rubocop-eightyfourcodes 0.0.2 → 0.0.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (43) hide show
  1. checksums.yaml +4 -4
  2. data/.rspec +3 -0
  3. data/.rubocop.yml +16 -0
  4. data/CHANGELOG.md +5 -0
  5. data/Gemfile +9 -3
  6. data/Gemfile.lock +75 -0
  7. data/LICENSE.md +7 -5
  8. data/README.md +13 -61
  9. data/Rakefile +32 -0
  10. data/config/default.yml +36 -8
  11. data/lib/rubocop/cop/eighty_four_codes/command_literal_injection.rb +4 -2
  12. data/lib/rubocop/cop/eighty_four_codes/ensure_redirect.rb +48 -0
  13. data/lib/rubocop/cop/eighty_four_codes/ruby_version_file.rb +30 -34
  14. data/lib/rubocop/cop/eightyfourcodes_cops.rb +12 -0
  15. data/lib/rubocop/cop/gitlab_security/deep_munge.rb +36 -0
  16. data/lib/rubocop/cop/gitlab_security/json_serialization.rb +137 -0
  17. data/lib/rubocop/cop/gitlab_security/public_send.rb +47 -0
  18. data/lib/rubocop/cop/gitlab_security/redirect_to_params_update.rb +38 -0
  19. data/lib/rubocop/cop/gitlab_security/send_file_params.rb +40 -0
  20. data/lib/rubocop/cop/gitlab_security/sql_injection.rb +41 -0
  21. data/lib/rubocop/cop/gitlab_security/system_command_injection.rb +38 -0
  22. data/lib/rubocop/{eighty_four_codes → eightyfourcodes}/inject.rb +5 -1
  23. data/lib/rubocop/eightyfourcodes/version.rb +7 -0
  24. data/lib/rubocop/{eighty_four_codes.rb → eightyfourcodes.rb} +6 -1
  25. data/lib/rubocop-eightyfourcodes.rb +5 -16
  26. data/rubocop-eightyfourcodes.gemspec +22 -23
  27. data/sig/rubocop/eightyfourcodes.rbs +6 -0
  28. metadata +32 -50
  29. data/CONTRIBUTING.md +0 -3
  30. data/lib/rubocop/cop/eighty_four_codes/cop.rb +0 -70
  31. data/lib/rubocop/cop/eighty_four_codes/shell_escape.rb +0 -62
  32. data/lib/rubocop/eighty_four_codes/concept.rb +0 -34
  33. data/lib/rubocop/eighty_four_codes/config_formatter.rb +0 -33
  34. data/lib/rubocop/eighty_four_codes/description_extractor.rb +0 -72
  35. data/lib/rubocop/eighty_four_codes/example.rb +0 -32
  36. data/lib/rubocop/eighty_four_codes/example_group.rb +0 -95
  37. data/lib/rubocop/eighty_four_codes/hook.rb +0 -49
  38. data/lib/rubocop/eighty_four_codes/language/node_pattern.rb +0 -20
  39. data/lib/rubocop/eighty_four_codes/language.rb +0 -118
  40. data/lib/rubocop/eighty_four_codes/top_level_describe.rb +0 -57
  41. data/lib/rubocop/eighty_four_codes/util.rb +0 -19
  42. data/lib/rubocop/eighty_four_codes/version.rb +0 -10
  43. data/lib/rubocop/eighty_four_codes/wording.rb +0 -81
@@ -0,0 +1,137 @@
1
+ # frozen_string_literal: true
2
+
3
+ module RuboCop
4
+ module Cop
5
+ module GitlabSecurity
6
+ # Checks for `to_json` / `as_json` without allowing via `only`.
7
+ #
8
+ # Either method called on an instance of a `Serializer` class will be
9
+ # ignored. Associations included via `include` are subject to the same
10
+ # rules.
