Affected by GO-2022-0617
and 18 other vulnerabilities
GO-2022-0617 : WITHDRAWN: Potential proxy IP restriction bypass in Kubernetes in k8s.io/kubernetes
GO-2022-0885 : Improper Authentication in Kubernetes in k8s.io/kubernetes
GO-2022-0890 : Server Side Request Forgery (SSRF) in Kubernetes in k8s.io/kubernetes
GO-2022-0907 : Access Restriction Bypass in kube-apiserver in k8s.io/kubernetes
GO-2022-0908 : Incomplete List of Disallowed Inputs in Kubernetes in k8s.io/kubernetes
GO-2022-0910 : Files or Directories Accessible to External Parties in kubernetes in k8s.io/kubernetes
GO-2022-0983 : kubectl ANSI escape characters not filtered in k8s.io/kubernetes
GO-2023-1864 : Kubelet vulnerable to bypass of seccomp profile enforcement in k8s.io/kubernetes
GO-2023-1891 : kube-apiserver vulnerable to policy bypass in k8s.io/kubernetes
GO-2023-1892 : Kubernetes mountable secrets policy bypass in k8s.io/kubernetes
GO-2023-2159 : Kube-proxy may unintentionally forward traffic in k8s.io/kubernetes
GO-2023-2170 : Kubernetes privilege escalation vulnerability in k8s.io/kubernetes
GO-2023-2330 : Kubernetes privilege escalation vulnerability in k8s.io/kubernetes
GO-2023-2341 : Kubernetes Improper Input Validation vulnerability in k8s.io/kubernetes
GO-2024-2748 : Privilege Escalation in Kubernetes in k8s.io/apimachinery
GO-2024-2753 : Denial of service in Kubernetes in k8s.io/kubernetes
GO-2024-2754 : Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes
GO-2024-2755 : Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes
GO-2024-2994 : Kubernetes sets incorrect permissions on Windows containers logs in k8s.io/kubernetes
Discover Packages
k8s.io/kubernetes
test
conformance
command
Version:
v1.17.4-beta.0
Opens a new window with list of versions in this module.
Published: Feb 11, 2020
License: Apache-2.0
Opens a new window with license information.
Imports: 11
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
README
README
¶
This directory contains the regression test for controlling the list of all
conformance tests.
If you add or remove a conformance test, this test will fail and you will need
to update the golden list of tests stored in testdata/
. Changes to that file
require review by sig-architecture.
To update the list, run
bazel build //test/conformance:list_conformance_tests
cp bazel-genfiles/test/conformance/conformance.txt test/conformance/testdata
Add the changed file to your PR, then send for review.
Expand ▾
Collapse ▴
Documentation
¶
Package main provides a tool that scans kubernetes e2e test source code
looking for conformance test declarations, which it emits on stdout. It
also looks for legacy, manually added "[Conformance]" tags and reports an
error if it finds any.
This approach is not air tight, but it will serve our purpose as a
pre-submit check.
Source Files
¶
Directories
¶
Click to show internal directories.
Click to hide internal directories.