Affected by GO-2022-0617
and 18 other vulnerabilities
GO-2022-0617 : WITHDRAWN: Potential proxy IP restriction bypass in Kubernetes in k8s.io/kubernetes
GO-2022-0782 : Symlink Attack in kubectl cp in k8s.io/kubernetes
GO-2022-0885 : Improper Authentication in Kubernetes in k8s.io/kubernetes
GO-2022-0890 : Server Side Request Forgery (SSRF) in Kubernetes in k8s.io/kubernetes
GO-2022-0907 : Access Restriction Bypass in kube-apiserver in k8s.io/kubernetes
GO-2022-0910 : Files or Directories Accessible to External Parties in kubernetes in k8s.io/kubernetes
GO-2022-0983 : kubectl ANSI escape characters not filtered in k8s.io/kubernetes
GO-2023-1864 : Kubelet vulnerable to bypass of seccomp profile enforcement in k8s.io/kubernetes
GO-2023-1891 : kube-apiserver vulnerable to policy bypass in k8s.io/kubernetes
GO-2023-1892 : Kubernetes mountable secrets policy bypass in k8s.io/kubernetes
GO-2023-1985 : Kubernetes in OpenShift3 Access Control Misconfiguration in k8s.io/kubernetes
GO-2023-2159 : Kube-proxy may unintentionally forward traffic in k8s.io/kubernetes
GO-2023-2170 : Kubernetes privilege escalation vulnerability in k8s.io/kubernetes
GO-2023-2330 : Kubernetes privilege escalation vulnerability in k8s.io/kubernetes
GO-2023-2341 : Kubernetes Improper Input Validation vulnerability in k8s.io/kubernetes
GO-2024-2748 : Privilege Escalation in Kubernetes in k8s.io/apimachinery
GO-2024-2754 : Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes
GO-2024-2755 : Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes
GO-2024-2994 : Kubernetes sets incorrect permissions on Windows containers logs in k8s.io/kubernetes
Discover Packages
k8s.io/kubernetes
pkg
registry
binding
package
Version:
v0.7.3
Opens a new window with list of versions in this module.
Published: Jan 8, 2015
License: Apache-2.0
Opens a new window with license information.
Imports: 6
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Documentation
Documentation
¶
Package binding contains the middle layer logic for bindings.
Bindings are objects containing instructions for how a pod ought to
be bound to a host. This allows a registry object which supports this
action (ApplyBinding) to be served through an apiserver.
type MockRegistry
type REST
func (b *REST) Create(ctx api.Context, obj runtime.Object) (<-chan apiserver.RESTResult, error)
func (*REST) Delete(ctx api.Context, id string) (<-chan apiserver.RESTResult, error)
func (*REST) Get(ctx api.Context, id string) (runtime.Object, error)
func (*REST) List(ctx api.Context, label, field labels.Selector) (runtime.Object, error)
func (*REST) New() runtime.Object
func (b *REST) Update(ctx api.Context, obj runtime.Object) (<-chan apiserver.RESTResult, error)
type Registry
type MockRegistry struct {
OnApplyBinding func(binding *api .Binding ) error
}
MockRegistry can be used for testing.
REST implements the RESTStorage interface for bindings. When bindings are written, it
changes the location of the affected pods. This information is eventually reflected
in the pod's CurrentState.Host field.
NewREST creates a new REST backed by the given bindingRegistry.
Create attempts to make the assignment indicated by the binding it recieves.
Delete returns an error because bindings are write-only objects.
Get returns an error because bindings are write-only objects.
List returns an error because bindings are write-only objects.
New returns a new binding object fit for having data unmarshalled into it.
Update returns an error-- this object may not be updated.
Registry contains the functions needed to support a BindingStorage.
Source Files
¶
Click to show internal directories.
Click to hide internal directories.