=========================================================== .___ __ __ _________________ __ __ __| _/|__|/ |_ / ___\_` __ \__ \ | | \/ __ | | \\_ __\ / /_/ > | \// __ \| | / /_/ | | || | \___ /|__| (____ /____/\____ | |__||__| /_____/ \/ \/ grep rough audit - static analysis tool v2.8 written by @Wireghoul =================================[justanotherhacker.com]=== docker-registry-2.7.1+ds2/BUILDING.md-50-> out in the correct location in the `GOPATH`. This should almost always be docker-registry-2.7.1+ds2/BUILDING.md:51:> `$GOPATH/src/github.com/docker/distribution`. docker-registry-2.7.1+ds2/BUILDING.md-52- ############################################## docker-registry-2.7.1+ds2/BUILDING.md-66-For the full development experience, one should `cd` into docker-registry-2.7.1+ds2/BUILDING.md:67:`$GOPATH/src/github.com/docker/distribution`. From there, the regular `go` docker-registry-2.7.1+ds2/BUILDING.md-68-commands, such as `go test`, should work per package (please see ############################################## docker-registry-2.7.1+ds2/context/http.go-32-// account proxy headers. docker-registry-2.7.1+ds2/context/http.go:33:func RemoteAddr(r *http.Request) string { docker-registry-2.7.1+ds2/context/http.go-34- if prior := r.Header.Get("X-Forwarded-For"); prior != "" { ############################################## docker-registry-2.7.1+ds2/context/http.go-56-func RemoteIP(r *http.Request) string { docker-registry-2.7.1+ds2/context/http.go:57: addr := RemoteAddr(r) docker-registry-2.7.1+ds2/context/http.go-58- ############################################## docker-registry-2.7.1+ds2/context/http.go-209- case "remoteaddr": docker-registry-2.7.1+ds2/context/http.go:210: return RemoteAddr(ctx.r) docker-registry-2.7.1+ds2/context/http.go-211- case "method": ############################################## docker-registry-2.7.1+ds2/context/http_test.go-223-// SingleHostReverseProxy will insert an X-Forwarded-For header, and can be used to test docker-registry-2.7.1+ds2/context/http_test.go:224:// RemoteAddr(). A fake RemoteAddr cannot be set on the HTTP request - it is overwritten docker-registry-2.7.1+ds2/context/http_test.go-225-// at the transport layer to 127.0.0.1:<port> . However, as the X-Forwarded-For header docker-registry-2.7.1+ds2/context/http_test.go-226-// just contains the IP address, it is different enough for testing. docker-registry-2.7.1+ds2/context/http_test.go:227:func TestRemoteAddr(t *testing.T) { docker-registry-2.7.1+ds2/context/http_test.go-228- var expectedRemote string ############################################## docker-registry-2.7.1+ds2/context/http_test.go-235- docker-registry-2.7.1+ds2/context/http_test.go:236: actualRemote := RemoteAddr(r) docker-registry-2.7.1+ds2/context/http_test.go-237- if expectedRemote != actualRemote { ############################################## docker-registry-2.7.1+ds2/contrib/docker-integration/README.md-40- docker-registry-2.7.1+ds2/contrib/docker-integration/README.md:41:`docker run --privileged -v "$GOPATH/src/github.com/docker/distribution/contrib/docker-integration:/test" -w /test distribution/golem golem -rundaemon .` docker-registry-2.7.1+ds2/contrib/docker-integration/README.md-42- ############################################## docker-registry-2.7.1+ds2/docs/spec/api.md.tmpl-1109-|------|----|------|-----------| docker-registry-2.7.1+ds2/docs/spec/api.md.tmpl:1110:{{range $route := .RouteDescriptors}}{{range $method := .Methods}}| {{$method.Method}} | `{{$route.Path|prettygorilla}}` | {{$route.Entity}} | {{$method.Description}} | docker-registry-2.7.1+ds2/docs/spec/api.md.tmpl-1111-{{end}}{{end}} ############################################## docker-registry-2.7.1+ds2/docs/spec/api.md.tmpl-1120-|----|-------|-----------| docker-registry-2.7.1+ds2/docs/spec/api.md.tmpl:1121:{{range $err := .ErrorDescriptors}} `{{$err.Value}}` | {{$err.Message}} | {{$err.Description|removenewlines}} docker-registry-2.7.1+ds2/docs/spec/api.md.tmpl-1122-{{end}} ############################################## docker-registry-2.7.1+ds2/docs/spec/api.md.tmpl-1209-|----|-------|-----------| docker-registry-2.7.1+ds2/docs/spec/api.md.tmpl:1210:{{range $err := .ErrorCodes}}| `{{$err.Descriptor.Value}}` | {{$err.Descriptor.Message}} | {{$err.Descriptor.Description|removenewlines}} | docker-registry-2.7.1+ds2/docs/spec/api.md.tmpl-1211-{{end}} ############################################## docker-registry-2.7.1+ds2/docs/spec/manifest-v2-2.md-82- manifest runs on. A full list of valid operating system and architecture docker-registry-2.7.1+ds2/docs/spec/manifest-v2-2.md:83: values are listed in the [Go language documentation for `$GOOS` and docker-registry-2.7.1+ds2/docs/spec/manifest-v2-2.md:84: `$GOARCH`](https://golang.org/doc/install/source#environment) docker-registry-2.7.1+ds2/docs/spec/manifest-v2-2.md-85- ############################################## docker-registry-2.7.1+ds2/notifications/bridge.go-50- ID: id, docker-registry-2.7.1+ds2/notifications/bridge.go:51: Addr: context.RemoteAddr(r), docker-registry-2.7.1+ds2/notifications/bridge.go-52- Host: r.Host, ############################################## docker-registry-2.7.1+ds2/notifications/http_test.go-140- // Case where connection is immediately closed docker-registry-2.7.1+ds2/notifications/http_test.go:141: url: closeL.Addr().String(), docker-registry-2.7.1+ds2/notifications/http_test.go-142- failure: true, ############################################## docker-registry-2.7.1+ds2/registry/api/v2/headerparser_test.go-40- name: "quoted values", docker-registry-2.7.1+ds2/registry/api/v2/headerparser_test.go:41: raw: `key="val";param = "[[ $((1 + 1)) == 3 ]] && echo panic!;" ; p=" abcd "`, docker-registry-2.7.1+ds2/registry/api/v2/headerparser_test.go-42- expected: map[string]string{"key": "val", "param": "[[ $((1 + 1)) == 3 ]] && echo panic!;", "p": " abcd "}, ############################################## docker-registry-2.7.1+ds2/registry/client/auth/challenge/addr.go-20-// FROM: http://golang.org/src/net/http/transport.go docker-registry-2.7.1+ds2/registry/client/auth/challenge/addr.go:21:func canonicalAddr(url *url.URL) string { docker-registry-2.7.1+ds2/registry/client/auth/challenge/addr.go-22- addr := url.Host ############################################## docker-registry-2.7.1+ds2/registry/client/auth/challenge/authchallenge.go-58- endpoint.Host = strings.ToLower(endpoint.Host) docker-registry-2.7.1+ds2/registry/client/auth/challenge/authchallenge.go:59: endpoint.Host = canonicalAddr(endpoint) docker-registry-2.7.1+ds2/registry/client/auth/challenge/authchallenge.go-60-} ############################################## docker-registry-2.7.1+ds2/registry/client/auth/challenge/authchallenge_test.go-75- lowered.Host = strings.ToLower(lowered.Host) docker-registry-2.7.1+ds2/registry/client/auth/challenge/authchallenge_test.go:76: lowered.Host = canonicalAddr(&lowered) docker-registry-2.7.1+ds2/registry/client/auth/challenge/authchallenge_test.go-77- c, err := scm.GetChallenges(lowered) ############################################## docker-registry-2.7.1+ds2/registry/handlers/health_test.go-74- } docker-registry-2.7.1+ds2/registry/handlers/health_test.go:75: addrStr := ln.Addr().String() docker-registry-2.7.1+ds2/registry/handlers/health_test.go-76- ############################################## docker-registry-2.7.1+ds2/registry/registry.go-195- ln = tls.NewListener(ln, tlsConf) docker-registry-2.7.1+ds2/registry/registry.go:196: dcontext.GetLogger(registry.app).Infof("listening on %v, tls", ln.Addr()) docker-registry-2.7.1+ds2/registry/registry.go-197- } else { docker-registry-2.7.1+ds2/registry/registry.go:198: dcontext.GetLogger(registry.app).Infof("listening on %v", ln.Addr()) docker-registry-2.7.1+ds2/registry/registry.go-199- } ############################################## docker-registry-2.7.1+ds2/debian/rules-9- ## Remove Files-Excluded (when built from checkout or non-DFSG tarball): docker-registry-2.7.1+ds2/debian/rules:10: $(RM) -rv `perl -0nE 'say $$1 if m{^Files\-Excluded\:\s*(.*?)(?:\n\n|Files:|Comment:)}sm;' debian/copyright` docker-registry-2.7.1+ds2/debian/rules-11- -find vendor -type d -empty -delete -print ############################################## docker-registry-2.7.1+ds2/.pc/lib-crypto.patch/registry/registry.go-200- ln = tls.NewListener(ln, tlsConf) docker-registry-2.7.1+ds2/.pc/lib-crypto.patch/registry/registry.go:201: dcontext.GetLogger(registry.app).Infof("listening on %v, tls", ln.Addr()) docker-registry-2.7.1+ds2/.pc/lib-crypto.patch/registry/registry.go-202- } else { docker-registry-2.7.1+ds2/.pc/lib-crypto.patch/registry/registry.go:203: dcontext.GetLogger(registry.app).Infof("listening on %v", ln.Addr()) docker-registry-2.7.1+ds2/.pc/lib-crypto.patch/registry/registry.go-204- } ############################################## docker-registry-2.7.1+ds2/.pc/no-relic.patch/registry/registry.go-196- ln = tls.NewListener(ln, tlsConf) docker-registry-2.7.1+ds2/.pc/no-relic.patch/registry/registry.go:197: dcontext.GetLogger(registry.app).Infof("listening on %v, tls", ln.Addr()) docker-registry-2.7.1+ds2/.pc/no-relic.patch/registry/registry.go-198- } else { docker-registry-2.7.1+ds2/.pc/no-relic.patch/registry/registry.go:199: dcontext.GetLogger(registry.app).Infof("listening on %v", ln.Addr()) docker-registry-2.7.1+ds2/.pc/no-relic.patch/registry/registry.go-200- }