Fix gosec complaints in libnetwork
These were purposefully ignored before but this goes ahead and "fixes" most of them. Note that none of the things gosec flagged are problematic, just quieting the linter here. Signed-off-by: Brian Goff <cpuguy83@gmail.com>
This commit is contained in:
parent
0645eb8461
commit
116f200737
10 changed files with 17 additions and 12 deletions
|
@ -117,7 +117,7 @@ func fetchNodePeers(ip string, port int, network string) map[string]string {
|
||||||
path = fmt.Sprintf(clusterPeers, ip, port)
|
path = fmt.Sprintf(clusterPeers, ip, port)
|
||||||
}
|
}
|
||||||
|
|
||||||
resp, err := http.Get(path) // nolint:gosec
|
resp, err := http.Get(path) //nolint:gosec // G107: Potential HTTP request made with variable url
|
||||||
if err != nil {
|
if err != nil {
|
||||||
logrus.WithError(err).Fatalf("Failed fetching path")
|
logrus.WithError(err).Fatalf("Failed fetching path")
|
||||||
}
|
}
|
||||||
|
|
|
@ -39,8 +39,9 @@ func setupVerifyAndReconcile(config *networkConfiguration, i *bridgeInterface) e
|
||||||
|
|
||||||
// Release any residual IPv6 address that might be there because of older daemon instances
|
// Release any residual IPv6 address that might be there because of older daemon instances
|
||||||
for _, addrv6 := range addrsv6 {
|
for _, addrv6 := range addrsv6 {
|
||||||
|
addrv6 := addrv6
|
||||||
if addrv6.IP.IsGlobalUnicast() && !types.CompareIPNet(addrv6.IPNet, i.bridgeIPv6) {
|
if addrv6.IP.IsGlobalUnicast() && !types.CompareIPNet(addrv6.IPNet, i.bridgeIPv6) {
|
||||||
if err := i.nlh.AddrDel(i.Link, &addrv6); err != nil { // nolint:gosec
|
if err := i.nlh.AddrDel(i.Link, &addrv6); err != nil {
|
||||||
logrus.Warnf("Failed to remove residual IPv6 address %s from bridge: %v", addrv6.IPNet, err)
|
logrus.Warnf("Failed to remove residual IPv6 address %s from bridge: %v", addrv6.IPNet, err)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -628,8 +628,9 @@ func clearEncryptionStates() {
|
||||||
logrus.Warnf("Failed to retrieve SA list for cleanup: %v", err)
|
logrus.Warnf("Failed to retrieve SA list for cleanup: %v", err)
|
||||||
}
|
}
|
||||||
for _, sp := range spList {
|
for _, sp := range spList {
|
||||||
|
sp := sp
|
||||||
if sp.Mark != nil && sp.Mark.Value == spMark.Value {
|
if sp.Mark != nil && sp.Mark.Value == spMark.Value {
|
||||||
if err := nlh.XfrmPolicyDel(&sp); err != nil { // nolint:gosec
|
if err := nlh.XfrmPolicyDel(&sp); err != nil {
|
||||||
logrus.Warnf("Failed to delete stale SP %s: %v", sp, err)
|
logrus.Warnf("Failed to delete stale SP %s: %v", sp, err)
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
|
@ -637,8 +638,9 @@ func clearEncryptionStates() {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
for _, sa := range saList {
|
for _, sa := range saList {
|
||||||
|
sa := sa
|
||||||
if sa.Reqid == r {
|
if sa.Reqid == r {
|
||||||
if err := nlh.XfrmStateDel(&sa); err != nil { // nolint:gosec
|
if err := nlh.XfrmStateDel(&sa); err != nil {
|
||||||
logrus.Warnf("Failed to delete stale SA %s: %v", sa, err)
|
logrus.Warnf("Failed to delete stale SA %s: %v", sa, err)
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
|
|
|
@ -131,10 +131,11 @@ func (d *driver) peerDbNetworkWalk(nid string, f func(*peerKey, *peerEntry) bool
|
||||||
|
|
||||||
for pKeyStr, pEntry := range mp {
|
for pKeyStr, pEntry := range mp {
|
||||||
var pKey peerKey
|
var pKey peerKey
|
||||||
|
pEntry := pEntry
|
||||||
if _, err := fmt.Sscan(pKeyStr, &pKey); err != nil {
|
if _, err := fmt.Sscan(pKeyStr, &pKey); err != nil {
|
||||||
logrus.Warnf("Peer key scan on network %s failed: %v", nid, err)
|
logrus.Warnf("Peer key scan on network %s failed: %v", nid, err)
|
||||||
}
|
}
|
||||||
if f(&pKey, &pEntry) { // nolint:gosec
|
if f(&pKey, &pEntry) {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -448,7 +448,8 @@ func (epj *endpointJoinInfo) UnmarshalJSON(b []byte) error {
|
||||||
}
|
}
|
||||||
var StaticRoutes []*types.StaticRoute
|
var StaticRoutes []*types.StaticRoute
|
||||||
for _, r := range tStaticRoute {
|
for _, r := range tStaticRoute {
|
||||||
StaticRoutes = append(StaticRoutes, &r) // nolint:gosec
|
r := r
|
||||||
|
StaticRoutes = append(StaticRoutes, &r)
|
||||||
}
|
}
|
||||||
epj.StaticRoutes = StaticRoutes
|
epj.StaticRoutes = StaticRoutes
|
||||||
|
|
||||||
|
|
|
@ -244,7 +244,7 @@ func (nDB *NetworkDB) clusterLeave() error {
|
||||||
|
|
||||||
func (nDB *NetworkDB) triggerFunc(stagger time.Duration, C <-chan time.Time, f func()) {
|
func (nDB *NetworkDB) triggerFunc(stagger time.Duration, C <-chan time.Time, f func()) {
|
||||||
// Use a random stagger to avoid synchronizing
|
// Use a random stagger to avoid synchronizing
|
||||||
randStagger := time.Duration(uint64(rnd.Int63()) % uint64(stagger)) // nolint:gosec
|
randStagger := time.Duration(uint64(rnd.Int63()) % uint64(stagger)) //nolint:gosec // gosec complains about the use of rand here. It should be fine.
