Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 12 for enforcement (0.14 sec)

  1. CODE_OF_CONDUCT.md

    representative at an online or offline event.
    
    ## Enforcement
    
    Instances of abusive, harassing, or otherwise unacceptable behavior may be
    reported to the community leaders responsible for enforcement at
    .
    All complaints will be reviewed and investigated promptly and fairly.
    
    All community leaders are obligated to respect the privacy and security of the
    reporter of any incident.
    
    ## Enforcement Guidelines
    
    Registered: Sun Nov 03 09:35:10 UTC 2024
    - Last Modified: Thu Oct 17 06:18:13 UTC 2024
    - 5K bytes
    - Viewed (0)
  2. internal/auth/credentials.go

    	accessKeyMinLen = 3
    
    	// Maximum length for MinIO access key.
    	// There is no max length enforcement for access keys
    	accessKeyMaxLen = 20
    
    	// Minimum length for MinIO secret key for both server
    	secretKeyMinLen = 8
    
    	// Maximum secret key length for MinIO, this
    	// is used when autogenerating new credentials.
    	// There is no max length enforcement for secret keys
    	secretKeyMaxLen = 40
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue May 28 17:14:16 UTC 2024
    - 12K bytes
    - Viewed (0)
  3. architecture/ambient/ztunnel.md

    This is fairly straightforward.
    
    First, we need to check that this traffic is allowed.
    Traffic may be denied by RBAC policies (especially from a `STRICT` mode enforcement, which denies plaintext traffic).
    
    If it is allowed, we will forward to the target destination.
    
    #### Hairpin
    
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Wed Jul 17 23:10:17 UTC 2024
    - 16.8K bytes
    - Viewed (0)
  4. cmd/config-current.go

    			Description: "enable Identity Plugin via external hook",
    		},
    		config.HelpKV{
    			Key:         config.PolicyPluginSubSys,
    			Description: "enable Access Management Plugin for policy enforcement",
    		},
    		config.HelpKV{
    			Key:             config.LoggerWebhookSubSys,
    			Description:     "send server logs to webhook endpoints",
    			MultipleTargets: true,
    		},
    		config.HelpKV{
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Sep 03 18:23:41 UTC 2024
    - 30.1K bytes
    - Viewed (0)
  5. README.md

       between services in the cluster and from a service to external
       services. The proxies form a _secure microservice mesh_ providing a rich
       set of functions like discovery, rich layer-7 routing, circuit breakers,
       policy enforcement and telemetry recording/reporting
       functions.
    
      > Note: The service mesh is not an overlay network. It
      > simplifies and enhances how microservices in an application talk to each
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Wed Oct 30 22:38:34 UTC 2024
    - 6.8K bytes
    - Viewed (0)
  6. cmd/admin-handlers-users_test.go

    	c.assertSvcAccInfoQueryable(ctx, userAdmClient, accessKey, cr.AccessKey, false)
    
    	// 3. Check S3 access
    	c.assertSvcAccS3Access(ctx, s, cr, bucket)
    
    	// Check that session policies do not apply - as policy enforcement is
    	// delegated to plugin.
    	{
    		svcAK, svcSK := mustGenerateCredentials(c)
    
    		// This policy does not allow listing objects.
    		policyBytes := []byte(fmt.Sprintf(`{
     "Version": "2012-10-17",
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sun Sep 22 00:33:43 UTC 2024
    - 47.3K bytes
    - Viewed (0)
  7. src/cmd/cgo/doc.go

    entirely using GODEBUG=cgocheck=0. Complete checking of pointer
    handling, at some cost in run time, is available by setting
    GOEXPERIMENT=cgocheck2 at build time.
    
    It is possible to defeat this enforcement by using the unsafe package,
    and of course there is nothing stopping the C code from doing anything
    it likes. However, programs that break these rules are likely to fail
    in unexpected and unpredictable ways.
    
    Registered: Tue Nov 05 11:13:11 UTC 2024
    - Last Modified: Tue Oct 01 22:52:54 UTC 2024
    - 44K bytes
    - Viewed (0)
  8. CHANGELOG/CHANGELOG-1.32.md

    ## Changelog since v1.32.0-alpha.2
    
    ## Changes by Kind
    
    ### API Change
    
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Tue Oct 29 20:17:52 UTC 2024
    - 121.6K bytes
    - Viewed (0)
  9. cmd/sts-handlers_test.go

    	// it is denied by the plugin.
    	c.mustNotUpload(ctx, s.getUserClient(c, cr.AccessKey, cr.SecretKey, ""), bucket)
    
    	// Check that session policies do not apply - as policy enforcement is
    	// delegated to plugin.
    	{
    		svcAK, svcSK := mustGenerateCredentials(c)
    
    		// This policy does not allow listing objects.
    		policyBytes := []byte(fmt.Sprintf(`{
     "Version": "2012-10-17",
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Oct 10 23:40:37 UTC 2024
    - 97.1K bytes
    - Viewed (0)
  10. CHANGELOG/CHANGELOG-1.27.md

      Added `validationActions` to `ValidatingAdmissionPolicyBinding`, enabling validation failures to be handled by any combination of the warn, audit and deny enforcement actions. ([#115973](https://github.com/kubernetes/kubernetes/pull/115973), [@jpbetz](https://github.com/jpbetz))
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Wed Jul 17 07:48:22 UTC 2024
    - 466.3K bytes
    - Viewed (1)
Back to top