mirror of https://github.com/python/cpython
[doc] Fix typos in cgi.rst (#24766)
This commit is contained in:
parent
be7e467bcf
commit
19d839ae20
|
@ -316,7 +316,7 @@ algorithms implemented in this module in other circumstances.
|
||||||
.. function:: test()
|
.. function:: test()
|
||||||
|
|
||||||
Robust test CGI script, usable as main program. Writes minimal HTTP headers and
|
Robust test CGI script, usable as main program. Writes minimal HTTP headers and
|
||||||
formats all information provided to the script in HTML form.
|
formats all information provided to the script in HTML format.
|
||||||
|
|
||||||
|
|
||||||
.. function:: print_environ()
|
.. function:: print_environ()
|
||||||
|
@ -346,8 +346,8 @@ Caring about security
|
||||||
|
|
||||||
.. index:: pair: CGI; security
|
.. index:: pair: CGI; security
|
||||||
|
|
||||||
There's one important rule: if you invoke an external program (via the
|
There's one important rule: if you invoke an external program (via
|
||||||
:func:`os.system` or :func:`os.popen` functions. or others with similar
|
:func:`os.system`, :func:`os.popen` or other functions with similar
|
||||||
functionality), make very sure you don't pass arbitrary strings received from
|
functionality), make very sure you don't pass arbitrary strings received from
|
||||||
the client to the shell. This is a well-known security hole whereby clever
|
the client to the shell. This is a well-known security hole whereby clever
|
||||||
hackers anywhere on the Web can exploit a gullible CGI script to invoke
|
hackers anywhere on the Web can exploit a gullible CGI script to invoke
|
||||||
|
@ -424,7 +424,7 @@ above on installing your CGI script carefully can save you a lot of time. If
|
||||||
you wonder whether you have understood the installation procedure correctly, try
|
you wonder whether you have understood the installation procedure correctly, try
|
||||||
installing a copy of this module file (:file:`cgi.py`) as a CGI script. When
|
installing a copy of this module file (:file:`cgi.py`) as a CGI script. When
|
||||||
invoked as a script, the file will dump its environment and the contents of the
|
invoked as a script, the file will dump its environment and the contents of the
|
||||||
form in HTML form. Give it the right mode etc, and send it a request. If it's
|
form in HTML format. Give it the right mode etc., and send it a request. If it's
|
||||||
installed in the standard :file:`cgi-bin` directory, it should be possible to
|
installed in the standard :file:`cgi-bin` directory, it should be possible to
|
||||||
send it a request by entering a URL into your browser of the form:
|
send it a request by entering a URL into your browser of the form:
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue