rubocop-eightyfourcodes 0.0.2 → 0.0.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (43) hide show
  1. checksums.yaml +4 -4
  2. data/.rspec +3 -0
  3. data/.rubocop.yml +16 -0
  4. data/CHANGELOG.md +5 -0
  5. data/Gemfile +9 -3
  6. data/Gemfile.lock +75 -0
  7. data/LICENSE.md +7 -5
  8. data/README.md +13 -61
  9. data/Rakefile +32 -0
  10. data/config/default.yml +36 -8
  11. data/lib/rubocop/cop/eighty_four_codes/command_literal_injection.rb +4 -2
  12. data/lib/rubocop/cop/eighty_four_codes/ensure_redirect.rb +48 -0
  13. data/lib/rubocop/cop/eighty_four_codes/ruby_version_file.rb +30 -34
  14. data/lib/rubocop/cop/eightyfourcodes_cops.rb +12 -0
  15. data/lib/rubocop/cop/gitlab_security/deep_munge.rb +36 -0
  16. data/lib/rubocop/cop/gitlab_security/json_serialization.rb +137 -0
  17. data/lib/rubocop/cop/gitlab_security/public_send.rb +47 -0
  18. data/lib/rubocop/cop/gitlab_security/redirect_to_params_update.rb +38 -0
  19. data/lib/rubocop/cop/gitlab_security/send_file_params.rb +40 -0
  20. data/lib/rubocop/cop/gitlab_security/sql_injection.rb +41 -0
  21. data/lib/rubocop/cop/gitlab_security/system_command_injection.rb +38 -0
  22. data/lib/rubocop/{eighty_four_codes → eightyfourcodes}/inject.rb +5 -1
  23. data/lib/rubocop/eightyfourcodes/version.rb +7 -0
  24. data/lib/rubocop/{eighty_four_codes.rb → eightyfourcodes.rb} +6 -1
  25. data/lib/rubocop-eightyfourcodes.rb +5 -16
  26. data/rubocop-eightyfourcodes.gemspec +22 -23
  27. data/sig/rubocop/eightyfourcodes.rbs +6 -0
  28. metadata +32 -50
  29. data/CONTRIBUTING.md +0 -3
  30. data/lib/rubocop/cop/eighty_four_codes/cop.rb +0 -70
  31. data/lib/rubocop/cop/eighty_four_codes/shell_escape.rb +0 -62
  32. data/lib/rubocop/eighty_four_codes/concept.rb +0 -34
  33. data/lib/rubocop/eighty_four_codes/config_formatter.rb +0 -33
  34. data/lib/rubocop/eighty_four_codes/description_extractor.rb +0 -72
  35. data/lib/rubocop/eighty_four_codes/example.rb +0 -32
  36. data/lib/rubocop/eighty_four_codes/example_group.rb +0 -95
  37. data/lib/rubocop/eighty_four_codes/hook.rb +0 -49
  38. data/lib/rubocop/eighty_four_codes/language/node_pattern.rb +0 -20
  39. data/lib/rubocop/eighty_four_codes/language.rb +0 -118
  40. data/lib/rubocop/eighty_four_codes/top_level_describe.rb +0 -57
  41. data/lib/rubocop/eighty_four_codes/util.rb +0 -19
  42. data/lib/rubocop/eighty_four_codes/version.rb +0 -10
  43. data/lib/rubocop/eighty_four_codes/wording.rb +0 -81
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: caa8bb23e13eed6bbcb9e59c2a4a76db329ae6ec62c7efe251cdcc6e794beff3
4
- data.tar.gz: fdc49e8b5e58feb5e438d6c2cc0183cf20a194175cc2fea9c970939d4d51c751
3
+ metadata.gz: a2337a72314ad6423017df81a2dcf8f83013dc6e873fd69b5125378182721640
4
+ data.tar.gz: b32af92eabaeea8c0d9d87f65bfdcbc7143dfe57721a389ad1c883f287134559
5
5
  SHA512:
6
- metadata.gz: 7669d1010b6d8521ffbf0b61d0c858c62d851df29c0f3144a5a010ae021737df911488393a8b4538505e774b96e138f769196ae1e514f57558df71cb5dab9517
7
- data.tar.gz: 56f7910d7429f6592cf1f3a9ef54b7c02690b55545f1f45f9c02d872249bf3d6c79e815615fe922f4ce22526bcebf7cda73678f9f634f1dbe50504af44664e76
6
+ metadata.gz: af6326b9251b078270670d986af36041e0af768bb69d29ba9e960f0663dc420444e333057b886714c4184ac1201624d2ab0cd34f5b1425860f70c9e0b666c747
7
+ data.tar.gz: 84565456b4a0c98c085ec35f86da4bd4765a399b822068d6a51df0129ab786dc0ba97a147e221b187a48b3690bb130cc77592b035c447f6da92aaf8e48c50efc
data/.rspec ADDED
@@ -0,0 +1,3 @@
1
+ --format documentation
2
+ --color
3
+ --require spec_helper
data/.rubocop.yml ADDED
@@ -0,0 +1,16 @@
1
+ plugins:
2
+ - rubocop-rspec
3
+ - rubocop-rake
4
+
5
+ AllCops:
6
+ NewCops: enable
7
+ Exclude:
8
+ - 'lib/rubocop/cop/gitlab_security/*.rb'
9
+ - 'spec/rubocop/cop/gitlab_security/*.rb'
10
+ # avoid linting installed gems when running in GitHub Actions
11
+ - '**/vendor/bundle/**/*'
12
+ Naming/FileName:
13
+ Exclude:
14
+ - lib/rubocop-eightyfourcodes.rb
15
+ RSpec/ExampleLength:
16
+ Max: 10
data/CHANGELOG.md CHANGED
@@ -1,5 +1,10 @@
1
1
  # Changelog
2
2
 
