- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 28 for enforcement (0.09 sec)
-
common-protos/k8s.io/api/admissionregistration/v1alpha1/generated.proto
// - binding: The resource name of the ValidatingAdmissionPolicyBinding // - expressionIndex: The index of the failed validations in the ValidatingAdmissionPolicy // - validationActions: The enforcement actions enacted for the validation failure // Example audit annotation:
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 25.7K bytes - Viewed (0) -
cmd/admin-handlers-users_test.go
c.assertSvcAccInfoQueryable(ctx, userAdmClient, accessKey, cr.AccessKey, false) // 3. Check S3 access c.assertSvcAccS3Access(ctx, s, cr, bucket) // Check that session policies do not apply - as policy enforcement is // delegated to plugin. { svcAK, svcSK := mustGenerateCredentials(c) // This policy does not allow listing objects. policyBytes := []byte(fmt.Sprintf(`{ "Version": "2012-10-17",
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sun Sep 22 00:33:43 UTC 2024 - 47.3K bytes - Viewed (0) -
src/cmd/cgo/doc.go
entirely using GODEBUG=cgocheck=0. Complete checking of pointer handling, at some cost in run time, is available by setting GOEXPERIMENT=cgocheck2 at build time. It is possible to defeat this enforcement by using the unsafe package, and of course there is nothing stopping the C code from doing anything it likes. However, programs that break these rules are likely to fail in unexpected and unpredictable ways.
Registered: Tue Nov 05 11:13:11 UTC 2024 - Last Modified: Tue Oct 01 22:52:54 UTC 2024 - 44K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.32.md
## Changelog since v1.32.0-alpha.2 ## Changes by Kind ### API Change
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Tue Oct 29 20:17:52 UTC 2024 - 121.6K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.3.md
* Bump GCE ContainerVM to container-v1-3-v20160517 (Docker 1.11.1) ([#25843](https://github.com/kubernetes/kubernetes/pull/25843), [@zmerlynn](https://github.com/zmerlynn)) * AWS: Move enforcement of attached AWS device limit from kubelet to scheduler ([#23254](https://github.com/kubernetes/kubernetes/pull/23254), [@jsafrane](https://github.com/jsafrane))
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Thu Dec 24 02:28:26 UTC 2020 - 84K bytes - Viewed (0) -
cmd/sts-handlers_test.go
// it is denied by the plugin. c.mustNotUpload(ctx, s.getUserClient(c, cr.AccessKey, cr.SecretKey, ""), bucket) // Check that session policies do not apply - as policy enforcement is // delegated to plugin. { svcAK, svcSK := mustGenerateCredentials(c) // This policy does not allow listing objects. policyBytes := []byte(fmt.Sprintf(`{ "Version": "2012-10-17",
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Oct 10 23:40:37 UTC 2024 - 97.1K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.23.md
`PodSecurity` replaces the deprecated `PodSecurityPolicy` admission controller. `PodSecurity` is an admission controller that enforces Pod Security Standards on Pods in a Namespace based on specific namespace labels that set the enforcement level. In 1.23, the `PodSecurity` feature gate is enabled by default. ### Container Runtime Interface (CRI) v1 is default The Kubelet now supports the CRI `v1` API, which is now the project-wide default.
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Tue Feb 28 21:06:52 UTC 2023 - 424.5K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.22.md
- Fix raw block mode CSI `NodePublishVolume` stage miss pod info. ([#99069](https://github.com/kubernetes/kubernetes/pull/99069), [@phantooom](https://github.com/phantooom)) - Fix resource enforcement when using systemd cgroup driver ([#102147](https://github.com/kubernetes/kubernetes/pull/102147), [@kolyshkin](https://github.com/kolyshkin))
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Tue Dec 13 12:43:45 UTC 2022 - 454.1K bytes - Viewed (0) -
cmd/config-versions.go
Compression compress.Config `json:"compress"` // OpenID configuration OpenID openid.Config `json:"openid"` // External policy enforcements. Policy struct { // OPA configuration. OPA opa.Args `json:"opa"` // Add new external policy enforcements here. } `json:"policy"` LDAPServerConfig xldap.LegacyConfig `json:"ldapserverconfig"`
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 2.5K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.15.md
#### Node - The deprecated kubelet security controls `AllowPrivileged`, `HostNetworkSources`, `HostPIDSources`, and `HostIPCSources` have been removed. Enforcement of these restrictions should be done through admission control (such as `PodSecurityPolicy`) instead. ([#77820](https://github.com/kubernetes/kubernetes/pull/77820), [@dims](https://github.com/dims))
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Thu May 05 13:44:43 UTC 2022 - 278.9K bytes - Viewed (0)