diff options
author | Benjamin Peterson <benjamin@python.org> | 2020-05-26 04:19:42 (GMT) |
---|---|---|
committer | GitHub <noreply@github.com> | 2020-05-26 04:19:42 (GMT) |
commit | b03e0ee226b72da737dd0fbf39b635d13bcc220d (patch) | |
tree | 1bead1cd9c4d50bbd8a3a2e50910c42ff09f096c | |
parent | 791a46ed58f74d673cf2c0d81deec57155bf7583 (diff) | |
download | cpython-b03e0ee226b72da737dd0fbf39b635d13bcc220d.zip cpython-b03e0ee226b72da737dd0fbf39b635d13bcc220d.tar.gz cpython-b03e0ee226b72da737dd0fbf39b635d13bcc220d.tar.bz2 |
[3.9] closes bpo-40774: Fix docs indentation for asyncio.create_subprocess_shell() (GH-20403) (#20407)
(cherry picked from commit 4a0ac42)
Co-authored-by: sth <sth.dev@tejp.de>
-rw-r--r-- | Doc/library/asyncio-subprocess.rst | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/Doc/library/asyncio-subprocess.rst b/Doc/library/asyncio-subprocess.rst index 1d87d2f..eb1312a 100644 --- a/Doc/library/asyncio-subprocess.rst +++ b/Doc/library/asyncio-subprocess.rst @@ -95,14 +95,14 @@ Creating Subprocesses See the documentation of :meth:`loop.subprocess_shell` for other parameters. -.. important:: - - It is the application's responsibility to ensure that all whitespace and - special characters are quoted appropriately to avoid `shell injection - <https://en.wikipedia.org/wiki/Shell_injection#Shell_injection>`_ - vulnerabilities. The :func:`shlex.quote` function can be used to properly - escape whitespace and special shell characters in strings that are going - to be used to construct shell commands. + .. important:: + + It is the application's responsibility to ensure that all whitespace and + special characters are quoted appropriately to avoid `shell injection + <https://en.wikipedia.org/wiki/Shell_injection#Shell_injection>`_ + vulnerabilities. The :func:`shlex.quote` function can be used to properly + escape whitespace and special shell characters in strings that are going + to be used to construct shell commands. .. deprecated-removed:: 3.8 3.10 |