Affected by GO-2022-0344
and 7 other vulnerabilities
GO-2022-0344: containerd CRI plugin: Insecure handling of image volumes in github.com/containerd/containerd
GO-2022-0360: Ambiguous OCI manifest parsing in github.com/containerd/containerd
GO-2022-0482: containerd CRI plugin: Host memory exhaustion through ExecSync in github.com/containerd/containerd
GO-2022-0784: containerd-shim API Exposed to Host Network Containers in github.com/containerd/containerd
GO-2022-0803: containerd v1.2.x can be coerced into leaking credentials during image pull in github.com/containerd/containerd
GO-2022-0921: Archive package allows chmod of file outside of unpack target directory in github.com/containerd/containerd
GO-2022-0938: Insufficiently restricted permissions on plugin directories in github.com/containerd/containerd
GO-2022-1147: containerd CRI stream server vulnerable to host memory exhaustion via terminal in github.com/containerd/containerd
The highest tagged major version is
v2.
package
Version:
v1.0.0-rc.0
Opens a new window with list of versions in this module.
Published: Dec 1, 2017
License: Apache-2.0, CC-BY-4.0
Opens a new window with license information.
Imports: 11
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Documentation
¶
-
func CheckDirectoryEqual(d1, d2 string) error
-
func CheckDirectoryEqualWithApplier(root string, a Applier) error
-
func FSSuite(t *testing.T, a TestApplier)
-
type Applier
-
func Apply(appliers ...Applier) Applier
-
func Chmod(name string, perm os.FileMode) Applier
-
func Chown(name string, uid, gid int) Applier
-
func Chtimes(name string, atime, mtime time.Time) Applier
-
func CreateDir(name string, perm os.FileMode) Applier
-
func CreateFile(name string, content []byte, perm os.FileMode) Applier
-
func Lchtimes(name string, atime, mtime time.Time) Applier
-
func Link(oldname, newname string) Applier
-
func Remove(name string) Applier
-
func RemoveAll(name string) Applier
-
func Rename(old, new string) Applier
-
func SetXAttr(name, key, value string) Applier
-
func Symlink(oldname, newname string) Applier
-
type TestApplier
CheckDirectoryEqual compares two directory paths to make sure that
the content of the directories is the same.
CheckDirectoryEqualWithApplier compares directory against applier
FSSuite runs the path test suite
Applier applies single file changes
Apply returns a new applier from the given appliers
Chmod returns a file applier which changes the file permission
Chown returns a file applier which changes the ownership of a file
Chtimes changes access and mod time of file.
Use Lchtimes for symbolic links.
CreateDir returns a file applier to create the directory with
the provided name and permission
CreateFile returns a file applier which creates a file as the
provided name with the given content and permission.
Lchtimes changes access and mod time of file without following symlink
Link returns a file applier which creates a hard link
Remove returns a file applier which removes the provided file name
RemoveAll returns a file applier which removes the provided file name
as in os.RemoveAll
Rename returns a file applier which renames a file
SetXAttr sets the xatter for the file
Symlink returns a file applier which creates a symbolic link
TestApplier applies the test context
Source Files
¶
Click to show internal directories.
Click to hide internal directories.