Skip to content

Commit 4ac7cef

Browse files
committed
🚨 Lint update
1 parent bff6819 commit 4ac7cef

File tree

12 files changed

+62
-55
lines changed

12 files changed

+62
-55
lines changed

.rubocop_gradual.lock

Lines changed: 2 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,13 +5,8 @@
55
"app/controllers/masq/passwords_controller.rb:4013562638": [
66
[8, 18, 1, "Lint/AssignmentInCondition: Wrap assignment in parentheses if intentional", 177560]
77
],
8-
"app/controllers/masq/server_controller.rb:4249946322": [
9-
[47, 16, 1, "Lint/AssignmentInCondition: Wrap assignment in parentheses if intentional", 177560],
10-
[89, 25, 1, "Lint/AssignmentInCondition: Wrap assignment in parentheses if intentional", 177560]
11-
],
12-
"app/controllers/masq/sessions_controller.rb:2546607075": [
13-
[39, 21, 3, "Style/AndOr: Use `&&` instead of `and`.", 193409806],
14-
[49, 20, 1, "Lint/AssignmentInCondition: Wrap assignment in parentheses if intentional", 177560]
8+
"app/controllers/masq/sessions_controller.rb:3600302919": [
9+
[39, 21, 3, "Style/AndOr: Use `&&` instead of `and`.", 193409806]
1510
],
1611
"app/models/masq/persona.rb:3585878101": [
1712
[14, 5, 55, "Style/ClassMethodsDefinitions: Use `class << self` to define a class method.", 1041090622],

app/controllers/masq/consumer_controller.rb

Lines changed: 37 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -2,20 +2,23 @@ module Masq
22
class ConsumerController < BaseController
33
skip_before_action :verify_authenticity_token
44

5+
def index
6+
end
7+
58
def start
69
begin
7-
oidreq = openid_consumer.begin(params[:openid_identifier])
10+
open_id_req = openid_consumer.begin(params[:openid_identifier])
811
rescue OpenID::OpenIDError => e
912
redirect_to(consumer_path, alert: "Discovery failed for #{params[:openid_identifier]}: #{e}")
1013
return
1114
end
1215
if params[:use_sreg]
13-
sregreq = OpenID::SReg::Request.new
14-
sregreq.policy_url = "http://www.policy-url.com"
15-
sregreq.request_fields(["nickname", "email"], true) # required
16-
sregreq.request_fields(["fullname", "dob"], false) # optional
17-
oidreq.add_extension(sregreq)
18-
oidreq.return_to_args["did_sreg"] = "y"
16+
open_id_sreg_req = OpenID::SReg::Request.new
17+
open_id_sreg_req.policy_url = "http://www.policy-url.com"
18+
open_id_sreg_req.request_fields(["nickname", "email"], true) # required
19+
open_id_sreg_req.request_fields(["fullname", "dob"], false) # optional
20+
open_id_req.add_extension(open_id_sreg_req)
21+
open_id_req.return_to_args["did_sreg"] = "y"
1922
end
2023
if params[:use_ax_fetch]
2124
axreq = OpenID::AX::FetchRequest.new
@@ -33,50 +36,50 @@ def start
3336
["http://axschema.org/pref/timezone", "timezone"],
3437
]
3538
requested_attrs.each { |a| axreq.add(OpenID::AX::AttrInfo.new(a[0], a[1], a[2] || false, a[3] || 1)) }
36-
oidreq.add_extension(axreq)
37-
oidreq.return_to_args["did_ax_fetch"] = "y"
39+
open_id_req.add_extension(axreq)
40+
open_id_req.return_to_args["did_ax_fetch"] = "y"
3841
end
3942
if params[:use_ax_store]
4043
ax_store_req = OpenID::AX::StoreRequest.new
4144
ax_store_req.set_values("http://axschema.org/contact/email", %w([email protected]))
4245
ax_store_req.set_values("http://axschema.org/birthDate", %w(1976-08-07))
4346
ax_store_req.set_values("http://axschema.org/customValueThatIsNotSupported", %w(unsupported))
44-
oidreq.add_extension(ax_store_req)
45-
oidreq.return_to_args["did_ax_store"] = "y"
47+
open_id_req.add_extension(ax_store_req)
48+
open_id_req.return_to_args["did_ax_store"] = "y"
4649
end
4750
if params[:use_pape]
48-
papereq = OpenID::PAPE::Request.new
49-
papereq.add_policy_uri(OpenID::PAPE::AUTH_PHISHING_RESISTANT)
50-
papereq.max_auth_age = 60
51-
oidreq.add_extension(papereq)
52-
oidreq.return_to_args["did_pape"] = "y"
51+
open_id_pape_req = OpenID::PAPE::Request.new
52+
open_id_pape_req.add_policy_uri(OpenID::PAPE::AUTH_PHISHING_RESISTANT)
53+
open_id_pape_req.max_auth_age = 60
54+
open_id_req.add_extension(open_id_pape_req)
55+
open_id_req.return_to_args["did_pape"] = "y"
5356
end
5457
if params[:force_post]
55-
oidreq.return_to_args["force_post"] = "x" * 2048
58+
open_id_req.return_to_args["force_post"] = "x" * 2048
5659
end
57-
if oidreq.send_redirect?(consumer_url, consumer_complete_url, params[:immediate])
58-
redirect_to(oidreq.redirect_url(consumer_url, consumer_complete_url, params[:immediate]))
60+
if open_id_req.send_redirect?(consumer_url, consumer_complete_url, params[:immediate])
61+
redirect_to(open_id_req.redirect_url(consumer_url, consumer_complete_url, params[:immediate]))
5962
else
60-
@form_text = oidreq.form_markup(consumer_url, consumer_complete_url, params[:immediate], {"id" => "checkid_form"})
63+
@form_text = open_id_req.form_markup(consumer_url, consumer_complete_url, params[:immediate], {"id" => "checkid_form"})
6164
end
6265
end
6366

