Commit dc72c135 authored by Rémy Coutable's avatar Rémy Coutable

Fix EE-specific offenses to the LineBreakAfterGuardClauses cop

Signed-off-by: default avatarRémy Coutable <remy@rymai.me>
parent 63a0f8e2
...@@ -9,6 +9,7 @@ module Oauth2 ...@@ -9,6 +9,7 @@ module Oauth2
def execute def execute
return error('access token not found') unless access_token return error('access token not found') unless access_token
status = AccessTokenValidationService.new(access_token).validate status = AccessTokenValidationService.new(access_token).validate
if status == AccessTokenValidationService::VALID if status == AccessTokenValidationService::VALID
......
...@@ -69,6 +69,7 @@ module Projects ...@@ -69,6 +69,7 @@ module Projects
# Try for 30 seconds, polling every 10 # Try for 30 seconds, polling every 10
3.times do 3.times do
return true if reference_counter.value == 0 return true if reference_counter.value == 0
sleep 10 sleep 10
end end
......
...@@ -7,6 +7,7 @@ module Prependable ...@@ -7,6 +7,7 @@ module Prependable
return false return false
else else
return false if base < self return false if base < self
super super
base.singleton_class.send(:prepend, const_get('ClassMethods')) if const_defined?(:ClassMethods) base.singleton_class.send(:prepend, const_get('ClassMethods')) if const_defined?(:ClassMethods)
@_dependencies.each { |dep| base.send(:prepend, dep) } @_dependencies.each { |dep| base.send(:prepend, dep) }
......
...@@ -35,11 +35,13 @@ class AddIndexForPushrulesIsSample < ActiveRecord::Migration ...@@ -35,11 +35,13 @@ class AddIndexForPushrulesIsSample < ActiveRecord::Migration
def up def up
return if index_exists? :push_rules, :is_sample return if index_exists? :push_rules, :is_sample
add_concurrent_index(:push_rules, :is_sample, where: "is_sample") add_concurrent_index(:push_rules, :is_sample, where: "is_sample")
end end
def down def down
return unless index_exists? :push_rules, :is_sample return unless index_exists? :push_rules, :is_sample
remove_concurrent_index(:push_rules, :is_sample, where: "is_sample") remove_concurrent_index(:push_rules, :is_sample, where: "is_sample")
end end
end end
...@@ -31,6 +31,7 @@ module EE ...@@ -31,6 +31,7 @@ module EE
kubeclient.get_deployments(namespace: actual_namespace).as_json kubeclient.get_deployments(namespace: actual_namespace).as_json
rescue KubeException => err rescue KubeException => err
raise err unless err.error_code == 404 raise err unless err.error_code == 404
[] []
end end
end end
......
...@@ -366,6 +366,7 @@ module EE ...@@ -366,6 +366,7 @@ module EE
def username_only_import_url def username_only_import_url
bare_url = read_attribute(:import_url) bare_url = read_attribute(:import_url)
return bare_url unless ::Gitlab::UrlSanitizer.valid?(bare_url) return bare_url unless ::Gitlab::UrlSanitizer.valid?(bare_url)
::Gitlab::UrlSanitizer.new(bare_url, credentials: { user: import_data&.user }).full_url ::Gitlab::UrlSanitizer.new(bare_url, credentials: { user: import_data&.user }).full_url
end end
......
...@@ -177,6 +177,7 @@ class License < ActiveRecord::Base ...@@ -177,6 +177,7 @@ class License < ActiveRecord::Base
license = self.last license = self.last
return unless license && license.valid? return unless license && license.valid?
license license
end end
end end
......
...@@ -111,6 +111,7 @@ class RemoteMirror < ActiveRecord::Base ...@@ -111,6 +111,7 @@ class RemoteMirror < ActiveRecord::Base
def url=(value) def url=(value)
return super(value) unless Gitlab::UrlSanitizer.valid?(value) return super(value) unless Gitlab::UrlSanitizer.valid?(value)
mirror_url = Gitlab::UrlSanitizer.new(value) mirror_url = Gitlab::UrlSanitizer.new(value)
self.credentials = mirror_url.credentials self.credentials = mirror_url.credentials
......
...@@ -8,6 +8,7 @@ class LdapGroupResetService ...@@ -8,6 +8,7 @@ class LdapGroupResetService
group.members.with_ldap_dn.map do |member| group.members.with_ldap_dn.map do |member|
# don't unauthorize the current user # don't unauthorize the current user
next if current_user == member.user next if current_user == member.user
member.update_attribute :access_level, Gitlab::Access::GUEST member.update_attribute :access_level, Gitlab::Access::GUEST
end end
......
