- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 1,308 for outo (0.04 sec)
-
pilot/pkg/xds/testdata/benchmarks/auto.yaml
apiVersion: networking.istio.io/v1alpha3 kind: ServiceEntry metadata: name: proxy-service-instance spec: hosts: - example.com ports: - number: 7070 name: auto protocol: "" resolution: STATIC location: MESH_INTERNAL endpoints: - address: 1.1.1.1 labels: security.istio.io/tlsMode: istio --- # Set up .Services number of services.
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sat Jul 29 02:10:48 UTC 2023 - 908 bytes - Viewed (0) -
src/internal/zstd/literals.go
if err != nil { return nil, err } outbuf[out4] = byte(t4 >> 8) out4++ rbr4.cnt -= uint32(t4 & 0xff) } outbuf[out1] = byte(t1 >> 8) out1++ rbr1.cnt -= uint32(t1 & 0xff) outbuf[out2] = byte(t2 >> 8) out2++ rbr2.cnt -= uint32(t2 & 0xff) outbuf[out3] = byte(t3 >> 8) out3++ rbr3.cnt -= uint32(t3 & 0xff) } return outbuf, nil
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu Nov 09 14:30:10 UTC 2023 - 8.8K bytes - Viewed (0) -
internal/crypto/auto-encryption.go
package crypto import ( "github.com/minio/minio/internal/config" "github.com/minio/pkg/v3/env" ) const ( // EnvKMSAutoEncryption is the environment variable used to en/disable // SSE-S3 auto-encryption. SSE-S3 auto-encryption, if enabled, // requires a valid KMS configuration and turns any non-SSE-C // request into an SSE-S3 request. // If present EnvAutoEncryption must be either "on" or "off".
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 1.4K bytes - Viewed (0) -
pkg/config/analysis/analyzers/injection/image-auto.go
"istio.io/istio/pkg/config/schema/gvk" ) // ImageAutoAnalyzer reports an error if Pods and Deployments with `image: auto` are not going to be injected. type ImageAutoAnalyzer struct{} var _ analysis.Analyzer = &ImageAutoAnalyzer{} const ( istioProxyContainerName = "istio-proxy" manualInjectionImage = "auto" ) // Metadata implements Analyzer. func (a *ImageAutoAnalyzer) Metadata() analysis.Metadata {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Mar 01 01:34:15 UTC 2023 - 4K bytes - Viewed (0) -
platforms/documentation/docs/src/snippets/java/toolchain-filters/tests/matchingVendorWithCC.out
> No locally installed toolchains match and toolchain auto-provisioning is not enabled....
Registered: Wed Jun 12 18:38:38 UTC 2024 - Last Modified: Sun Jan 21 03:08:51 UTC 2024 - 513 bytes - Viewed (0) -
platforms/documentation/docs/src/snippets/java/toolchain-filters/tests/matchingVendorWithoutCC.out
> No locally installed toolchains match and toolchain auto-provisioning is not enabled....
Registered: Wed Jun 12 18:38:38 UTC 2024 - Last Modified: Sun Jan 21 03:08:51 UTC 2024 - 513 bytes - Viewed (0) -
releasenotes/notes/auto-passthrough-regression.yaml
apiVersion: release-notes/v2 kind: bug-fix area: traffic-management releaseNotes: - | **Fixed** auto-passthrough gateways not getting XDS pushes on service updates
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Jan 09 16:25:50 UTC 2023 - 228 bytes - Viewed (0) -
releasenotes/notes/auto-san-validation.yaml
apiVersion: release-notes/v2 kind: bug-fix area: security releaseNotes: - |
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sun Dec 17 08:16:47 UTC 2023 - 196 bytes - Viewed (0) -
.github/workflows/auto-assign-pr-to-author.yml
name: 'Auto Assign PR to Author' on: pull_request: types: [opened] permissions: {} jobs: add-reviews: permissions: contents: read # for kentaro-m/auto-assign-action to fetch config file pull-requests: write # for kentaro-m/auto-assign-action to assign PR reviewers runs-on: ubuntu-latest steps:
Registered: Wed Jun 12 18:38:38 UTC 2024 - Last Modified: Thu May 02 09:13:16 UTC 2024 - 381 bytes - Viewed (0) -
releasenotes/notes/enable-auto-sni.yaml
- title: Default value of the feature flag `ENABLE_AUTO_SNI` to true content: | [auto_sni](https://www.envoyproxy.io/docs/envoy/latest/api-v3/config/core/v3/protocol.proto#envoy-v3-api-field-config-core-v3-upstreamhttpprotocoloptions-auto-sni) is enabled by default. This means SNI will be set automatically based on the downstream HTTP host/authority header if `DestinationRule` does not explicitly set the same.
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jan 24 15:53:10 UTC 2024 - 691 bytes - Viewed (0)