lib/ssl_helpers.rb

Summary

Maintainability
A
3 hrs
Test Coverage

Possible unprotected redirect
Open

      redirect_to params.merge(protocol: 'http')
Severity: Critical
Found in lib/ssl_helpers.rb by brakeman

Unvalidated redirects and forwards are #10 on the OWASP Top Ten.

Redirects which rely on user-supplied values can be used to "spoof" websites or hide malicious links in otherwise harmless-looking URLs. They can also allow access to restricted areas of a site if the destination is not validated.

Brakeman will raise warnings whenever redirect_to appears to be used with a user-supplied value that may allow them to change the :host option.

For example,

redirect_to params.merge(:action => :home)

will create a warning like

Possible unprotected redirect near line 46: redirect_to(params)

This is because params could contain :host => 'evilsite.com' which would redirect away from your site and to a malicious site.

If the first argument to redirect_to is a hash, then adding :only_path => true will limit the redirect to the current host. Another option is to specify the host explicitly.

redirect_to params.merge(:only_path => true)

redirect_to params.merge(:host => 'myhost.com')

If the first argument is a string, then it is possible to parse the string and extract the path:

redirect_to URI.parse(some_url).path

If the URL does not contain a protocol (e.g., http://), then you will probably get unexpected results, as redirect_to will prepend the current host name and a protocol.

Possible unprotected redirect
Open

      redirect_to params.merge(protocol: 'https')
Severity: Critical
Found in lib/ssl_helpers.rb by brakeman

Unvalidated redirects and forwards are #10 on the OWASP Top Ten.

Redirects which rely on user-supplied values can be used to "spoof" websites or hide malicious links in otherwise harmless-looking URLs. They can also allow access to restricted areas of a site if the destination is not validated.

Brakeman will raise warnings whenever redirect_to appears to be used with a user-supplied value that may allow them to change the :host option.

For example,

redirect_to params.merge(:action => :home)

will create a warning like

Possible unprotected redirect near line 46: redirect_to(params)

This is because params could contain :host => 'evilsite.com' which would redirect away from your site and to a malicious site.

If the first argument to redirect_to is a hash, then adding :only_path => true will limit the redirect to the current host. Another option is to specify the host explicitly.

redirect_to params.merge(:only_path => true)

redirect_to params.merge(:host => 'myhost.com')

If the first argument is a string, then it is possible to parse the string and extract the path:

redirect_to URI.parse(some_url).path

If the URL does not contain a protocol (e.g., http://), then you will probably get unexpected results, as redirect_to will prepend the current host name and a protocol.

Assignment Branch Condition size for redirect_to_proper_protocol_if_needed is too high. [48.08/15]
Open

  def redirect_to_proper_protocol_if_needed
    return true unless request.get?
    if request.port == 80 && (params[:privacy_type] == 'private' ||
                              params[:private] == 'true')
      redirect_to params.merge(protocol: 'https')
Severity: Minor
Found in lib/ssl_helpers.rb by rubocop

This cop checks that the ABC size of methods is not higher than the configured maximum. The ABC size is based on assignments, branches (method calls), and conditions. See http://c2.com/cgi/wiki?AbcMetric

Perceived complexity for redirect_to_proper_protocol_if_needed is too high. [16/7]
Open

  def redirect_to_proper_protocol_if_needed
    return true unless request.get?
    if request.port == 80 && (params[:privacy_type] == 'private' ||
                              params[:private] == 'true')
      redirect_to params.merge(protocol: 'https')
Severity: Minor
Found in lib/ssl_helpers.rb by rubocop

This cop tries to produce a complexity score that's a measure of the complexity the reader experiences when looking at a method. For that reason it considers when nodes as something that doesn't add as much complexity as an if or a &&. Except if it's one of those special case/when constructs where there's no expression after case. Then the cop treats it as an if/elsif/elsif... and lets all the when nodes count. In contrast to the CyclomaticComplexity cop, this cop considers else nodes as adding complexity.

Example:

def my_method                   # 1
  if cond                       # 1
    case var                    # 2 (0.8 + 4 * 0.2, rounded)
    when 1 then func_one
    when 2 then func_two
    when 3 then func_three
    when 4..10 then func_other
    end
  else                          # 1
    do_something until a && b   # 2
  end                           # ===
end                             # 7 complexity points

Cyclomatic complexity for redirect_to_proper_protocol_if_needed is too high. [15/6]
Open

  def redirect_to_proper_protocol_if_needed
    return true unless request.get?
    if request.port == 80 && (params[:privacy_type] == 'private' ||
                              params[:private] == 'true')
      redirect_to params.merge(protocol: 'https')
Severity: Minor
Found in lib/ssl_helpers.rb by rubocop

This cop checks that the cyclomatic complexity of methods is not higher than the configured maximum. The cyclomatic complexity is the number of linearly independent paths through a method. The algorithm counts decision points and adds one.

