- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 29 for Rrole1 (0.06 seconds)
-
src/main/java/org/codelibs/fess/opensearch/user/cbean/cq/bs/BsUserCQ.java
public void setRoles_Equal(String roles) { setRoles_Term(roles, null); } public void setRoles_Equal(String roles, ConditionOptionCall<TermQueryBuilder> opLambda) { setRoles_Term(roles, opLambda); } public void setRoles_Term(String roles) { setRoles_Term(roles, null); } public void setRoles_Term(String roles, ConditionOptionCall<TermQueryBuilder> opLambda) {Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Sat Mar 15 06:53:53 GMT 2025 - 326.2K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.10.md
as well as hostIPC and hostPID. hostNetwork is also checked to deny exec /attach. ([#56839](https://github.com/kubernetes/kubernetes/pull/56839), [@hzxuzhonghu](https://github.com/hzxuzhonghu)) * When using Role-Based Access Control, the "admin", "edit", and "view" roles now have the expected permissions on NetworkPolicy resources, rather than reserving those permissions to only cluster-admin. ([#56650](https://github.com/kubernetes/kubernetes/pull/56650), [@danwinship](https://github.com/danwinship))...
Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Thu May 05 13:44:43 GMT 2022 - 341.8K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.6.md
Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Thu Dec 24 02:28:26 GMT 2020 - 304K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.9.md
#### **RBAC** * New permissions have been added to default RBAC roles ([#52654](https://github.com/kubernetes/kubernetes/pull/52654),[ @liggitt](https://github.com/liggitt)): * The default admin and edit roles now include read/write permissions * The view role includes read permissions on poddisruptionbudget.policy resources.Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Tue Nov 16 10:46:27 GMT 2021 - 313.7K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.8.md
`settings/v1alpha1`, and `scheduling/v1alpha1` APIs are disabled by default. * The `system:node` role is no longer automatically granted to the `system:nodes` group in new clusters. The role gives broad read access to resources, including secrets and configmaps. Use the `Node` authorization mode to authorize the nodes in new clusters. To continue providing the `system:node` role to the members of the `system:nodes` group, create an installation-specific `ClusterRoleBinding` in the installation....
Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Tue Feb 20 15:45:02 GMT 2024 - 312.2K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.20.md
- The label applied to control-plane nodes "node-role.kubernetes.io/master" is now deprecated and will be removed in a future release after a GA deprecation period. - Introduce a new label "node-role.kubernetes.io/control-plane" that will be applied in parallel to "node-role.kubernetes.io/master" until the removal of the "node-role.kubernetes.io/master" label.
Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Wed Jan 19 21:05:45 GMT 2022 - 409K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.11.md
### SIG Autoscaling * A cluster-autoscaler ClusterRole is added to cover only the functionality required by Cluster Autoscaler and avoid abusing system:cluster-admin role. Cloud providers other than GCE might want to update their deployments or sample yaml files to reuse the role created via add-on. ([#64503](https://github.com/kubernetes/kubernetes/pull/64503), [@kgolab](https://github.com/kgolab)) ### SIG Azure
Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Thu Feb 06 06:04:15 GMT 2020 - 328.4K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.7.md
### kubectl (CLI)
Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Thu May 05 13:44:43 GMT 2022 - 308.7K bytes - Click Count (1) -
CHANGELOG/CHANGELOG-1.24.md
`master` in labels and taints. For new clusters, the label `node-role.kubernetes.io/master` will no longer be added to control plane nodes, only the label `node-role.kubernetes.io/control-plane` will be added. For clusters that are being upgraded to 1.24 with `kubeadm upgrade apply`, the command will remove the label `node-role.kubernetes.io/master` from existing control plane nodes. For new clusters, both the old taint `node-role.kubernetes.io/master:NoSchedule` and new taint `node-role.kuberne...
Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Thu Aug 24 00:02:43 GMT 2023 - 473.4K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.22.md
- The `system:aggregate-to-edit` role no longer includes write access to the Endpoints API. For new Kubernetes 1.22 clusters, the `edit` and `admin` roles will no longer include that access in newly created Kubernetes 1.22 clusters. This will have no affect on existing clusters upgrading to Kubernetes 1.22. To retain write access to Endpoints in the aggregated `edit` and `admin` roles for newly created 1.22 clusters, refer to https://github.com/kubernetes/website/pull/29025....
Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Tue Dec 13 12:43:45 GMT 2022 - 454.1K bytes - Click Count (0)