===========================================================
                                      .___ __  __   
          _________________  __ __  __| _/|__|/  |_ 
         / ___\_` __ \__  \ |  |  \/ __ | | \\_  __\
        / /_/  >  | \// __ \|  |  / /_/ | |  ||  |  
        \___  /|__|  (____  /____/\____ | |__||__|  
       /_____/            \/           \/           
              grep rough audit - static analysis tool
                  v2.8 written by @Wireghoul
=================================[justanotherhacker.com]===
docker-registry-2.7.1+ds2/BUILDING.md-50-> out in the correct location in the `GOPATH`. This should almost always be
docker-registry-2.7.1+ds2/BUILDING.md:51:> `$GOPATH/src/github.com/docker/distribution`.
docker-registry-2.7.1+ds2/BUILDING.md-52-
##############################################
docker-registry-2.7.1+ds2/BUILDING.md-66-For the full development experience, one should `cd` into
docker-registry-2.7.1+ds2/BUILDING.md:67:`$GOPATH/src/github.com/docker/distribution`. From there, the regular `go`
docker-registry-2.7.1+ds2/BUILDING.md-68-commands, such as `go test`, should work per package (please see
##############################################
docker-registry-2.7.1+ds2/context/http.go-32-// account proxy headers.
docker-registry-2.7.1+ds2/context/http.go:33:func RemoteAddr(r *http.Request) string {
docker-registry-2.7.1+ds2/context/http.go-34-	if prior := r.Header.Get("X-Forwarded-For"); prior != "" {
##############################################
docker-registry-2.7.1+ds2/context/http.go-56-func RemoteIP(r *http.Request) string {
docker-registry-2.7.1+ds2/context/http.go:57:	addr := RemoteAddr(r)
docker-registry-2.7.1+ds2/context/http.go-58-
##############################################
docker-registry-2.7.1+ds2/context/http.go-209-		case "remoteaddr":
docker-registry-2.7.1+ds2/context/http.go:210:			return RemoteAddr(ctx.r)
docker-registry-2.7.1+ds2/context/http.go-211-		case "method":
##############################################
docker-registry-2.7.1+ds2/context/http_test.go-223-// SingleHostReverseProxy will insert an X-Forwarded-For header, and can be used to test
docker-registry-2.7.1+ds2/context/http_test.go:224:// RemoteAddr().  A fake RemoteAddr cannot be set on the HTTP request - it is overwritten
docker-registry-2.7.1+ds2/context/http_test.go-225-// at the transport layer to 127.0.0.1:<port> .  However, as the X-Forwarded-For header
docker-registry-2.7.1+ds2/context/http_test.go-226-// just contains the IP address, it is different enough for testing.
docker-registry-2.7.1+ds2/context/http_test.go:227:func TestRemoteAddr(t *testing.T) {
docker-registry-2.7.1+ds2/context/http_test.go-228-	var expectedRemote string
##############################################
docker-registry-2.7.1+ds2/context/http_test.go-235-
docker-registry-2.7.1+ds2/context/http_test.go:236:		actualRemote := RemoteAddr(r)
docker-registry-2.7.1+ds2/context/http_test.go-237-		if expectedRemote != actualRemote {
##############################################
docker-registry-2.7.1+ds2/contrib/docker-integration/README.md-40-
docker-registry-2.7.1+ds2/contrib/docker-integration/README.md:41:`docker run --privileged -v "$GOPATH/src/github.com/docker/distribution/contrib/docker-integration:/test" -w /test distribution/golem golem -rundaemon .`
docker-registry-2.7.1+ds2/contrib/docker-integration/README.md-42-
##############################################
docker-registry-2.7.1+ds2/docs/spec/api.md.tmpl-1109-|------|----|------|-----------|
docker-registry-2.7.1+ds2/docs/spec/api.md.tmpl:1110:{{range $route := .RouteDescriptors}}{{range $method := .Methods}}| {{$method.Method}} | `{{$route.Path|prettygorilla}}` | {{$route.Entity}} | {{$method.Description}} |
docker-registry-2.7.1+ds2/docs/spec/api.md.tmpl-1111-{{end}}{{end}}
##############################################
docker-registry-2.7.1+ds2/docs/spec/api.md.tmpl-1120-|----|-------|-----------|
docker-registry-2.7.1+ds2/docs/spec/api.md.tmpl:1121:{{range $err := .ErrorDescriptors}} `{{$err.Value}}` | {{$err.Message}} | {{$err.Description|removenewlines}}
docker-registry-2.7.1+ds2/docs/spec/api.md.tmpl-1122-{{end}}
##############################################
docker-registry-2.7.1+ds2/docs/spec/api.md.tmpl-1209-|----|-------|-----------|
docker-registry-2.7.1+ds2/docs/spec/api.md.tmpl:1210:{{range $err := .ErrorCodes}}| `{{$err.Descriptor.Value}}` | {{$err.Descriptor.Message}} | {{$err.Descriptor.Description|removenewlines}} |
docker-registry-2.7.1+ds2/docs/spec/api.md.tmpl-1211-{{end}}
##############################################
docker-registry-2.7.1+ds2/docs/spec/manifest-v2-2.md-82-        manifest runs on. A full list of valid operating system and architecture
docker-registry-2.7.1+ds2/docs/spec/manifest-v2-2.md:83:        values are listed in the [Go language documentation for `$GOOS` and
docker-registry-2.7.1+ds2/docs/spec/manifest-v2-2.md:84:        `$GOARCH`](https://golang.org/doc/install/source#environment)
docker-registry-2.7.1+ds2/docs/spec/manifest-v2-2.md-85-
##############################################
docker-registry-2.7.1+ds2/notifications/bridge.go-50-		ID:        id,
docker-registry-2.7.1+ds2/notifications/bridge.go:51:		Addr:      context.RemoteAddr(r),
docker-registry-2.7.1+ds2/notifications/bridge.go-52-		Host:      r.Host,
##############################################
docker-registry-2.7.1+ds2/notifications/http_test.go-140-			// Case where connection is immediately closed
docker-registry-2.7.1+ds2/notifications/http_test.go:141:			url:     closeL.Addr().String(),
docker-registry-2.7.1+ds2/notifications/http_test.go-142-			failure: true,
##############################################
docker-registry-2.7.1+ds2/registry/api/v2/headerparser_test.go-40-			name:     "quoted values",
docker-registry-2.7.1+ds2/registry/api/v2/headerparser_test.go:41:			raw:      `key="val";param = "[[ $((1 + 1)) == 3 ]] && echo panic!;" ; p=" abcd "`,
docker-registry-2.7.1+ds2/registry/api/v2/headerparser_test.go-42-			expected: map[string]string{"key": "val", "param": "[[ $((1 + 1)) == 3 ]] && echo panic!;", "p": " abcd "},
##############################################
docker-registry-2.7.1+ds2/registry/client/auth/challenge/addr.go-20-// FROM: http://golang.org/src/net/http/transport.go
docker-registry-2.7.1+ds2/registry/client/auth/challenge/addr.go:21:func canonicalAddr(url *url.URL) string {
docker-registry-2.7.1+ds2/registry/client/auth/challenge/addr.go-22-	addr := url.Host
##############################################
docker-registry-2.7.1+ds2/registry/client/auth/challenge/authchallenge.go-58-	endpoint.Host = strings.ToLower(endpoint.Host)
docker-registry-2.7.1+ds2/registry/client/auth/challenge/authchallenge.go:59:	endpoint.Host = canonicalAddr(endpoint)
docker-registry-2.7.1+ds2/registry/client/auth/challenge/authchallenge.go-60-}
##############################################
docker-registry-2.7.1+ds2/registry/client/auth/challenge/authchallenge_test.go-75-	lowered.Host = strings.ToLower(lowered.Host)
docker-registry-2.7.1+ds2/registry/client/auth/challenge/authchallenge_test.go:76:	lowered.Host = canonicalAddr(&lowered)
docker-registry-2.7.1+ds2/registry/client/auth/challenge/authchallenge_test.go-77-	c, err := scm.GetChallenges(lowered)
##############################################
docker-registry-2.7.1+ds2/registry/handlers/health_test.go-74-	}
docker-registry-2.7.1+ds2/registry/handlers/health_test.go:75:	addrStr := ln.Addr().String()
docker-registry-2.7.1+ds2/registry/handlers/health_test.go-76-
##############################################
docker-registry-2.7.1+ds2/registry/registry.go-195-		ln = tls.NewListener(ln, tlsConf)
docker-registry-2.7.1+ds2/registry/registry.go:196:		dcontext.GetLogger(registry.app).Infof("listening on %v, tls", ln.Addr())
docker-registry-2.7.1+ds2/registry/registry.go-197-	} else {
docker-registry-2.7.1+ds2/registry/registry.go:198:		dcontext.GetLogger(registry.app).Infof("listening on %v", ln.Addr())
docker-registry-2.7.1+ds2/registry/registry.go-199-	}
##############################################
docker-registry-2.7.1+ds2/debian/rules-9-	## Remove Files-Excluded (when built from checkout or non-DFSG tarball):
docker-registry-2.7.1+ds2/debian/rules:10:	$(RM) -rv `perl -0nE 'say $$1 if m{^Files\-Excluded\:\s*(.*?)(?:\n\n|Files:|Comment:)}sm;' debian/copyright`
docker-registry-2.7.1+ds2/debian/rules-11-	-find vendor -type d -empty -delete -print
##############################################
docker-registry-2.7.1+ds2/.pc/lib-crypto.patch/registry/registry.go-200-		ln = tls.NewListener(ln, tlsConf)
docker-registry-2.7.1+ds2/.pc/lib-crypto.patch/registry/registry.go:201:		dcontext.GetLogger(registry.app).Infof("listening on %v, tls", ln.Addr())
docker-registry-2.7.1+ds2/.pc/lib-crypto.patch/registry/registry.go-202-	} else {
docker-registry-2.7.1+ds2/.pc/lib-crypto.patch/registry/registry.go:203:		dcontext.GetLogger(registry.app).Infof("listening on %v", ln.Addr())
docker-registry-2.7.1+ds2/.pc/lib-crypto.patch/registry/registry.go-204-	}
##############################################
docker-registry-2.7.1+ds2/.pc/no-relic.patch/registry/registry.go-196-		ln = tls.NewListener(ln, tlsConf)
docker-registry-2.7.1+ds2/.pc/no-relic.patch/registry/registry.go:197:		dcontext.GetLogger(registry.app).Infof("listening on %v, tls", ln.Addr())
docker-registry-2.7.1+ds2/.pc/no-relic.patch/registry/registry.go-198-	} else {
docker-registry-2.7.1+ds2/.pc/no-relic.patch/registry/registry.go:199:		dcontext.GetLogger(registry.app).Infof("listening on %v", ln.Addr())
docker-registry-2.7.1+ds2/.pc/no-relic.patch/registry/registry.go-200-	}