File tree Expand file tree Collapse file tree
Expand file tree Collapse file tree Original file line number Diff line number Diff line change 1- {"translation" : " 95.05 %" , "updated_at" : " 2024-04-21T06 :56:33Z " }
1+ {"translation" : " 95.06 %" , "updated_at" : " 2024-04-21T07 :56:10Z " }
Original file line number Diff line number Diff line change @@ -1169,6 +1169,10 @@ msgid ""
11691169"vulnerabilities. On :ref:`some platforms <shlex-quote-warning>`, it is "
11701170"possible to use :func:`shlex.quote` for this escaping."
11711171msgstr ""
1172+ "不同于某些其他的 popen 函数,这个库将不会隐式地选择调用系统 shell。 这意味着所有字符,包括 shell 元字符都可以被安全地传递给子进程。"
1173+ " 如果 shell 是通过 ``shell=True`` 被显式地发起调用的,则应用程序要负责确保所有空白符和元字符被适当地转义以避免 `shell "
1174+ "注入 <https://en.wikipedia.org/wiki/Shell_injection#Shell_injection>`_ 安全漏洞。 在"
1175+ " :ref:`某些平台 <shlex-quote-warning>` 上,可以使用 :func:`shlex.quote` 来执行这种转义。"
11721176
11731177#: ../../library/subprocess.rst:767
11741178msgid ""
@@ -1180,6 +1184,10 @@ msgid ""
11801184"consider passing ``shell=True`` to allow Python to escape special "
11811185"characters. See :gh:`114539` for additional discussion."
11821186msgstr ""
1187+ "在 Windows 上,批处理文件 (:file:`*.bat` 或 :file:`*.cmd`) 可以在系统 shell "
1188+ "中通过操作系统调用来启动而忽略传给该库的参数。 这可能导致根据 shell 规则来解析参数,而没有任何 Python 添加的转义。 "
1189+ "如果你想要附带来自不受信任源的参数启动批处理文件,请考虑传入 ``shell=True`` 以允许 Python 转义特殊字符。 请参阅 "
1190+ ":gh:`114539` 了解相关讨论。"
11831191
11841192#: ../../library/subprocess.rst:777
11851193msgid "Popen Objects"
You can’t perform that action at this time.
0 commit comments