11
+ #
12
+ # @example
13
+ #
14
+ # # bad
15
+ # render json: @user.to_json
16
+ # render json: @user.to_json(except: %i[password])
17
+ # render json: @user.to_json(
18
+ # only: %i[username],
19
+ # include: [:identities]
20
+ # )
21
+ #
22
+ # # acceptable
23
+ # render json: UserSerializer.new.to_json
24
+ #
25
+ # # good
26
+ # render json: @user.to_json(only: %i[name username])
27
+ # render json: @user.to_json(
28
+ # only: %i[username],
29
+ # include: { identities: { only: %i[provider] } }
30
+ # )
31
+ #
32
+ # See https://gitlab.com/gitlab-org/gitlab-ce/issues/29661
33
+ class JsonSerialization < RuboCop::Cop::Base
34
+ MSG = "Don't use `%s` without specifying `only`"
35
+
36
+ # Check for `to_json` sent to any object that's not a Hash literal or
37
+ # Serializer instance
38
+ # @!method json_serialization?(node)
39
+ def_node_matcher :json_serialization?, <<~PATTERN
40
+ (send !{nil? hash #serializer?} ${:to_json :as_json} $...)
41
+ PATTERN
42
+
43
+ # Check if node is a `only: ...` pair
44
+ # @!method only_pair?(node)
45
+ def_node_matcher :only_pair?, <<~PATTERN
46
+ (pair (sym :only) ...)
47
+ PATTERN
48
+
49
+ # Check if node is a `include: {...}` pair
50
+ # @!method include_pair?(node)
51
+ def_node_matcher :include_pair?, <<~PATTERN
52
+ (pair (sym :include) (hash $...))
53
+ PATTERN
54
+
55
+ # Check for a `only: [...]` pair anywhere in the node
56
+ # @!method contains_only?(node)
57
+ def_node_search :contains_only?, <<~PATTERN
58
+ (pair (sym :only) (array ...))
59
+ PATTERN
60
+
61
+ # Check for `SomeConstant.new`
62
+ # @!method constant_init(node)
63
+ def_node_search :constant_init, <<~PATTERN
64
+ (send (const nil? $_) :new ...)
65
+ PATTERN
66
+
67
+ def on_send(node)
68
+ matched = json_serialization?(node)
69
+ return unless matched
70
+
71
+ @_has_top_level_only = false
72
+ @method = matched.first
73
+
74
+ if matched.last.nil? || matched.last.empty?
75
+ @offense_found = true
76
+ # Empty `to_json` call
77
+ add_offense(node.loc.selector, message: format_message)
78
+ else
79
+ check_arguments(node, matched)
80
+ end
81
+ end
82
+
83
+ private
84
+
85
+ def format_message
86
+ format(MSG, @method)
87
+ end
88
+
89
+ def serializer?(node)
90
+ constant_init(node).any? { |name| name.to_s.end_with?('Serializer') }
91
+ end
92
+
93
+ def check_arguments(node, matched)
94
+ options = matched.last.first
95
+
96
+ # If `to_json` was given an argument that isn't a Hash, we don't
97
+ # know what to do here, so just move along
98
+ return unless options.hash_type?
99
+
100
+ options.each_child_node do |child_node|
101
+ check_pair(child_node)
102
+ end
103
+
104
+ return unless requires_only?
105
+
106
+ @offense_found = true
107
+
108
+ # Add a top-level offense for the entire argument list, but only if
109
+ # we haven't yet added any offenses to the child Hash values (such
110
+ # as `include`)
111
+ add_offense(node.children.last, message: format_message)
112
+ end
113
+
114
+ def check_pair(pair)
115
+ if only_pair?(pair)
116
+ @_has_top_level_only = true
117
+ elsif include_pair?(pair)
118
+ includes = pair.value
119
+
120
+ includes.each_child_node do |child_node|
121
+ next if contains_only?(child_node)
122
+
123
+ @offense_found = true
124
+ add_offense(child_node, message: format_message)
125
+ end
126
+ end
127
+ end
128
+
129
+ def requires_only?
