Skip to content

Commit 5e55cfc

Browse files
committed
doc(yank): mention [email protected] and revoking creds
1 parent fca2136 commit 5e55cfc

File tree

4 files changed

+36
-0
lines changed

4 files changed

+36
-0
lines changed

src/doc/man/cargo-yank.md

+9
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,16 @@ A common workflow is to yank a crate having already published a semver
6161
compatible version, to reduce the probability of preventing dependent
6262
crates from compiling.
6363

64+
To address copyright, licensing, or personal data issues with your published
65+
crate, contact the maintainers of the registry you used. For crates.io, refer
66+
to their [policies] and contact them at <[email protected]>.
67+
68+
If your credentials have been leaked, the recommended process is to revoke them
69+
immediately. Once a crate is published, it's impossible to know if those leaked
70+
credentials have been copied, so taking swift action is crucial.
71+
6472
[RustSec]: https://rustsec.org/
73+
[policies]: https://crates.io/policies
6574

6675
## OPTIONS
6776

src/doc/man/generated_txt/cargo-yank.txt

+10
Original file line numberDiff line numberDiff line change
@@ -66,6 +66,16 @@ DESCRIPTION
6666
compatible version, to reduce the probability of preventing dependent
6767
crates from compiling.
6868

69+
To address copyright, licensing, or personal data issues with your
70+
published crate, contact the maintainers of the registry you used. For
71+
crates.io, refer to their policies <https://crates.io/policies> and
72+
contact them at <[email protected]>.
73+
74+
If your credentials have been leaked, the recommended process is to
75+
revoke them immediately. Once a crate is published, it’s impossible to
76+
know if those leaked credentials have been copied, so taking swift
77+
action is crucial.
78+
6979
OPTIONS
7080
Yank Options
7181
--vers version, --version version

src/doc/src/commands/cargo-yank.md

+9
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,16 @@ A common workflow is to yank a crate having already published a semver
6161
compatible version, to reduce the probability of preventing dependent
6262
crates from compiling.
6363

64+
To address copyright, licensing, or personal data issues with your published
65+
crate, contact the maintainers of the registry you used. For crates.io, refer
66+
to their [policies] and contact them at <[email protected]>.
67+
68+
If your credentials have been leaked, the recommended process is to revoke them
69+
immediately. Once a crate is published, it's impossible to know if those leaked
70+
credentials have been copied, so taking swift action is crucial.
71+
6472
[RustSec]: https://rustsec.org/
73+
[policies]: https://crates.io/policies
6574

6675
## OPTIONS
6776

src/etc/man/cargo-yank.1

+8
Original file line numberDiff line numberDiff line change
@@ -91,6 +91,14 @@ irrespective of susceptibility to the vulnerability in question.
9191
A common workflow is to yank a crate having already published a semver
9292
compatible version, to reduce the probability of preventing dependent
9393
crates from compiling.
94+
.sp
95+
To address copyright, licensing, or personal data issues with your published
96+
crate, contact the maintainers of the registry you used. For crates.io, refer
97+
to their \fIpolicies\fR <https://crates.io/policies> and contact them at <[email protected]>\&.
98+
.sp
99+
If your credentials have been leaked, the recommended process is to revoke them
100+
immediately. Once a crate is published, it\[cq]s impossible to know if those leaked
101+
credentials have been copied, so taking swift action is crucial.
94102
.SH "OPTIONS"
95103
.SS "Yank Options"
96104
.sp

0 commit comments

Comments
 (0)