6467
def complete
65-
parameters = params.to_unsafe_h.reject { |k, v| request.path_parameters[k.to_sym] }
66-
oidresp = openid_consumer.complete(parameters, url_for({}))
67-
case oidresp.status
68+
parameters = params.to_unsafe_h.reject { |k, _v| request.path_parameters[k.to_sym] }
69+
open_id_req = openid_consumer.complete(parameters, url_for({}))
70+
case open_id_req.status
6871
when OpenID::Consumer::SETUP_NEEDED
6972
flash[:alert] = t(:immediate_request_failed_setup_needed)
7073
when OpenID::Consumer::CANCEL
7174
flash[:alert] = t(:openid_transaction_cancelled)
7275
when OpenID::Consumer::FAILURE
73-
flash[:alert] = oidresp.display_identifier ?
74-
t(:verification_of_identifier_failed, identifier: oidresp.display_identifier, message: oidresp.message) :
75-
t(:verification_failed_message, message: oidresp.message)
76+
flash[:alert] = open_id_req.display_identifier ?
77+
t(:verification_of_identifier_failed, identifier: open_id_req.display_identifier, message: open_id_req.message) :
78+
t(:verification_failed_message, message: open_id_req.message)
7679
when OpenID::Consumer::SUCCESS
77-
flash[:notice] = t(:verification_of_identifier_succeeded, identifier: oidresp.display_identifier)
80+
flash[:notice] = t(:verification_of_identifier_succeeded, identifier: open_id_req.display_identifier)
7881
if params[:did_sreg]
79-
sreg_resp = OpenID::SReg::Response.from_success_response(oidresp)
82+
sreg_resp = OpenID::SReg::Response.from_success_response(open_id_req)
8083
sreg_message = "\n\n" + t(:simple_registration_data_requested)
8184
if sreg_resp.empty?
8285
sreg_message << ", " + t(:but_none_was_returned)
@@ -87,7 +90,7 @@ def complete
8790
flash[:notice] += sreg_message
8891
end
8992
if params[:did_ax_fetch]
90-
ax_fetch_resp = OpenID::AX::FetchResponse.from_success_response(oidresp)
93+
ax_fetch_resp = OpenID::AX::FetchResponse.from_success_response(open_id_req)
9194
ax_fetch_message = "\n\n" + t(:attribute_exchange_data_requested)
9295
if ax_fetch_resp
9396
ax_fetch_message << ". " + t(:the_following_data_were_sent) + "\n"
@@ -98,7 +101,7 @@ def complete
98101
flash[:notice] += ax_fetch_message
99102
end
100103
if params[:did_ax_store]
101-
ax_store_resp = OpenID::AX::StoreResponse.from_success_response(oidresp)
104+
ax_store_resp = OpenID::AX::StoreResponse.from_success_response(open_id_req)
102105
ax_store_message = "\n\n" + t(:attribute_exchange_store_requested)
103106
ax_store_message << if ax_store_resp
104107
if ax_store_resp.succeeded?
@@ -112,7 +115,7 @@ def complete
112115
flash[:notice] += ax_store_message
113116
end
114117
if params[:did_pape]
115-
pape_resp = OpenID::PAPE::Response.from_success_response(oidresp)
118+
pape_resp = OpenID::PAPE::Response.from_success_response(open_id_req)
116119
pape_message = "\n\n" + t(:authentication_policies_requested)
117120
if pape_resp.auth_policies.empty?
118121
pape_message << ", " + t(:but_the_server_did_not_report_one)
@@ -124,6 +127,9 @@ def complete
124127
pape_message << "\nNIST Auth Level: #{pape_resp.nist_auth_level}" if pape_resp.nist_auth_level
125128
flash[:notice] += pape_message
126129
end
130+
else
131+
# NOOP
132+
# This should never happen.
127133
end
128134
redirect_to(action: "index")
129135
end

