mirror of
https://github.com/go-vikunja/vikunja.git
synced 2026-05-08 04:48:27 -05:00
chore(lint): suppress gosec false positives on SSRF-safe HTTP client calls
This commit is contained in:
@@ -32,7 +32,7 @@ func unsplashImage(url string, c *echo.Context) error {
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
resp, err := utils.NewSSRFSafeHTTPClient().Do(req)
|
||||
resp, err := utils.NewSSRFSafeHTTPClient().Do(req) //nolint:gosec // SSRF protection is handled by the SSRF-safe client
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
@@ -261,7 +261,7 @@ func (p *Provider) Set(s *xorm.Session, image *background.Image, project *models
|
||||
if err != nil {
|
||||
return
|
||||
}
|
||||
resp, err := utils.NewSSRFSafeHTTPClient().Do(req)
|
||||
resp, err := utils.NewSSRFSafeHTTPClient().Do(req) //nolint:gosec // SSRF protection is handled by the SSRF-safe client
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
@@ -373,7 +373,7 @@ func pingbackByPhotoID(photoID string) {
|
||||
if err != nil {
|
||||
log.Errorf("Unsplash Pingback Failed: %s", err.Error())
|
||||
}
|
||||
_, err = utils.NewSSRFSafeHTTPClient().Do(req)
|
||||
_, err = utils.NewSSRFSafeHTTPClient().Do(req) //nolint:gosec // SSRF protection is handled by the SSRF-safe client
|
||||
if err != nil {
|
||||
log.Errorf("Unsplash Pingback Failed: %s", err.Error())
|
||||
}
|
||||
|
||||
@@ -48,7 +48,7 @@ func DownloadFileWithHeaders(url string, headers http.Header) (buf *bytes.Buffer
|
||||
}
|
||||
|
||||
hc := utils.NewSSRFSafeHTTPClient()
|
||||
resp, err := hc.Do(req)
|
||||
resp, err := hc.Do(req) //nolint:gosec // SSRF protection is handled by the SSRF-safe client
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
@@ -188,7 +188,7 @@ func makeAuthenticatedGetRequest(token, urlPart string, v interface{}) error {
|
||||
}
|
||||
req.Header.Set("Authorization", "Bearer "+token)
|
||||
|
||||
resp, err := utils.NewSSRFSafeHTTPClient().Do(req)
|
||||
resp, err := utils.NewSSRFSafeHTTPClient().Do(req) //nolint:gosec // SSRF protection is handled by the SSRF-safe client
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
@@ -101,7 +101,7 @@ func DownloadImage(url string) ([]byte, error) {
|
||||
return nil, fmt.Errorf("failed to create HTTP request: %w", err)
|
||||
}
|
||||
|
||||
resp, err := NewSSRFSafeHTTPClient().Do(req)
|
||||
resp, err := NewSSRFSafeHTTPClient().Do(req) //nolint:gosec // SSRF protection is handled by the SSRF-safe client
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("failed to download image: %w", err)
|
||||
}
|
||||
|
||||
@@ -46,7 +46,7 @@ func TestNewSSRFSafeHTTPClient(t *testing.T) {
|
||||
client := NewSSRFSafeHTTPClient()
|
||||
req, err := http.NewRequestWithContext(context.Background(), http.MethodGet, server.URL, nil)
|
||||
require.NoError(t, err)
|
||||
resp, err := client.Do(req)
|
||||
resp, err := client.Do(req) //nolint:gosec // testing SSRF-safe client
|
||||
require.NoError(t, err)
|
||||
defer resp.Body.Close()
|
||||
assert.Equal(t, http.StatusOK, resp.StatusCode)
|
||||
@@ -59,7 +59,7 @@ func TestNewSSRFSafeHTTPClient(t *testing.T) {
|
||||
// Attempt to connect to localhost (non-routable)
|
||||
req, err := http.NewRequestWithContext(context.Background(), http.MethodGet, "http://127.0.0.1:1/test", nil)
|
||||
require.NoError(t, err)
|
||||
_, err = client.Do(req) //nolint:bodyclose
|
||||
_, err = client.Do(req) //nolint:bodyclose,gosec // testing SSRF-safe client
|
||||
require.Error(t, err)
|
||||
})
|
||||
|
||||
@@ -75,7 +75,7 @@ func TestNewSSRFSafeHTTPClient(t *testing.T) {
|
||||
client := NewSSRFSafeHTTPClient()
|
||||
req, err := http.NewRequestWithContext(context.Background(), http.MethodGet, server.URL, nil)
|
||||
require.NoError(t, err)
|
||||
resp, err := client.Do(req)
|
||||
resp, err := client.Do(req) //nolint:gosec // testing SSRF-safe client
|
||||
require.NoError(t, err)
|
||||
defer resp.Body.Close()
|
||||
assert.Equal(t, http.StatusOK, resp.StatusCode)
|
||||
|
||||
Reference in New Issue
Block a user