summaryrefslogtreecommitdiff
path: root/web/fetch.py
diff options
context:
space:
mode:
authorJesusaves <cpntb1@ymail.com>2020-03-02 15:47:20 -0300
committerJesusaves <cpntb1@ymail.com>2020-03-02 15:47:20 -0300
commit365d9c787368676538108b522d9a1d8be91caae2 (patch)
tree11d961ad5fa3d6e441ab342007ded17e5b192504 /web/fetch.py
parentc215ad8f80a5dccccb4436dd318484d107ef7d05 (diff)
downloadtools-365d9c787368676538108b522d9a1d8be91caae2.tar.gz
tools-365d9c787368676538108b522d9a1d8be91caae2.tar.bz2
tools-365d9c787368676538108b522d9a1d8be91caae2.tar.xz
tools-365d9c787368676538108b522d9a1d8be91caae2.zip
Web Lang Update
Diffstat (limited to 'web/fetch.py')
-rwxr-xr-xweb/fetch.py19
1 files changed, 10 insertions, 9 deletions
diff --git a/web/fetch.py b/web/fetch.py
index 551f2db..d6e2e24 100755
--- a/web/fetch.py
+++ b/web/fetch.py
@@ -7,15 +7,16 @@
from transifex.api import TransifexAPI
import sys
-if len(sys.argv) == 2:
- if sys.argv[1] == "AllFilesVerified":
- pass
- else:
- print("Rejected: Incorrect magic word.")
- exit(1)
-else:
- print("Rejected: As this script is VULNERABLE TO CODE INJECTION, you cannot run this command without verifying all files at Transifex first.")
- exit(1)
+#if len(sys.argv) == 2:
+# if sys.argv[1] == "AllFilesVerified":
+# pass
+# else:
+# print("Rejected: Incorrect magic word.")
+# exit(1)
+#else:
+# print("Rejected: As this script is VULNERABLE TO CODE INJECTION, you cannot run this command without verifying all files at Transifex first.")
+# exit(1)
+print("\033[1mThis script is VULNERABLE TO CODE INJECTION. Git diff before deploying!\033[0m")
project='saulc-tmw-fork'