130
+ return false if @_has_top_level_only
131
+
132
+ !@offense_found
133
+ end
134
+ end
135
+ end
136
+ end
137
+ end
@@ -0,0 +1,47 @@
1
+ # frozen_string_literal: true
2
+
3
+ module RuboCop
4
+ module Cop
5
+ module GitlabSecurity
6
+ # Checks for the use of `public_send`, `send`, and `__send__` methods.
7
+ #
8
+ # If passed untrusted input these methods can be used to execute arbitrary
9
+ # methods on behalf of an attacker.
10
+ #
11
+ # @example
12
+ #
13
+ # # bad
14
+ # myobj.public_send("#{params[:foo]}")
15
+ #
16
+ # # good
17
+ # case params[:foo].to_s
18
+ # when 'choice1'
19
+ # items.choice1
20
+ # when 'choice2'
21
+ # items.choice2
22
+ # when 'choice3'
23
+ # items.choice3
24
+ # end
25
+ class PublicSend < RuboCop::Cop::Base
26
+ MSG = 'Avoid using `%s`.'
27
+
28
+ RESTRICT_ON_SEND = %i[send public_send __send__].freeze
29
+
30
+ # @!method send?(node)
31
+ def_node_matcher :send?, <<-PATTERN
32
+ (call _ ${:send :public_send :__send__} ...)
33
+ PATTERN
34
+
35
+ def on_send(node)
36
+ send?(node) do |match|
37
+ next unless node.arguments?
38
+
39
+ add_offense(node.loc.selector, message: format(MSG, match))
40
+ end
41
+ end
42
+
43
+ alias_method :on_csend, :on_send
44
+ end
45
+ end
46
+ end
47
+ end
@@ -0,0 +1,38 @@
1
+ # frozen_string_literal: true
2
+
3
+ module RuboCop
4
+ module Cop
5
+ module GitlabSecurity
6
+ # Check for use of redirect_to(params.update())
7
+ #
8
+ # Passing user params to the redirect_to method provides an open redirect
9
+ #
10
+ # @example
11
+ #
12
+ # # bad
13
+ # redirect_to(params.update(action: 'main'))
14
+ #
15
+ # # good
16
+ # redirect_to(allowed(params))
17
+ #
18
+ class RedirectToParamsUpdate < RuboCop::Cop::Base
19
+ MSG = 'Avoid using `redirect_to(params.%<name>s(...))`. ' \
20
+ 'Only pass allowed arguments into redirect_to() (e.g. not including `host`)'
21
+
22
+ # @!method redirect_to_params_update_node(node)
23
+ def_node_matcher :redirect_to_params_update_node, <<-PATTERN
24
+ (send nil? :redirect_to $(send (send nil? :params) ${:update :merge} ...))
25
+ PATTERN
26
+
27
+ def on_send(node)
28
+ selected, name = redirect_to_params_update_node(node)
29
+ return unless name
30
+
31
+ message = format(MSG, name: name)
32
+
33
+ add_offense(selected, message: message)
34
+ end
35
+ end
36
+ end
37
+ end
38
+ end
@@ -0,0 +1,40 @@
1
+ # frozen_string_literal: true
2
+
3
+ module RuboCop
4
+ module Cop
5
+ module GitlabSecurity
6
+ # Check for use of send_file(..., params[], ...)
7
+ #
8
+ # Passing user params to the send_file() method allows directory traversal
9
+ #
10
+ # @example
11
+ #
12
+ # # bad
13
+ # send_file("/tmp/myproj/" + params[:filename])
14
+ #
15
+ # # good (verify directory)
16
+
17
+ # basename = File.expand_path("/tmp/myproj")
18
+ # filename = File.expand_path(File.join(basename, @file.public_filename))
19
+ # raise if basename != filename
20
+ # send_file filename, disposition: 'inline'
21
+ #
22
+ class SendFileParams < RuboCop::Cop::Base
23
+ MSG = 'Do not pass user provided params directly to send_file(), ' \
24
+ 'verify the path with file.expand_path() first.'
