[Python-checkins] closes bpo-40774: Fix docs indentation for asyncio.create_subprocess_shell() (GH-20403)
sth
webhook-mailer at python.org
Tue May 26 00:08:45 EDT 2020
https://github.com/python/cpython/commit/4a0ac42c52a4d9ccfb0a78ab02aa03172ce0e31a
commit: 4a0ac42c52a4d9ccfb0a78ab02aa03172ce0e31a
branch: master
author: sth <sth.dev at tejp.de>
committer: GitHub <noreply at github.com>
date: 2020-05-25T23:08:40-05:00
summary:
closes bpo-40774: Fix docs indentation for asyncio.create_subprocess_shell() (GH-20403)
files:
M Doc/library/asyncio-subprocess.rst
diff --git a/Doc/library/asyncio-subprocess.rst b/Doc/library/asyncio-subprocess.rst
index 1d87d2f8005ec..eb1312a949a10 100644
--- a/Doc/library/asyncio-subprocess.rst
+++ b/Doc/library/asyncio-subprocess.rst
@@ -95,14 +95,14 @@ Creating Subprocesses
See the documentation of :meth:`loop.subprocess_shell` for other
parameters.
-.. important::
-
- It is the application's responsibility to ensure that all whitespace and
- special characters are quoted appropriately to avoid `shell injection
- <https://en.wikipedia.org/wiki/Shell_injection#Shell_injection>`_
- vulnerabilities. The :func:`shlex.quote` function can be used to properly
- escape whitespace and special shell characters in strings that are going
- to be used to construct shell commands.
+ .. important::
+
+ It is the application's responsibility to ensure that all whitespace and
+ special characters are quoted appropriately to avoid `shell injection
+ <https://en.wikipedia.org/wiki/Shell_injection#Shell_injection>`_
+ vulnerabilities. The :func:`shlex.quote` function can be used to properly
+ escape whitespace and special shell characters in strings that are going
+ to be used to construct shell commands.
.. deprecated-removed:: 3.8 3.10
More information about the Python-checkins
mailing list