Affected by GO-2022-0617
and 22 other vulnerabilities
GO-2022-0617 : WITHDRAWN: Potential proxy IP restriction bypass in Kubernetes in k8s.io/kubernetes
GO-2022-0782 : Symlink Attack in kubectl cp in k8s.io/kubernetes
GO-2022-0885 : Improper Authentication in Kubernetes in k8s.io/kubernetes
GO-2022-0890 : Server Side Request Forgery (SSRF) in Kubernetes in k8s.io/kubernetes
GO-2022-0907 : Access Restriction Bypass in kube-apiserver in k8s.io/kubernetes
GO-2022-0910 : Files or Directories Accessible to External Parties in kubernetes in k8s.io/kubernetes
GO-2022-0983 : ANSI escape characters not filtered in kubectl in k8s.io/kubernetes
GO-2023-1864 : Kubelet vulnerable to bypass of seccomp profile enforcement in k8s.io/kubernetes
GO-2023-1891 : Vulnerable to policy bypass in kube-apiserver in k8s.io/kubernetes
GO-2023-1892 : Kubernetes mountable secrets policy bypass in k8s.io/kubernetes
GO-2023-1985 : Kubernetes in OpenShift3 Access Control Misconfiguration in k8s.io/kubernetes
GO-2023-2159 : Kube-proxy may unintentionally forward traffic in k8s.io/kubernetes
GO-2023-2341 : Kubernetes Improper Input Validation vulnerability in k8s.io/kubernetes
GO-2024-2748 : Privilege Escalation in Kubernetes in k8s.io/apimachinery
GO-2024-2754 : Sensitive Information leak for users of Ceph RBD via Log File in k8s.io/kubernetes
GO-2024-2755 : Sensitive Information leak for VSphere users via Log File in k8s.io/kubernetes
GO-2024-2994 : Kubernetes sets incorrect permissions on Windows containers logs in k8s.io/kubernetes
GO-2024-3277 : Kubernetes Nil pointer dereference in KCM after v1 HPA patch request in k8s.io/kubernetes
GO-2025-3465 : Node Denial of Service via kubelet Checkpoint API in k8s.io/kubernetes
GO-2025-3521 : Kubernetes GitRepo Volume Inadvertent Local Repository Access in k8s.io/kubernetes
GO-2025-3522 : Kubernetes allows Command Injection affecting Windows nodes via nodes/*/logs/query API in k8s.io/kubernetes
GO-2025-3915 : Kubernetes Nodes can delete themselves by adding an OwnerReference in k8s.io/kubernetes
Discover Packages
k8s.io/kubernetes
pkg
registry
generic
etcd
package
Version:
v0.7.1
Opens a new window with list of versions in this module.
Published: Dec 23, 2014
License: Apache-2.0
Opens a new window with license information.
Imports: 7
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Documentation
Documentation
¶
Package etcd has a generic implementation of a registry that
stores things in etcd.
func NamespaceKeyFunc(ctx api.Context, prefix string, id string) (string, error)
func NamespaceKeyRootFunc(ctx api.Context, prefix string) string
type Etcd
func (e *Etcd) Create(ctx api.Context, id string, obj runtime.Object) error
func (e *Etcd) Delete(ctx api.Context, id string) error
func (e *Etcd) Get(ctx api.Context, id string) (runtime.Object, error)
func (e *Etcd) List(ctx api.Context, m generic.Matcher) (runtime.Object, error)
func (e *Etcd) Update(ctx api.Context, id string, obj runtime.Object) error
func (e *Etcd) Watch(ctx api.Context, m generic.Matcher, resourceVersion string) (watch.Interface, error)
NamespaceKeyFunc is the default function for constructing etcd paths to a resource relative to prefix enforcing namespace rules.
If no namespace is on context, it errors.
NamespaceKeyRootFunc is the default function for constructing etcd paths to resource directories enforcing namespace rules.
Etcd implements generic.Registry, backing it with etcd storage.
It's intended to be embeddable, so that you can implement any
non-generic functions if needed.
You must supply a value for every field below before use; these are
left public as it's meant to be overridable if need be.
Create inserts a new item.
Delete removes the item from etcd.
Get retrieves the item from etcd.
List returns a list of all the items matching m.
Watch starts a watch for the items that m matches.
TODO: Detect if m references a single object instead of a list.
Source Files
¶
Click to show internal directories.
Click to hide internal directories.