25
+
26
+ # @!method params_node?(node)
27
+ def_node_search :params_node?, <<-PATTERN
28
+ (send (send nil? :params) ... )
29
+ PATTERN
30
+
31
+ def on_send(node)
32
+ return unless node.command?(:send_file)
33
+ return unless node.arguments.any? { |e| params_node?(e) }
34
+
35
+ add_offense(node.loc.selector)
36
+ end
37
+ end
38
+ end
39
+ end
40
+ end
@@ -0,0 +1,41 @@
1
+ # frozen_string_literal: true
2
+
3
+ module RuboCop
4
+ module Cop
5
+ module GitlabSecurity
6
+ # Check for use of where("name = '#{params[:name]}'")
7
+ #
8
+ # Passing user input to where() without parameterization can result in SQL Injection
9
+ #
10
+ # @example
11
+ #
12
+ # # bad
13
+ # u = User.where("name = '#{params[:name]}'")
14
+ #
15
+ # # good (parameters)
16
+ # u = User.where("name = ? AND id = ?", params[:name], params[:id])
17
+ # u = User.where(name: params[:name], id: params[:id])
18
+ #
19
+ class SqlInjection < RuboCop::Cop::Base
20
+ MSG = 'Parameterize all user-input passed to where(), do not directly embed user input in SQL queries.'
21
+
22
+ # @!method where_user_input?(node)
23
+ def_node_matcher :where_user_input?, <<-PATTERN
24
+ (send _ :where ...)
25
+ PATTERN
26
+
27
+ # @!method string_var_string?(node)
28
+ def_node_matcher :string_var_string?, <<-PATTERN
29
+ (dstr (str ...) (begin ...) (str ...) ...)
30
+ PATTERN
31
+
32
+ def on_send(node)
33
+ return unless where_user_input?(node)
34
+ return unless node.arguments.any? { |e| string_var_string?(e) }
35
+
36
+ add_offense(node.loc.selector)
37
+ end
38
+ end
39
+ end
40
+ end
41
+ end
@@ -0,0 +1,38 @@
1
+ # frozen_string_literal: true
2
+
3
+ module RuboCop
4
+ module Cop
5
+ module GitlabSecurity
6
+ # Check for use of system("/bin/ls #{params[:file]}")
7
+ #
8
+ # Passing user input to system() without sanitization and parameterization can result in command injection
9
+ #
10
+ # @example
11
+ #
12
+ # # bad
13
+ # system("/bin/ls #{filename}")
14
+ #
15
+ # # good (parameters)
16
+ # system("/bin/ls", filename)
17
+ # # even better
18
+ # exec("/bin/ls", shell_escape(filename))
19
+ #
20
+ class SystemCommandInjection < RuboCop::Cop::Base
21
+ MSG = 'Do not include variables in the command name for system(). ' \
22
+ 'Use parameters "system(cmd, params)" or exec() instead.'
23
+
24
+ # @!method system_var?(node)
25
+ def_node_matcher :system_var?, <<-PATTERN
26
+ (dstr (str ...) (begin ...) ...)
27
+ PATTERN
28
+
29
+ def on_send(node)
30
+ return unless node.command?(:system)
31
+ return unless node.arguments.any? { |e| system_var?(e) }
32
+
33
+ add_offense(node.loc.selector)
34
+ end
35
+ end
36
+ end
37
+ end
38
+ end
@@ -1,3 +1,7 @@
1
+ # frozen_string_literal: true
2
+
3
+ # The original code is from https://github.com/rubocop/rubocop-rspec/blob/master/lib/rubocop/rspec/inject.rb
4
+ # See https://github.com/rubocop/rubocop-rspec/blob/master/MIT-LICENSE.md
1
5
  module RuboCop
2
6
  module EightyFourCodes
3
7
  # Because RuboCop doesn't yet support plugins, we have to monkey patch in a
@@ -6,7 +10,7 @@ module RuboCop
6
10
  def self.defaults!
