netbird/client/firewall/uspfilter
Yury Gargay e37a337164
Add gosec linter (#1342)
This PR adds `gosec` linter with the following checks disabled:

- G102: Bind to all interfaces
- G107: Url provided to HTTP request as taint input
- G112: Potential slowloris attack
- G114: Use of net/http serve function that has no support for setting timeouts
- G204: Audit use of command execution
- G401: Detect the usage of DES, RC4, MD5 or SHA1
- G402: Look for bad TLS connection settings
- G404: Insecure random number source (rand)
- G501: Import blocklist: crypto/md5
- G505: Import blocklist: crypto/sha1

We have complaints related to the checks above. They have to be addressed separately.
2023-12-04 13:34:06 +01:00
..
allow_netbird_linux.go Add default firewall rule to allow netbird traffic (#1056) 2023-09-05 21:07:32 +02:00
allow_netbird_windows.go Fix Windows firewall message check (#1254) 2023-10-27 10:54:26 +02:00
allow_netbird.go Add default firewall rule to allow netbird traffic (#1056) 2023-09-05 21:07:32 +02:00
rule.go Feat fake dns address (#902) 2023-06-08 13:46:57 +04:00
uspfilter_test.go Add default firewall rule to allow netbird traffic (#1056) 2023-09-05 21:07:32 +02:00
uspfilter.go Add gosec linter (#1342) 2023-12-04 13:34:06 +01:00