0
0
Fork 0

Fix Style/StringLiterals cop (#30005)

This commit is contained in:
Matt Jankowski 2024-04-19 16:33:00 -04:00 committed by GitHub
parent 8d47ba893a
commit 933189887b
No known key found for this signature in database
GPG key ID: B5690EEEBB952194
7 changed files with 8 additions and 20 deletions

View file

@ -7,4 +7,4 @@
# You can also remove all the silencers if you're trying to debug a problem that might stem from framework code
# by setting BACKTRACE=1 before calling your invocation, like "BACKTRACE=1 ./bin/rails runner 'MyClass.perform'".
Rails.backtrace_cleaner.remove_silencers! if ENV["BACKTRACE"]
Rails.backtrace_cleaner.remove_silencers! if ENV['BACKTRACE']

View file

@ -7,7 +7,7 @@ Rails.application.configure do
proxy = URI.parse(ENV['http_proxy'])
raise "Unsupported proxy type: #{proxy.scheme}" unless %w(http https).include? proxy.scheme
raise "No proxy host" unless proxy.host
raise 'No proxy host' unless proxy.host
host = proxy.host
host = host[1...-1] if host[0] == '[' # for IPv6 address
@ -24,7 +24,7 @@ Rails.application.configure do
proxy = URI.parse(ENV['http_hidden_proxy'])
raise "Unsupported proxy type: #{proxy.scheme}" unless %w(http https).include? proxy.scheme
raise "No proxy host" unless proxy.host
raise 'No proxy host' unless proxy.host
host = proxy.host
host = host[1...-1] if host[0] == '[' # for IPv6 address

View file

@ -14,7 +14,7 @@ class Rack::Attack
end
def remote_ip
@remote_ip ||= (@env["action_dispatch.remote_ip"] || ip).to_s
@remote_ip ||= (@env['action_dispatch.remote_ip'] || ip).to_s
end
def throttleable_remote_ip

View file

@ -6,7 +6,7 @@ WebAuthn.configure do |config|
config.origin = "#{Rails.configuration.x.use_https ? 'https' : 'http'}://#{Rails.configuration.x.web_domain}"
# Relying Party name for display purposes
config.rp_name = "Mastodon"
config.rp_name = 'Mastodon'
# Optionally configure a client timeout hint, in milliseconds.
# This hint specifies how long the browser should wait for an