3
+ ## 0.0.3 (2024-10-23)
4
+
5
+ - Recreated entire project using <https://github.com/rubocop/rubocop-extension-generator>
6
+ - Added `EnsureRedirect`
7
+
3
8
  ## 0.0.2 (2020-09-24)
4
9
 
5
10
  - Added `RubyVersionFile`: Ensure we read Gemfile ruby version from `.ruby-version` file
data/Gemfile CHANGED
@@ -1,9 +1,15 @@
1
+ # frozen_string_literal: true
2
+
1
3
  source 'https://rubygems.org'
2
4
 
5
+ # Specify your gem's dependencies in rubocop-eightyfourcodes.gemspec
3
6
  gemspec
4
7
 
5
8
  group :development, :test do
6
- gem 'pry'
7
- gem 'rspec', '~> 3.6.0'
8
- gem 'rubocop-rspec', '~> 1.21.0'
9
+ gem 'rake'
10
+ gem 'rspec'
11
+ gem 'rubocop'
12
+ gem 'rubocop-rake'
13
+ gem 'rubocop-rspec'
14
+ gem 'yard'
9
15
  end
data/Gemfile.lock ADDED
@@ -0,0 +1,75 @@
1
+ PATH
2
+ remote: .
3
+ specs:
4
+ rubocop-eightyfourcodes (0.0.4)
5
+ rubocop (< 2)
6
+
7
+ GEM
8
+ remote: https://rubygems.org/
9
+ specs:
10
+ ast (2.4.2)
11
+ diff-lcs (1.6.0)
12
+ json (2.10.2)
13
+ language_server-protocol (3.17.0.4)
14
+ lint_roller (1.1.0)
15
+ parallel (1.26.3)
16
+ parser (3.3.7.1)
17
+ ast (~> 2.4.1)
18
+ racc
19
+ racc (1.8.1)
20
+ rainbow (3.1.1)
21
+ rake (13.2.1)
22
+ regexp_parser (2.10.0)
23
+ rspec (3.13.0)
24
+ rspec-core (~> 3.13.0)
25
+ rspec-expectations (~> 3.13.0)
26
+ rspec-mocks (~> 3.13.0)
27
+ rspec-core (3.13.3)
28
+ rspec-support (~> 3.13.0)
29
+ rspec-expectations (3.13.3)
30
+ diff-lcs (>= 1.2.0, < 2.0)
31
+ rspec-support (~> 3.13.0)
32
+ rspec-mocks (3.13.2)
33
+ diff-lcs (>= 1.2.0, < 2.0)
34
+ rspec-support (~> 3.13.0)
35
+ rspec-support (3.13.2)
36
+ rubocop (1.74.0)
37
+ json (~> 2.3)
38
+ language_server-protocol (~> 3.17.0.2)
39
+ lint_roller (~> 1.1.0)
40
+ parallel (~> 1.10)
41
+ parser (>= 3.3.0.2)
42
+ rainbow (>= 2.2.2, < 4.0)
43
+ regexp_parser (>= 2.9.3, < 3.0)
44
+ rubocop-ast (>= 1.38.0, < 2.0)
45
+ ruby-progressbar (~> 1.7)
46
+ unicode-display_width (>= 2.4.0, < 4.0)
47
+ rubocop-ast (1.40.0)
48
+ parser (>= 3.3.1.0)
49
+ rubocop-rake (0.7.1)
50
+ lint_roller (~> 1.1)
51
+ rubocop (>= 1.72.1)
52
+ rubocop-rspec (3.5.0)
53
+ lint_roller (~> 1.1)
54
+ rubocop (~> 1.72, >= 1.72.1)
55
+ ruby-progressbar (1.13.0)
56
+ unicode-display_width (3.1.4)
57
+ unicode-emoji (~> 4.0, >= 4.0.4)
58
+ unicode-emoji (4.0.4)
59
+ yard (0.9.37)
60
+
61
+ PLATFORMS
62
+ arm64-darwin-23
63
+ ruby
64
+
65
+ DEPENDENCIES
66
+ rake
67
+ rspec
68
+ rubocop
69
+ rubocop-eightyfourcodes!
70
+ rubocop-rake
71
+ rubocop-rspec
72
+ yard
73
+
74
+ BUNDLED WITH
75
+ 2.6.4
data/LICENSE.md CHANGED
@@ -1,4 +1,6 @@
1
- Copyright (c) 2019 eightyfourcodes AB
1
+ The MIT License (MIT)
2
+
3
+ Copyright (c) 2024 84codes AB
2
4
 
