mirror of
https://github.com/moby/moby.git
synced 2022-11-09 12:21:53 -05:00
997ec12ec8
After discussing in the maintainers meeting, we concluded that Slowloris attacks
are not a real risk other than potentially having some additional goroutines
lingering around, so setting a long timeout to satisfy the linter, and to at
least have "some" timeout.
libnetwork/diagnostic/server.go:96:10: G112: Potential Slowloris Attack because ReadHeaderTimeout is not configured in the http.Server (gosec)
srv := &http.Server{
Addr: net.JoinHostPort(ip, strconv.Itoa(port)),
Handler: s,
}
api/server/server.go:60:10: G112: Potential Slowloris Attack because ReadHeaderTimeout is not configured in the http.Server (gosec)
srv: &http.Server{
Addr: addr,
},
daemon/metrics_unix.go:34:13: G114: Use of net/http serve function that has no support for setting timeouts (gosec)
if err := http.Serve(l, mux); err != nil && !strings.Contains(err.Error(), "use of closed network connection") {
^
cmd/dockerd/metrics.go:27:13: G114: Use of net/http serve function that has no support for setting timeouts (gosec)
if err := http.Serve(l, mux); err != nil && !strings.Contains(err.Error(), "use of closed network connection") {
^
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
(cherry picked from commit
|
||
---|---|---|
.. | ||
trap | ||
config.go | ||
config_unix.go | ||
config_unix_test.go | ||
config_windows.go | ||
daemon.go | ||
daemon_freebsd.go | ||
daemon_linux.go | ||
daemon_test.go | ||
daemon_unix.go | ||
daemon_unix_test.go | ||
daemon_windows.go | ||
docker.go | ||
docker_unix.go | ||
docker_windows.go | ||
genwinres_windows.go | ||
metrics.go | ||
options.go | ||
options_test.go | ||
README.md | ||
service_unsupported.go | ||
service_windows.go |
docker.go contains Docker daemon's main function.
This file provides first line CLI argument parsing and environment variable setting.