Affected by GO-2022-0617
and 10 other vulnerabilities
GO-2022-0617 : WITHDRAWN: Potential proxy IP restriction bypass in Kubernetes in k8s.io/kubernetes
GO-2022-0983 : kubectl ANSI escape characters not filtered in k8s.io/kubernetes
GO-2023-1628 : Kubernetes vulnerable to path traversal in k8s.io/kubernetes
GO-2023-1629 : Kubernetes vulnerable to validation bypass in k8s.io/kubernetes
GO-2023-1864 : Kubelet vulnerable to bypass of seccomp profile enforcement in k8s.io/kubernetes
GO-2023-1891 : kube-apiserver vulnerable to policy bypass in k8s.io/kubernetes
GO-2023-1892 : Kubernetes mountable secrets policy bypass in k8s.io/kubernetes
GO-2023-2170 : Kubernetes privilege escalation vulnerability in k8s.io/kubernetes
GO-2023-2330 : Kubernetes privilege escalation vulnerability in k8s.io/kubernetes
GO-2023-2341 : Kubernetes Improper Input Validation vulnerability in k8s.io/kubernetes
GO-2024-2994 : Kubernetes sets incorrect permissions on Windows containers logs in k8s.io/kubernetes
Discover Packages
k8s.io/kubernetes
test
e2e_node
runner
remote
command
Version:
v1.25.1
Opens a new window with list of versions in this module.
Published: Sep 14, 2022
License: Apache-2.0
Opens a new window with license information.
Imports: 24
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Documentation
Documentation
¶
To run the node e2e tests remotely against one or more hosts on gce:
$ go run run_remote.go --logtostderr --v 2 --ssh-env gce --hosts <comma separated hosts>
To run the node e2e tests remotely against one or more images on gce and provision them:
$ go run run_remote.go --logtostderr --v 2 --project <project> --zone <zone> --ssh-env gce --images <comma separated images>
Source Files
¶
Click to show internal directories.
Click to hide internal directories.