app/controllers/masq/server_controller.rb

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ class ServerController < BaseController
55
skip_before_action :verify_authenticity_token
66
# Error handling
77
rescue_from OpenID::Server::ProtocolError, with: :render_openid_error
8-
# Actions other than index require a logged in user
8+
# Actions other than index require a logged-in user
99
before_action :login_required, except: %i[index cancel seatbelt_config seatbelt_login_state]
1010
before_action :ensure_valid_checkid_request, except: %i[index cancel seatbelt_config seatbelt_login_state]
1111
after_action :clear_checkid_request, only: %i[cancel complete]
@@ -26,7 +26,7 @@ def index
2626
elsif openid_request
2727
handle_non_checkid_request
2828
else
29-
render(plain: t(:this_is_openid_not_a_human_ressource))
29+
render(plain: t(:this_is_openid_not_a_human_resource))
3030
end
3131
end
3232
format.xrds
@@ -40,11 +40,12 @@ def index
4040
# be answered based on the users release policy. If the request is immediate
4141
# (relying party wants no user interaction, used e.g. for ajax requests)
4242
# the request can only be answered if no further information (like simple
43-
# registration data) is requested. Otherwise the user will be redirected
43+
# registration data) is requested. Otherwise, the user will be redirected
4444
# to the decision page.
4545
def proceed
4646
identity = identifier(current_account)
47-
if @site = current_account.sites.find_by(url: checkid_request.trust_root)
47+
@site = current_account.sites.find_by(url: checkid_request.trust_root)
48+
if @site
4849
resp = checkid_request.answer(true, nil, identity)
4950
resp = add_sreg(resp, @site.sreg_properties) if sreg_request
5051
resp = add_ax(resp, @site.ax_properties) if ax_fetch_request
@@ -60,15 +61,15 @@ def proceed
6061
end
6162

6263
# Displays the decision page on that the user can confirm the request and
63-
# choose which data should be transfered to the relying party.
64+
# choose which data should be transferred to the relying party.
6465
def decide
6566
@site = current_account.sites.where(url: checkid_request.trust_root).first_or_initialize
6667
@site.persona = current_account.personas.find_by(params[:persona_id]) || current_account.personas.first if sreg_request || ax_store_request || ax_fetch_request
6768
end
6869

6970
# This action is called by submitting the decision form, the information entered by
7071
# the user is used to answer the request. If the user decides to always trust the
71-
# relying party, a new site according to the release policies the will be created.
72+
# relying party, a new site according to the release policies will be created.
7273
def complete
7374
if params[:cancel]
7475
cancel
@@ -86,7 +87,8 @@ def complete
8687
not_accepted = []
8788
accepted = []
8889
ax_store_request.data.each do |type_uri, values|
89-
if property = Persona.attribute_name_for_type_uri(type_uri)
90+
property = Persona.attribute_name_for_type_uri(type_uri)
91+
if property
9092
store_attribute = params[:site][:ax_store][property.to_sym]
9193
if store_attribute && !store_attribute[:value].blank?
9294
@site.persona.update_attribute(property, values.first)

app/controllers/masq/sessions_controller.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,8 @@ def set_login_cookie
4646
end
4747

