From 335bbbc98b4296c5835b3cf863b4e58875769aa5 Mon Sep 17 00:00:00 2001 From: Christoph Otter Date: Wed, 31 May 2023 09:19:57 +0200 Subject: [PATCH] Fix deserialize calls in doc comments --- lib/api/src/module.rs | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/lib/api/src/module.rs b/lib/api/src/module.rs index 830e31db7ff..52bf98ae30b 100644 --- a/lib/api/src/module.rs +++ b/lib/api/src/module.rs @@ -238,7 +238,7 @@ impl Module { /// a malicious actor could inject code into executable /// memory. /// - /// And as such, the `deserialize` method is unsafe. + /// And as such, the `deserialize_unchecked` method is unsafe. /// /// # Usage /// @@ -246,7 +246,7 @@ impl Module { /// # use wasmer::*; /// # fn main() -> anyhow::Result<()> { /// # let mut store = Store::default(); - /// let module = Module::deserialize(&store, serialized_data)?; + /// let module = Module::deserialize_unchecked(&store, serialized_data)?; /// # Ok(()) /// # } /// ``` @@ -300,7 +300,7 @@ impl Module { /// # use wasmer::*; /// # let mut store = Store::default(); /// # fn main() -> anyhow::Result<()> { - /// let module = Module::deserialize_from_file_checked(&store, path)?; + /// let module = Module::deserialize_from_file(&store, path)?; /// # Ok(()) /// # } /// ```