7
11
  path = CONFIG_DEFAULT.to_s
8
12
  hash = ConfigLoader.send(:load_yaml_configuration, path)
9
- config = Config.new(hash, path)
13
+ config = Config.new(hash, path).tap(&:make_excludes_absolute)
10
14
  puts "configuration from #{path}" if ConfigLoader.debug?
11
15
  config = ConfigLoader.merge_with_default(config, path)
12
16
  ConfigLoader.instance_variable_set(:@default_configuration, config)
@@ -0,0 +1,7 @@
1
+ # frozen_string_literal: true
2
+
3
+ module RuboCop
4
+ module EightyFourCodes
5
+ VERSION = '0.0.4'
6
+ end
7
+ end
@@ -1,6 +1,11 @@
1
+ # frozen_string_literal: true
2
+
3
+ require_relative 'eightyfourcodes/version'
4
+
1
5
  module RuboCop
2
- # RuboCop RSpec project namespace
6
+ # Namespace for EightyFourCodes cops
3
7
  module EightyFourCodes
8
+ class Error < StandardError; end
4
9
  PROJECT_ROOT = Pathname.new(__dir__).parent.parent.expand_path.freeze
5
10
  CONFIG_DEFAULT = PROJECT_ROOT.join('config', 'default.yml').freeze
6
11
  CONFIG = YAML.safe_load(CONFIG_DEFAULT.read).freeze
@@ -1,22 +1,11 @@
1
- require 'pathname'
2
- require 'yaml'
1
+ # frozen_string_literal: true
3
2
 
4
3
  require 'rubocop'
5
4
 
6
- require 'rubocop/eighty_four_codes'
7
- require 'rubocop/eighty_four_codes/version'
8
- require 'rubocop/eighty_four_codes/inject'
9
- require 'rubocop/eighty_four_codes/top_level_describe'
10
- require 'rubocop/eighty_four_codes/wording'
11
- require 'rubocop/eighty_four_codes/util'
12
- require 'rubocop/eighty_four_codes/language'
13
- require 'rubocop/eighty_four_codes/language/node_pattern'
14
- require 'rubocop/eighty_four_codes/concept'
15
- require 'rubocop/eighty_four_codes/example_group'
16
- require 'rubocop/eighty_four_codes/example'
17
- require 'rubocop/eighty_four_codes/hook'
18
- require 'rubocop/cop/eighty_four_codes/cop'
5
+ require_relative 'rubocop/eightyfourcodes'
6
+ require_relative 'rubocop/eightyfourcodes/version'
7
+ require_relative 'rubocop/eightyfourcodes/inject'
19
8
 
20
9
  RuboCop::EightyFourCodes::Inject.defaults!
21
10
 
22
- Dir["#{__dir__}/rubocop/cop/eighty_four_codes/**/*.rb"].each { |cop| require cop }
11
+ require_relative 'rubocop/cop/eightyfourcodes_cops'
@@ -1,35 +1,34 @@
1
- $LOAD_PATH.unshift File.expand_path('lib', __dir__)
2
- require 'rubocop/eighty_four_codes/version'
1
+ # frozen_string_literal: true
2
+
3
+ require_relative 'lib/rubocop/eightyfourcodes/version'
3
4
 
4
5
  Gem::Specification.new do |spec|
5
6
  spec.name = 'rubocop-eightyfourcodes'
6
- spec.summary = 'Basic security checks for projects'
7
+ spec.version = RuboCop::EightyFourCodes::VERSION
8
+ spec.authors = ['Anders Bälter']
9
+ spec.email = ['anders@84codes.com']
10
+
11
+ spec.summary = 'This is a collection of cops developed and used by 84codes AB.'
7
12
  spec.description = <<~DESCRIPTION
8
- Basic security checking for Ruby files.
9
13
  A plugin for the RuboCop code style enforcing & linting tool.
10
14
  DESCRIPTION
11
15
  spec.homepage = 'https://github.com/84codes/rubocop-eightyfourcodes/'
12
- spec.authors = ['Anders Bälter', 'Brian Neel']
13
- spec.email = [
14
- 'anders@eightyfourcodes.com',
15
- 'brian@gitlab.com'
16
- ]
17
- spec.licenses = ['MIT']
16
+ spec.license = 'MIT'
17
+ spec.required_ruby_version = '>= 2.6.0'
18
+
19
+ spec.metadata = {
20
+ 'rubygems_mfa_required' => 'true'
21
+ }
18
22
 
19
- spec.version = RuboCop::EightyFourCodes::Version::STRING
20
- spec.platform = Gem::Platform::RUBY
21
- spec.required_ruby_version = '>= 2.3.0'
23
+ # Specify which files should be added to the gem when it is released.
24
+ # The `git ls-files -z` loads the files in the RubyGem that have been added into git.
25
+ spec.files = Dir.chdir(__dir__) do
26
+ `git ls-files -z`.split("\x0").reject do |f|
27
+ (File.expand_path(f) == __FILE__) || f.match(%r{\A(?:(?:bin|test|spec|features)/|\.(?:git|circleci)|appveyor)})
28
+ end
29
+ end
22
30
 
23
31
  spec.require_paths = ['lib']
24
- spec.files = Dir[
25
- '{config,lib}/**/*',
26
- '*.md',
27
- '*.gemspec',
28
- 'Gemfile'
29
- ]
32
+ spec.add_dependency 'rubocop', '< 2'
30
33
  spec.extra_rdoc_files = ['LICENSE.md', 'README.md']
31
-
32
- spec.add_runtime_dependency 'rubocop', '>= 0.51'
33
-
34
- spec.add_development_dependency 'rake'
35
34
  end
@@ -0,0 +1,6 @@
1
+ module Rubocop
2
+ module EightyFourCodes
3
+ VERSION: String
4
+ # See the writing guide of rbs: https://github.com/ruby/rbs#guides
5
+ end
6
+ end
metadata CHANGED
@@ -1,87 +1,70 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: rubocop-eightyfourcodes
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.0.2
4
+ version: 0.0.4
5
5
  platform: ruby
6
6
  authors:
7
7
  - Anders Bälter
8
- - Brian Neel
9
- autorequire:
10
8
  bindir: bin
11
9
  cert_chain: []
12
- date: 2020-09-24 00:00:00.000000000 Z
10
+ date: 2025-03-20 00:00:00.000000000 Z
13
11
  dependencies:
14
12
  - !ruby/object:Gem::Dependency
15
13
  name: rubocop
16
14
  requirement: !ruby/object:Gem::Requirement
17
15
  requirements:
18
- - - ">="
16
+ - - "<"
19
17
  - !ruby/object:Gem::Version
20
- version: '0.51'
18
+ version: '2'
21
19
  type: :runtime
22
20
  prerelease: false
23
21
  version_requirements: !ruby/object:Gem::Requirement
24
22
  requirements:
25
- - - ">="
23
+ - - "<"
26
24
  - !ruby/object:Gem::Version
27
- version: '0.51'
28
- - !ruby/object:Gem::Dependency
29
- name: rake
30
- requirement: !ruby/object:Gem::Requirement
31
- requirements:
32
- - - ">="
33
- - !ruby/object:Gem::Version
34
- version: '0'
35
- type: :development
36
- prerelease: false
37
- version_requirements: !ruby/object:Gem::Requirement
38
- requirements:
39
- - - ">="
40
- - !ruby/object:Gem::Version
41
- version: '0'
42
- description: |
43
- Basic security checking for Ruby files.
44
- A plugin for the RuboCop code style enforcing & linting tool.
25
+ version: '2'
26
+ description: 'A plugin for the RuboCop code style enforcing & linting tool.