An if statement (or unless or ?:) increases the complexity by one. An else branch does not, since it doesn't add a decision point. The && operator (or keyword and) can be converted to a nested if statement, and ||/or is shorthand for a sequence of ifs, so they also add one. Loops can be said to have an exit condition, so they add one.

Method has too many lines. [14/10]
Open

  def redirect_to_proper_protocol_if_needed
    return true unless request.get?
    if request.port == 80 && (params[:privacy_type] == 'private' ||
                              params[:private] == 'true')
      redirect_to params.merge(protocol: 'https')
Severity: Minor
Found in lib/ssl_helpers.rb by rubocop

This cop checks if the length of a method exceeds some maximum value. Comment lines can optionally be ignored. The maximum allowed length is configurable.

Consider simplifying this complex logical expression.
Open

    elsif request.port == 443 && !ssl_required? &&
          ((params[:privacy_type].blank? && params[:private].blank?) ||
            ((params[:privacy_type].present? || params[:private].present?) &&
              (params[:privacy_type].blank? || params[:privacy_type] != 'private') &&
              (params[:private].blank? || params[:private] != 'true')))
Severity: Critical
Found in lib/ssl_helpers.rb - About 2 hrs to fix

    Method redirect_to_proper_protocol_if_needed has a Cognitive Complexity of 12 (exceeds 5 allowed). Consider refactoring.
    Open

      def redirect_to_proper_protocol_if_needed
        return true unless request.get?
        if request.port == 80 && (params[:privacy_type] == 'private' ||
                                  params[:private] == 'true')
          redirect_to params.merge(protocol: 'https')
    Severity: Minor
    Found in lib/ssl_helpers.rb - About 1 hr to fix

    Cognitive Complexity

    Cognitive Complexity is a measure of how difficult a unit of code is to intuitively understand. Unlike Cyclomatic Complexity, which determines how difficult your code will be to test, Cognitive Complexity tells you how difficult your code will be to read and comprehend.

    A method's cognitive complexity is based on a few simple rules:

    • Code is not considered more complex when it uses shorthand that the language provides for collapsing multiple statements into one
    • Code is considered more complex for each "break in the linear flow of the code"
    • Code is considered more complex when "flow breaking structures are nested"

    Further reading

    Method url_for has a Cognitive Complexity of 6 (exceeds 5 allowed). Consider refactoring.
    Open

        def url_for(options = nil)
          if options.kind_of?(Hash)
            options[:protocol] = 'https://' if options[:private] == 'true'
    
            # If the protocol is HTTPS and we're not already there, and we haven't explicitly
    Severity: Minor
    Found in lib/ssl_helpers.rb - About 25 mins to fix

    Cognitive Complexity

    Cognitive Complexity is a measure of how difficult a unit of code is to intuitively understand. Unlike Cyclomatic Complexity, which determines how difficult your code will be to test, Cognitive Complexity tells you how difficult your code will be to read and comprehend.

    A method's cognitive complexity is based on a few simple rules:

    • Code is not considered more complex when it uses shorthand that the language provides for collapsing multiple statements into one
    • Code is considered more complex for each "break in the linear flow of the code"
    • Code is considered more complex when "flow breaking structures are nested"

    Further reading

    Prefer Object#is_a? over Object#kind_of?.
    Open

          if options.kind_of?(Hash)
    Severity: Minor
    Found in lib/ssl_helpers.rb by rubocop

    This cop enforces consistent use of Object#is_a? or Object#kind_of?.

    Example: EnforcedStyle: is_a? (default)

    # bad
    var.kind_of?(Date)
    var.kind_of?(Integer)
    
    # good
    var.is_a?(Date)
    var.is_a?(Integer)

    Example: EnforcedStyle: kind_of?

