Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 4 of 4 for authorizer (0.06 sec)

  1. CHANGELOG/CHANGELOG-1.5.md

    * Use authorization to limit users' ability to use specific PodSecurityPolicy objects
    
    **What is the impact?**
    
    A user that is authorized to create pods can make use of any existing PodSecurityPolicy, even ones they are not authorized to use.
    
    **How can I mitigate this prior to installing 1.5.5?**
    
    1. Export existing PodSecurityPolicy objects:
      * `kubectl get podsecuritypolicies -o yaml > psp.yaml`
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Thu Dec 24 02:28:26 UTC 2020
    - 136.4K bytes
    - Viewed (0)
  2. CHANGELOG/CHANGELOG-1.4.md

    * Fix working_set calculation in kubelet ([#29153](https://github.com/kubernetes/kubernetes/pull/29153), [@vishh](https://github.com/vishh))
    * Fix RBAC authorizer of ServiceAccount ([#29071](https://github.com/kubernetes/kubernetes/pull/29071), [@albatross0](https://github.com/albatross0))
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Thu Dec 24 02:28:26 UTC 2020
    - 133.5K bytes
    - Viewed (0)
  3. okhttp/src/jvmTest/kotlin/okhttp3/URLConnectionTest.kt

        server.enqueue(MockResponse(body = "this response comes via HTTPS"))
        server.enqueue(MockResponse(body = "another response via HTTPS"))
    
        // install a custom SSL socket factory so the server can be authorized
        client =
          client
            .newBuilder()
            .sslSocketFactory(
              handshakeCertificates.sslSocketFactory(),
              handshakeCertificates.trustManager,
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Sat Jun 21 20:36:35 UTC 2025
    - 133.2K bytes
    - Viewed (0)
  4. cmd/object-handlers.go

    					}
    				}
    				if reader != nil && proxy.Proxy && perr == nil {
    					gr = reader
    				}
    			}
    		}
    		if reader == nil || !proxy.Proxy {
    			// validate if the request indeed was authorized, if it wasn't we need to return "ErrAccessDenied"
    			// instead of any namespace related error.
    			if s3Error := authorizeRequest(ctx, r, policy.GetObjectAction); s3Error != ErrNone {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sun Sep 07 16:13:09 UTC 2025
    - 120.6K bytes
    - Viewed (0)
Back to top