diff --git a/lib/perl/OVH/Bastion/execute.inc b/lib/perl/OVH/Bastion/execute.inc index bacd3d8..d7af8bd 100644 --- a/lib/perl/OVH/Bastion/execute.inc +++ b/lib/perl/OVH/Bastion/execute.inc @@ -67,7 +67,6 @@ sub execute { } =cut - #=cut only to debug tainted stuff require Scalar::Util; foreach (@$cmd) { if (Scalar::Util::tainted($_) && /(.+)/) { @@ -75,12 +74,9 @@ sub execute { # to be able to warn under -T; untaint it. we're going to crash right after anyway. require Carp; warn(Carp::longmess("would exec <" . join('^', @$cmd) . "> but param '$1' is tainted!")); - osh_warn("about to execute a cmd but param '$1' is tainted, I'm gonna crash!"); } } - #=cut - if ($system) { my $child_exit_status = system(@$cmd); $fnret = sysret2human($child_exit_status);