Affected by GO-2022-0617
and 18 other vulnerabilities
GO-2022-0617: WITHDRAWN: Potential proxy IP restriction bypass in Kubernetes in k8s.io/kubernetes
GO-2022-0782: Symlink Attack in kubectl cp in k8s.io/kubernetes
GO-2022-0885: Improper Authentication in Kubernetes in k8s.io/kubernetes
GO-2022-0890: Server Side Request Forgery (SSRF) in Kubernetes in k8s.io/kubernetes
GO-2022-0907: Access Restriction Bypass in kube-apiserver in k8s.io/kubernetes
GO-2022-0910: Files or Directories Accessible to External Parties in kubernetes in k8s.io/kubernetes
GO-2022-0983: kubectl ANSI escape characters not filtered in k8s.io/kubernetes
GO-2023-1864: Kubelet vulnerable to bypass of seccomp profile enforcement in k8s.io/kubernetes
GO-2023-1891: kube-apiserver vulnerable to policy bypass in k8s.io/kubernetes
GO-2023-1892: Kubernetes mountable secrets policy bypass in k8s.io/kubernetes
GO-2023-1985: Kubernetes in OpenShift3 Access Control Misconfiguration in k8s.io/kubernetes
GO-2023-2159: Kube-proxy may unintentionally forward traffic in k8s.io/kubernetes
GO-2023-2170: Kubernetes privilege escalation vulnerability in k8s.io/kubernetes
GO-2023-2330: Kubernetes privilege escalation vulnerability in k8s.io/kubernetes
GO-2023-2341: Kubernetes Improper Input Validation vulnerability in k8s.io/kubernetes
GO-2024-2748: Privilege Escalation in Kubernetes in k8s.io/apimachinery
GO-2024-2754: Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes
GO-2024-2755: Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes
GO-2024-2994: Kubernetes sets incorrect permissions on Windows containers logs in k8s.io/kubernetes
package
Version:
v0.6.2
Opens a new window with list of versions in this module.
Published: Dec 12, 2014
License: Apache-2.0
Opens a new window with license information.
Imports: 10
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Documentation
¶
Package controller provides Registry interface and it's RESTStorage
implementation for storing ReplicationController api objects.
-
type PodLister
-
type REST
-
func (rs *REST) Create(ctx api.Context, obj runtime.Object) (<-chan apiserver.RESTResult, error)
-
func (rs *REST) Delete(ctx api.Context, id string) (<-chan apiserver.RESTResult, error)
-
func (rs *REST) Get(ctx api.Context, id string) (runtime.Object, error)
-
func (rs *REST) List(ctx api.Context, label, field labels.Selector) (runtime.Object, error)
-
func (*REST) New() runtime.Object
-
func (rs *REST) Update(ctx api.Context, obj runtime.Object) (<-chan apiserver.RESTResult, error)
-
func (rs *REST) Watch(ctx api.Context, label, field labels.Selector, resourceVersion string) (watch.Interface, error)
-
type Registry
PodLister is anything that knows how to list pods.
REST implements apiserver.RESTStorage for the replication controller service.
NewREST returns a new apiserver.RESTStorage for the given registry and PodLister.
Create registers the given ReplicationController.
Delete asynchronously deletes the ReplicationController specified by its id.
Get obtains the ReplicationController specified by its id.
List obtains a list of ReplicationControllers that match selector.
New creates a new ReplicationController for use with Create and Update.
Update replaces a given ReplicationController instance with an existing
instance in storage.registry.
Watch returns ReplicationController events via a watch.Interface.
It implements apiserver.ResourceWatcher.
Registry is an interface for things that know how to store ReplicationControllers.
Source Files
¶
Click to show internal directories.
Click to hide internal directories.