Autofix Rubocop Style/RedundantPercentQ (#23651)

This commit is contained in:
Nick Schonning 2023-02-17 21:32:57 -05:00 committed by GitHub
parent 7a941b42d3
commit efd424506a
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
2 changed files with 2 additions and 15 deletions

View file

@ -3113,13 +3113,6 @@ Style/OptionalBooleanParameter:
- 'app/workers/unfollow_follow_worker.rb' - 'app/workers/unfollow_follow_worker.rb'
- 'lib/mastodon/redis_config.rb' - 'lib/mastodon/redis_config.rb'
# Offense count: 1
# This cop supports safe autocorrection (--autocorrect).
# Configuration parameters: PreferredDelimiters.
Style/PercentLiteralDelimiters:
Exclude:
- 'spec/lib/text_formatter_spec.rb'
# Offense count: 2 # Offense count: 2
# This cop supports safe autocorrection (--autocorrect). # This cop supports safe autocorrection (--autocorrect).
Style/PerlBackrefs: Style/PerlBackrefs:
@ -3224,12 +3217,6 @@ Style/RedundantConstantBase:
- 'lib/tasks/statistics.rake' - 'lib/tasks/statistics.rake'
- 'spec/rails_helper.rb' - 'spec/rails_helper.rb'
# Offense count: 2
# This cop supports safe autocorrection (--autocorrect).
Style/RedundantPercentQ:
Exclude:
- 'spec/lib/text_formatter_spec.rb'
# Offense count: 16 # Offense count: 16
# This cop supports safe autocorrection (--autocorrect). # This cop supports safe autocorrection (--autocorrect).
Style/RedundantRegexpCharacterClass: Style/RedundantRegexpCharacterClass:

View file

@ -223,7 +223,7 @@ RSpec.describe TextFormatter do
end end
context 'given a URL containing unsafe code (XSS attack, visible part)' do context 'given a URL containing unsafe code (XSS attack, visible part)' do
let(:text) { %q{http://example.com/b<del>b</del>} } let(:text) { 'http://example.com/b<del>b</del>' }
it 'does not include the HTML in the URL' do it 'does not include the HTML in the URL' do
is_expected.to include '"http://example.com/b"' is_expected.to include '"http://example.com/b"'
@ -235,7 +235,7 @@ RSpec.describe TextFormatter do
end end
context 'given a URL containing unsafe code (XSS attack, invisible part)' do context 'given a URL containing unsafe code (XSS attack, invisible part)' do
let(:text) { %q{http://example.com/blahblahblahblah/a<script>alert("Hello")</script>} } let(:text) { 'http://example.com/blahblahblahblah/a<script>alert("Hello")</script>' }
it 'does not include the HTML in the URL' do it 'does not include the HTML in the URL' do
is_expected.to include '"http://example.com/blahblahblahblah/a"' is_expected.to include '"http://example.com/blahblahblahblah/a"'