danger-wcc 0.0.5 → 0.0.6

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 2559417d0fc17cc5432a264afe84b98076248c88
4
- data.tar.gz: 7bd3382415a0414c6b48214c28806f13356f822f
3
+ metadata.gz: a19b6ce24d61f5ff2a951f9902122eda8942c8c7
4
+ data.tar.gz: e958cfa4740a01893df04a960f902ea5eb541dfc
5
5
  SHA512:
6
- metadata.gz: fee811c11bdb726932f1964379bade0ce0a4e61ff6d26acb34734155bd2048abfa707c15188c0e9dae2251a9ae77e53eb5f958433a1cf7c032caab6cc116edf9
7
- data.tar.gz: 512a9dba219287d1640e7bf7c4f57c9399e82760e31c0efab9cf6c7692f6af853e285588cc35384056fd95d0acce3e3f23e5d258a39b3fac5d55213e983520e5
6
+ metadata.gz: 2779c8031e0b5dbcc595c07b9bec606c4daab6e94214fa1808909f80819b2f4c95358448adf93b4ec8462c5e1179c981489cfd4eb5be7f48291a4635189e62d3
7
+ data.tar.gz: 353a0fb641903e0ce67fc874114976fcd90070a5c28c9c6d81f59682926e874d1ef67236ebe0de64e75f97572353b86fa4b0398ed91155cb0254a7e8787691f4
@@ -47,28 +47,36 @@ Metrics/ModuleLength:
47
47
  - 'lib/wcc/utils.rb'
48
48
  - 'spec/**/*.rb'
49
49
 
50
- Naming/UncommunicativeMethodParamName:
50
+ Naming/MethodParameterName:
51
51
  Enabled: false
52
52
 
53
53
  Naming/MemoizedInstanceVariableName:
54
54
  Enabled: false
55
55
 
56
- Performance/UnfreezeString:
57
- Exclude:
58
- - 'spec/**/*.rb'
59
-
60
- Style/BracesAroundHashParameters:
61
- Enabled: false
62
-
63
56
  Lint/AssignmentInCondition:
64
57
  Enabled: false
65
58
 
59
+ Lint/RaiseException:
60
+ Enabled: true
61
+
62
+ Lint/StructNewOverride:
63
+ Enabled: true
64
+
66
65
  Style/EmptyMethod:
67
66
  EnforcedStyle: expanded
68
67
 
69
68
  Style/Alias:
70
69
  EnforcedStyle: prefer_alias_method
71
70
 
71
+ Style/HashEachMethods:
72
+ Enabled: true
73
+
74
+ Style/HashTransformKeys:
75
+ Enabled: true
76
+
77
+ Style/HashTransformValues:
78
+ Enabled: true
79
+
72
80
  Style/NumericPredicate:
73
81
  EnforcedStyle: comparison
74
82
 
@@ -79,13 +87,13 @@ Style/RegexpLiteral:
79
87
  Style/SignalException:
80
88
  Enabled: false
81
89
 
82
- Layout/AlignParameters:
90
+ Layout/ParameterAlignment:
83
91
  EnforcedStyle: with_fixed_indentation
84
92
 
85
- Layout/IndentHash:
93
+ Layout/FirstHashElementIndentation:
86
94
  EnforcedStyle: consistent
87
95
 
88
- Layout/AlignHash:
96
+ Layout/HashAlignment:
89
97
  # allow coder to get around alignment rules by explicitly defining the hash param
90
98
  EnforcedLastArgumentHashStyle: ignore_explicit
91
99
 
@@ -35,7 +35,7 @@ Gem::Specification.new do |spec|
35
35
  spec.add_development_dependency 'webmock', '~> 3.1'
36
36
 
37
37
  # Linting code and docs
38
- spec.add_development_dependency 'rubocop'
38
+ spec.add_development_dependency 'rubocop', '~> 0.81'
39
39
  spec.add_development_dependency 'yard'
40
40
 
41
41
  # Makes testing easy via `bundle exec guard`
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module DangerWCC
4
- VERSION = '0.0.5'
4
+ VERSION = '0.0.6'
5
5
  end
@@ -102,7 +102,7 @@ class Danger::DangerWCC < Danger::Plugin
102
102
  return unless c.fail?
103
103
 
104
104
  messaging.issue([c.message, message[:sha]].join("\n"),
105
- severity: severity)
105
+ severity: severity)
106
106
  end
107
107
 
