Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 03ee257

Browse files
[po] auto sync
1 parent fa119c2 commit 03ee257

2 files changed

Lines changed: 9 additions & 1 deletion

File tree

.stat.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
{"translation": "95.05%", "updated_at": "2024-04-21T06:56:33Z"}
1+
{"translation": "95.06%", "updated_at": "2024-04-21T07:56:10Z"}

library/subprocess.po

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1169,6 +1169,10 @@ msgid ""
11691169
"vulnerabilities. On :ref:`some platforms <shlex-quote-warning>`, it is "
11701170
"possible to use :func:`shlex.quote` for this escaping."
11711171
msgstr ""
1172+
"不同于某些其他的 popen 函数,这个库将不会隐式地选择调用系统 shell。 这意味着所有字符,包括 shell 元字符都可以被安全地传递给子进程。"
1173+
" 如果 shell 是通过 ``shell=True`` 被显式地发起调用的,则应用程序要负责确保所有空白符和元字符被适当地转义以避免 `shell "
1174+
"注入 <https://en.wikipedia.org/wiki/Shell_injection#Shell_injection>`_ 安全漏洞。 在"
1175+
" :ref:`某些平台 <shlex-quote-warning>` 上,可以使用 :func:`shlex.quote` 来执行这种转义。"
11721176

11731177
#: ../../library/subprocess.rst:767
11741178
msgid ""
@@ -1180,6 +1184,10 @@ msgid ""
11801184
"consider passing ``shell=True`` to allow Python to escape special "
11811185
"characters. See :gh:`114539` for additional discussion."
11821186
msgstr ""
1187+
"在 Windows 上,批处理文件 (:file:`*.bat` 或 :file:`*.cmd`) 可以在系统 shell "
1188+
"中通过操作系统调用来启动而忽略传给该库的参数。 这可能导致根据 shell 规则来解析参数,而没有任何 Python 添加的转义。 "
1189+
"如果你想要附带来自不受信任源的参数启动批处理文件,请考虑传入 ``shell=True`` 以允许 Python 转义特殊字符。 请参阅 "
1190+
":gh:`114539` 了解相关讨论。"
11831191

11841192
#: ../../library/subprocess.rst:777
11851193
msgid "Popen Objects"

0 commit comments

Comments
 (0)