From a2ecf08736373a7880661a92bfa84032a4580d2e Mon Sep 17 00:00:00 2001 From: Chris McGehee Date: Wed, 26 Jan 2022 20:05:53 -0800 Subject: [PATCH] [Process] Update PHPDoc to use proper placeholder syntax --- src/Symfony/Component/Process/Process.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/Symfony/Component/Process/Process.php b/src/Symfony/Component/Process/Process.php index 39fc4d3c92fb0..d92eeb2508850 100644 --- a/src/Symfony/Component/Process/Process.php +++ b/src/Symfony/Component/Process/Process.php @@ -177,7 +177,7 @@ public function __construct($command, string $cwd = null, array $env = null, $in * In order to inject dynamic values into command-lines, we strongly recommend using placeholders. * This will save escaping values, which is not portable nor secure anyway: * - * $process = Process::fromShellCommandline('my_command "$MY_VAR"'); + * $process = Process::fromShellCommandline('my_command "${:MY_VAR}"'); * $process->run(null, ['MY_VAR' => $theValue]); * * @param string $command The command line to pass to the shell of the OS