Affected by GO-2022-0560
and 10 other vulnerabilities
GO-2022-0560: Nomad Spread Job Stanza May Trigger Panic in Servers in github.com/hashicorp/nomad
GO-2022-0573: Improper Authentication in HashiCorp Nomad in github.com/hashicorp/nomad
GO-2022-0577: HashiCorp Nomad vulnerable to Allocation of Resources Without Limits or Throttling in github.com/hashicorp/nomad
GO-2022-0584: Arbitrary file reads in HashiCorp Nomad in github.com/hashicorp/nomad
GO-2022-0591: Privilege escalation in Hashicorp Nomad in github.com/hashicorp/nomad
GO-2022-0600: HashiCorp Nomad Artifact Download Race Condition in github.com/hashicorp/nomad
GO-2022-0732: Privilege escalation in Hashicorp Nomad in github.com/hashicorp/nomad
GO-2022-1062: Nomad Panics On Job Submission With Bad Artifact Stanza Source URL in github.com/hashicorp/nomad
GO-2024-2670: ACL security vulnerability in github.com/hashicorp/nomad
GO-2024-3073: Nomad Vulnerable to Allocation Directory Escape On Non-Existing File Paths Through Archive Unpacking in github.com/hashicorp/nomad
GO-2024-3262: Hashicorp Nomad Incorrect Authorization vulnerability in github.com/hashicorp/nomad
package
Version:
v1.1.0
Opens a new window with list of versions in this module.
Published: May 17, 2021
License: MPL-2.0
Opens a new window with license information.
Imports: 7
Opens a new window with list of imports.
Imported by: 9
Opens a new window with list of known importers.
Documentation
¶
func DefaultCodeToLevel(code codes.Code) hclog.Level
StreamClientInterceptor returns a new streaming client interceptor that logs the execution of gRPC calls.
UnaryClientInterceptor returns a new unary client interceptor that logs the execution of gRPC calls.
type CodeToLevel func(code codes.Code) hclog.Level
CodeToLevel function defines the mapping between gRPC return codes and hclog level.
type Option func(*options)
Source Files
¶
Click to show internal directories.
Click to hide internal directories.