- Sort Score
- Result 10 results
- Languages All
Results 1 - 3 of 3 for authorizer (0.04 sec)
-
CHANGELOG/CHANGELOG-1.5.md
* Use authorization to limit users' ability to use specific PodSecurityPolicy objects **What is the impact?** A user that is authorized to create pods can make use of any existing PodSecurityPolicy, even ones they are not authorized to use. **How can I mitigate this prior to installing 1.5.5?** 1. Export existing PodSecurityPolicy objects: * `kubectl get podsecuritypolicies -o yaml > psp.yaml`
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Thu Dec 24 02:28:26 UTC 2020 - 136.4K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.4.md
* Fix working_set calculation in kubelet ([#29153](https://github.com/kubernetes/kubernetes/pull/29153), [@vishh](https://github.com/vishh)) * Fix RBAC authorizer of ServiceAccount ([#29071](https://github.com/kubernetes/kubernetes/pull/29071), [@albatross0](https://github.com/albatross0))
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Thu Dec 24 02:28:26 UTC 2020 - 133.5K bytes - Viewed (0) -
okhttp/src/jvmTest/kotlin/okhttp3/URLConnectionTest.kt
server.enqueue(MockResponse(body = "this response comes via HTTPS")) server.enqueue(MockResponse(body = "another response via HTTPS")) // install a custom SSL socket factory so the server can be authorized client = client .newBuilder() .sslSocketFactory( handshakeCertificates.sslSocketFactory(), handshakeCertificates.trustManager,
Registered: Fri Dec 26 11:42:13 UTC 2025 - Last Modified: Sat Jun 21 20:36:35 UTC 2025 - 133.2K bytes - Viewed (0)