108
108
  def checkers
@@ -141,6 +141,7 @@ class Danger::DangerWCC < Danger::Plugin
141
141
 
142
142
  def warning_checks
143
143
  return checks if @config[:warn] == :all
144
+
144
145
  @config[:warn] || []
145
146
  end
146
147
 
@@ -56,8 +56,8 @@ class Danger::DangerWCC < Danger::Plugin
56
56
  )
57
57
 
58
58
  plugin.warn(warning.captures[2],
59
- file: warning.captures[0],
60
- line: warning.captures[1].to_i)
59
+ file: warning.captures[0],
60
+ line: warning.captures[1].to_i)
61
61
  end
62
62
  end
63
63
  end
@@ -12,23 +12,26 @@ class Danger::DangerWCC < Danger::Plugin
12
12
  include Utils
13
13
  include Github
14
14
 
15
- CHECKS = %i[
16
- rubocop_exceptions
17
- todos
18
- commit_lint
19
- reek
20
- flay
21
- brakeman
22
- jshint
23
- ].freeze
15
+ DEFAULT_OPTIONS = {
16
+ rubocop_exceptions: true,
17
+ flay: true,
18
+ todos: true,
19
+ brakeman: true,
20
+ commit_lint: false,
21
+ reek: false,
22
+ jshint: false
23
+ }.freeze
24
24
 
25
25
  # Runs all the included checks in the plugin
26
26
  def all(options = {})
27
- to_run = CHECKS.reject { |check_name| options[check_name] == false }
27
+ options = DEFAULT_OPTIONS.merge(options)
28
+
29
+ to_run = options.keys.reject { |check_name| options[check_name] == false }
28
30
  raise ArgumentError, 'No Enabled Checks' if to_run.empty?
29
31
 
30
32
  to_run.each do |check_name|
31
- public_send(check_name, options.fetch(check_name, {}))
33
+ check_options = options.fetch(check_name, {})
34
+ public_send(check_name, check_options == true ? {} : check_options)
32
35
  end
33
36
  end
34
37
 
@@ -49,8 +49,8 @@ class Danger::DangerWCC < Danger::Plugin
49
49
 
50
50
  line_info = with_line_number.match(/^\s*([^\:]+)\:(\d+)\:/i)
51
51
  plugin.warn(format_links_as_markdown(warning.captures[0]),
52
- file: line_info.captures[0],
53
- line: line_info.captures[1].to_i)
52
+ file: line_info.captures[0],
53
+ line: line_info.captures[1].to_i)
54
54
  end
55
55
  end
56
56
  end
@@ -6,9 +6,9 @@ class Danger::DangerWCC < Danger::Plugin
6
6
  class RubocopExceptions
7
7
  include Utils
8
8
 
9
- DISABLE_REGEX = /^(?:\+\s)?.*\#\s*rubocop\:disable\s+(\S+)/i
10
- ENABLE_REGEX = /^(?:\+\s)?\s*\#\s*rubocop\:enable\s+(\S+)/i
11
- COMMENT_LINE_REGEX = /^(?:\+\s)?\s*\#\s*(.+)$/i
9
+ DISABLE_REGEX = /^(?:\+\s)?.*\#\s*rubocop\:disable\s+(\S+)/i.freeze
10
+ ENABLE_REGEX = /^(?:\+\s)?\s*\#\s*rubocop\:enable\s+(\S+)/i.freeze
11
+ COMMENT_LINE_REGEX = /^(?:\+\s)?\s*\#\s*(.+)$/i.freeze
12
12
 
13
13
  def initialize(plugin, options = {})
14
14
  @plugin = plugin
@@ -20,7 +20,7 @@ class Danger::DangerWCC < Danger::Plugin
20
20
  message = build_message(e)
21
21
  severity = message_severity(e)
22
22
  issue(message,
23
- severity: severity, file: e[:file], line: e[:disabled_at])
23
+ severity: severity, file: e[:file], line: e[:disabled_at])
24
24
  end
25
25
  end
26
26
 
@@ -35,7 +35,7 @@ class Danger::DangerWCC < Danger::Plugin
35
35
  else
36
36
  " \nPlease provide an explanation why this rule was disabled."
37
37
  end
38
- unless e[:reenabled]
38
+ unless e[:inline] || e[:reenabled]
39
39
  message += "\n\nThe rule was not reenabled!\n"\
40
40
  'Please add a `rubocop:enable` comment so the rule is disabled '\
41
41
  'for the minimal scope.'
@@ -44,7 +44,7 @@ class Danger::DangerWCC < Danger::Plugin
44
44
  end
45
45
 
46
46
  def message_severity(e)
47
- if !e[:reenabled]
47
+ if !e[:inline] && !e[:reenabled]
48
48
  'fail'
49
49
  elsif e[:context_lines].empty?
50
50
  'warn'
@@ -60,18 +60,23 @@ class Danger::DangerWCC < Danger::Plugin
60
60
  end
61
61
  end
62
62
 
63
+ # rubocop:disable Metrics/AbcSize
63
64
  def make_violation(file_contents, hunk, line, rule)
65
+ is_inline_comment = !/^\s*\+?\s*\#/.match(line.content)
66
+
64
67
  reenable_line_offset = find_reenable(file_contents,
65
- line.line_number.right,
66
- rule)
68
+ line.line_number.right,
69
+ rule)
67
70
 
68
71
  {
69
72
  rule: rule,
70
73
  disabled_at: line.line_number.right,
74
+ inline: is_inline_comment,
71
75
  reenabled: !reenable_line_offset.nil?,
72
76
  context_lines: find_context(hunk.lines.drop(hunk.lines.index(line)))
73
77
  }
74
78
  end
79
+ # rubocop:enable Metrics/AbcSize
75
80
 
76
81
  def find_context(diff_lines)
77
82
  # search for all non-`rubocop:` comment lines immediately
@@ -6,8 +6,8 @@ class Danger::DangerWCC < Danger::Plugin
6
6
  class Todos
7
7
  include Utils
8
8
 
9
- TODO_REGEX = /^\+.*\#.*TODO:?/i
10
- LINK_REGEX = /\#.*(https?\:\/\/\S+)/i
9
+ TODO_REGEX = /^\+.*\#.*TODO:?/i.freeze
10
+ LINK_REGEX = /\#.*(https?\:\/\/\S+)/i.freeze
11
11
 
12
12
  def initialize(plugin, options = {})
13
13
  @plugin = plugin
@@ -26,11 +26,11 @@ class Danger::DangerWCC < Danger::Plugin
26
26
  if result[:link]
27
27
  plugin.message "TODO added in #{result[:file_link]} "\
28
28
  "referencing [#{result[:link]}](#{result[:link]})",
29
- file: result[:file], line: result[:line]
29
+ file: result[:file], line: result[:line]
30
30
  else
31
31
  plugin.warn "TODO added in #{result[:file_link]} - "\
32
32
  'is there a card associated with that?',
33
- file: result[:file], line: result[:line]
33
+ file: result[:file], line: result[:line]
34
34
  end
35
35
  end
36
36
 
@@ -72,6 +72,7 @@ class Danger::DangerWCC < Danger::Plugin
72
72
  def max(a, b)
73
73
  return a if b.nil?
74
74
  return b if a.nil?
75
+
75
76
  a > b ? a : b
76
77
  end
77
78
  end
@@ -12,6 +12,7 @@ module Utils
12
12
 
13
13
  def logger
14
14
  return @logger if @logger
15
+
15
16
  @logger = Logger.new(STDERR)
16
17
  @logger.level = ENV['DANGER_LOG_LEVEL'] ||
17
18
  (plugin.verbose ? Logger::INFO : Logger::ERROR)
@@ -0,0 +1,12 @@
1
+ diff --git a/spec/fixtures/rubocop_exception.rb b/spec/fixtures/rubocop_exception.rb
2
+ index eee0aa0..5a0e804 100644
3
+ --- a/spec/fixtures/rubocop_exception.rb
4
+ +++ b/spec/fixtures/rubocop_exception.rb
5
+ @@ -36,4 +36,7 @@ module RubocopException
6
+ }
7
+ # rubocop:enable Layout/AlignHash
8
+ end
9
+ +
10
+ + def some_inline_disabled_rule # rubocop:disable Rails/SomeRule
11
+ + end
12
+ end
@@ -36,4 +36,7 @@ module RubocopException
36
36
  }
37
37
  # rubocop:enable Layout/AlignHash
38
38
  end
39
+
40
+ def some_inline_disabled_rule # rubocop:disable Rails/SomeRule
41
+ end
39
42
  end
@@ -16,7 +16,7 @@ TEST_MESSAGES = {
16
16
  'separating the subject and the body.",
17
17
  all_errors: "this is a really long subject and it even ends in a period.\n'\
18
18
  'Not to mention the missing empty line!",
19
- valid: "This is a valid message\n\nYou can tell because it meets all the '\
19
+ valid: "This is a valid message\n\nYou can tell because it meets all the '\
20
20
  'criteria and the linter does not complain."
21
21
  }.freeze
22
22
 
