- Sort Score
- Result 10 results
- Languages All
Results 71 - 80 of 90 for authorizers (0.1 sec)
-
CHANGELOG/CHANGELOG-1.32.md
- Kube-apiserver: Promoted `AuthorizeWithSelectors` feature to beta, which includes field and label selector information from requests in webhook authorization calls. Promoted `AuthorizeNodeWithSelectors` feature to beta, which changes node authorizer behavior to limit requests from node API clients, so that each Node can only get / list / watch its own Node API object, and can also only get / list / watch Pod API objects bound to that node. Clients using kubelet credentials to read other nodes...
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Tue Oct 29 20:17:52 UTC 2024 - 121.6K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.18.md
- Improves performance of the node authorizer ([#87696](https://github.com/kubernetes/kubernetes/pull/87696), [@liggitt](https://github.com/liggitt)) [SIG Auth]
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Wed Jun 16 17:18:28 UTC 2021 - 373.2K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.10.md
[API Aggregation](https://github.com/kubernetes/enhancements/issues/263) has been upgraded to "stable" in Kubernetes 1.10, so you can use it in production. Webhooks have seen numerous improvements, including alpha [Support for self-hosting authorizer webhooks](https://github.com/kubernetes/enhancements/issues/516). ### Auth
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Thu May 05 13:44:43 UTC 2022 - 341.8K bytes - Viewed (0) -
apache-maven/src/main/appended-resources/licenses/CDDL+GPLv2-with-classpath-exception.txt
OTHER CONTRIBUTOR) ASSUME THE COST OF ANY NECESSARY SERVICING, REPAIR OR CORRECTION. THIS DISCLAIMER OF WARRANTY CONSTITUTES AN ESSENTIAL PART OF THIS LICENSE. NO USE OF ANY COVERED SOFTWARE IS AUTHORIZED HEREUNDER EXCEPT UNDER THIS DISCLAIMER. 6. TERMINATION. 6.1. This License and the rights granted hereunder will terminate automatically if You fail to comply with terms herein and fail to
Registered: Sun Nov 03 03:35:11 UTC 2024 - Last Modified: Fri May 17 19:14:22 UTC 2024 - 38.5K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.27.md
- Added authorization check support to the CEL expressions of ValidatingAdmissionPolicy via a `authorizer`
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Wed Jul 17 07:48:22 UTC 2024 - 466.3K bytes - Viewed (0) -
cmd/api-errors.go
Description: "The service is unavailable. Please retry.", HTTPStatusCode: http.StatusServiceUnavailable, }, ErrUnauthorizedAccess: { Code: "UnauthorizedAccess", Description: "You are not authorized to perform this operation", HTTPStatusCode: http.StatusUnauthorized, }, ErrExpressionTooLong: { Code: "ExpressionTooLong",
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Oct 01 22:13:18 UTC 2024 - 92.1K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.31.md
adds an alpha AuthorizeNodeWithSelectors feature that makes the node authorizer limit requests from node API clients to get / list / watch its own Node API object, and to get / list / watch its own Pod API objects. Clients using kubelet credentials to read other nodes or unrelated pods must change their authentication credentials (recommended), adjust their usage, or grant broader read access independent of the node authorizer. ([#125571](https://github.com/kubernetes/kubernetes/pull/125571), [@...
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Wed Oct 23 12:18:32 UTC 2024 - 315.4K bytes - Viewed (0) -
okhttp/src/test/java/okhttp3/URLConnectionTest.kt
server.enqueue(MockResponse(body = "this response comes via HTTPS")) server.enqueue(MockResponse(body = "another response via HTTPS")) // install a custom SSL socket factory so the server can be authorized client = client.newBuilder() .sslSocketFactory( handshakeCertificates.sslSocketFactory(), handshakeCertificates.trustManager, )
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Sat Jan 20 10:30:28 UTC 2024 - 131.7K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.22.md
### CVE-2022-3162: Unauthorized read of Custom Resources A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read. **Affected Versions**: - kube-apiserver v1.25.0 - v1.25.3 - kube-apiserver v1.24.0 - v1.24.7
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Tue Dec 13 12:43:45 UTC 2022 - 454.1K bytes - Viewed (0) -
cmd/object-handlers.go
} } if reader != nil && proxy.Proxy && perr == nil { gr = reader } } } if reader == nil || !proxy.Proxy { // validate if the request indeed was authorized, if it wasn't we need to return "ErrAccessDenied" // instead of any namespace related error. if s3Error := authorizeRequest(ctx, r, policy.GetObjectAction); s3Error != ErrNone {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sat Oct 05 05:16:15 UTC 2024 - 117.4K bytes - Viewed (0)