Affected by GO-2022-0560
and 16 other vulnerabilities
GO-2022-0560 : Nomad Spread Job Stanza May Trigger Panic in Servers in github.com/hashicorp/nomad
GO-2022-0573 : Improper Authentication in HashiCorp Nomad in github.com/hashicorp/nomad
GO-2022-0584 : Arbitrary file reads in HashiCorp Nomad in github.com/hashicorp/nomad
GO-2022-0591 : Privilege escalation in Hashicorp Nomad in github.com/hashicorp/nomad
GO-2022-0600 : HashiCorp Nomad Artifact Download Race Condition in github.com/hashicorp/nomad
GO-2022-0622 : Improper Privilege Management in HashiCorp Nomad in github.com/hashicorp/nomad
GO-2022-0709 : Improper network isolation in Hashicorp Nomad in github.com/hashicorp/nomad
GO-2022-0732 : Privilege escalation in Hashicorp Nomad in github.com/hashicorp/nomad
GO-2022-0770 : Path Traversal in HashiCorp Nomad in github.com/hashicorp/nomad
GO-2022-0806 : Use After Free in HashiCorp Nomad in github.com/hashicorp/nomad
GO-2022-0821 : Improper Certificate Validation in HashiCorp Nomad in github.com/hashicorp/nomad
GO-2022-0840 : Allocation of Resources Without Limits or Throttling in HashiCorp Nomad in github.com/hashicorp/nomad
GO-2022-1062 : Nomad Panics On Job Submission With Bad Artifact Stanza Source URL in github.com/hashicorp/nomad
GO-2024-2670 : ACL security vulnerability in github.com/hashicorp/nomad
GO-2024-3073 : Nomad Vulnerable to Allocation Directory Escape On Non-Existing File Paths Through Archive Unpacking in github.com/hashicorp/nomad
GO-2024-3262 : Hashicorp Nomad Incorrect Authorization vulnerability in github.com/hashicorp/nomad
GO-2024-3354 : Hashicorp Nomad Incorrect Privilege Assignment vulnerability in github.com/hashicorp/nomad
Discover Packages
github.com/hashicorp/nomad
e2e
e2eutil
package
Version:
v0.10.0
Opens a new window with list of versions in this module.
Published: Oct 22, 2019
License: MPL-2.0
Opens a new window with license information.
Imports: 13
Opens a new window with list of imports.
Imported by: 229
Opens a new window with list of known importers.
Jump to ...
Documentation
Index
Constants
Variables
Functions
AgentRestart(client, nodeID)
DeploymentsForJob(t, nomadClient, jobID)
RegisterAllocs(t, nomadClient, jobFile, jobID)
RegisterAndWaitForAllocs(t, nomadClient, jobFile, jobID)
RequireConsulDeregistered(require, client, serviceName)
RequireConsulStatus(require, client, serviceName, expectedStatus)
WaitForAllocRunning(t, nomadClient, allocID)
WaitForDeployment(t, nomadClient, deployID, status, statusDesc)
WaitForLeader(t, nomadClient)
WaitForNodesReady(t, nomadClient, nodes)
Types
Source Files
Documentation
Documentation
¶
func AgentRestart(client *api.Client, nodeID string) (string, error)
func DeploymentsForJob(t *testing.T, nomadClient *api.Client, jobID string) []*api.Deployment
func RegisterAllocs(t *testing.T, nomadClient *api.Client, jobFile string, jobID string) []*api.AllocationListStub
func RegisterAndWaitForAllocs(t *testing.T, nomadClient *api.Client, jobFile string, jobID string) []*api.AllocationListStub
func RequireConsulDeregistered(require *require.Assertions, client *capi.Client, serviceName string)
func RequireConsulStatus(require *require.Assertions, client *capi.Client, ...)
func WaitForAllocRunning(t *testing.T, nomadClient *api.Client, allocID string)
func WaitForDeployment(t *testing.T, nomadClient *api.Client, deployID string, status string, ...)
func WaitForLeader(t *testing.T, nomadClient *api.Client)
func WaitForNodesReady(t *testing.T, nomadClient *api.Client, nodes int)
AgentRestart is a test helper function that restarts a client node
running under systemd using a raw_exec job. Returns the job ID of
the restart job so that callers can clean it up.
RequireConsulDeregistered asserts that the service eventually is deregistered from Consul
RequireConsulStatus asserts the aggregate health of the service converges to
the expected status
WaitForNodesReady waits until at least `nodes` number of nodes are ready or
fails the test.
Source Files
¶
Click to show internal directories.
Click to hide internal directories.