From 51a343efba551d0df5656162b92afb46eba32713 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Mich=C3=A9e=20Lengronne?= Date: Thu, 7 May 2020 11:06:39 +0200 Subject: [PATCH] useless rubocop rule --- libraries/ssh_crypto.rb | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/libraries/ssh_crypto.rb b/libraries/ssh_crypto.rb index bc65cb9..6448eb6 100644 --- a/libraries/ssh_crypto.rb +++ b/libraries/ssh_crypto.rb @@ -23,7 +23,7 @@ def ssh_version inspec.command('ssh -V 2>&1 | cut -f1 -d" " | cut -f2 -d"_"').stdout.to_f end - def valid_ciphers # rubocop:disable Metrics/CyclomaticComplexity, Metrics/MethodLength + def valid_ciphers # rubocop:disable Metrics/CyclomaticComplexity # define a set of default ciphers ciphers53 = 'aes256-ctr,aes192-ctr,aes128-ctr' ciphers66 = 'chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr' @@ -68,7 +68,7 @@ def valid_ciphers # rubocop:disable Metrics/CyclomaticComplexity, Metrics/Method ciphers end - def valid_kexs # rubocop:disable Metrics/CyclomaticComplexity, Metrics/MethodLength + def valid_kexs # rubocop:disable Metrics/CyclomaticComplexity # define a set of default KEXs kex66 = 'curve25519-sha256@libssh.org,diffie-hellman-group-exchange-sha256' kex59 = 'diffie-hellman-group-exchange-sha256' @@ -210,7 +210,7 @@ def valid_privseparation # rubocop:disable Metrics/CyclomaticComplexity end # return a list of valid algoriths for a current platform - def valid_algorithms # rubocop:disable Metrics/CyclomaticComplexity, Metrics/MethodLength + def valid_algorithms # rubocop:disable Metrics/CyclomaticComplexity alg53 = %w[rsa] alg60 = %w[rsa ecdsa] alg66 = %w[rsa ecdsa ed25519]