Affected by GO-2022-0560
and 9 other vulnerabilities
GO-2022-0560 : Nomad Spread Job Stanza May Trigger Panic in Servers in github.com/hashicorp/nomad
GO-2022-0573 : Improper Authentication in HashiCorp Nomad in github.com/hashicorp/nomad
GO-2022-0577 : HashiCorp Nomad vulnerable to Allocation of Resources Without Limits or Throttling in github.com/hashicorp/nomad
GO-2022-0584 : Arbitrary file reads in HashiCorp Nomad in github.com/hashicorp/nomad
GO-2022-0600 : HashiCorp Nomad Artifact Download Race Condition in github.com/hashicorp/nomad
GO-2022-0732 : Privilege escalation in Hashicorp Nomad in github.com/hashicorp/nomad
GO-2022-1062 : Nomad Panics On Job Submission With Bad Artifact Stanza Source URL in github.com/hashicorp/nomad
GO-2024-2670 : ACL security vulnerability in github.com/hashicorp/nomad
GO-2024-3073 : Nomad Vulnerable to Allocation Directory Escape On Non-Existing File Paths Through Archive Unpacking in github.com/hashicorp/nomad
GO-2024-3262 : Hashicorp Nomad Incorrect Authorization vulnerability in github.com/hashicorp/nomad
Discover Packages
github.com/hashicorp/nomad
drivers
shared
hostnames
package
Version:
v1.1.5
Opens a new window with list of versions in this module.
Published: Sep 20, 2021
License: MPL-2.0
Opens a new window with license information.
Imports: 7
Opens a new window with list of imports.
Imported by: 2
Opens a new window with list of known importers.
Documentation
Documentation
¶
Rendered for
linux/amd64
windows/amd64
darwin/amd64
js/wasm
GenerateEtcHostsMount writes a /etc/hosts file using the network spec's
hosts configuration, and returns a mount config so that task drivers can
bind-mount it into the resulting task's filesystem. The extraHosts
parameter is expected to be the same format as the extra_hosts field from
the Docker or containerd drivers: []string{"<hostname>:<ip address>"}
Source Files
¶
Click to show internal directories.
Click to hide internal directories.