    # bad
    var.is_a?(Time)
    var.is_a?(String)
    
    # good
    var.kind_of?(Time)
    var.kind_of?(String)

    Use a guard clause instead of wrapping the code inside a conditional expression.
    Open

        if defined?(SystemSetting.force_https_on_restricted_pages) && SystemSetting.force_https_on_restricted_pages
    Severity: Minor
    Found in lib/ssl_helpers.rb by rubocop

    Use a guard clause instead of wrapping the code inside a conditional expression

    Example:

    # bad
    def test
      if something
        work
      end
    end
    
    # good
    def test
      return unless something
      work
    end
    
    # also good
    def test
      work if something
    end
    
    # bad
    if something
      raise 'exception'
    else
      ok
    end
    
    # good
    raise 'exception' if something
    ok

    Prefer Object#is_a? over Object#kind_of?.
    Open

          options[:protocol] = 'https://' if options.kind_of?(Hash)
    Severity: Minor
    Found in lib/ssl_helpers.rb by rubocop

    This cop enforces consistent use of Object#is_a? or Object#kind_of?.

    Example: EnforcedStyle: is_a? (default)

    # bad
    var.kind_of?(Date)
    var.kind_of?(Integer)
    
    # good
    var.is_a?(Date)
    var.is_a?(Integer)

    Example: EnforcedStyle: kind_of?

    # bad
    var.is_a?(Time)
    var.is_a?(String)
    
    # good
    var.kind_of?(Time)
    var.kind_of?(String)

    Prefer Object#is_a? over Object#kind_of?.
    Open

          options[:url][:protocol] = 'https://' if options[:url].kind_of?(Hash)
    Severity: Minor
    Found in lib/ssl_helpers.rb by rubocop

    This cop enforces consistent use of Object#is_a? or Object#kind_of?.

    Example: EnforcedStyle: is_a? (default)

    # bad
    var.kind_of?(Date)
    var.kind_of?(Integer)
    
    # good
    var.is_a?(Date)
    var.is_a?(Integer)

    Example: EnforcedStyle: kind_of?

    # bad
    var.is_a?(Time)
    var.is_a?(String)
    
    # good
    var.kind_of?(Time)
    var.kind_of?(String)

    Prefer Object#is_a? over Object#kind_of?.
    Open

          options[:html][:protocol] = 'https://' if !options[:html].nil? && options[:html].kind_of?(Hash)
    Severity: Minor
    Found in lib/ssl_helpers.rb by rubocop

    This cop enforces consistent use of Object#is_a? or Object#kind_of?.

    Example: EnforcedStyle: is_a? (default)

    # bad
    var.kind_of?(Date)
    var.kind_of?(Integer)
    
    # good
    var.is_a?(Date)
    var.is_a?(Integer)

    Example: EnforcedStyle: kind_of?

    # bad
    var.is_a?(Time)
    var.is_a?(String)
    
    # good
    var.kind_of?(Time)
    var.kind_of?(String)

    Prefer Object#is_a? over Object#kind_of?.
    Open

          if options.kind_of?(Hash) && options[:private] == 'true'
    Severity: Minor
    Found in lib/ssl_helpers.rb by rubocop

    This cop enforces consistent use of Object#is_a? or Object#kind_of?.

    Example: EnforcedStyle: is_a? (default)

    # bad
    var.kind_of?(Date)
    var.kind_of?(Integer)
    
    # good
    var.is_a?(Date)
    var.is_a?(Integer)

    Example: EnforcedStyle: kind_of?

    # bad
    var.is_a?(Time)
    var.is_a?(String)
    
    # good
    var.kind_of?(Time)
    var.kind_of?(String)

    Unreachable code detected.
    Open

          options[:protocol] = 'https://' if options.kind_of?(Hash)
    Severity: Minor
    Found in lib/ssl_helpers.rb by rubocop

    This cop checks for unreachable code. The check are based on the presence of flow of control statement in non-final position in begin(implicit) blocks.

    Example:

    # bad
    
    def some_method
      return
      do_something
    end
    
    # bad
    
    def some_method
      if cond
        return
      else
        return
      end
      do_something
    end

    Example:

    # good
    
    def some_method
      do_something
    end

    Avoid single-line method definitions.
    Open

            def ssl_allowed?; true; end
    Severity: Minor
    Found in lib/ssl_helpers.rb by rubocop

    This cop checks for single-line method definitions that contain a body. It will accept single-line methods with no body.

    Example:

    # bad
    def some_method; body end
    def link_to(url); {:name => url}; end
    def @table.columns; super; end
    
    # good
    def no_op; end
    def self.resource_class=(klass); end
    def @table.columns; end

    There are no issues that match your filters.

    Category
    Status