3
5
  Permission is hereby granted, free of charge, to any person obtaining a copy
4
6
  of this software and associated documentation files (the "Software"), to deal
@@ -7,13 +9,13 @@ to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
7
9
  copies of the Software, and to permit persons to whom the Software is
8
10
  furnished to do so, subject to the following conditions:
9
11
 
10
- The above copyright notice and this permission notice shall be included in all
11
- copies or substantial portions of the Software.
12
+ The above copyright notice and this permission notice shall be included in
13
+ all copies or substantial portions of the Software.
12
14
 
13
15
  THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
14
16
  IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
15
17
  FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
16
18
  AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
17
19
  LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
18
- OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
19
- SOFTWARE.
20
+ OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
21
+ THE SOFTWARE.
data/README.md CHANGED
@@ -1,20 +1,16 @@
1
+ # Rubocop::EightyFourCodes
2
+
1
3
  This is a collection of cops developed and used by 84codes AB
2
- This code is based heavily upon the [rubocop-gitlab-security](https://gitlab.com/gitlab-org/rubocop-gitlab-security)
3
- code released under the MIT License.
4
4
 
5
5
  ## Installation
6
6
 
7
- Just install the `rubocop-eightyfourcodes` gem
7
+ Install the gem and add to the application's Gemfile by executing:
8
8
 
9
- ```bash
10
- gem install rubocop-eightyfourcodes
11
- ```
9
+ bundle add rubocop-eightyfourcodes --require=false
12
10
 
13
- or if you use bundler put this in your `Gemfile`
11
+ If bundler is not being used to manage dependencies, install the gem by executing:
14
12
 
15
- ```yaml
16
- gem 'rubocop-eightyfourcodes'
17
- ```
13
+ gem install rubocop-eightyfourcodes
18
14
 
19
15
  ## Usage
20
16
 
@@ -32,64 +28,20 @@ require: rubocop-eightyfourcodes
32
28
  Now you can run `rubocop` and it will automatically load the RuboCop eightyfourcodes
33
29
  cops together with the standard cops.
34
30
 
35
- ### Command line
36
-
37
- ```bash
38
- rubocop --require rubocop-eightyfourcodes
39
- ```
40
-
41
- ### Rake task
31
+ ## Development
42
32
 
43
- ```ruby
44
- RuboCop::RakeTask.new do |task|
45
- task.requires << 'rubocop-eightyfourcodes'
46
- end
47
- ```
33
+ After checking out the repo, run `bin/setup` to install dependencies. Then, run `rake spec` to run the tests. You can also run `bin/console` for an interactive prompt that will allow you to experiment.
48
34
 
49
- ## Inspecting specific files
35
+ Use `bundle exec rake 'new_cop[EightyFourCodes/CommandLiteralInjection]'` to generate a new cop.
50
36
 
