Skip to content

Commit 46e742b

Browse files
KyFaStrei-moo
authored andcommitted
alphabetize and rubocop lint
1 parent 6e965f3 commit 46e742b

File tree

3 files changed

+9
-11
lines changed

3 files changed

+9
-11
lines changed

lib/secure_headers/headers/policy_management.rb

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -131,11 +131,11 @@ def self.included(base)
131131
NAVIGATE_TO => :source_list,
132132
OBJECT_SRC => :source_list,
133133
PLUGIN_TYPES => :media_type_list,
134+
PREFETCH_SRC => :source_list,
135+
REPORT_TO => :report_to_endpoint,
136+
REPORT_URI => :source_list,
134137
REQUIRE_SRI_FOR => :require_sri_for_list,
135138
REQUIRE_TRUSTED_TYPES_FOR => :require_trusted_types_for_list,
136-
REPORT_URI => :source_list,
137-
REPORT_TO => :report_to_endpoint,
138-
PREFETCH_SRC => :source_list,
139139
SANDBOX => :sandbox_list,
140140
SCRIPT_SRC => :source_list,
141141
SCRIPT_SRC_ELEM => :source_list,
@@ -161,8 +161,8 @@ def self.included(base)
161161
FORM_ACTION,
162162
FRAME_ANCESTORS,
163163
NAVIGATE_TO,
164-
REPORT_URI,
165164
REPORT_TO,
165+
REPORT_URI,
166166
]
167167

168168
FETCH_SOURCES = ALL_DIRECTIVES - NON_FETCH_SOURCES - NON_SOURCE_LIST_SOURCES

spec/lib/secure_headers/headers/content_security_policy_spec.rb

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -212,30 +212,29 @@ module SecureHeaders
212212
end
213213

214214
it "supports report-to directive with endpoint name" do
215-
csp = ContentSecurityPolicy.new({default_src: %w('self'), report_to: "csp-endpoint"})
215+
csp = ContentSecurityPolicy.new({ default_src: %w('self'), report_to: "csp-endpoint" })
216216
expect(csp.value).to eq("default-src 'self'; report-to csp-endpoint")
217217
end
218218

219219
it "includes report-to before report-uri in alphabetical order" do
220-
csp = ContentSecurityPolicy.new({default_src: %w('self'), report_uri: %w(/csp_report), report_to: "csp-endpoint"})
220+
csp = ContentSecurityPolicy.new({ default_src: %w('self'), report_uri: %w(/csp_report), report_to: "csp-endpoint" })
221221
expect(csp.value).to eq("default-src 'self'; report-to csp-endpoint; report-uri /csp_report")
222222
end
223223

224224
it "does not add report-to if the endpoint name is empty" do
225-
csp = ContentSecurityPolicy.new({default_src: %w('self'), report_to: ""})
225+
csp = ContentSecurityPolicy.new({ default_src: %w('self'), report_to: "" })
226226
expect(csp.value).to eq("default-src 'self'")
227227
end
228228

229229
it "does not add report-to if not provided" do
230-
csp = ContentSecurityPolicy.new({default_src: %w('self')})
230+
csp = ContentSecurityPolicy.new({ default_src: %w('self') })
231231
expect(csp.value).not_to include("report-to")
232232
end
233233

234234
it "supports report-to without report-uri" do
235-
csp = ContentSecurityPolicy.new({default_src: %w('self'), report_to: "reporting-endpoint-name"})
235+
csp = ContentSecurityPolicy.new({ default_src: %w('self'), report_to: "reporting-endpoint-name" })
236236
expect(csp.value).to eq("default-src 'self'; report-to reporting-endpoint-name")
237237
end
238238
end
239239
end
240240
end
241-

spec/lib/secure_headers_spec.rb

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -670,4 +670,3 @@ module SecureHeaders
670670
end
671671
end
672672
end
673-

0 commit comments

Comments
 (0)