@@ -130,7 +130,7 @@ module Danger
130
130
 
131
131
  checks.each do |check, _|
132
132
  commit = double(:commit,
133
- message: TEST_MESSAGES[check], sha: sha)
133
+ message: TEST_MESSAGES[check], sha: sha)
134
134
  allow(@git).to receive(:commits).and_return([commit])
135
135
 
136
136
  commit_lint disable: [check]
@@ -193,7 +193,7 @@ module Danger
193
193
 
194
194
  checks.each do |check, warning|
195
195
  commit = double(:commit,
196
- message: TEST_MESSAGES[check], sha: sha)
196
+ message: TEST_MESSAGES[check], sha: sha)
197
197
  allow(@git).to receive(:commits).and_return([commit])
198
198
 
199
199
  expect {
@@ -279,7 +279,7 @@ module Danger
279
279
 
280
280
  checks.each do |check, warning|
281
281
  commit = double(:commit,
282
- message: TEST_MESSAGES[check], sha: sha)
282
+ message: TEST_MESSAGES[check], sha: sha)
283
283
  allow(@git).to receive(:commits).and_return([commit])
284
284
 
285
285
  expect {
@@ -367,7 +367,7 @@ module Danger
367
367
 
368
368
  options.each_with_index do |(check, opts), i|
369
369
  commit = double(:commit,
370
- message: TEST_MESSAGES[:valid], sha: sha)
370
+ message: TEST_MESSAGES[:valid], sha: sha)
371
371
  allow(@git).to receive(:commits).and_return([commit])
372
372
 
373
373
  arg = {}
@@ -37,8 +37,10 @@ module Danger
37
37
  end
38
38
 
39
39
  it '#add_labels adds existing labels to issue' do
40
- stub = stub_request(:post,
41
- API_URL + '/repos/watermarkchurch/danger-wcc/issues/2/labels')
40
+ stub = stub_request(
41
+ :post,
42
+ API_URL + '/repos/watermarkchurch/danger-wcc/issues/2/labels'
43
+ )
42
44
  .with(body: '["backlog","bug","duplicate"]')
43
45
 
44
46
  # act
@@ -49,11 +51,15 @@ module Danger
49
51
  end
50
52
 
51
53
  it '#add_labels creates new labels before adding to issue' do
52
- stub = stub_request(:post,
53
- API_URL + '/repos/watermarkchurch/danger-wcc/labels')
54
+ stub = stub_request(
55
+ :post,
56
+ API_URL + '/repos/watermarkchurch/danger-wcc/labels'
57
+ )
54
58
  .with(body: '{"name":"new_label","color":"ffffff"}')
55
- stub_request(:post,
56
- API_URL + '/repos/watermarkchurch/danger-wcc/issues/2/labels')
59
+ stub_request(
60
+ :post,
61
+ API_URL + '/repos/watermarkchurch/danger-wcc/issues/2/labels'
62
+ )
57
63
  .with(body: '["backlog","new_label"]')
58
64
 
59
65
  # act
@@ -16,18 +16,21 @@ module Danger
16
16
  end
17
17
 
18
18
  describe 'all' do
19
- it 'runs all checks and passes default options' do
20
- Danger::DangerWCC::CHECKS.each do |check|
19
+ it 'runs all default and passes default options' do
20
+ %i[rubocop_exceptions flay todos brakeman].each do |check|
21
21
  expect(@my_plugin).to receive(check)
22
22
  .with({})
23
23
  end
24
+ %i[commit_lint reek jshint].each do |check|
25
+ expect(@my_plugin).to_not receive(check)
26
+ end
24
27
 
25
28
  # act
26
29
  @my_plugin.all
27
30
  end
28
31
 
29
32
  it 'errors if all checks disabled' do
30
- disabled = Danger::DangerWCC::CHECKS
33
+ disabled = Danger::DangerWCC::DEFAULT_OPTIONS.keys
31
34
  options = disabled.each_with_object({}) { |v, h| h[v] = false; }
32
35
 
