[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#969634: ITP: shellescape -- Escape arbitrary strings for use as command line arguments



Package: wnpp
Severity: wishlist
Owner: Jai Flack <jflack@disroot.org>

* Package name    : shellescape
  Version         : 1.2.2-1
  Upstream Author : Alessio Treglia
* URL             : https://github.com/alessio/shellescape
* License         : Expat
  Programming Lang: Go
  Description     : Escape arbitrary strings for use as command line arguments

 Escape arbitrary strings for safe use as command
 line arguments.  Contents of the package This package provides the
 shellescape.Quote() function that returns a shell-escaped copy of a
 string. This functionality could be helpful in those cases where it is
 known that the output of a Go program will be appended to/used in the
 context of shell programs' command line arguments.

 Especially when creating pipeline of commands which might end up being
 executed by a shell interpreter, it is particularly unsafe to not escape
 arguments.

 escargs utility escargs reads lines from the standard input and prints
 shell-escaped versions. Unlinke xargs, blank lines on the standard input are
 not discarded.

I intend to maintain this under the umbrella of the Go packaging team


Reply to: