rubocop-gitlab-security 0.1.0 → 0.1.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 0de5c70ba259b93d21c8b7516b44699985fe6473
4
- data.tar.gz: aebb63f21cb446003f34a24f78bda31666279250
3
+ metadata.gz: 418947a57b9293b3d1d3a11af563ff17249ae717
4
+ data.tar.gz: 79cfcb1bb7a3ef41e152a9539f7a98140de119b2
5
5
  SHA512:
6
- metadata.gz: a355bd388fcf9e8b22757a289de2be26252c72e05a58e22017fe90f7a765f8a3d2309ad87988bd7a1687242539e168ee4cb743337e65fab41f7378d27b874c64
7
- data.tar.gz: e50d20427b601c6f92ea8a66ade418e04a5bf256767440c62d3b8c2c5fc760d0c97173eeea198a4eac74624593e365071d90584bfde2ff5260b3ffca890fd7c0
6
+ metadata.gz: 95d9e45787487cd75eedbf0a333253fa93c89d9da7bc404ac459f0376cc118de697f922dbdac836683ab1c2714b0bb3c8a8c0bb668cd206ae61675302f975493
7
+ data.tar.gz: a176a812a0e0a6bb93ccc6aebe0f43e2b42ba39dfc329e4a75e8e097653b83eff9c98fca93d38fc90790d7b1a76e7aa9077d5b123cba42194e13f4208605821b
data/Gemfile CHANGED
@@ -5,5 +5,5 @@ gemspec
5
5
  group :development, :test do
6
6
  gem 'pry'
7
7
  gem 'rspec', '~> 3.6.0'
8
- gem 'rubocop-rspec', '~> 1.15.0'
8
+ gem 'rubocop-rspec', '~> 1.21.0'
9
9
  end
@@ -16,13 +16,13 @@ module RuboCop
16
16
  MSG = 'Never disable the deep munge security option.'.freeze
17
17
 
18
18
  def_node_matcher :disable_deep_munge?, <<-PATTERN
19
- (send (send (send nil :config) :action_dispatch) :perform_deep_munge= (false))
19
+ (send (send (send nil? :config) :action_dispatch) :perform_deep_munge= (false))
20
20
  PATTERN
21
21
 
22
22
  def on_send(node)
23
23
  return unless disable_deep_munge?(node)
24
24
 
25
- add_offense(node, :selector)
25
+ add_offense(node, location: :selector)
26
26
  end
27
27
  end
28
28
  end
@@ -34,7 +34,7 @@ module RuboCop
34
34
  # Check for `to_json` sent to any object that's not a Hash literal or
35
35
  # Serializer instance
36
36
  def_node_matcher :json_serialization?, <<~PATTERN
37
- (send !{nil hash #serializer?} ${:to_json :as_json} $...)
37
+ (send !{nil? hash #serializer?} ${:to_json :as_json} $...)
38
38
  PATTERN
39
39
 
40
40
  # Check if node is a `only: ...` pair
@@ -54,7 +54,7 @@ module RuboCop
54
54
 
55
55
  # Check for `SomeConstant.new`
56
56
  def_node_search :constant_init, <<~PATTERN
57
- (send (const nil $_) :new ...)
57
+ (send (const nil? $_) :new ...)
58
58
  PATTERN
59
59
 
60
60
  def on_send(node)
@@ -66,7 +66,7 @@ module RuboCop
66
66
 
67
67
  if matched.last.nil? || matched.last.empty?
68
68
  # Empty `to_json` call
69
- add_offense(node, :selector, format_message)
69
+ add_offense(node, location: :selector, message: format_message)
70
70
  else
71
71
  check_arguments(node, matched)
72
72
  end
@@ -98,7 +98,7 @@ module RuboCop
98
98
  # Add a top-level offense for the entire argument list, but only if
99
99
  # we haven't yet added any offenses to the child Hash values (such
100
100
  # as `include`)
101
- add_offense(node.children.last, :expression, format_message)
101
+ add_offense(node.children.last, location: :expression, message: format_message)
102
102
  end
103
103
 
104
104
  def check_pair(pair)
@@ -110,7 +110,7 @@ module RuboCop
110
110
  includes.each_child_node do |child_node|
111
111
  next if contains_only?(child_node)
112
112
 
113
- add_offense(child_node, :expression, format_message)
113
+ add_offense(child_node, location: :expression, message: format_message)
114
114
  end
115
115
  end
116
116
  end
@@ -31,7 +31,7 @@ module RuboCop
31
31
  send?(node) do |match|
32
32
  next unless node.arguments?
33
33
 
34
- add_offense(node, :selector, format(MSG, match))
34
+ add_offense(node, location: :selector, message: format(MSG, match))
35
35
  end
36
36
  end
37
37
  end
@@ -17,13 +17,13 @@ module RuboCop
17
17
  MSG = 'Avoid using redirect_to(params.update()). Only pass whitelisted arguments into redirect_to() (e.g. not including `host`)'.freeze
18
18
 
19
19
  def_node_matcher :redirect_to_params_update_node, <<-PATTERN
20
- (send nil :redirect_to (send (send nil :params) ${:update :merge} ...))
20
+ (send nil :redirect_to (send (send nil? :params) ${:update :merge} ...))
21
21
  PATTERN
22
22
 
23
23
  def on_send(node)
24
24
  return unless redirect_to_params_update_node(node)
25
25
 
26
- add_offense(node, :selector)
26
+ add_offense(node, location: :selector)
27
27
  end
28
28
  end
29
29
  end
@@ -23,14 +23,14 @@ module RuboCop
23
23
  this warning can be disabled using `#rubocop:disable GitlabSecurity/SendFileParams`'.freeze
24
24
 
25
25
  def_node_search :params_node?, <<-PATTERN
26
- (send (send nil :params) ... )
26
+ (send (send nil? :params) ... )
27
27
  PATTERN
28
28
 
29
29
  def on_send(node)
30
30
  return unless node.command?(:send_file)
31
- return unless node.method_args.any? { |e| params_node?(e) }
31
+ return unless node.arguments.any? { |e| params_node?(e) }
32
32
 
33
- add_offense(node, :selector)
33
+ add_offense(node, location: :selector)
34
34
  end
35
35
  end
36
36
  end
@@ -28,9 +28,9 @@ module RuboCop
28
28
 
29
29
  def on_send(node)
30
30
  return unless where_user_input?(node)
31
- return unless node.method_args.any? { |e| string_var_string?(e) }
31
+ return unless node.arguments.any? { |e| string_var_string?(e) }
32
32
 
33
- add_offense(node, :selector)
33
+ add_offense(node, location: :selector)
34
34
  end
35
35
  end
36
36
  end
@@ -25,9 +25,9 @@ module RuboCop
25
25
 
26
26
  def on_send(node)
27
27
  return unless node.command?(:system)
28
- return unless node.method_args.any? { |e| system_var?(e) }
28
+ return unless node.arguments.any? { |e| system_var?(e) }
29
29
 
30
- add_offense(node, :selector)
30
+ add_offense(node, location: :selector)
31
31
  end
32
32
  end
33
33
  end
@@ -42,7 +42,7 @@ module RuboCop
42
42
  end
43
43
 
44
44
  def scope_argument
45
- node.method_args.first
45
+ node.first_argument
46
46
  end
47
47
  end
48
48
  end
@@ -4,7 +4,7 @@ module RuboCop
4
4
  module GitlabSecurity
5
5
  # Version information for the GitlabSecurity Rubocop plugin.
6
6
  module Version
7
- STRING = '0.1.0'
7
+ STRING = '0.1.1'
8
8
  end
9
9
  end
10
10
  end
@@ -1,15 +1,13 @@
1
- # encoding: utf-8
2
-
3
1
  $LOAD_PATH.unshift File.expand_path('../lib', __FILE__)
4
2
  require 'rubocop/gitlab-security/version'
5
3
 
