September 22, 2017 | ||
---|---|---|
View ddae20c
Update libcontainerd to use containerd 1.0Kenfe-Mickael Laventure authored on 2017/09/22 22:52:41 |
March 18, 2017 | ||
---|---|---|
View 38de272
When authz plugin is disabled, remove from authz middleware chain.Anusha Ragunathan authored on 2017/03/18 06:57:23 |
December 20, 2016 | ||
---|---|---|
View 4286001
plugingetter: Avoid all caps for constant declarationsAaron Lehmann authored on 2016/12/20 11:18:43 |
November 3, 2016 | ||
---|---|---|
View a64fc8e
Revert "Update authz plugin list on failure."Riyaz Faizullabhoy authored on 2016/11/03 06:29:40 |
October 27, 2016 | ||
---|---|---|
View fae904a
Update authz plugin list on failure.Anusha Ragunathan authored on 2016/10/27 08:29:48 |
October 8, 2016 | ||
---|---|---|
View c5393ee
Make authorization plugins use pluginv2.Anusha Ragunathan authored on 2016/10/08 06:53:17 |
June 13, 2016 | ||
---|---|---|
View ceb9c5a
pkg: authorization: lock when lazy loadingAntonio Murdaca authored on 2016/06/13 00:19:43 |
May 17, 2016 | ||
---|---|---|
View 4192fe9
Enable to dynamically reload authorization plugins via daemon.configLiron Levin authored on 2016/05/17 03:12:48 |
||
View f371170
plugins: experimental support for new plugin managementTibor Vass authored on 2016/05/17 00:50:55 |
May 4, 2016 | ||
---|---|---|
View 3f77baf
fix typosallencloud authored on 2016/05/04 00:12:38 |
December 21, 2015 | ||
---|---|---|
View c28fc06
pkg: authorization: do not register the same pluginAntonio Murdaca authored on 2015/12/21 03:44:01 |
December 18, 2015 | ||
---|---|---|
View 5a64c80
authZ: more fixesAntonio Murdaca authored on 2015/12/18 20:34:19 |
December 16, 2015 | ||
---|---|---|
View 8435ea5
pkg: authorization: cleanupAntonio Murdaca authored on 2015/12/16 20:01:04 |
November 12, 2015 | ||
---|---|---|
View 75c353f
Docker authorization plug-in infrastructure enables extending the functionality of the Docker daemon with respect to user authorization. The infrastructure enables registering a set of external authorization plug-in. Each plug-in receives information about the user and the request and decides whether to allow or deny the request. Only in case all plug-ins allow accessing the resource the access is granted.Liron Levin authored on 2015/11/12 20:06:47 |