issues regarding SQL Injection (xkcd URL):
+     <link xlink:href="&url.xkcd;327">xkcd</link>
     </para>
 
     <sect2 xml:id="security.database.avoiding">