1
0
mirror of https://github.com/oauth2-proxy/oauth2-proxy.git synced 2025-04-04 22:34:22 +02:00

Document GoSec nosec skip comments

This commit is contained in:
Nick Meves 2020-07-20 18:49:45 -07:00
parent 2bb0160bf3
commit ad52587ae6
No known key found for this signature in database
GPG Key ID: 93BA8A3CEDCDD1CF
8 changed files with 20 additions and 31 deletions

View File

@ -119,18 +119,18 @@ type tcpKeepAliveListener struct {
*net.TCPListener *net.TCPListener
} }
func (ln tcpKeepAliveListener) Accept() (c net.Conn, err error) { func (ln tcpKeepAliveListener) Accept() (net.Conn, error) {
tc, err := ln.AcceptTCP() tc, err := ln.AcceptTCP()
if err != nil { if err != nil {
return return nil, err
} }
err = tc.SetKeepAlive(true) err = tc.SetKeepAlive(true)
if err != nil { if err != nil {
return nil, err logger.Printf("Error setting Keep-Alive: %v", err)
} }
err = tc.SetKeepAlivePeriod(3 * time.Minute) err = tc.SetKeepAlivePeriod(3 * time.Minute)
if err != nil { if err != nil {
return nil, err logger.Printf("Error setting Keep-Alive period: %v", err)
} }
return tc, nil return tc, nil
} }

View File

@ -413,6 +413,8 @@ func (p *OAuthProxy) SignInPage(rw http.ResponseWriter, req *http.Request, code
redirectURL = "/" redirectURL = "/"
} }
// We allow unescaped template.HTML since it is user configured options
/* #nosec G203 */
t := struct { t := struct {
ProviderName string ProviderName string
SignInMessage template.HTML SignInMessage template.HTML

View File

@ -1,6 +1,7 @@
package basic package basic
import ( import (
// We support SHA1 & bcrypt in HTPasswd
"crypto/sha1" // #nosec G505 "crypto/sha1" // #nosec G505
"encoding/base64" "encoding/base64"
"encoding/csv" "encoding/csv"
@ -29,6 +30,7 @@ type sha1Pass string
// NewHTPasswdValidator constructs an httpasswd based validator from the file // NewHTPasswdValidator constructs an httpasswd based validator from the file
// at the path given. // at the path given.
func NewHTPasswdValidator(path string) (Validator, error) { func NewHTPasswdValidator(path string) (Validator, error) {
// We allow HTPasswd location via config options
r, err := os.Open(path) // #nosec G304 r, err := os.Open(path) // #nosec G304
if err != nil { if err != nil {
return nil, fmt.Errorf("could not open htpasswd file: %v", err) return nil, fmt.Errorf("could not open htpasswd file: %v", err)
@ -90,6 +92,7 @@ func (h *htpasswdMap) Validate(user string, password string) bool {
switch rp := realPassword.(type) { switch rp := realPassword.(type) {
case sha1Pass: case sha1Pass:
// We support SHA1 HTPasswd entries
d := sha1.New() // #nosec G401 d := sha1.New() // #nosec G401
_, err := d.Write([]byte(password)) _, err := d.Write([]byte(password))
if err != nil { if err != nil {

View File

@ -103,6 +103,7 @@ func newReverseProxy(target *url.URL, upstream options.Upstream, errorHandler Pr
proxy.FlushInterval = 1 * time.Second proxy.FlushInterval = 1 * time.Second
} }
// InsecureSkipVerify is a configurable option we allow
/* #nosec G402 */ /* #nosec G402 */
if upstream.InsecureSkipTLSVerify { if upstream.InsecureSkipTLSVerify {
proxy.Transport = &http.Transport{ proxy.Transport = &http.Transport{

View File

@ -12,6 +12,7 @@ func GetCertPool(paths []string) (*x509.CertPool, error) {
} }
pool := x509.NewCertPool() pool := x509.NewCertPool()
for _, path := range paths { for _, path := range paths {
// Cert paths are a configurable option
data, err := ioutil.ReadFile(path) // #nosec G304 data, err := ioutil.ReadFile(path) // #nosec G304
if err != nil { if err != nil {
return nil, fmt.Errorf("certificate authority file (%s) could not be read - %s", path, err) return nil, fmt.Errorf("certificate authority file (%s) could not be read - %s", path, err)

View File

@ -30,6 +30,7 @@ func Validate(o *options.Options) error {
msgs = append(msgs, validateSessionCookieMinimal(o)...) msgs = append(msgs, validateSessionCookieMinimal(o)...)
if o.SSLInsecureSkipVerify { if o.SSLInsecureSkipVerify {
// InsecureSkipVerify is a configurable option we allow
/* #nosec G402 */ /* #nosec G402 */
insecureTransport := &http.Transport{ insecureTransport := &http.Transport{
TLSClientConfig: &tls.Config{InsecureSkipVerify: true}, TLSClientConfig: &tls.Config{InsecureSkipVerify: true},

View File

@ -4,12 +4,9 @@ import (
"bytes" "bytes"
"context" "context"
"crypto/rsa" "crypto/rsa"
"encoding/json"
"errors" "errors"
"fmt" "fmt"
"io/ioutil"
"math/rand" "math/rand"
"net/http"
"net/url" "net/url"
"time" "time"
@ -106,30 +103,12 @@ type loginGovCustomClaims struct {
// checkNonce checks the nonce in the id_token // checkNonce checks the nonce in the id_token
func checkNonce(idToken string, p *LoginGovProvider) (err error) { func checkNonce(idToken string, p *LoginGovProvider) (err error) {
token, err := jwt.ParseWithClaims(idToken, &loginGovCustomClaims{}, func(token *jwt.Token) (interface{}, error) { token, err := jwt.ParseWithClaims(idToken, &loginGovCustomClaims{}, func(token *jwt.Token) (interface{}, error) {
resp, myerr := http.Get(p.PubJWKURL.String())
if myerr != nil {
return nil, myerr
}
if resp.StatusCode != 200 {
myerr = fmt.Errorf("got %d from %q", resp.StatusCode, p.PubJWKURL.String())
return nil, myerr
}
body, myerr := ioutil.ReadAll(resp.Body)
if myerr != nil {
return nil, myerr
}
if myerr = resp.Body.Close(); myerr != nil {
return nil, myerr
}
var pubkeys jose.JSONWebKeySet var pubkeys jose.JSONWebKeySet
myerr = json.Unmarshal(body, &pubkeys) rerr := requests.New(p.PubJWKURL.String()).Do().UnmarshalInto(&pubkeys)
if myerr != nil { if rerr != nil {
return nil, myerr return nil, rerr
} }
pubkey := pubkeys.Keys[0] return pubkeys.Keys[0].Key, nil
return pubkey.Key, nil
}) })
if err != nil { if err != nil {
return return

View File

@ -19,10 +19,12 @@ type UserMap struct {
} }
// NewUserMap parses the authenticated emails file into a new UserMap // NewUserMap parses the authenticated emails file into a new UserMap
//
// TODO (@NickMeves): Audit usage of `unsafe.Pointer` and potentially refactor
func NewUserMap(usersFile string, done <-chan bool, onUpdate func()) *UserMap { func NewUserMap(usersFile string, done <-chan bool, onUpdate func()) *UserMap {
um := &UserMap{usersFile: usersFile} um := &UserMap{usersFile: usersFile}
m := make(map[string]bool) m := make(map[string]bool)
atomic.StorePointer(&um.m, unsafe.Pointer(&m)) atomic.StorePointer(&um.m, unsafe.Pointer(&m)) // #nosec G103
if usersFile != "" { if usersFile != "" {
logger.Printf("using authenticated emails file %s", usersFile) logger.Printf("using authenticated emails file %s", usersFile)
WatchForUpdates(usersFile, done, func() { WatchForUpdates(usersFile, done, func() {
@ -68,7 +70,7 @@ func (um *UserMap) LoadAuthenticatedEmailsFile() {
address := strings.ToLower(strings.TrimSpace(r[0])) address := strings.ToLower(strings.TrimSpace(r[0]))
updated[address] = true updated[address] = true
} }
atomic.StorePointer(&um.m, unsafe.Pointer(&updated)) atomic.StorePointer(&um.m, unsafe.Pointer(&updated)) // #nosec G103
} }
func newValidatorImpl(domains []string, usersFile string, func newValidatorImpl(domains []string, usersFile string,