4848
def redirect_after_login
49-
if return_to = session[:return_to]
49+
return_to = session[:return_to]
50+
if return_to
5051
session[:return_to] = nil
5152
redirect_to(return_to)
5253
else

app/controllers/masq/sites_controller.rb

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,9 @@ def destroy
3636
end
3737
end
3838

39+
def create
40+
end
41+
3942
private
4043

4144
def site

app/models/masq/account.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ class Account < ActiveRecord::Base
2424
after_save :deliver_forgot_password
2525

2626
# attr_accessible :login, :email, :password, :password_confirmation, :public_persona_id, :yubikey_mandatory
27-
attr_accessor :password
27+
attr_accessor :password, :password_confirmation
2828

2929
class ActivationCodeNotFound < StandardError; end
3030

config/locales/de.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -210,7 +210,7 @@ de:
210210
i_forgot_my_password: Ich habe mein Passwort vergessen
211211

212212
# server controller
213-
this_is_openid_not_a_human_ressource: Dies ist ein OpenID-Server-Endpunkt und keine von Menschen lesbare Ressource.
213+
this_is_openid_not_a_human_resource: Dies ist ein OpenID-Server-Endpunkt und keine von Menschen lesbare Ressource.
214214
identity_verification_request_invalid: Die Anfrage zur Identitätsprüfung ist ungültig.
215215
service_provider_requires_reauthentication_last_login_too_long_ago: Der Dienstanbieter erfordert eine erneute Authentifizierung, da Ihr letzter Login zu lange her war.
216216
login_to_verify_identity: Bitte loggen Sie sich ein, um Ihre Identität zu bestätigen.

config/locales/en.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -210,7 +210,7 @@ en:
210210
i_forgot_my_password: I forgot my password
211211

212212
# server controller
213-
this_is_openid_not_a_human_ressource: This is an OpenID server endpoint, not a human readable resource.
213+
this_is_openid_not_a_human_resource: This is an OpenID server endpoint, not a human readable resource.
214214
identity_verification_request_invalid: The identity verification request is invalid.
215215
service_provider_requires_reauthentication_last_login_too_long_ago: The Service Provider requires reauthentication, because your last login is too long ago.
216216
login_to_verify_identity: Please log in to verify your identity.

config/locales/es.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -199,7 +199,7 @@ es:
199199
i_forgot_my_password: Olvidé mi clave
200200

201201
# server controller
202-
this_is_openid_not_a_human_ressource: "Este es un punto de conexión del servidor OpenID, no un recurso utilizable por personas"
202+
this_is_openid_not_a_human_resource: "Este es un punto de conexión del servidor OpenID, no un recurso utilizable por personas"
203203
identity_verification_request_invalid: La petición de verificación de identidad es inválida.
204204
service_provider_requires_reauthentication_last_login_too_long_ago: "El proveedor del servicio requiere autenticación, porque tu último ingreso fue hace demasiado tiempo."
205205
login_to_verify_identity: Por favor ingresa para verificar tu identidad.

config/locales/nl.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -197,7 +197,7 @@ nl:
197197
i_forgot_my_password: Ik ben mijn wachtwoord vergeten
198198

199199
# server controller
200-
this_is_openid_not_a_human_ressource: Dit is een OpenID server eindpunt, geen voor mensen leesbare bron.
200+
this_is_openid_not_a_human_resource: Dit is een OpenID server eindpunt, geen voor mensen leesbare bron.
201201
identity_verification_request_invalid: De vereficatie van de identiteit is ongeldig.
202202
service_provider_requires_reauthentication_last_login_too_long_ago: De dienst vereist een nieuwe autenticatie, omdat uw laatste inlog te lang geleden was.
203203
login_to_verify_identity: Log alstublieft in om uw identiteit te verefiëren.

0 commit comments

Comments
 (0)