33
36
  # expect
@@ -42,20 +45,18 @@ module Danger
42
45
  end
43
46
 
44
47
  it 'runs only enabled checks' do
45
- enabled = %i[todos commit_lint]
46
- disabled =
47
- Danger::DangerWCC::CHECKS.reject do |check|
48
- enabled.include?(check)
49
- end
50
- options = disabled.each_with_object({}) { |v, h| h[v] = false; }
48
+ options = {
49
+ rubocop_exceptions: false,
50
+ todos: false,
51
+ brakeman: false,
52
+ reek: true
53
+ }
51
54
 
52
55
  # expect
53
- enabled.each do |check|
54
- expect(@my_plugin).to receive(check)
55
- end
56
- disabled.each do |check|
57
- expect(@my_plugin).to_not receive(check)
58
- end
56
+ expect(@my_plugin).to receive(:reek)
57
+ expect(@my_plugin).to receive(:flay)
58
+ expect(@my_plugin).to_not receive(:rubocop_exceptions)
59
+ expect(@my_plugin).to_not receive(:commit_lint)
59
60
 
60
61
  # act
61
62
  @my_plugin.all options
@@ -63,7 +64,7 @@ module Danger
63
64
 
64
65
  it 'passes options' do
65
66
  options =
66
- Danger::DangerWCC::CHECKS.each_with_object({}) do |v, h|
67
+ Danger::DangerWCC::DEFAULT_OPTIONS.keys.each_with_object({}) do |v, h|
67
68
  h[v] = false
68
69
  end
69
70
  options[:commit_lint] = { test: { options: 1 } }
@@ -30,9 +30,9 @@ module Danger
30
30
  .to eq([Violation.new('Rubocop rule Rails/SomeRule disabled in '\
31
31
  '<a href="github_html_link">spec/fixtures/rubocop_exception.rb</a>'\
32
32
  " \nPlease provide an explanation why this rule was disabled.",
33
- false,
34
- 'spec/fixtures/rubocop_exception.rb',
35
- 5)])
33
+ false,
34
+ 'spec/fixtures/rubocop_exception.rb',
35
+ 5)])
36
36
  end
37
37
 
38
38
  it 'Errors when rubocop exception not reenabled' do
@@ -52,9 +52,28 @@ module Danger
52
52
  "\n\nThe rule was not reenabled!\n"\
53
53
  'Please add a `rubocop:enable` comment so the rule is disabled '\
54
54
  'for the minimal scope.',
55
- false,
55
+ false,
56
+ 'spec/fixtures/rubocop_exception.rb',
57
+ 10)])
58
+ end
59
+
60
+ it 'does not require reenabling for inline comments' do
61
+ allow(@git).to receive(:diff)
62
+ .and_return([load_diff(
56
63
  'spec/fixtures/rubocop_exception.rb',
57
- 10)])
64
+ 'exception_inline_disabled_rule'
65
+ )])
66
+
67
+ # act
68
+ @my_plugin.rubocop_exceptions
69
+
70
+ expect(@dangerfile.violation_report[:warnings])
71
+ .to eq([Violation.new('Rubocop rule Rails/SomeRule disabled in '\
72
+ '<a href="github_html_link">spec/fixtures/rubocop_exception.rb</a>'\
73
+ " \nPlease provide an explanation why this rule was disabled.",
74
+ false,
75
+ 'spec/fixtures/rubocop_exception.rb',
76
+ 40)])
58
77
  end
59
78
 
60
79
  it 'Messages when exception added with context' do
@@ -71,9 +90,9 @@ module Danger
71
90
  .to eq([Violation.new('Rubocop rule Metrics/LineLength disabled in '\
72
91
  '<a href="github_html_link">spec/fixtures/rubocop_exception.rb</a>'\
73
92
  " explanation:\n\t> Disabling because I want to.",
74
- false,
75
- 'spec/fixtures/rubocop_exception.rb',
76
- 15)])
93
+ false,
94
+ 'spec/fixtures/rubocop_exception.rb',
95
+ 15)])
77
96
  end
78
97
 
79
98
  it 'Messages when exception added with multiline context' do
@@ -92,9 +111,9 @@ module Danger
92
111
  ' explanation:'\
93
112
  "\n\t> I want to disable this because.."\
94
113
  "\n\t> I forgot the reasons.",
95
- false,
96
- 'spec/fixtures/rubocop_exception.rb',
97
- 30)])
114
+ false,
115
+ 'spec/fixtures/rubocop_exception.rb',
116
+ 30)])
98
117
  end
99
118
 
