Affected by GO-2022-0617
and 20 other vulnerabilities
GO-2022-0617 : WITHDRAWN: Potential proxy IP restriction bypass in Kubernetes in k8s.io/kubernetes
GO-2022-0782 : Symlink Attack in kubectl cp in k8s.io/kubernetes
GO-2022-0885 : Improper Authentication in Kubernetes in k8s.io/kubernetes
GO-2022-0890 : Server Side Request Forgery (SSRF) in Kubernetes in k8s.io/kubernetes
GO-2022-0907 : Access Restriction Bypass in kube-apiserver in k8s.io/kubernetes
GO-2022-0910 : Files or Directories Accessible to External Parties in kubernetes in k8s.io/kubernetes
GO-2022-0983 : kubectl ANSI escape characters not filtered in k8s.io/kubernetes
GO-2023-1864 : Kubelet vulnerable to bypass of seccomp profile enforcement in k8s.io/kubernetes
GO-2023-1891 : kube-apiserver vulnerable to policy bypass in k8s.io/kubernetes
GO-2023-1892 : Kubernetes mountable secrets policy bypass in k8s.io/kubernetes
GO-2023-1985 : Kubernetes in OpenShift3 Access Control Misconfiguration in k8s.io/kubernetes
GO-2023-2159 : Kube-proxy may unintentionally forward traffic in k8s.io/kubernetes
GO-2023-2341 : Kubernetes Improper Input Validation vulnerability in k8s.io/kubernetes
GO-2024-2748 : Privilege Escalation in Kubernetes in k8s.io/apimachinery
GO-2024-2754 : Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes
GO-2024-2755 : Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes
GO-2024-2994 : Kubernetes sets incorrect permissions on Windows containers logs in k8s.io/kubernetes
GO-2024-3277 : Kubernetes Nil pointer dereference in KCM after v1 HPA patch request in k8s.io/kubernetes
GO-2025-3465 : Node Denial of Service via kubelet Checkpoint API in k8s.io/kubernetes
GO-2025-3521 : Kubernetes GitRepo Volume Inadvertent Local Repository Access in k8s.io/kubernetes
GO-2025-3522 : Kubernetes allows Command Injection affecting Windows nodes via nodes/*/logs/query API in k8s.io/kubernetes
Discover Packages
k8s.io/kubernetes
pkg
registry
controller
package
Version:
v0.16.0
Opens a new window with list of versions in this module.
Published: Apr 29, 2015
License: Apache-2.0
Opens a new window with license information.
Imports: 11
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Documentation
Documentation
¶
Package controller provides Registry interface and it's RESTStorage
implementation for storing ReplicationController api objects.
Strategy is the default logic that applies when creating and updating Replication Controller objects.
ControllerToSelectableFields returns a label set that represents the object.
MatchController is the filter used by the generic etcd backend to route
watch events from etcd to clients of the apiserver only interested in specific
labels/fields.
type Registry interface {
ListControllers(ctx api .Context , label labels .Selector , field fields .Selector ) (*api .ReplicationControllerList , error )
WatchControllers(ctx api .Context , label labels .Selector , field fields .Selector , resourceVersion string ) (watch .Interface , error )
GetController(ctx api .Context , controllerID string ) (*api .ReplicationController , error )
CreateController(ctx api .Context , controller *api .ReplicationController ) (*api .ReplicationController , error )
UpdateController(ctx api .Context , controller *api .ReplicationController ) (*api .ReplicationController , error )
DeleteController(ctx api .Context , controllerID string ) error
}
Registry is an interface for things that know how to store ReplicationControllers.
NewRegistry returns a new Registry interface for the given Storage. Any mismatched
types will panic.
Source Files
¶
Directories
¶
Click to show internal directories.
Click to hide internal directories.