pry-send_tweet.rb 1.17.7 → 1.17.8
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +4 -0
- data/lib/pry/send_tweet/commands/easter_eggs.rb +1 -0
- data/lib/pry/send_tweet/version.rb +1 -1
- metadata +1 -1
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 1642112fb14155f08e24ec2ffffbee20cb03cd43109df45f3d349e35658b273c
|
4
|
+
data.tar.gz: b47efba93bc8ea5b34bc9b8a258a98dc8a3fc4ab91eaaf3450dce463c484ce92
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 021e1e8480b41b964662b6bd7113ed60f812058cbb87412ac6aa4d6d4c530319200e109ecac008b301d04b761e4950fabb97fba0a905e97e69cc4fcfb3ad6945
|
7
|
+
data.tar.gz: 99dec9816528094b967497e2aaf7af47404f13ad8eec2479afe1a1632fdb1cb1ab196ebfe22e2fb01f8da83a21e8db833471d6ab9e249e587fe03aa9b806baa6
|
data/CHANGELOG.md
CHANGED
@@ -484,6 +484,7 @@ Pry.commands.instance_eval do
|
|
484
484
|
%q|Why did the Dutch break rank, the Irish deserve no better than Soap Bar, they're far from clean| => 'https://www.youtube.com/watch?v=0EioRyzcvJo',
|
485
485
|
%q|The original telescope is a pipe, but not a crack pipe, that came after the telescope| => 'https://www.youtube.com/watch?v=k9dMdbUAi0c',
|
486
486
|
%q|Observing a jquery riddled with XSS issuesB on the frontend and Rails4-5 on the backend shows us the pains of legacy, and a team too focused on backend technology. You got owned from the front.| => 'https://www.youtube.com/watch?v=25DC6v8oPxo',
|
487
|
+
%q[Rails and webpack are a bad match. Why? Because webpack leaves a manfiest file in public/packs/, which might expose admin paths and keys, etc. Is that 0day? Are all modern Rails applications vulnerable to this? I don't think Rails understands JavaScript, and should not be the ruby leaders for such tech.] => 'https://www.youtube.com/watch?v=pHIua_4T0sY',
|
487
488
|
%q[Rails and webpack are a bad match. Why? Because webpack leaves a manfiest file in public/packs/, which might expose admin paths and keys, etc. Is that 0day? Are all modern Rails applications vulnerable to this? I don't think Rails understands JavaScript, and should not be the ruby leaders for such tech.] => 'https://www.youtube.com/watch?v=pHIua_4T0sY'
|
488
489
|
}
|
489
490
|
command '🎧', '' do
|