owasp-noir / noir

Attack surface detector that identifies endpoints by static analysis
https://owasp.org/www-project-noir/
MIT License
596 stars 46 forks source link

Apply Linting #404

Closed ksg97031 closed 1 month ago

ksg97031 commented 1 month ago
% ameba --version
1.6.1

% ameba --fix --except=Documentation/DocumentationAdmonition,Lint/SpecFilename
spec/functional_test/func_spec.cr:133:7
[C] Naming/AccessorMethodName: Favour method name 'url=' over 'set_url'
> def set_url(url)
      ^-----^

src/models/noir.cr:128:51
[C] Naming/BlockParameterName: Disallowed block parameter name found
> existing_param = dup.params.find { |p| p.name == param.name }
                                      ^

src/models/endpoint.cr:33:7
[C] Naming/AccessorMethodName: Favour method name 'details=' over 'set_details'
> def set_details(@details : Details)
      ^---------^

src/models/endpoint.cr:36:7
[C] Naming/AccessorMethodName: Favour method name 'protocol=' over 'set_protocol'
> def set_protocol(protocol : String)
      ^----------^

src/techs/techs.cr:477:12
[C] Naming/AccessorMethodName: Favour method name 'techs' over 'get_techs'
> def self.get_techs
           ^-------^

src/tagger/tagger.cr:33:12
[C] Naming/AccessorMethodName: Favour method name 'taggers' over 'get_taggers'
> def self.get_taggers
           ^---------^