6
4
  Gem::Specification.new do |spec|
7
5
  spec.name = 'rubocop-gitlab-security'
8
6
  spec.summary = 'Basic security checks for projects'
9
- spec.description = <<-end_description
7
+ spec.description = <<~DESCRIPTION
10
8
  Basic security checking for Ruby files.
11
9
  A plugin for the RuboCop code style enforcing & linting tool.
12
- end_description
10
+ DESCRIPTION
13
11
  spec.homepage = 'https://gitlab.com/gitlab-org/rubocop-gitlab-security/'
14
12
  spec.authors = ['Brian Neel']
15
13
  spec.email = [
@@ -19,7 +17,7 @@ Gem::Specification.new do |spec|
19
17
 
20
18
  spec.version = RuboCop::GitlabSecurity::Version::STRING
21
19
  spec.platform = Gem::Platform::RUBY
22
- spec.required_ruby_version = '>= 2.1.0'
20
+ spec.required_ruby_version = '>= 2.3.0'
23
21
 
24
22
  spec.require_paths = ['lib']
25
23
  spec.files = Dir[
@@ -30,7 +28,7 @@ Gem::Specification.new do |spec|
30
28
  ]
31
29
  spec.extra_rdoc_files = ['MIT-LICENSE.md', 'README.md']
32
30
 
33
- spec.add_runtime_dependency 'rubocop', '>= 0.47.1'
31
+ spec.add_runtime_dependency 'rubocop', '>= 0.51'
34
32
 
35
33
  spec.add_development_dependency 'rake'
36
34
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: rubocop-gitlab-security
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.1.0
4
+ version: 0.1.1
5
5
  platform: ruby
6
6
  authors:
7
7
  - Brian Neel
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2017-08-24 00:00:00.000000000 Z
11
+ date: 2017-12-14 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: rubocop
@@ -16,14 +16,14 @@ dependencies:
16
16
  requirements:
17
17
  - - ">="
18
18
  - !ruby/object:Gem::Version
19
- version: 0.47.1
19
+ version: '0.51'
20
20
  type: :runtime
21
21
  prerelease: false
22
22
  version_requirements: !ruby/object:Gem::Requirement
23
23
  requirements:
24
24
  - - ">="
25
25
  - !ruby/object:Gem::Version
26
- version: 0.47.1
26
+ version: '0.51'
27
27
  - !ruby/object:Gem::Dependency
28
28
  name: rake
29
29
  requirement: !ruby/object:Gem::Requirement
@@ -38,9 +38,9 @@ dependencies:
38
38
  - - ">="
39
39
  - !ruby/object:Gem::Version
40
40
  version: '0'
41
- description: |2
42
- Basic security checking for Ruby files.
43
- A plugin for the RuboCop code style enforcing & linting tool.
41
+ description: |
42
+ Basic security checking for Ruby files.
43
+ A plugin for the RuboCop code style enforcing & linting tool.
44
44
  email:
45
45
  - brian@gitlab.com
46
46
  executables: []
@@ -90,7 +90,7 @@ required_ruby_version: !ruby/object:Gem::Requirement
90
90
  requirements:
91
91
  - - ">="
92
92
  - !ruby/object:Gem::Version
93
- version: 2.1.0
93
+ version: 2.3.0
94
94
  required_rubygems_version: !ruby/object:Gem::Requirement
95
95
  requirements:
96
96
  - - ">="
@@ -98,7 +98,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
98
98
  version: '0'
99
99
  requirements: []
100
100
  rubyforge_project:
101
- rubygems_version: 2.5.2
101
+ rubygems_version: 2.6.11
102
102
  signing_key:
103
103
  specification_version: 4
104
104
  summary: Basic security checks for projects