Affected by GO-2022-0617
and 20 other vulnerabilities
GO-2022-0617: WITHDRAWN: Potential proxy IP restriction bypass in Kubernetes in k8s.io/kubernetes
GO-2022-0802: Kubernetes kubectl cp Vulnerable to Symlink Attack in k8s.io/kubernetes
GO-2022-0885: Improper Authentication in Kubernetes in k8s.io/kubernetes
GO-2022-0907: Access Restriction Bypass in kube-apiserver in k8s.io/kubernetes
GO-2022-0910: Files or Directories Accessible to External Parties in kubernetes in k8s.io/kubernetes
GO-2022-0983: kubectl ANSI escape characters not filtered in k8s.io/kubernetes
GO-2023-1864: Kubelet vulnerable to bypass of seccomp profile enforcement in k8s.io/kubernetes
GO-2023-1891: kube-apiserver vulnerable to policy bypass in k8s.io/kubernetes
GO-2023-1892: Kubernetes mountable secrets policy bypass in k8s.io/kubernetes
GO-2023-2159: Kube-proxy may unintentionally forward traffic in k8s.io/kubernetes
GO-2023-2341: Kubernetes Improper Input Validation vulnerability in k8s.io/kubernetes
GO-2024-2748: Privilege Escalation in Kubernetes in k8s.io/apimachinery
GO-2024-2753: Denial of service in Kubernetes in k8s.io/kubernetes
GO-2024-2754: Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes
GO-2024-2755: Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes
GO-2024-2994: Kubernetes sets incorrect permissions on Windows containers logs in k8s.io/kubernetes
GO-2024-3277: Kubernetes Nil pointer dereference in KCM after v1 HPA patch request in k8s.io/kubernetes
GO-2025-3465: Node Denial of Service via kubelet Checkpoint API in k8s.io/kubernetes
GO-2025-3521: Kubernetes GitRepo Volume Inadvertent Local Repository Access in k8s.io/kubernetes
GO-2025-3522: Kubernetes allows Command Injection affecting Windows nodes via nodes/*/logs/query API in k8s.io/kubernetes
GO-2025-3547: Kubernetes kube-apiserver Vulnerable to Race Condition in k8s.io/kubernetes
package
Version:
v1.16.0-alpha.0
Opens a new window with list of versions in this module.
Published: May 14, 2019
License: Apache-2.0
Opens a new window with license information.
Imports: 44
Opens a new window with list of imports.
Imported by: 120
Opens a new window with list of known importers.
Documentation
¶
- Constants
-
func CreateHostPortPods(f *framework.Framework, id string, replicas int, expectRunning bool)
-
func CreateNodeSelectorPods(f *framework.Framework, id string, replicas int, ...) error
-
func GetNodeThatCanRunPod(f *framework.Framework) string
-
func OnlyAllowNodeZones(f *framework.Framework, zoneCount int, image string)
-
func PodsUseStaticPVsOrFail(f *framework.Framework, podCount int, image string)
-
func SIGDescribe(text string, body func()) bool
-
func SetupNVIDIAGPUNode(f *framework.Framework, setupResourceGatherer bool) *framework.ContainerResourceGatherer
-
func SpreadRCOrFail(f *framework.Framework, replicaCount int32, image string)
-
func SpreadServiceOrFail(f *framework.Framework, replicaCount int, image string)
-
func WaitForSchedulerAfterAction(f *framework.Framework, action common.Action, ns, podName string, ...)
-
type Resource
View Source
const (
KubeletPodDeletionDelaySeconds = 60
AdditionalWaitPerDeleteSeconds = 5
)
OnlyAllowNodeZones tests that GetAllCurrentZones returns only zones with Nodes
Check that the pods using statically created PVs get scheduled to the same zone that the PV is in.
Check that the pods comprising a replication controller get spread evenly across available zones
Check that the pods comprising a service get spread evenly across available zones
WaitForSchedulerAfterAction performs the provided action and then waits for
scheduler to act on the given pod.
type Resource struct {
MilliCPU int64
Memory int64
}
Source Files
¶
Click to show internal directories.
Click to hide internal directories.