100
119
  it 'Messages when exception added in between existing comments' do
@@ -112,9 +131,9 @@ module Danger
112
131
  '<a href="github_html_link">spec/fixtures/rubocop_exception.rb</a>'\
113
132
  ' explanation:'\
114
133
  "\n\t> here is my comment why we are disabling ABC",
115
- false,
116
- 'spec/fixtures/rubocop_exception.rb',
117
- 21)])
134
+ false,
135
+ 'spec/fixtures/rubocop_exception.rb',
136
+ 21)])
118
137
  end
119
138
 
120
139
  it 'Does not message when no exception added' do
@@ -27,9 +27,9 @@ module Danger
27
27
  .to eq([Violation.new('TODO added in '\
28
28
  '<a href="github_html_link">spec/fixtures/todo.rb</a>'\
29
29
  ' - is there a card associated with that?',
30
- false,
31
- 'spec/fixtures/todo.rb',
32
- 9)])
30
+ false,
31
+ 'spec/fixtures/todo.rb',
32
+ 9)])
33
33
  end
34
34
 
35
35
  it 'Does not warn when TODO removed' do
@@ -68,9 +68,9 @@ module Danger
68
68
  '<a href="github_html_link">spec/fixtures/todo.rb</a> '\
69
69
  'referencing [https://zube.io/watermark/asdf1234]'\
70
70
  '(https://zube.io/watermark/asdf1234)',
71
- false,
72
- 'spec/fixtures/todo.rb',
73
- 13)])
71
+ false,
72
+ 'spec/fixtures/todo.rb',
73
+ 13)])
74
74
  end
75
75
 
76
76
  it 'Sends message when todo below link' do
@@ -87,9 +87,9 @@ module Danger
87
87
  '<a href="github_html_link">spec/fixtures/todo.rb</a> '\
88
88
  'referencing [https://www.github.com/watermarkchurch/asdf/1234]'\
89
89
  '(https://www.github.com/watermarkchurch/asdf/1234)',
90
- false,
91
- 'spec/fixtures/todo.rb',
92
- 18)])
90
+ false,
91
+ 'spec/fixtures/todo.rb',
92
+ 18)])
93
93
  end
94
94
  end
95
95
  end
@@ -50,7 +50,7 @@ module Danger
50
50
  [
51
51
  load_diff('spec/fixtures/todo.rb', 'no_todo'),
52
52
  load_diff('spec/fixtures/find_in_diff.rb',
53
- 'find_in_diff_2_chunks')
53
+ 'find_in_diff_2_chunks')
54
54
  ]
55
55
  )
56
56
 
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: danger-wcc
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.0.5
4
+ version: 0.0.6
5
5
  platform: ruby
6
6
  authors:
7
7
  - Watermark Dev
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2018-08-24 00:00:00.000000000 Z
11
+ date: 2020-08-10 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: brakeman
@@ -154,16 +154,16 @@ dependencies:
154
154
  name: rubocop
155
155
  requirement: !ruby/object:Gem::Requirement
156
156
  requirements:
157
- - - ">="
157
+ - - "~>"
158
158
  - !ruby/object:Gem::Version
159
- version: '0'
159
+ version: '0.81'
160
160
  type: :development
161
161
  prerelease: false
162
162
  version_requirements: !ruby/object:Gem::Requirement
163
163
  requirements:
164
- - - ">="
164
+ - - "~>"
165
165
  - !ruby/object:Gem::Version
166
- version: '0'
166
+ version: '0.81'
167
167
  - !ruby/object:Gem::Dependency
168
168
  name: yard
169
169
  requirement: !ruby/object:Gem::Requirement
@@ -291,6 +291,7 @@ files:
291
291
  - spec/fixtures/brakeman/brakeman.diff
292
292
  - spec/fixtures/brakeman/brakeman.out
293
293
  - spec/fixtures/exception_context.diff
294
+ - spec/fixtures/exception_inline_disabled_rule.diff
294
295
  - spec/fixtures/exception_insert_context.diff
295
296
  - spec/fixtures/exception_misspelled.diff
296
297
  - spec/fixtures/exception_multiline_context.diff
@@ -356,6 +357,7 @@ test_files:
356
357
  - spec/fixtures/brakeman/brakeman.diff
357
358
  - spec/fixtures/brakeman/brakeman.out
358
359
  - spec/fixtures/exception_context.diff
360
+ - spec/fixtures/exception_inline_disabled_rule.diff
359
361
  - spec/fixtures/exception_insert_context.diff
360
362
  - spec/fixtures/exception_misspelled.diff
361
363
  - spec/fixtures/exception_multiline_context.diff