diff options
author | sth <sth.dev@tejp.de> | 2020-05-26 04:08:40 (GMT) |
---|---|---|
committer | GitHub <noreply@github.com> | 2020-05-26 04:08:40 (GMT) |
commit | 4a0ac42c52a4d9ccfb0a78ab02aa03172ce0e31a (patch) | |
tree | 09870ae809bf3977fba012faf72f92f29cc40b3e /Doc/library/asyncio-subprocess.rst | |
parent | f7b1e461567e5e3fa3ba46f589d9edc1b45b2dd0 (diff) | |
download | cpython-4a0ac42c52a4d9ccfb0a78ab02aa03172ce0e31a.zip cpython-4a0ac42c52a4d9ccfb0a78ab02aa03172ce0e31a.tar.gz cpython-4a0ac42c52a4d9ccfb0a78ab02aa03172ce0e31a.tar.bz2 |
closes bpo-40774: Fix docs indentation for asyncio.create_subprocess_shell() (GH-20403)
Diffstat (limited to 'Doc/library/asyncio-subprocess.rst')
-rw-r--r-- | Doc/library/asyncio-subprocess.rst | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/Doc/library/asyncio-subprocess.rst b/Doc/library/asyncio-subprocess.rst index 1d87d2f..eb1312a 100644 --- a/Doc/library/asyncio-subprocess.rst +++ b/Doc/library/asyncio-subprocess.rst @@ -95,14 +95,14 @@ Creating Subprocesses See the documentation of :meth:`loop.subprocess_shell` for other parameters. -.. important:: - - It is the application's responsibility to ensure that all whitespace and - special characters are quoted appropriately to avoid `shell injection - <https://en.wikipedia.org/wiki/Shell_injection#Shell_injection>`_ - vulnerabilities. The :func:`shlex.quote` function can be used to properly - escape whitespace and special shell characters in strings that are going - to be used to construct shell commands. + .. important:: + + It is the application's responsibility to ensure that all whitespace and + special characters are quoted appropriately to avoid `shell injection + <https://en.wikipedia.org/wiki/Shell_injection#Shell_injection>`_ + vulnerabilities. The :func:`shlex.quote` function can be used to properly + escape whitespace and special shell characters in strings that are going + to be used to construct shell commands. .. deprecated-removed:: 3.8 3.10 |