From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on dcvr.yhbt.net X-Spam-Level: X-Spam-ASN: X-Spam-Status: No, score=-2.8 required=3.0 tests=AWL,BAYES_00,DKIM_INVALID, DKIM_SIGNED,MAILING_LIST_MULTI,RCVD_IN_BL_SPAMCOP_NET,SPF_HELO_PASS, SPF_PASS,UNPARSEABLE_RELAY shortcircuit=no autolearn=no autolearn_force=no version=3.4.2 Received: from nue.mailmanlists.eu (nue.mailmanlists.eu [IPv6:2a01:4f8:1c0c:6b10::1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by dcvr.yhbt.net (Postfix) with ESMTPS id 730251F61A for ; Tue, 13 Dec 2022 07:16:17 +0000 (UTC) Authentication-Results: dcvr.yhbt.net; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=ruby-lang.org header.i=@ruby-lang.org header.b="DHVihZJn"; dkim-atps=neutral Received: from nue.mailmanlists.eu (localhost [127.0.0.1]) by nue.mailmanlists.eu (Postfix) with ESMTP id 1B89F7E6C8; Tue, 13 Dec 2022 07:16:05 +0000 (UTC) Authentication-Results: nue.mailmanlists.eu; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=ruby-lang.org header.i=@ruby-lang.org header.a=rsa-sha256 header.s=s1 header.b=DHVihZJn; dkim-atps=neutral Received: from o1678948x4.outbound-mail.sendgrid.net (o1678948x4.outbound-mail.sendgrid.net [167.89.48.4]) by nue.mailmanlists.eu (Postfix) with ESMTPS id 9A6E37E589 for ; Tue, 13 Dec 2022 07:15:59 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ruby-lang.org; h=from:references:subject:mime-version:content-type: content-transfer-encoding:list-id:to:cc:content-type:from:subject:to; s=s1; bh=x9p7jeCZIHAFTdJU3cSAV11qFDoXRv0d4lxlHfF66KE=; b=DHVihZJnIlmtxy0g7iQorgYhB9ZXpQT/bOEtk8Ud9vtEGFTDynPMVynDypt6DGVcVqom tHQGdphqm/NLBwszvECarXwCEjWeRUznw0G4SIxMROn7MI8x4aFmhEADSEUEs8mcmdlejd qg+eOa0HuYH45rDxNWNETj5PgMP3qDH3V5ytGa3w80I2ksS9PHLtQdeUFZANSPQ0RIy1nL 746Ax1aANe8nEdx5u38lZLTYYEmtdyO+VbeGvW1RFlwwOnbSRn/5Z3e5BFVpmYT9g27SqK xDSJcyqWWFFNR1UrfSGqNlF7fEQiQdhexJbMOfdnAmzfAMbWCCjD8LGdwTEotaZg== Received: by filterdrecv-6c4ccfbdd8-wnrfr with SMTP id filterdrecv-6c4ccfbdd8-wnrfr-1-639826AD-1B 2022-12-13 07:15:57.927519062 +0000 UTC m=+2189426.379633189 Received: from herokuapp.com (unknown) by geopod-ismtpd-4-1 (SG) with ESMTP id 8p76ZBQ-RjijJdjSp8N2Qg for ; Tue, 13 Dec 2022 07:15:57.768 +0000 (UTC) Date: Tue, 13 Dec 2022 07:15:57 +0000 (UTC) From: "hsbt (Hiroshi SHIBATA)" Message-ID: References: Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Redmine-Project: ruby-master X-Redmine-Issue-Tracker: Feature X-Redmine-Issue-Id: 19194 X-Redmine-Issue-Author: make_now_just X-Redmine-Issue-Assignee: make_now_just X-Redmine-Sender: hsbt X-Mailer: Redmine X-Redmine-Host: bugs.ruby-lang.org X-Redmine-Site: Ruby Issue Tracking System X-Auto-Response-Suppress: All Auto-Submitted: auto-generated X-Redmine-MailingListIntegration-Message-Ids: 87667 X-SG-EID: =?us-ascii?Q?BAqCsB0mvMCnHXWkBD9MTHUyV8AfYOY3mM6FlznSxbO5US8=2FSBDCMBBYmmIAuU?= =?us-ascii?Q?TeaKG5YiQzAGgZc0jHcwXZVFMafO4FzN+zEifU7?= =?us-ascii?Q?=2FXM1+dUVpgXhVkGpV3vJmYWzgevLD1YSCuM8rBl?= =?us-ascii?Q?n67yeHttVX28NawRt71FCHKQL1DeJoSjbaE6sGc?= =?us-ascii?Q?l2f8BzyQo+Z66RrstofdBcQbUgnDhA3JG4+03jB?= =?us-ascii?Q?Z=2F9b843=2FgIVL7SvckftBHzZaZqAKMuX2HCIE5oe?= =?us-ascii?Q?JKaILBXs1m5I8t6NPB4QA=3D=3D?= To: ruby-dev@ml.ruby-lang.org X-Entity-ID: b/2+PoftWZ6GuOu3b0IycA== Message-ID-Hash: OFPSFXQ62N73D3F4APBE5MBZ6O2V2BL3 X-Message-ID-Hash: OFPSFXQ62N73D3F4APBE5MBZ6O2V2BL3 X-MailFrom: bounces+313651-12dc-ruby-dev=ml.ruby-lang.org@em5188.ruby-lang.org X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header X-Mailman-Version: 3.3.3 Precedence: list Reply-To: "Ruby developers (Japanese)" Subject: =?utf-8?q?=5Bruby-dev=3A52024=5D_?= [Ruby master Feature#19194] Add Regexp.linear_time? List-Id: "Ruby developers (Japanese)" Archived-At: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: Issue #19194 has been updated by hsbt (Hiroshi SHIBATA). >May I merge the pull request on GitHub? Yes, you can merge it. I meant commit and push to master branch directly or merge pull-request. ---------------------------------------- Feature #19194: Add Regexp.linear_time? https://bugs.ruby-lang.org/issues/19194#change-100619 * Author: make_now_just (Hiroya Fujinami) * Status: Assigned * Priority: Normal * Assignee: make_now_just (Hiroya Fujinami) * Target version: 3.2 ---------------------------------------- I suggest adding a new method named `Regexp.linear_time?` to check if matching against a given regexp can be completed in linear time by the optimization introduced in #19104 (GitHub PR [#6486](https://github.com/ruby/ruby/pull/6486)). This method was discussed in #19104. I'm not sure the name is best. # Example ``` Regexp.linear_time?(/a/) # => true Regexp.linear_time?(/(a|a)*\1/) # => false, because this uses a back-reference. # This can accept a regexp source string and flags like `Regexp.new`. Regexp.linear_time?('a') # => true Regexp.linear_time?('a', Regexp::IGNORECASE) # => true ``` For example, this method is useful for implementing a Rubocop rule to check a regexp is ReDoS safe. # Implementation Implementation is done at GitHub PR [#6901](https://github.com/ruby/ruby/pull/6901). See the details there. -- https://bugs.ruby-lang.org/