...@@ -19,6 +19,7 @@ class RepositoryUpdateRemoteMirrorWorker ...@@ -19,6 +19,7 @@ class RepositoryUpdateRemoteMirrorWorker
return if remote_mirror.updated_since?(scheduled_time) return if remote_mirror.updated_since?(scheduled_time)
raise UpdateAlreadyInProgressError if remote_mirror.update_in_progress? raise UpdateAlreadyInProgressError if remote_mirror.update_in_progress?
remote_mirror.update_start remote_mirror.update_start
project = remote_mirror.project project = remote_mirror.project
......
...@@ -85,10 +85,12 @@ module Elasticsearch ...@@ -85,10 +85,12 @@ module Elasticsearch
bulk_operations = slice.map do |delta| bulk_operations = slice.map do |delta|
if delta.status == :deleted if delta.status == :deleted
next if delta.old_file[:mode].to_s(8) == "160000" next if delta.old_file[:mode].to_s(8) == "160000"
b = LiteBlob.new(repository_for_indexing, delta.old_file) b = LiteBlob.new(repository_for_indexing, delta.old_file)
delete_blob(b) delete_blob(b)
else else
next if delta.new_file[:mode].to_s(8) == "160000" next if delta.new_file[:mode].to_s(8) == "160000"
b = LiteBlob.new(repository_for_indexing, delta.new_file) b = LiteBlob.new(repository_for_indexing, delta.new_file)
index_blob(b, to) index_blob(b, to)
end end
...@@ -112,6 +114,7 @@ module Elasticsearch ...@@ -112,6 +114,7 @@ module Elasticsearch
def delete_blob(blob) def delete_blob(blob)
return unless blob.text? return unless blob.text?
{ {
delete: { delete: {
_index: "#{self.class.index_name}", _index: "#{self.class.index_name}",
...@@ -124,6 +127,7 @@ module Elasticsearch ...@@ -124,6 +127,7 @@ module Elasticsearch
def index_blob(blob, target_sha) def index_blob(blob, target_sha)
return unless can_index_blob?(blob) return unless can_index_blob?(blob)
{ {
index: { index: {
_index: "#{self.class.index_name}", _index: "#{self.class.index_name}",
......
...@@ -9,9 +9,11 @@ module Gitlab ...@@ -9,9 +9,11 @@ module Gitlab
def oauth_state_valid? def oauth_state_valid?
return false unless state return false unless state
salt, hmac, return_to = state.split(':', 3) salt, hmac, return_to = state.split(':', 3)
return false unless return_to return false unless return_to
hmac == generate_oauth_hmac(salt, return_to) hmac == generate_oauth_hmac(salt, return_to)
end end
......
...@@ -94,6 +94,7 @@ module Gitlab ...@@ -94,6 +94,7 @@ module Gitlab
page, version = wiki_page_from_iterator(response) { |message| message.end_of_page } page, version = wiki_page_from_iterator(response) { |message| message.end_of_page }
break unless page && version break unless page && version
pages << [page, version] pages << [page, version]
end end
......
...@@ -154,8 +154,10 @@ module Gitlab ...@@ -154,8 +154,10 @@ module Gitlab
# there can be only one Kerberos identity in GitLab; if the user has a Kerberos identity in AD, # there can be only one Kerberos identity in GitLab; if the user has a Kerberos identity in AD,
# replace any existing Kerberos identity for the user # replace any existing Kerberos identity for the user
return unless ldap_user.kerberos_principal.present? return unless ldap_user.kerberos_principal.present?
kerberos_identity = user.identities.where(provider: :kerberos).first kerberos_identity = user.identities.where(provider: :kerberos).first
return if kerberos_identity && kerberos_identity.extern_uid == ldap_user.kerberos_principal return if kerberos_identity && kerberos_identity.extern_uid == ldap_user.kerberos_principal
kerberos_identity ||= Identity.new(provider: :kerberos, user: user) kerberos_identity ||= Identity.new(provider: :kerberos, user: user)
kerberos_identity.extern_uid = ldap_user.kerberos_principal kerberos_identity.extern_uid = ldap_user.kerberos_principal
unless kerberos_identity.save unless kerberos_identity.save
......
...@@ -426,6 +426,7 @@ module Gitlab ...@@ -426,6 +426,7 @@ module Gitlab
args = [gitlab_shell_projects_path, 'delete-remote-branches', storage, "#{project_name}.git", remote_name, *branch_names] args = [gitlab_shell_projects_path, 'delete-remote-branches', storage, "#{project_name}.git", remote_name, *branch_names]
output, status = Popen.popen(args) output, status = Popen.popen(args)
raise Error, output unless status.zero? raise Error, output unless status.zero?
true true
end end
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment