Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 7 of 7 for privileged (0.12 sec)

  1. .devcontainer/devcontainer.json

    {
      "name": "istio build-tools",
      "image": "gcr.io/istio-testing/build-tools:master-c67afcee625a4b91bdde7da65c9867f98248691e",
      "privileged": true,
      "remoteEnv": {
        "USE_GKE_GCLOUD_AUTH_PLUGIN": "True",
        "BUILD_WITH_CONTAINER": "0",
        "CARGO_HOME": "/home/.cargo",
        "RUSTUP_HOME": "/home/.rustup"
      },
      "features": {
        "ghcr.io/devcontainers/features/docker-outside-of-docker:1": {},
        "ghcr.io/mpriscella/features/kind:1": {}
      },
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Wed Nov 06 04:52:54 UTC 2024
    - 879 bytes
    - Viewed (0)
  2. src/cmd/asm/internal/asm/testdata/riscv64.s

    	BINV	X30, X5, X6				// 3393e269
    	BINV	$63, X6					// 1313f36b
    	BINVI	$1, X7, X8				// 13941368
    	BSET	X8, X9, X10				// 33958428
    	BSET	$63, X9					// 9394f42b
    	BSETI	$1, X10, X11				// 93151528
    
    	//
    	// Privileged ISA
    	//
    
    	// 3.3.1: Environment Call and Breakpoint
    	ECALL						// 73000000
    	SCALL						// 73000000
    	EBREAK						// 73001000
    	SBREAK						// 73001000
    
    Registered: Tue Nov 05 11:13:11 UTC 2024
    - Last Modified: Fri Oct 25 12:05:29 UTC 2024
    - 16.8K bytes
    - Viewed (0)
  3. cmd/warm-backend.go

    	Remove(ctx context.Context, object string, rv remoteVersionID) error
    	InUse(ctx context.Context) (bool, error)
    }
    
    const probeObject = "probeobject"
    
    // checkWarmBackend checks if tier config credentials have sufficient privileges
    // to perform all operations defined in the WarmBackend interface.
    func checkWarmBackend(ctx context.Context, w WarmBackend) error {
    	remoteVersionID, err := w.Put(ctx, probeObject, strings.NewReader("MinIO"), 5)
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Oct 31 22:10:24 UTC 2024
    - 4K bytes
    - Viewed (0)
  4. compat/maven-compat/src/main/java/org/apache/maven/project/interpolation/StringSearchModelInterpolator.java

                InterpolateObjectAction action =
                        new InterpolateObjectAction(obj, valueSources, postProcessors, debugEnabled, this, getLogger());
    
                ModelInterpolationException error = AccessController.doPrivileged(action);
    
                if (error != null) {
                    throw error;
                }
            } finally {
                getInterpolator().clearAnswers();
            }
        }
    
    Registered: Sun Nov 03 03:35:11 UTC 2024
    - Last Modified: Fri Oct 25 12:31:46 UTC 2024
    - 14.1K bytes
    - Viewed (0)
  5. docs/en/docs/advanced/behind-a-proxy.md

    ```
    
    This tells Traefik to listen on port 9999 and to use another file `routes.toml`.
    
    /// tip
    
    We are using port 9999 instead of the standard HTTP port 80 so that you don't have to run it with admin (`sudo`) privileges.
    
    ///
    
    Now create that other file `routes.toml`:
    
    ```TOML hl_lines="5  12  20"
    [http]
      [http.middlewares]
    
        [http.middlewares.api-stripprefix.stripPrefix]
          prefixes = ["/api/v1"]
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sun Oct 27 16:49:49 UTC 2024
    - 11.6K bytes
    - Viewed (0)
  6. CHANGELOG/CHANGELOG-1.32.md

    granting the caller `nodes/proxy` permission in RBAC but that also grants the caller permissions to exec, run and attach to containers on the nodes and doing so does not follow the least privilege principle. Granting callers more permissions than they need can give attackers an opportunity to escalate privileges. ([#126347](https://github.com/kubernetes/kubernetes/pull/126347), [@vinayakankugoyal](https://github.com/vinayakankugoyal)) [SIG API Machinery, Auth, Cluster Lifecycle and Node]
    
    ###...
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Tue Oct 29 20:17:52 UTC 2024
    - 121.6K bytes
    - Viewed (0)
  7. cmd/iam.go

    		if parentInClaim != parentUser {
    			return false
    		}
    	} else {
    		// This is needed so a malicious user cannot
    		// use a leaked session key of another user
    		// to widen its privileges.
    		return false
    	}
    
    	isOwnerDerived := parentUser == globalActiveCred.AccessKey
    
    	var err error
    	var svcPolicies []string
    	roleArn := args.GetRoleArn()
    
    	switch {
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Oct 29 16:01:48 UTC 2024
    - 74.6K bytes
    - Viewed (0)
Back to top