Affected by GO-2022-0617
and 18 other vulnerabilities
GO-2022-0617: WITHDRAWN: Potential proxy IP restriction bypass in Kubernetes in k8s.io/kubernetes
GO-2022-0782: Symlink Attack in kubectl cp in k8s.io/kubernetes
GO-2022-0885: Improper Authentication in Kubernetes in k8s.io/kubernetes
GO-2022-0890: Server Side Request Forgery (SSRF) in Kubernetes in k8s.io/kubernetes
GO-2022-0907: Access Restriction Bypass in kube-apiserver in k8s.io/kubernetes
GO-2022-0910: Files or Directories Accessible to External Parties in kubernetes in k8s.io/kubernetes
GO-2022-0983: kubectl ANSI escape characters not filtered in k8s.io/kubernetes
GO-2023-1864: Kubelet vulnerable to bypass of seccomp profile enforcement in k8s.io/kubernetes
GO-2023-1891: kube-apiserver vulnerable to policy bypass in k8s.io/kubernetes
GO-2023-1892: Kubernetes mountable secrets policy bypass in k8s.io/kubernetes
GO-2023-1985: Kubernetes in OpenShift3 Access Control Misconfiguration in k8s.io/kubernetes
GO-2023-2159: Kube-proxy may unintentionally forward traffic in k8s.io/kubernetes
GO-2023-2170: Kubernetes privilege escalation vulnerability in k8s.io/kubernetes
GO-2023-2330: Kubernetes privilege escalation vulnerability in k8s.io/kubernetes
GO-2023-2341: Kubernetes Improper Input Validation vulnerability in k8s.io/kubernetes
GO-2024-2748: Privilege Escalation in Kubernetes in k8s.io/apimachinery
GO-2024-2754: Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes
GO-2024-2755: Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes
GO-2024-2994: Kubernetes sets incorrect permissions on Windows containers logs in k8s.io/kubernetes
package
Version:
v0.17.0
Opens a new window with list of versions in this module.
Published: May 12, 2015
License: Apache-2.0, Apache-2.0
Opens a new window with license information.
Imports: 7
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Documentation
¶
Package buildinfo provides build information about heat deployments.
View Source
const GetOutput = `
{
"api": {
"revision": "2.4.5"
},
"engine": {
"revision": "1.2.1"
}
}`
GetOutput represents the response body from a Get request.
GetExpected represents the expected object from a Get request.
HandleGetSuccessfully creates an HTTP handler at `/build_info`
on the test handler mux that responds with a `Get` response.
type BuildInfo struct {
API Revision `mapstructure:"api"`
Engine Revision `mapstructure:"engine"`
}
BuildInfo represents the build information for a Heat deployment.
GetResult represents the result of a Get operation.
Get retreives data for the given stack template.
Extract returns a pointer to a BuildInfo object and is called after a
Get operation.
type Revision struct {
Revision string `mapstructure:"revision"`
}
Revision represents the API/Engine revision of a Heat deployment.
Source Files
¶
Click to show internal directories.
Click to hide internal directories.