51
- By default, `rubocop-eightyfourcodes` inspects all files. You can override this setting in your config file by specifying one or more patterns:
37
+ The [NodePattern Debugger](https://nodepattern.herokuapp.com/) is a very helpful resource when creating new AST matchers.
52
38
 
53
- ```yaml
54
- # Inspect all files
55
- AllCops:
56
- EightyFourCodes:
57
- Patterns:
58
- - '.+'
59
- ```
60
-
61
- ```yaml
62
- # Inspect only controller files.
63
- AllCops:
64
- EightyFourCodes:
65
- Patterns:
66
- - app/controllers/**/*.rb
67
- ```
68
-
69
- ## The Cops
70
-
71
- All cops are located under
72
- [`lib/rubocop/cop/eighty_four_codes`](lib/rubocop/cop/eighty_four_codes), and contain
73
- examples/documentation.
74
-
75
- In your `.rubocop.yml`, you may treat the eightyfourcodes cops just like any other
76
- cop. For example:
77
-
78
- ```yaml
79
- EightyFourCodes/CommandLiteralInjection:
80
- Exclude:
81
- - 'spec/**/*'
82
- ```
39
+ To install this gem onto your local machine, run `bundle exec rake install`. To release a new version, update the version number in `version.rb`, and then run `bundle exec rake release`, which will create a git tag for the version, push git commits and the created tag, and push the `.gem` file to [rubygems.org](https://rubygems.org).
83
40
 
84
41
  ## Contributing
85
42
 
86
- 1. Fork it
87
- 2. Create your feature branch (`git checkout -b my-new-feature`)
88
- 3. Commit your changes (`git commit -am 'Add some feature'`)
89
- 4. Push to the branch (`git push origin my-new-feature`)
90
- 5. Create new Merge Request
43
+ Bug reports and pull requests are welcome on GitHub at <https://github.com/84codes/rubocop-eightyfourcodes>.
91
44
 
92
45
  ## License
93
46
 
94
- `rubocop-eightyfourcodes` is MIT licensed. [See the accompanying file](LICENSE.md) for
95
- the full text.
47
+ The gem is available as open source under the terms of the [MIT License](https://opensource.org/licenses/MIT).
data/Rakefile ADDED
@@ -0,0 +1,32 @@
1
+ # frozen_string_literal: true
2
+
3
+ require 'bundler/gem_tasks'
4
+ require 'rspec/core/rake_task'
5
+ require 'rubocop/rake_task'
6
+
7
+ RuboCop::RakeTask.new
8
+
9
+ task default: %i[spec rubocop]
10
+
11
+ RSpec::Core::RakeTask.new(:spec) do |spec|
12
+ spec.pattern = FileList['spec/**/*_spec.rb']
13
+ end
14
+
15
+ desc 'Generate a new cop with a template'
16
+ task :new_cop, [:cop] do |_task, args|
17
+ require 'rubocop'
18
+
19
+ cop_name = args.fetch(:cop) do
20
+ warn 'usage: bundle exec rake new_cop[Department/Name]'
21
+ exit!
22
+ end
23
+
24
+ generator = RuboCop::Cop::Generator.new(cop_name)
25
+
26
+ generator.write_source
27
+ generator.write_spec
28
+ generator.inject_require(root_file_path: 'lib/rubocop/cop/eightyfourcodes_cops.rb')
29
+ generator.inject_config(config_file_path: 'config/default.yml')
30
+
31
+ puts generator.todo
32
+ end
data/config/default.yml CHANGED
@@ -1,15 +1,43 @@
1
1
  ---
2
- AllCops:
3
- EightyFourCodes:
4
- Patterns:
5
- - ".+"
6
-
7
2
  EightyFourCodes/CommandLiteralInjection:
8
- Description: "Check for Command Injection in `` and %x"
3
+ Description: "Do not include variables command literals"
9
4
  Enabled: true
10
5
  VersionAdded: "0.0.1"
11
-
12
6
  EightyFourCodes/RubyVersionFile:
13
- Description: "Ensure .ruby-version file use in Gemfile"
7
+ Description: "Control Ruby version via .ruby-version"
14
8
  Enabled: true
15
9
  VersionAdded: "0.0.2"
10
+ EightyFourCodes/EnsureRedirect:
11
+ Description: "Checks for `redirect` from an `ensure` block"
12
+ Enabled: true
13
+ VersionAdded: "0.0.3"
14
+ GitlabSecurity/DeepMunge:
15
+ Description: "Checks for disabling the deep munge security control."
16
+ Enabled: true
17
+ VersionAdded: "0.0.4"
18
+ GitlabSecurity/JsonSerialization:
19
+ Description: "Checks for `to_json` / `as_json` without allowing via `only`."
20
+ Enabled: true
21
+ VersionAdded: "0.0.4"
22
+ GitlabSecurity/PublicSend:
23
+ Description: "Checks for the use of `public_send`, `send`, and `__send__` methods."
24
+ Enabled: true
25
+ VersionAdded: "0.0.4"
26
+ GitlabSecurity/RedirectToParamsUpdate:
27
+ Description: "Check for use of redirect_to(params.update())"
28
+ Enabled: true
29
+ VersionAdded: "0.0.4"
30
+ GitlabSecurity/SendFileParams:
31
+ Description: "Check for use of send_file(..., params[], ...)"
32
+ Enabled: true
33
+ VersionAdded: "0.0.4"
34
+ GitlabSecurity/SqlInjection:
35
+ Description: |
36
+ Check for use of where("name = '#{params[:name]}'")"
37
+ Enabled: true
38
+ VersionAdded: "0.0.4"
39
+ GitlabSecurity/SystemCommandInjection:
40
+ Description: |
41
+ Check for use of system("/bin/ls #{params[:file]}")
42
+ Enabled: true
43
+ VersionAdded: "0.0.4"
@@ -1,3 +1,5 @@
1
+ # frozen_string_literal: true
2
+
1
3
  module RuboCop
2
4
  module Cop
3
5
  module EightyFourCodes
@@ -15,8 +17,8 @@ module RuboCop
15
17
  # # even better
16
18
  # exec("/bin/ls", shell_escape(filename))
17
19
  #
18
- class CommandLiteralInjection < RuboCop::Cop::Cop
19
- MSG = 'Do not include variables command literals. Use parameters "system(cmd, params)" or exec() instead'.freeze
20
+ class CommandLiteralInjection < Base
21
+ MSG = 'Do not include variables command literals. Use parameters "system(cmd, params)" or exec() instead'
20
22
 
