Affected by GO-2022-0617
and 9 other vulnerabilities
GO-2022-0617: WITHDRAWN: Potential proxy IP restriction bypass in Kubernetes in k8s.io/kubernetes
GO-2022-0983: kubectl ANSI escape characters not filtered in k8s.io/kubernetes
GO-2023-1628: Kubernetes vulnerable to path traversal in k8s.io/kubernetes
GO-2023-1629: Kubernetes vulnerable to validation bypass in k8s.io/kubernetes
GO-2023-1864: Kubelet vulnerable to bypass of seccomp profile enforcement in k8s.io/kubernetes
GO-2023-1891: kube-apiserver vulnerable to policy bypass in k8s.io/kubernetes
GO-2023-1892: Kubernetes mountable secrets policy bypass in k8s.io/kubernetes
GO-2023-2341: Kubernetes Improper Input Validation vulnerability in k8s.io/kubernetes
GO-2024-2994: Kubernetes sets incorrect permissions on Windows containers logs in k8s.io/kubernetes
GO-2024-3277: Kubernetes Nil pointer dereference in KCM after v1 HPA patch request in k8s.io/kubernetes
package
Version:
v1.23.11-rc.0
Opens a new window with list of versions in this module.
Published: Aug 17, 2022
License: Apache-2.0
Opens a new window with license information.
Imports: 9
Opens a new window with list of imports.
Imported by: 1
Opens a new window with list of known importers.
Documentation
¶
-
func CheckDaemonPodOnNodes(f *framework.Framework, ds *appsv1.DaemonSet, nodeNames []string) func() (bool, error)
-
func CheckDaemonStatus(f *framework.Framework, dsName string) error
-
func CheckPresentOnNodes(c clientset.Interface, ds *appsv1.DaemonSet, ns string, numNodes int) (bool, error)
-
func CheckRunningOnAllNodes(f *framework.Framework, ds *appsv1.DaemonSet) (bool, error)
-
func NewDaemonSet(dsName, image string, labels map[string]string, volumes []v1.Volume, ...) *appsv1.DaemonSet
-
func SchedulableNodes(c clientset.Interface, ds *appsv1.DaemonSet) []string
CheckPresentOnNodes will check that the daemonset will be present on at least the given number of
schedulable nodes.
Source Files
¶
Click to show internal directories.
Click to hide internal directories.