Affected by GO-2022-0617
and 18 other vulnerabilities
GO-2022-0617: WITHDRAWN: Potential proxy IP restriction bypass in Kubernetes in k8s.io/kubernetes
GO-2022-0782: Symlink Attack in kubectl cp in k8s.io/kubernetes
GO-2022-0885: Improper Authentication in Kubernetes in k8s.io/kubernetes
GO-2022-0890: Server Side Request Forgery (SSRF) in Kubernetes in k8s.io/kubernetes
GO-2022-0907: Access Restriction Bypass in kube-apiserver in k8s.io/kubernetes
GO-2022-0910: Files or Directories Accessible to External Parties in kubernetes in k8s.io/kubernetes
GO-2022-0983: kubectl ANSI escape characters not filtered in k8s.io/kubernetes
GO-2023-1864: Kubelet vulnerable to bypass of seccomp profile enforcement in k8s.io/kubernetes
GO-2023-1891: kube-apiserver vulnerable to policy bypass in k8s.io/kubernetes
GO-2023-1892: Kubernetes mountable secrets policy bypass in k8s.io/kubernetes
GO-2023-1985: Kubernetes in OpenShift3 Access Control Misconfiguration in k8s.io/kubernetes
GO-2023-2159: Kube-proxy may unintentionally forward traffic in k8s.io/kubernetes
GO-2023-2170: Kubernetes privilege escalation vulnerability in k8s.io/kubernetes
GO-2023-2330: Kubernetes privilege escalation vulnerability in k8s.io/kubernetes
GO-2023-2341: Kubernetes Improper Input Validation vulnerability in k8s.io/kubernetes
GO-2024-2748: Privilege Escalation in Kubernetes in k8s.io/apimachinery
GO-2024-2754: Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes
GO-2024-2755: Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes
GO-2024-2994: Kubernetes sets incorrect permissions on Windows containers logs in k8s.io/kubernetes
package
Version:
v0.4.2
Opens a new window with list of versions in this module.
Published: Oct 29, 2014
License: Apache-2.0
Opens a new window with license information.
Imports: 18
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Documentation
¶
Package service provides Registry interface and it's RESTStorage
implementation for storing Service api objects.
-
func GetServiceEnvironmentVariables(ctx api.Context, registry Registry, machine string) ([]api.EnvVar, error)
-
type REST
-
func (rs *REST) Create(ctx api.Context, obj runtime.Object) (<-chan runtime.Object, error)
-
func (rs *REST) Delete(ctx api.Context, id string) (<-chan runtime.Object, error)
-
func (rs *REST) Get(ctx api.Context, id string) (runtime.Object, error)
-
func (rs *REST) List(ctx api.Context, label, field labels.Selector) (runtime.Object, error)
-
func (*REST) New() runtime.Object
-
func (rs *REST) ResourceLocation(ctx api.Context, id string) (string, error)
-
func (rs *REST) Update(ctx api.Context, obj runtime.Object) (<-chan runtime.Object, error)
-
func (rs *REST) Watch(ctx api.Context, label, field labels.Selector, resourceVersion string) (watch.Interface, error)
-
type Registry
GetServiceEnvironmentVariables populates a list of environment variables that are use
in the container environment to get access to services.
REST adapts a service registry into apiserver's RESTStorage model.
NewREST returns a new REST.
TODO: implement field selector?
ResourceLocation returns a URL to which one can send traffic for the specified service.
Watch returns Services events via a watch.Interface.
It implements apiserver.ResourceWatcher.
type Registry interface {
ListServices(ctx api.Context) (*api.ServiceList, error)
CreateService(ctx api.Context, svc *api.Service) error
GetService(ctx api.Context, name string) (*api.Service, error)
DeleteService(ctx api.Context, name string) error
UpdateService(ctx api.Context, svc *api.Service) error
WatchServices(ctx api.Context, labels, fields labels.Selector, resourceVersion string) (watch.Interface, error)
endpoint.Registry
}
Registry is an interface for things that know how to store services.
Source Files
¶
Click to show internal directories.
Click to hide internal directories.