- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 28 for enforcement (0.17 sec)
-
CODE_OF_CONDUCT.md
representative at an online or offline event. ## Enforcement Instances of abusive, harassing, or otherwise unacceptable behavior may be reported to the community leaders responsible for enforcement at . All complaints will be reviewed and investigated promptly and fairly. All community leaders are obligated to respect the privacy and security of the reporter of any incident. ## Enforcement Guidelines
Registered: Sun Nov 03 09:35:10 UTC 2024 - Last Modified: Thu Oct 17 06:18:13 UTC 2024 - 5K bytes - Viewed (0) -
code_of_conduct.md
address, posting via an official social media account, or acting as an appointed representative at an online or offline event. Representation of a project may be further defined and clarified by project maintainers. ## Enforcement Instances of abusive, harassing, or otherwise unacceptable behavior may be reported by contacting the project team at ******@****.***. The project team
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Mon Jan 20 18:38:58 UTC 2020 - 3.5K bytes - Viewed (0) -
internal/auth/credentials.go
accessKeyMinLen = 3 // Maximum length for MinIO access key. // There is no max length enforcement for access keys accessKeyMaxLen = 20 // Minimum length for MinIO secret key for both server secretKeyMinLen = 8 // Maximum secret key length for MinIO, this // is used when autogenerating new credentials. // There is no max length enforcement for secret keys secretKeyMaxLen = 40
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue May 28 17:14:16 UTC 2024 - 12K bytes - Viewed (0) -
docs/iam/access-management-plugin.md
## Configuration Access Management Plugin can be configured with environment variables: ```sh $ mc admin config set myminio policy_plugin --env KEY: policy_plugin enable Access Management Plugin for policy enforcement ARGS: MINIO_POLICY_PLUGIN_URL* (url) plugin hook endpoint (HTTP(S)) e.g. "http://localhost:8181/v1/data/httpapi/authz/allow"
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Dec 13 22:28:48 UTC 2022 - 4.4K bytes - Viewed (0) -
CODE_OF_CONDUCT.md
Violations of the Code of Conduct can occur in any setting, even those unrelated to the project. We will only consider complaints about conduct that has occurred within one year of the report. ## Enforcement
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Fri Feb 05 18:43:16 UTC 2021 - 5.2K bytes - Viewed (0) -
architecture/ambient/ztunnel.md
This is fairly straightforward. First, we need to check that this traffic is allowed. Traffic may be denied by RBAC policies (especially from a `STRICT` mode enforcement, which denies plaintext traffic). If it is allowed, we will forward to the target destination. #### Hairpin
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Wed Jul 17 23:10:17 UTC 2024 - 16.8K bytes - Viewed (0) -
cmd/config-current.go
Description: "enable Identity Plugin via external hook", }, config.HelpKV{ Key: config.PolicyPluginSubSys, Description: "enable Access Management Plugin for policy enforcement", }, config.HelpKV{ Key: config.LoggerWebhookSubSys, Description: "send server logs to webhook endpoints", MultipleTargets: true, }, config.HelpKV{
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Sep 03 18:23:41 UTC 2024 - 30.1K bytes - Viewed (0) -
README.md
between services in the cluster and from a service to external services. The proxies form a _secure microservice mesh_ providing a rich set of functions like discovery, rich layer-7 routing, circuit breakers, policy enforcement and telemetry recording/reporting functions. > Note: The service mesh is not an overlay network. It > simplifies and enhances how microservices in an application talk to each
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Wed Oct 30 22:38:34 UTC 2024 - 6.8K bytes - Viewed (0) -
guava/src/com/google/common/util/concurrent/CycleDetectingLockFactory.java
return rank.getDeclaringClass().getSimpleName() + "." + rank.name(); } /** * A {@code CycleDetectingLockFactory.WithExplicitOrdering} provides the additional enforcement of * an application-specified ordering of lock acquisitions. The application defines the allowed * ordering with an {@code Enum} whose values each correspond to a lock type. The order in which
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Fri Dec 15 19:31:54 UTC 2023 - 35.9K bytes - Viewed (0) -
common-protos/k8s.io/api/policy/v1beta1/generated.proto
// runtimeClass is the strategy that will dictate the allowable RuntimeClasses for a pod. // If this field is omitted, the pod's runtimeClassName field is unrestricted. // Enforcement of this field depends on the RuntimeClass feature gate being enabled. // +optional optional RuntimeClassStrategyOptions runtimeClass = 24; }
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 19.6K bytes - Viewed (0)