Affected by GO-2022-0617
and 17 other vulnerabilities
GO-2022-0617 : WITHDRAWN: Potential proxy IP restriction bypass in Kubernetes in k8s.io/kubernetes
GO-2022-0802 : Kubernetes kubectl cp Vulnerable to Symlink Attack in k8s.io/kubernetes
GO-2022-0885 : Improper Authentication in Kubernetes in k8s.io/kubernetes
GO-2022-0907 : Access Restriction Bypass in kube-apiserver in k8s.io/kubernetes
GO-2022-0910 : Files or Directories Accessible to External Parties in kubernetes in k8s.io/kubernetes
GO-2022-0983 : kubectl ANSI escape characters not filtered in k8s.io/kubernetes
GO-2023-1864 : Kubelet vulnerable to bypass of seccomp profile enforcement in k8s.io/kubernetes
GO-2023-1891 : kube-apiserver vulnerable to policy bypass in k8s.io/kubernetes
GO-2023-1892 : Kubernetes mountable secrets policy bypass in k8s.io/kubernetes
GO-2023-2159 : Kube-proxy may unintentionally forward traffic in k8s.io/kubernetes
GO-2023-2170 : Kubernetes privilege escalation vulnerability in k8s.io/kubernetes
GO-2023-2330 : Kubernetes privilege escalation vulnerability in k8s.io/kubernetes
GO-2023-2341 : Kubernetes Improper Input Validation vulnerability in k8s.io/kubernetes
GO-2024-2748 : Privilege Escalation in Kubernetes in k8s.io/apimachinery
GO-2024-2753 : Denial of service in Kubernetes in k8s.io/kubernetes
GO-2024-2754 : Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes
GO-2024-2755 : Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes
GO-2024-2994 : Kubernetes sets incorrect permissions on Windows containers logs in k8s.io/kubernetes
Discover Packages
k8s.io/kubernetes
pkg
controller
service
package
Version:
v1.16.0-rc.1
Opens a new window with list of versions in this module.
Published: Sep 10, 2019
License: Apache-2.0
Opens a new window with license information.
Imports: 27
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Documentation
Documentation
¶
Package service contains code for syncing cloud load balancers
with the service registry.
type ServiceController struct {
}
ServiceController keeps cloud provider service resources
(like load balancers) in sync with the registry.
New returns a new service controller to keep cloud provider service resources
(like load balancers) in sync with the registry.
Run starts a background goroutine that watches for changes to services that
have (or had) LoadBalancers=true and ensures that they have
load balancers created and deleted appropriately.
serviceSyncPeriod controls how often we check the cluster's services to
ensure that the correct load balancers exist.
nodeSyncPeriod controls how often we check the cluster's nodes to determine
if load balancers need to be updated to point to a new set.
It's an error to call Run() more than once for a given ServiceController
object.
Source Files
¶
Directories
¶
Click to show internal directories.
Click to hide internal directories.