- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 31 for read (0.04 sec)
-
common-protos/k8s.io/api/core/v1/generated.proto
// cachingMode is the Host Caching mode: None, Read Only, Read Write. // +optional optional string cachingMode = 3; // fsType is Filesystem type to mount. // Must be a filesystem type supported by the host operating system. // Ex. "ext4", "xfs", "ntfs". Implicitly inferred to be "ext4" if unspecified. // +optional optional string fsType = 4; // readOnly Defaults to false (read/write). ReadOnly here will force
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 255.8K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.17.md
- [Node binaries](#node-binaries-7) - [Changelog since v1.17.8](#changelog-since-v1178) - [Urgent Upgrade Notes](#urgent-upgrade-notes) - [(No, really, you MUST read this before you upgrade)](#no-really-you-must-read-this-before-you-upgrade) - [Changes by Kind](#changes-by-kind-8) - [Bug or Regression](#bug-or-regression-7) - [Dependencies](#dependencies-8) - [Added](#added-8)
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Thu Jan 28 10:44:33 UTC 2021 - 346.2K bytes - Viewed (1) -
CHANGELOG/CHANGELOG-1.21.md
- The e2e suite can be instructed not to wait for pods in kube-system to be ready or for all nodes to be ready by passing `--allowed-not-ready-nodes=-1` when invoking the e2e.test program. This allows callers to run subsets of the e2e suite in scenarios other than perfectly healthy clusters. ([#98781](https://github.com/kubernetes/kubernetes/pull/98781), [@...
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Fri Oct 14 07:03:14 UTC 2022 - 367.3K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.22.md
This release contains changes that address the following vulnerabilities: ### CVE-2022-3162: Unauthorized read of Custom Resources A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read. **Affected Versions**: - kube-apiserver v1.25.0 - v1.25.3
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Tue Dec 13 12:43:45 UTC 2022 - 454.1K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.31.md
- [Container Images](#container-images-2) - [Changelog since v1.30.0](#changelog-since-v1300) - [Urgent Upgrade Notes](#urgent-upgrade-notes) - [(No, really, you MUST read this before you upgrade)](#no-really-you-must-read-this-before-you-upgrade) - [Changes by Kind](#changes-by-kind-2) - [Deprecation](#deprecation-1) - [API Change](#api-change-1) - [Feature](#feature-2) - [Failing Test](#failing-test)
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Wed Oct 23 12:18:32 UTC 2024 - 315.4K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.24.md
### CVE-2022-3162: Unauthorized read of Custom Resources A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read. **Affected Versions**: - kube-apiserver v1.25.0 - v1.25.3
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Thu Aug 24 00:02:43 UTC 2023 - 473.4K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.18.md
- [Node binaries](#node-binaries-12) - [Changelog since v1.18.5](#changelog-since-v1185) - [Urgent Upgrade Notes](#urgent-upgrade-notes) - [(No, really, you MUST read this before you upgrade)](#no-really-you-must-read-this-before-you-upgrade) - [Changes by Kind](#changes-by-kind-13) - [API Change](#api-change-2) - [Bug or Regression](#bug-or-regression-12) - [Dependencies](#dependencies-14)
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Wed Jun 16 17:18:28 UTC 2021 - 373.2K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.23.md
This release contains changes that address the following vulnerabilities: ### CVE-2022-3162: Unauthorized read of Custom Resources A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read. **Affected Versions**: - kube-apiserver v1.25.0 - v1.25.3
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Tue Feb 28 21:06:52 UTC 2023 - 424.5K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.29.md
- [Container Images](#container-images-10) - [Changelog since v1.28.0](#changelog-since-v1280) - [Urgent Upgrade Notes](#urgent-upgrade-notes) - [(No, really, you MUST read this before you upgrade)](#no-really-you-must-read-this-before-you-upgrade) - [Changes by Kind](#changes-by-kind-10) - [Deprecation](#deprecation) - [API Change](#api-change-3) - [Feature](#feature-8)
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Wed Oct 23 04:37:31 UTC 2024 - 375.1K bytes - Viewed (1) -
CHANGELOG/CHANGELOG-1.9.md
### **API Machinery** * The kube-apiserver `--etcd-quorum-read` flag is deprecated and the ability to switch off quorum read will be removed in a future release. ([#53795](https://github.com/kubernetes/kubernetes/pull/53795),[ @xiangpengzhao](https://github.com/xiangpengzhao))
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Tue Nov 16 10:46:27 UTC 2021 - 313.7K bytes - Viewed (0)