Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 91 - 100 of 105 for Authorize (0.17 seconds)

  1. CHANGELOG/CHANGELOG-1.31.md

    adds an alpha AuthorizeNodeWithSelectors feature that makes the node authorizer limit requests from node API clients to get / list / watch its own Node API object, and to get / list / watch its own Pod API objects. Clients using kubelet credentials to read other nodes or unrelated pods must change their authentication credentials (recommended), adjust their usage, or grant broader read access independent of the node authorizer. ([#125571](https://github.com/kubernetes/kubernetes/pull/125571), [@...
    Created: Fri Dec 26 09:05:12 GMT 2025
    - Last Modified: Wed Nov 12 11:33:21 GMT 2025
    - 451.9K bytes
    - Click Count (0)
  2. cmd/object-handlers.go

    					}
    				}
    				if reader != nil && proxy.Proxy && perr == nil {
    					gr = reader
    				}
    			}
    		}
    		if reader == nil || !proxy.Proxy {
    			// validate if the request indeed was authorized, if it wasn't we need to return "ErrAccessDenied"
    			// instead of any namespace related error.
    			if s3Error := authorizeRequest(ctx, r, policy.GetObjectAction); s3Error != ErrNone {
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Sun Sep 28 20:59:21 GMT 2025
    - 120.6K bytes
    - Click Count (0)
  3. okhttp/src/jvmTest/kotlin/okhttp3/URLConnectionTest.kt

        server.enqueue(MockResponse(body = "this response comes via HTTPS"))
        server.enqueue(MockResponse(body = "another response via HTTPS"))
    
        // install a custom SSL socket factory so the server can be authorized
        client =
          client
            .newBuilder()
            .sslSocketFactory(
              handshakeCertificates.sslSocketFactory(),
              handshakeCertificates.trustManager,
    Created: Fri Dec 26 11:42:13 GMT 2025
    - Last Modified: Sat Jun 21 20:36:35 GMT 2025
    - 133.2K bytes
    - Click Count (0)
  4. CHANGELOG/CHANGELOG-1.22.md

    ### CVE-2022-3162: Unauthorized read of Custom Resources
    
    A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read.
    
    **Affected Versions**:
      - kube-apiserver v1.25.0 - v1.25.3
      - kube-apiserver v1.24.0 - v1.24.7
    Created: Fri Dec 26 09:05:12 GMT 2025
    - Last Modified: Tue Dec 13 12:43:45 GMT 2022
    - 454.1K bytes
    - Click Count (0)
  5. CHANGELOG/CHANGELOG-1.33.md

    object by patching themselves with an OwnerReference to a cluster-scoped resource. If the OwnerReference resource does not exist or is subsequently deleted, the given node object will be deleted via garbage collection. By default, node users are authorized for create and patch requests but not delete requests against their node object. Since the NodeRestriction admission controller does not prevent patching OwnerReferences, a compromised node could leverage this vulnerability to delete and then recreate...
    Created: Fri Dec 26 09:05:12 GMT 2025
    - Last Modified: Wed Dec 10 01:15:24 GMT 2025
    - 334.8K bytes
    - Click Count (0)
  6. CHANGELOG/CHANGELOG-1.4.md

    * Fix working_set calculation in kubelet ([#29153](https://github.com/kubernetes/kubernetes/pull/29153), [@vishh](https://github.com/vishh))
    * Fix RBAC authorizer of ServiceAccount ([#29071](https://github.com/kubernetes/kubernetes/pull/29071), [@albatross0](https://github.com/albatross0))
    Created: Fri Dec 26 09:05:12 GMT 2025
    - Last Modified: Thu Dec 24 02:28:26 GMT 2020
    - 133.5K bytes
    - Click Count (0)
  7. CHANGELOG/CHANGELOG-1.25.md

    ### CVE-2022-3162: Unauthorized read of Custom Resources
    
    A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read.
    
    **Affected Versions**:
      - kube-apiserver v1.25.0 - v1.25.3
      - kube-apiserver v1.24.0 - v1.24.7
    Created: Fri Dec 26 09:05:12 GMT 2025
    - Last Modified: Mon May 06 09:23:20 GMT 2024
    - 419.1K bytes
    - Click Count (0)
  8. CHANGELOG/CHANGELOG-1.29.md

    - Fixed an issue where the `vsphere` cloud provider would not trust a certificate if:
      - The issuer of the certificate was unknown (`x509.UnknownAuthorityError`)
      - The requested name did not match the set of authorized names (`x509.HostnameError`)
    Created: Fri Dec 26 09:05:12 GMT 2025
    - Last Modified: Wed Mar 12 00:36:01 GMT 2025
    - 429.6K bytes
    - Click Count (1)
  9. CHANGELOG/CHANGELOG-1.34.md

    Kube-apiserver: Added support for disabling caching of authorization webhook decisions in the `--authorization-config` file. The new fields `cacheAuthorizedRequests` and `cacheUnauthorizedRequests` could be set to `false` to prevent caching for authorized or unauthorized requests. See the https://kubernetes.io/docs/reference/access-authn-authz/authorization/#using-configuration-file-for-authorization for more details. ([#129237](https://github.com/kubernetes/kubernetes/pull/129237), [@rfranzke](...
    Created: Fri Dec 26 09:05:12 GMT 2025
    - Last Modified: Wed Dec 10 01:13:50 GMT 2025
    - 333.3K bytes
    - Click Count (2)
  10. CHANGELOG/CHANGELOG-1.12.md

    - LimitRange and Endpoints resources can be created via an update API call if the object does not already exist. When this occurs, an authorization check is now made to ensure the user making the API call is authorized to create the object. In previous releases, only an update authorization check was performed. ([#65150](https://github.com/kubernetes/kubernetes/pull/65150), [@jennybuckley](https://github.com/jennybuckley))
    Created: Fri Dec 26 09:05:12 GMT 2025
    - Last Modified: Thu Feb 06 06:04:15 GMT 2020
    - 293.8K bytes
    - Click Count (0)
Back to Top