|
||||||
select {
|
select {
|
||||||
case <-time.After(randStagger):
|
case <-time.After(randStagger):
|
||||||
case <-nDB.ctx.Done():
|
case <-nDB.ctx.Done():
|
||||||
|
|
|
@ -214,7 +214,7 @@ func setCommonFlags(msg *dns.Msg) {
|
||||||
|
|
||||||
func shuffleAddr(addr []net.IP) []net.IP {
|
func shuffleAddr(addr []net.IP) []net.IP {
|
||||||
for i := len(addr) - 1; i > 0; i-- {
|
for i := len(addr) - 1; i > 0; i-- {
|
||||||
r := rand.Intn(i + 1) // nolint:gosec
|
r := rand.Intn(i + 1) // nolint:gosec // gosec complains about the use of rand here. It should be fine.
|
||||||
addr[i], addr[r] = addr[r], addr[i]
|
addr[i], addr[r] = addr[r], addr[i]
|
||||||
}
|
}
|
||||||
return addr
|
return addr
|
||||||
|
|
|
@ -49,7 +49,7 @@ func reexecSetupResolver() {
|
||||||
logrus.Errorf("failed get network namespace %q: %v", os.Args[1], err)
|
logrus.Errorf("failed get network namespace %q: %v", os.Args[1], err)
|
||||||
os.Exit(2)
|
os.Exit(2)
|
||||||
}
|
}
|
||||||
defer f.Close() // nolint:gosec
|
defer f.Close() //nolint:gosec
|
||||||
|
|
||||||
nsFD := f.Fd()
|
nsFD := f.Fd()
|
||||||
if err = netns.Set(netns.NsHandle(nsFD)); err != nil {
|
if err = netns.Set(netns.NsHandle(nsFD)); err != nil {
|
||||||
|
|
|
@ -322,7 +322,7 @@ func (sb *sandbox) updateDNS(ipv6Enabled bool) error {
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
err = ioutil.WriteFile(sb.config.resolvConfPath, newRC.Content, 0644) // nolint:gosec
|
err = ioutil.WriteFile(sb.config.resolvConfPath, newRC.Content, 0644) //nolint:gosec // gosec complains about perms here, which must be 0644 in this case
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
|
@ -378,7 +378,7 @@ func programIngress(gwIP net.IP, ingressPorts []*PortConfig, isDelete bool) erro
|
||||||
}
|
}
|
||||||
|
|
||||||
path := filepath.Join("/proc/sys/net/ipv4/conf", oifName, "route_localnet")
|
path := filepath.Join("/proc/sys/net/ipv4/conf", oifName, "route_localnet")
|
||||||
if err := ioutil.WriteFile(path, []byte{'1', '\n'}, 0644); err != nil { // nolint:gosec
|
if err := ioutil.WriteFile(path, []byte{'1', '\n'}, 0644); err != nil { //nolint:gosec // gosec complains about perms here, which must be 0644 in this case
|
||||||
return fmt.Errorf("could not write to %s: %v", path, err)
|
return fmt.Errorf("could not write to %s: %v", path, err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -542,7 +542,7 @@ func writePortsToFile(ports []*PortConfig) (string, error) {
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return "", err
|
return "", err
|
||||||
}
|
}
|
||||||
defer f.Close() // nolint:gosec
|
defer f.Close() //nolint:gosec
|
||||||
|
|
||||||
buf, _ := proto.Marshal(&EndpointRecord{
|
buf, _ := proto.Marshal(&EndpointRecord{
|
||||||
IngressPorts: ports,
|
IngressPorts: ports,
|
||||||
|
|
Loading…
Reference in a new issue