![]() Prior to this, when wrong url injection happens, no information is fetched because we have bad input in the first place (404, 400). This makes the debugging session quite hard. |
||
---|---|---|
.. | ||
bitbucket | ||
core | ||
debian | ||
github | ||
gitlab | ||
pypi | ||
tests | ||
__init__.py | ||
cli.py | ||
utils.py |