- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 25 for rels (0.32 seconds)
-
fess-crawler/src/main/resources/org/codelibs/fess/crawler/mime/tika-mimetypes.xml
<sub-class-of type="application/zip"/> <!-- Only works if the Content Types or rels file is the first zip entry --> <magic priority="50"> <match value="PK\003\004" type="string" offset="0"> <match value="[Content_Types].xml" type="string" offset="30"/> <match value="_rels/.rels" type="string" offset="30"/> </match> </magic> </mime-type>Created: Sat Dec 20 11:21:39 GMT 2025 - Last Modified: Thu Oct 16 07:46:32 GMT 2025 - 320.2K bytes - Click Count (5) -
CHANGELOG/CHANGELOG-1.12.md
- To address the possibility of dry-run requests overwhelming admission webhooks that rely on side effects and a reconciliation mechanism, a new field is being added to `admissionregistration.k8s.io/v1beta1.ValidatingWebhookConfiguration` and `admissionregistration.k8s.io/v1beta1.MutatingWebhookConfiguration` so that webhooks can explicitly...
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Thu Feb 06 06:04:15 GMT 2020 - 293.8K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.23.md
If CSI Migration is working properly, Kubernetes end users shouldn’t notice a difference. After migration, Kubernetes users may continue to rely on all the functionality of in-tree storage plugins using the existing interface. - CSI Migration feature is turned on by default but stays in Beta for GCE PD, AWS EBS, and Azure Disk in 1.23.
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Tue Feb 28 21:06:52 GMT 2023 - 424.5K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.18.md
by this vulnerability if you run a Validating Admission Webhook for Nodes that denies admission based at least partially on the old state of the Node object. **Note**: This only impacts validating admission plugins that rely on old values in certain fields, and does not impact calls from kubelets that go through the built-in NodeRestriction admission plugin. **Affected Versions**: - kube-apiserver v1.20.0 - v1.20.5
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Wed Jun 16 17:18:28 GMT 2021 - 373.2K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.11.md
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Thu Feb 06 06:04:15 GMT 2020 - 328.4K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.34.md
- Pods were not allowed to mix the usage of `user-namespaces` (`hostUsers: false`) and `volumeDevices`....
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Wed Dec 10 01:13:50 GMT 2025 - 333.3K bytes - Click Count (2) -
CHANGELOG/CHANGELOG-1.14.md
* Ensures the conformance test image saves results before exiting when ginkgo returns non-zero value. ([#76039](https://github.com/kubernetes/kubernetes/pull/76039), [@johnSchnake](https://github.com/johnSchnake)) * GCE Windows nodes will rely solely on kubernetes and kube-proxy (and not the GCE agent) for network address management. ([#75855](https://github.com/kubernetes/kubernetes/pull/75855), [@pjh](https://github.com/pjh))
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Mon Jun 14 22:06:39 GMT 2021 - 271.5K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.22.md
- Conformance image is now built with Distroless. Users running Conformance testing should rely on container entrypoint instead of manual invocation to `/run_e2e.sh` or `/gorunner`, as they are now deprecated and will be removed in 1.25 release. Invoking `ginkgo` and `e2e.test` are still supported through overriding entrypoint (docker) or defining...
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Tue Dec 13 12:43:45 GMT 2022 - 454.1K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.17.md
- Kubeadm no longer removes /etc/cni/net.d as it does not install it. Users should remove files from it manually or rely on the component that created them ([#83950](https://github.com/kubernetes/kubernetes/pull/83950), [@yastij](https://github.com/yastij))
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Thu Jan 28 10:44:33 GMT 2021 - 346.2K bytes - Click Count (1) -
doc/go_spec.html
computed modulo 2<sup><i>n</i></sup>, where <i>n</i> is the bit width of the unsigned integer's type. Loosely speaking, these unsigned integer operations discard high bits upon overflow, and programs may rely on "wrap around". </p> <p> For signed integers, the operations <code>+</code>, <code>-</code>, <code>*</code>, <code>/</code>, and <code><<</code> may legally
Created: Tue Dec 30 11:13:12 GMT 2025 - Last Modified: Tue Dec 02 23:07:19 GMT 2025 - 286.5K bytes - Click Count (1)