Search Options

Results per page
Sort
Preferred Languages
Advance

Results 101 - 110 of 110 for authorizer (0.78 sec)

  1. cmd/object-handlers.go

    					}
    				}
    				if reader != nil && proxy.Proxy && perr == nil {
    					gr = reader
    				}
    			}
    		}
    		if reader == nil || !proxy.Proxy {
    			// validate if the request indeed was authorized, if it wasn't we need to return "ErrAccessDenied"
    			// instead of any namespace related error.
    			if s3Error := authorizeRequest(ctx, r, policy.GetObjectAction); s3Error != ErrNone {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sun Sep 07 16:13:09 UTC 2025
    - 120.6K bytes
    - Viewed (0)
  2. CHANGELOG/CHANGELOG-1.33.md

    object by patching themselves with an OwnerReference to a cluster-scoped resource. If the OwnerReference resource does not exist or is subsequently deleted, the given node object will be deleted via garbage collection. By default, node users are authorized for create and patch requests but not delete requests against their node object. Since the NodeRestriction admission controller does not prevent patching OwnerReferences, a compromised node could leverage this vulnerability to delete and then recreate...
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Wed Aug 13 19:46:23 UTC 2025
    - 294.3K bytes
    - Viewed (0)
  3. okhttp/src/jvmTest/kotlin/okhttp3/URLConnectionTest.kt

        server.enqueue(MockResponse(body = "this response comes via HTTPS"))
        server.enqueue(MockResponse(body = "another response via HTTPS"))
    
        // install a custom SSL socket factory so the server can be authorized
        client =
          client
            .newBuilder()
            .sslSocketFactory(
              handshakeCertificates.sslSocketFactory(),
              handshakeCertificates.trustManager,
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Sat Jun 21 20:36:35 UTC 2025
    - 133.2K bytes
    - Viewed (0)
  4. CHANGELOG/CHANGELOG-1.29.md

    - Fixed an issue where the `vsphere` cloud provider would not trust a certificate if:
      - The issuer of the certificate was unknown (`x509.UnknownAuthorityError`)
      - The requested name did not match the set of authorized names (`x509.HostnameError`)
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Wed Mar 12 00:36:01 UTC 2025
    - 429.6K bytes
    - Viewed (1)
  5. CHANGELOG/CHANGELOG-1.34.md

    Kube-apiserver: Added support for disabling caching of authorization webhook decisions in the `--authorization-config` file. The new fields `cacheAuthorizedRequests` and `cacheUnauthorizedRequests` could be set to `false` to prevent caching for authorized or unauthorized requests. See the https://kubernetes.io/docs/reference/access-authn-authz/authorization/#using-configuration-file-for-authorization for more details. ([#129237](https://github.com/kubernetes/kubernetes/pull/129237), [@rfranzke](...
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Wed Aug 27 10:36:10 UTC 2025
    - 292.8K bytes
    - Viewed (0)
  6. CHANGELOG/CHANGELOG-1.25.md

    ### CVE-2022-3162: Unauthorized read of Custom Resources
    
    A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read.
    
    **Affected Versions**:
      - kube-apiserver v1.25.0 - v1.25.3
      - kube-apiserver v1.24.0 - v1.24.7
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Mon May 06 09:23:20 UTC 2024
    - 419.1K bytes
    - Viewed (0)
  7. CHANGELOG/CHANGELOG-1.12.md

    - LimitRange and Endpoints resources can be created via an update API call if the object does not already exist. When this occurs, an authorization check is now made to ensure the user making the API call is authorized to create the object. In previous releases, only an update authorization check was performed. ([#65150](https://github.com/kubernetes/kubernetes/pull/65150), [@jennybuckley](https://github.com/jennybuckley))
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Thu Feb 06 06:04:15 UTC 2020
    - 293.8K bytes
    - Viewed (0)
  8. CHANGELOG/CHANGELOG-1.23.md

    ### CVE-2022-3162: Unauthorized read of Custom Resources
    
    A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read.
    
    **Affected Versions**:
      - kube-apiserver v1.25.0 - v1.25.3
      - kube-apiserver v1.24.0 - v1.24.7
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Tue Feb 28 21:06:52 UTC 2023
    - 424.5K bytes
    - Viewed (0)
  9. CHANGELOG/CHANGELOG-1.24.md

    ### CVE-2022-3162: Unauthorized read of Custom Resources
    
    A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read.
    
    **Affected Versions**:
      - kube-apiserver v1.25.0 - v1.25.3
      - kube-apiserver v1.24.0 - v1.24.7
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Thu Aug 24 00:02:43 UTC 2023
    - 473.4K bytes
    - Viewed (0)
  10. CHANGELOG/CHANGELOG-1.26.md

    - Fixes an issue where the vsphere cloud provider will not trust a certificate if:
      - The issuer of the certificate is unknown (x509.UnknownAuthorityError)
      - The requested name does not match the set of authorized names (x509.HostnameError)
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Thu Mar 14 16:24:51 UTC 2024
    - 425.7K bytes
    - Viewed (0)
Back to top