- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 16 for Coles (0.13 sec)
-
maven-api-impl/src/test/remote-repo/org/apache/maven/maven/2.0/maven-2.0.pom
<organization>ASF</organization> <roles> <role>PMC Chair</role> </roles> <timezone>-5</timezone> </developer> <developer> <id>brett</id> <name>Brett Porter</name> <email>******@****.***</email> <organization>ASF</organization> <roles> <role>PMC Member</role> </roles> <timezone>+10</timezone> </developer>
Plain Text - Registered: Sun May 05 03:35:11 GMT 2024 - Last Modified: Thu May 02 15:10:38 GMT 2024 - 8.6K bytes - Viewed (0) -
build-logic-commons/basics/src/main/kotlin/gradlebuild.minify.gradle.kts
parameters { keepClassesByArtifact = keepPatterns } } } afterEvaluate { // Without afterEvaluate, configurations.all runs before the configurations' roles are set. // This is yet another reason we need configuration factory methods. configurations.all { if (isCanBeResolved && !isCanBeConsumed) { resolutionStrategy.dependencySubstitution {
Plain Text - Registered: Wed May 08 11:36:15 GMT 2024 - Last Modified: Sat Sep 30 16:17:28 GMT 2023 - 4.2K bytes - Viewed (0) -
common-protos/k8s.io/api/authorization/v1beta1/generated.proto
// It is entirely possible to get an error and be able to continue determine authorization status in spite of it. // For instance, RBAC can be missing a role, but enough roles are still present and bound to reason about the request. // +optional optional string evaluationError = 3; } // SubjectRulesReviewStatus contains the result of a rules check. This check can be incomplete depending on
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Mon Mar 11 18:43:24 GMT 2024 - 11.9K bytes - Viewed (0) -
okhttp/src/test/resources/okhttp3/internal/publicsuffix/public_suffix_list.dat
vps-host.net atl.jelastic.vps-host.net njs.jelastic.vps-host.net ric.jelastic.vps-host.net // Sony Interactive Entertainment LLC : https://sie.com/ // Submitted by David Coles <david.coles@sony.com> playstation-cloud.com // SourceLair PC : https://www.sourcelair.com // Submitted by Antonis Kalipetis <******@****.***> apps.lair.io *.stolos.io
Plain Text - Registered: Fri May 03 11:42:14 GMT 2024 - Last Modified: Wed Dec 20 23:27:07 GMT 2023 - 240.3K bytes - Viewed (3) -
CHANGELOG/CHANGELOG-1.24.md
- `kubectl create token` can now be used to request a service account token, and permission to request service account tokens is added to the `edit` and `admin` RBAC roles ([#107880](https://github.com/kubernetes/kubernetes/pull/107880), [@liggitt](https://github.com/liggitt))
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Thu Aug 24 00:02:43 GMT 2023 - 473.4K bytes - Viewed (0) -
maven-core/src/test/resources/apiv4-repo/commons-logging/commons-logging/1.0.4/commons-logging-1.0.4.pom
<developers> <developer> <id>morgand</id> <name>Morgan Delagrange</name> <email>morgand at apache dot org</email> <organization>Apache</organization> <roles> <role>Java Developer</role> </roles> </developer> <developer> <id>rwaldhoff</id> <name>Rodney Waldhoff</name> <email>rwaldhoff at apache org</email>
Plain Text - Registered: Sun Apr 28 03:35:10 GMT 2024 - Last Modified: Tue Dec 19 19:08:55 GMT 2023 - 5.1K bytes - Viewed (0) -
manifests/charts/README.md
apps may target different 'environments' which contain different instances and variants of Istio. - Better security: separate Istio components reside in different namespaces, allowing different teams or roles to manage different parts of Istio. For example, a security team would maintain the root CA and policy, a telemetry team may only have access to Prometheus,
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Wed Feb 07 17:53:24 GMT 2024 - 6.7K bytes - Viewed (0) -
docs/en/docs/how-to/conditional-openapi.md
If you want to secure your API, there are several better things you can do, for example: * Make sure you have well defined Pydantic models for your request bodies and responses. * Configure any required permissions and roles using dependencies. * Never store plaintext passwords, only password hashes. * Implement and use well-known cryptographic tools, like Passlib and JWT tokens, etc.
Plain Text - Registered: Sun May 05 07:19:11 GMT 2024 - Last Modified: Sat Aug 19 19:54:04 GMT 2023 - 2.3K bytes - Viewed (0) -
common-protos/k8s.io/api/rbac/v1alpha1/generated.proto
repeated RoleBinding items = 2; } // RoleList is a collection of Roles. // Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 RoleList, and will no longer be served in v1.22. message RoleList { // Standard object's metadata. // +optional optional k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1; // Items is a list of Roles repeated Role items = 2; }
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Mon Mar 11 18:43:24 GMT 2024 - 8.5K bytes - Viewed (0) -
common-protos/k8s.io/api/rbac/v1beta1/generated.proto
repeated RoleBinding items = 2; } // RoleList is a collection of Roles // Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 RoleList, and will no longer be served in v1.22. message RoleList { // Standard object's metadata. // +optional optional k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1; // Items is a list of Roles repeated Role items = 2; }
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Mon Mar 11 18:43:24 GMT 2024 - 8.6K bytes - Viewed (0)