Search Options

Results per page
Sort
Preferred Languages
Advance

Results 71 - 80 of 89 for Restriction (0.19 sec)

  1. apache-maven/src/main/appended-resources/licenses/CDDL+GPLv2-with-classpath-exception.txt

    want it, that you can change the software or use pieces of it in new
    free programs; and that you know you can do these things.
    
    To protect your rights, we need to make restrictions that forbid anyone
    to deny you these rights or to ask you to surrender the rights. These
    restrictions translate to certain responsibilities for you if you
    distribute copies of the software, or if you modify it.
    
    Registered: Sun Sep 07 03:35:12 UTC 2025
    - Last Modified: Fri May 17 19:14:22 UTC 2024
    - 38.5K bytes
    - Viewed (0)
  2. CHANGELOG/CHANGELOG-1.23.md

    **Detection**:
    
    Kubernetes Audit logs may indicate if the user name was misspelled to bypass the restriction placed on which user is a pod allowed to run as.
    
    If you find evidence that this vulnerability has been exploited, please contact ******@****.***
    
    **Additional Details**:
    
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Tue Feb 28 21:06:52 UTC 2023
    - 424.5K bytes
    - Viewed (0)
  3. CHANGELOG/CHANGELOG-1.10.md

    * Fixed a panic in `kubectl run --attach ...` when the api server failed to create the runtime object (due to name conflict, PSP restriction, etc.) ([#61713](https://github.com/kubernetes/kubernetes/pull/61713), [@mountkin](https://github.com/mountkin))
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Thu May 05 13:44:43 UTC 2022
    - 341.8K bytes
    - Viewed (0)
  4. CHANGELOG/CHANGELOG-1.22.md

    ### Detection
    
    Kubernetes Audit logs may indicate if the user name was misspelled to bypass the restriction placed on which user is a pod allowed to run as.
    
    If you find evidence that this vulnerability has been exploited, please contact ******@****.***
    
    #### Additional Details
    
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Tue Dec 13 12:43:45 UTC 2022
    - 454.1K bytes
    - Viewed (0)
  5. docs/LICENSE

                   receives an offer from the Licensor to exercise the
                   Licensed Rights under the terms and conditions of this
                   Public License.
    
                b. No downstream restrictions. You may not offer or impose
                   any additional or different terms or conditions on, or
                   apply any Effective Technological Measures to, the
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Mon May 10 16:50:06 UTC 2021
    - 18.2K bytes
    - Viewed (0)
  6. okhttp/src/commonJvmAndroid/kotlin/okhttp3/OkHttpClient.kt

        /**
         * Configure a single client scoped listener that will receive all analytic events for this
         * client.
         *
         * @see EventListener for semantics and restrictions on listener implementations.
         */
        fun eventListener(eventListener: EventListener) =
          apply {
            this.eventListenerFactory = eventListener.asFactory()
          }
    
        /**
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Mon May 05 16:01:00 UTC 2025
    - 51.7K bytes
    - Viewed (0)
  7. docs/es/docs/deployment/concepts.md

    Puede haber varios enfoques para lograr esto, y te contaré más sobre estrategias específicas en los próximos capítulos, por ejemplo, al hablar sobre Docker y contenedores.
    
    La principal restricción a considerar es que tiene que haber un **componente único** manejando el **puerto** en la **IP pública**. Y luego debe tener una forma de **transmitir** la comunicación a los **procesos/workers** replicados.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun May 11 13:37:26 UTC 2025
    - 19.3K bytes
    - Viewed (0)
  8. docs/en/docs/deployment/concepts.md

    * Handled internally by a cloud provider as part of their services (read below 👇)
    
    Another option is that you could use a **cloud service** that does more of the work including setting up HTTPS. It could have some restrictions or charge you more, etc. But in that case, you wouldn't have to set up a TLS Termination Proxy yourself.
    
    I'll show you some concrete examples in the next chapters.
    
    ---
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 18.6K bytes
    - Viewed (0)
  9. cmd/bucket-handlers.go

    			errAPI.Description = fmt.Sprintf("%s '(%s)'", errAPI.Description, err)
    			writeErrorResponse(ctx, w, errAPI, r.URL)
    			return
    		}
    
    		// Make sure formValues adhere to policy restrictions.
    		if err = checkPostPolicy(formValues, postPolicyForm); err != nil {
    			writeErrorResponse(ctx, w, errorCodes.ToAPIErrWithErr(ErrAccessDenied, err), r.URL)
    			return
    		}
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 63.9K bytes
    - Viewed (0)
  10. cmd/xl-storage_test.go

    	"io"
    	"net/url"
    	"os"
    	slashpath "path"
    	"runtime"
    	"strings"
    	"syscall"
    	"testing"
    
    	"github.com/google/uuid"
    )
    
    func TestCheckPathLength(t *testing.T) {
    	// Check path length restrictions are not same on windows/darwin
    	if runtime.GOOS == "windows" || runtime.GOOS == "darwin" {
    		t.Skip()
    	}
    
    	testCases := []struct {
    		path        string
    		expectedErr error
    	}{
    		{".", errFileAccessDenied},
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 66K bytes
    - Viewed (0)
Back to top