21
23
  def_node_matcher :literal_var?, <<-PATTERN
22
24
  (begin ...)
@@ -0,0 +1,48 @@
1
+ # frozen_string_literal: true
2
+
3
+ module RuboCop
4
+ module Cop
5
+ module EightyFourCodes
6
+ # Checks for `redirect` from an `ensure` block.
7
+ # `redirect` from an ensure block is a dangerous code smell as it
8
+ # will take precedence over any exception being raised,
9
+ # and the exception will be silently thrown away as if it were rescued.
10
+ #
11
+ # If you want to rescue some (or all) exceptions, best to do it explicitly
12
+ #
13
+ # @example
14
+ #
15
+ # # bad
16
+ # def foo
17
+ # do_something
18
+ # ensure
19
+ # cleanup
20
+ # redirect "/"
21
+ # end
22
+ #
23
+ #
24
+ # # good
25
+ # def foo
26
+ # begin
27
+ # do_something
28
+ # rescue SomeException
29
+ # # Let's ignore this exception
30
+ # end
31
+ # redirect "/"
32
+ # ensure
33
+ # cleanup
34
+ # end
35
+ class EnsureRedirect < Base
36
+ MSG = 'Do not redirect from an `ensure` block.'
37
+
38
+ def on_ensure(node)
39
+ # `:send` nodes represent method calls, so we look for send nodes and then check if they are `redirect`
40
+ node.body&.each_node(:send) do |send_node|
41
+ # Check if the method name being called is `redirect`
42
+ add_offense(send_node) if send_node.method?(:redirect)
43
+ end
44
+ end
45
+ end
46
+ end
47
+ end
48
+ end
@@ -1,48 +1,44 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module RuboCop
4
- module Cop
5
- module EightyFourCodes
6
- # Read Ruby version from a .ruby-version file
7
- #
8
- # Instead of staticly defining the Ruby runtime version in Gemfile, load it from
9
- # a .ruby-version file definition. As this Ruby version file is read by rbenv, chruby etc
10
- # it's much easier for the developer to work with multiple projects with different versions.
11
- #
12
- # @example
13
- # # bad
14
- # ruby 2.6.6
15
- #
16
- # # good
17
- # ruby File.read('.ruby-version')
18
- class RubyVersionFile < Base
19
- extend AutoCorrector
4
+ module Cop
5
+ module EightyFourCodes
6
+ # Read Ruby version from a .ruby-version file
7
+ #
8
+ # Instead of staticly defining the Ruby runtime version in Gemfile, load it from
9
+ # a .ruby-version file definition. As this Ruby version file is read by rbenv, chruby etc
10
+ # it's much easier for the developer to work with multiple projects with different versions.
11
+ #
12
+ # @example
13
+ # # bad
14
+ # ruby 2.6.6
15
+ #
16
+ # # good
17
+ # ruby File.read('.ruby-version')
18
+ class RubyVersionFile < Base
19
+ extend AutoCorrector
20
20
 
