[Python-checkins] closes bpo-40774: Fix docs indentation for asyncio.create_subprocess_shell() (GH-20403)

sth webhook-mailer at python.org
Tue May 26 00:08:45 EDT 2020


https://github.com/python/cpython/commit/4a0ac42c52a4d9ccfb0a78ab02aa03172ce0e31a
commit: 4a0ac42c52a4d9ccfb0a78ab02aa03172ce0e31a
branch: master
author: sth <sth.dev at tejp.de>
committer: GitHub <noreply at github.com>
date: 2020-05-25T23:08:40-05:00
summary:

closes bpo-40774: Fix docs indentation for asyncio.create_subprocess_shell() (GH-20403)

files:
M Doc/library/asyncio-subprocess.rst

diff --git a/Doc/library/asyncio-subprocess.rst b/Doc/library/asyncio-subprocess.rst
index 1d87d2f8005ec..eb1312a949a10 100644
--- a/Doc/library/asyncio-subprocess.rst
+++ b/Doc/library/asyncio-subprocess.rst
@@ -95,14 +95,14 @@ Creating Subprocesses
    See the documentation of :meth:`loop.subprocess_shell` for other
    parameters.
 
-.. important::
-
-   It is the application's responsibility to ensure that all whitespace and
-   special characters are quoted appropriately to avoid `shell injection
-   <https://en.wikipedia.org/wiki/Shell_injection#Shell_injection>`_
-   vulnerabilities. The :func:`shlex.quote` function can be used to properly
-   escape whitespace and special shell characters in strings that are going
-   to be used to construct shell commands.
+   .. important::
+
+      It is the application's responsibility to ensure that all whitespace and
+      special characters are quoted appropriately to avoid `shell injection
+      <https://en.wikipedia.org/wiki/Shell_injection#Shell_injection>`_
+      vulnerabilities. The :func:`shlex.quote` function can be used to properly
+      escape whitespace and special shell characters in strings that are going
+      to be used to construct shell commands.
 
    .. deprecated-removed:: 3.8 3.10
 



More information about the Python-checkins mailing list