27
+
28
+ '
45
29
  email:
46
- - anders@eightyfourcodes.com
47
- - brian@gitlab.com
30
+ - anders@84codes.com
48
31
  executables: []
49
32
  extensions: []
50
33
  extra_rdoc_files:
51
34
  - LICENSE.md
52
35
  - README.md
53
36
  files:
37
+ - ".rspec"
38
+ - ".rubocop.yml"
54
39
  - CHANGELOG.md
55
- - CONTRIBUTING.md
56
40
  - Gemfile
41
+ - Gemfile.lock
57
42
  - LICENSE.md
58
43
  - README.md
44
+ - Rakefile
59
45
  - config/default.yml
60
46
  - lib/rubocop-eightyfourcodes.rb
61
47
  - lib/rubocop/cop/eighty_four_codes/command_literal_injection.rb
62
- - lib/rubocop/cop/eighty_four_codes/cop.rb
48
+ - lib/rubocop/cop/eighty_four_codes/ensure_redirect.rb
63
49
  - lib/rubocop/cop/eighty_four_codes/ruby_version_file.rb
64
- - lib/rubocop/cop/eighty_four_codes/shell_escape.rb
65
- - lib/rubocop/eighty_four_codes.rb
66
- - lib/rubocop/eighty_four_codes/concept.rb
67
- - lib/rubocop/eighty_four_codes/config_formatter.rb
68
- - lib/rubocop/eighty_four_codes/description_extractor.rb
69
- - lib/rubocop/eighty_four_codes/example.rb
70
- - lib/rubocop/eighty_four_codes/example_group.rb
71
- - lib/rubocop/eighty_four_codes/hook.rb
72
- - lib/rubocop/eighty_four_codes/inject.rb
73
- - lib/rubocop/eighty_four_codes/language.rb
74
- - lib/rubocop/eighty_four_codes/language/node_pattern.rb
75
- - lib/rubocop/eighty_four_codes/top_level_describe.rb
76
- - lib/rubocop/eighty_four_codes/util.rb
77
- - lib/rubocop/eighty_four_codes/version.rb
78
- - lib/rubocop/eighty_four_codes/wording.rb
50
+ - lib/rubocop/cop/eightyfourcodes_cops.rb
51
+ - lib/rubocop/cop/gitlab_security/deep_munge.rb
52
+ - lib/rubocop/cop/gitlab_security/json_serialization.rb
53
+ - lib/rubocop/cop/gitlab_security/public_send.rb
54
+ - lib/rubocop/cop/gitlab_security/redirect_to_params_update.rb
55
+ - lib/rubocop/cop/gitlab_security/send_file_params.rb
56
+ - lib/rubocop/cop/gitlab_security/sql_injection.rb
57
+ - lib/rubocop/cop/gitlab_security/system_command_injection.rb
58
+ - lib/rubocop/eightyfourcodes.rb
59
+ - lib/rubocop/eightyfourcodes/inject.rb
60
+ - lib/rubocop/eightyfourcodes/version.rb
79
61
  - rubocop-eightyfourcodes.gemspec
62
+ - sig/rubocop/eightyfourcodes.rbs
80
63
  homepage: https://github.com/84codes/rubocop-eightyfourcodes/
81
64
  licenses:
82
65
  - MIT
83
- metadata: {}
84
- post_install_message:
66
+ metadata:
67
+ rubygems_mfa_required: 'true'
85
68
  rdoc_options: []
86
69
  require_paths:
87
70
  - lib
@@ -89,15 +72,14 @@ required_ruby_version: !ruby/object:Gem::Requirement
89
72
  requirements:
90
73
  - - ">="
91
74
  - !ruby/object:Gem::Version
92
- version: 2.3.0
75
+ version: 2.6.0
93
76
  required_rubygems_version: !ruby/object:Gem::Requirement
94
77
  requirements:
95
78
  - - ">="
96
79
  - !ruby/object:Gem::Version
97
80
  version: '0'
98
81
  requirements: []
99
- rubygems_version: 3.1.2
100
- signing_key:
82
+ rubygems_version: 3.6.2
101
83
  specification_version: 4
102
- summary: Basic security checks for projects
84
+ summary: This is a collection of cops developed and used by 84codes AB.
103
85
  test_files: []
data/CONTRIBUTING.md DELETED
@@ -1,3 +0,0 @@
1
- # Contributing
2
-
3
- <https://docs.rubocop.org/en/latest/contributing/>