- Sort Score
- Result 10 results
- Languages All
Results 1 - 9 of 9 for privileges (0.39 sec)
-
cmd/warm-backend.go
Remove(ctx context.Context, object string, rv remoteVersionID) error InUse(ctx context.Context) (bool, error) } const probeObject = "probeobject" // checkWarmBackend checks if tier config credentials have sufficient privileges // to perform all operations defined in the WarmBackend interface. func checkWarmBackend(ctx context.Context, w WarmBackend) error { remoteVersionID, err := w.Put(ctx, probeObject, strings.NewReader("MinIO"), 5)
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Oct 31 22:10:24 UTC 2024 - 4K bytes - Viewed (0) -
docs/en/docs/advanced/behind-a-proxy.md
``` This tells Traefik to listen on port 9999 and to use another file `routes.toml`. /// tip We are using port 9999 instead of the standard HTTP port 80 so that you don't have to run it with admin (`sudo`) privileges. /// Now create that other file `routes.toml`: ```TOML hl_lines="5 12 20" [http] [http.middlewares] [http.middlewares.api-stripprefix.stripPrefix] prefixes = ["/api/v1"]
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 27 16:49:49 UTC 2024 - 11.6K bytes - Viewed (0) -
cmd/iam.go
if parentInClaim != parentUser { return false } } else { // This is needed so a malicious user cannot // use a leaked session key of another user // to widen its privileges. return false } isOwnerDerived := parentUser == globalActiveCred.AccessKey var err error var svcPolicies []string roleArn := args.GetRoleArn() switch {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Oct 29 16:01:48 UTC 2024 - 74.6K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.32.md
granting the caller `nodes/proxy` permission in RBAC but that also grants the caller permissions to exec, run and attach to containers on the nodes and doing so does not follow the least privilege principle. Granting callers more permissions than they need can give attackers an opportunity to escalate privileges. ([#126347](https://github.com/kubernetes/kubernetes/pull/126347), [@vinayakankugoyal](https://github.com/vinayakankugoyal)) [SIG API Machinery, Auth, Cluster Lifecycle and Node] ###...
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Tue Oct 29 20:17:52 UTC 2024 - 121.6K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.29.md
- Added a new `--init-only` command line flag to `kube-proxy`. Setting the flag makes `kube-proxy` perform its initial configuration that requires privileged mode, and then exit. The `--init-only` mode is intended to be executed in a privileged init container, so that the main container may run with a stricter `securityContext`. ([#120864](https://github.com/kubernetes/kubernetes/pull/120864), [@uablrek](https://github.com/uablrek)) [SIG Network...
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Wed Oct 23 04:37:31 UTC 2024 - 375.1K bytes - Viewed (1) -
CHANGELOG/CHANGELOG-1.28.md
- [CVE-2023-3955: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3955-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation) - [CVE-2023-3676: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3676-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation) - [Changes by Kind](#changes-by-kind-14)
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Wed Oct 23 04:34:59 UTC 2024 - 456.9K bytes - Viewed (0) -
.devcontainer/devcontainer.json
{ "name": "istio build-tools", "image": "gcr.io/istio-testing/build-tools:master-c67afcee625a4b91bdde7da65c9867f98248691e", "privileged": true, "remoteEnv": { "USE_GKE_GCLOUD_AUTH_PLUGIN": "True", "BUILD_WITH_CONTAINER": "0", "CARGO_HOME": "/home/.cargo", "RUSTUP_HOME": "/home/.rustup" }, "features": { "ghcr.io/devcontainers/features/docker-outside-of-docker:1": {}, "ghcr.io/mpriscella/features/kind:1": {} },
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Wed Nov 06 04:52:54 UTC 2024 - 879 bytes - Viewed (0) -
docs/pt/docs/advanced/behind-a-proxy.md
``` Isso diz ao Traefik para escutar na porta 9999 e usar outro arquivo `routes.toml`. /// tip | "Dica" Estamos usando a porta 9999 em vez da porta padrão HTTP 80 para que você não precise executá-lo com privilégios de administrador (`sudo`). /// Agora crie esse outro arquivo `routes.toml`: ```TOML hl_lines="5 12 20" [http] [http.middlewares] [http.middlewares.api-stripprefix.stripPrefix]
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 27 15:28:18 UTC 2024 - 12.2K bytes - Viewed (0) -
src/cmd/asm/internal/asm/testdata/riscv64.s
BINV X30, X5, X6 // 3393e269 BINV $63, X6 // 1313f36b BINVI $1, X7, X8 // 13941368 BSET X8, X9, X10 // 33958428 BSET $63, X9 // 9394f42b BSETI $1, X10, X11 // 93151528 // // Privileged ISA // // 3.3.1: Environment Call and Breakpoint ECALL // 73000000 SCALL // 73000000 EBREAK // 73001000 SBREAK // 73001000
Registered: Tue Nov 05 11:13:11 UTC 2024 - Last Modified: Fri Oct 25 12:05:29 UTC 2024 - 16.8K bytes - Viewed (0)