diff options
author | hahnmichaelf <hahn.michael.f@gmail.com> | 2018-08-14 01:16:37 +0800 |
---|---|---|
committer | hahnmichaelf <hahn.michael.f@gmail.com> | 2018-08-14 01:16:37 +0800 |
commit | 4808ce25ebdc566a13acbb9cb1c6815368b7c4a1 (patch) | |
tree | 57850ba53c6a6bedb6c3dadd942bcc7c17e51246 /app/scripts | |
parent | e454a5e0e883c3653c19e894e2757b79555263d5 (diff) | |
download | tangerine-wallet-browser-4808ce25ebdc566a13acbb9cb1c6815368b7c4a1.tar tangerine-wallet-browser-4808ce25ebdc566a13acbb9cb1c6815368b7c4a1.tar.gz tangerine-wallet-browser-4808ce25ebdc566a13acbb9cb1c6815368b7c4a1.tar.bz2 tangerine-wallet-browser-4808ce25ebdc566a13acbb9cb1c6815368b7c4a1.tar.lz tangerine-wallet-browser-4808ce25ebdc566a13acbb9cb1c6815368b7c4a1.tar.xz tangerine-wallet-browser-4808ce25ebdc566a13acbb9cb1c6815368b7c4a1.tar.zst tangerine-wallet-browser-4808ce25ebdc566a13acbb9cb1c6815368b7c4a1.zip |
fix for lint-test
Diffstat (limited to 'app/scripts')
-rw-r--r-- | app/scripts/contentscript.js | 2 | ||||
-rw-r--r-- | app/scripts/phishing-detect.js | 4 |
2 files changed, 3 insertions, 3 deletions
diff --git a/app/scripts/contentscript.js b/app/scripts/contentscript.js index 60ef97e5e..b6d5cfe9e 100644 --- a/app/scripts/contentscript.js +++ b/app/scripts/contentscript.js @@ -199,5 +199,5 @@ function blacklistedDomainCheck () { function redirectToPhishingWarning () { console.log('MetaMask - routing to Phishing Warning component') const extensionURL = extension.runtime.getURL('phishing.html') - window.location.href = extensionURL + "#" + window.location.hostname + window.location.href = extensionURL + '#' + window.location.hostname } diff --git a/app/scripts/phishing-detect.js b/app/scripts/phishing-detect.js index ae5991586..a66cdb5ac 100644 --- a/app/scripts/phishing-detect.js +++ b/app/scripts/phishing-detect.js @@ -1,5 +1,5 @@ window.onload = function() { - if (window.location.pathname === "/phishing.html") { - document.getElementById("esdbLink").innerHTML = "<b>To read more about this scam, navigate to: <a href='https://etherscamdb.info/domain/" + window.location.hash.substring(1) + "'> https://etherscamdb.info/domain/" + window.location.hash.substring(1) + "</a></b>" + if (window.location.pathname === '/phishing.html') { + document.getElementById("esdbLink").innerHTML = '<b>To read more about this scam, navigate to: <a href="https://etherscamdb.info/domain/' + window.location.hash.substring(1) + '"> https://etherscamdb.info/domain/' + window.location.hash.substring(1) + '</a></b>' } } |