OPSEXP-2875: add search enterprise mediation & reindex + fix tests #61
Annotations
10 warnings
Run KICS Scan:
java/Dockerfile#L24
A user should be specified in the dockerfile, otherwise the image will run as root
|
Run KICS Scan:
search/enterprise/common/Dockerfile#L1
A user should be specified in the dockerfile, otherwise the image will run as root
|
Run KICS Scan:
search/enterprise/all-in-one/Dockerfile#L1
A user should be specified in the dockerfile, otherwise the image will run as root
|
Run KICS Scan:
search/enterprise/reindexing/Dockerfile#L1
A user should be specified in the dockerfile, otherwise the image will run as root
|
Run KICS Scan:
repository/Dockerfile#L32
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
|
Run KICS Scan:
share/Dockerfile#L14
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
|
Run KICS Scan:
search/enterprise/all-in-one/Dockerfile#L7
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
|
Run KICS Scan:
tengine/libreoffice/Dockerfile#L26
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
|
Run KICS Scan:
share/Dockerfile#L13
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
|
Run KICS Scan:
connector/msteams/Dockerfile#L10
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
|
Loading