Update Kernel#load documentation to remove phrase related to protection

Code loaded via Kernel#load can modify the global namespace even
if the wrap parameter is provided.

Fixes [Bug #19990]
This commit is contained in:
Jeremy Evans 2024-01-11 12:52:14 -08:00
parent 76a207e542
commit eb8df2fa7a

5
load.c
View File

@ -883,9 +883,8 @@ rb_load_protect(VALUE fname, int wrap, int *pstate)
* LoadError will be raised.
*
* If the optional _wrap_ parameter is +true+, the loaded script will
* be executed under an anonymous module, protecting the calling
* program's global namespace. If the optional _wrap_ parameter is a
* module, the loaded script will be executed under the given module.
* be executed under an anonymous module. If the optional _wrap_ parameter
* is a module, the loaded script will be executed under the given module.
* In no circumstance will any local variables in the loaded file be
* propagated to the loading environment.
*/