diff options
author | Georg Brandl <georg@python.org> | 2016-02-26 19:37:12 +0100 |
---|---|---|
committer | Georg Brandl <georg@python.org> | 2016-02-26 19:37:12 +0100 |
commit | 5d9413404017a829aa5ddb52be6019fb63ec5c09 (patch) | |
tree | 75b750d4224ada300bdd242b3e08c2120681aad6 /Doc/library/asyncio-subprocess.rst | |
parent | 06871ef2b31bc6d7398388fbe83816edde5c0392 (diff) | |
download | cpython-git-5d9413404017a829aa5ddb52be6019fb63ec5c09.tar.gz |
Closes #25910: fix dead and permanently redirected links in the docs. Thanks to SilentGhost for the patch.
Diffstat (limited to 'Doc/library/asyncio-subprocess.rst')
-rw-r--r-- | Doc/library/asyncio-subprocess.rst | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/Doc/library/asyncio-subprocess.rst b/Doc/library/asyncio-subprocess.rst index 21dae54e38..51ce4278da 100644 --- a/Doc/library/asyncio-subprocess.rst +++ b/Doc/library/asyncio-subprocess.rst @@ -51,7 +51,7 @@ Create a subprocess: high-level API using Process It is the application's responsibility to ensure that all whitespace and metacharacters are quoted appropriately to avoid `shell injection - <http://en.wikipedia.org/wiki/Shell_injection#Shell_injection>`_ + <https://en.wikipedia.org/wiki/Shell_injection#Shell_injection>`_ vulnerabilities. The :func:`shlex.quote` function can be used to properly escape whitespace and shell metacharacters in strings that are going to be used to construct shell commands. @@ -134,7 +134,7 @@ Run subprocesses asynchronously using the :mod:`subprocess` module. It is the application's responsibility to ensure that all whitespace and metacharacters are quoted appropriately to avoid `shell injection - <http://en.wikipedia.org/wiki/Shell_injection#Shell_injection>`_ + <https://en.wikipedia.org/wiki/Shell_injection#Shell_injection>`_ vulnerabilities. The :func:`shlex.quote` function can be used to properly escape whitespace and shell metacharacters in strings that are going to be used to construct shell commands. |