21
- MSG = "Control Ruby version via .ruby-version, fix by replacing with File.read('.ruby-version')"
21
+ MSG = "Control Ruby version via .ruby-version, fix by replacing with File.read('.ruby-version')"
22
22
 
23
- RESTRICT_ON_SEND = %i[ruby].freeze
23
+ RESTRICT_ON_SEND = %i[ruby].freeze
24
24
 
25
- def_node_matcher :static_version_found?, <<~PATTERN
26
- (send nil? :ruby
27
- $(str _))
28
- PATTERN
25
+ def_node_matcher :static_version_found?, <<~PATTERN
26
+ (send nil? :ruby
27
+ $(str _))
28
+ PATTERN
29
29
 
30
- def on_send(node)
31
- return unless File.basename(processed_source.file_path).eql?('Gemfile')
32
- static_version_found?(node) do |source_node, source|
33
- message = format(MSG, source: source)
30
+ def on_send(node)
31
+ return unless File.basename(processed_source.file_path).eql?('Gemfile')
34
32
 
35
- add_offense(
36
- source_node,
37
- message: message
38
- ) do |corrector|
39
- corrector.replace(
40
- source_node, "File.read('.ruby-version')"
41
- )
42
- end
33
+ static_version_found?(node) do |source_node, source|
34
+ message = format(MSG, source: source)
35
+
36
+ add_offense(source_node, message: message) do |corrector|
37
+ corrector.replace(source_node, "File.read('.ruby-version')")
43
38
  end
44
39
  end
45
40
  end
46
41
  end
47
42
  end
48
43
  end
44
+ end
@@ -0,0 +1,12 @@
1
+ # frozen_string_literal: true
2
+
3
+ require_relative 'eighty_four_codes/command_literal_injection'
4
+ require_relative 'eighty_four_codes/ensure_redirect'
5
+ require_relative 'eighty_four_codes/ruby_version_file'
6
+
7
+ require_relative 'gitlab_security/json_serialization'
8
+ require_relative 'gitlab_security/public_send'
9
+ require_relative 'gitlab_security/redirect_to_params_update'
10
+ require_relative 'gitlab_security/send_file_params'
11
+ require_relative 'gitlab_security/sql_injection'
12
+ require_relative 'gitlab_security/system_command_injection'
@@ -0,0 +1,36 @@
1
+ # frozen_string_literal: true
2
+
3
+ module RuboCop
4
+ module Cop
5
+ module GitlabSecurity
6
+ # Checks for disabling the deep munge security control.
7
+ #
8
+ # Disabling this security setting can leave the application open to unsafe
9
+ # query generation
10
+ #
11
+ # @example
12
+ #
13
+ # # bad
14
+ # config.action_dispatch.perform_deep_munge = false
15
+ #
16
+ # See CVE-2012-2660, CVE-2012-2694, and CVE-2013-0155.
17
+ class DeepMunge < RuboCop::Cop::Base
18
+ MSG = 'Never disable the deep munge security option.'
19
+
20
+ # @!method disable_deep_munge?(node)
21
+ def_node_matcher :disable_deep_munge?, <<-PATTERN
22
+ (send
23
+ (send (send nil? :config) :action_dispatch) :perform_deep_munge=
24
+ { (false) (send true :!) }
25
+ )
26
+ PATTERN
27
+
28
+ def on_send(node)
29
+ return unless disable_deep_munge?(node)
30
+
31
+ add_offense(node.loc.selector)
32
+ end
33
+ end
34
+ end
35
+ end
36
+ end