Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 31 for Who (0.26 sec)

  1. common-protos/k8s.io/api/rbac/v1/generated.proto

      // +optional
      optional AggregationRule aggregationRule = 3;
    }
    
    // ClusterRoleBinding references a ClusterRole, but not contain it.  It can reference a ClusterRole in the global namespace,
    // and adds who information via Subject.
    message ClusterRoleBinding {
      // Standard object's metadata.
      // +optional
      optional k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1;
    
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Mon Mar 11 18:43:24 GMT 2024
    - 7.6K bytes
    - Viewed (0)
  2. common-protos/k8s.io/api/rbac/v1alpha1/generated.proto

      // +optional
      optional AggregationRule aggregationRule = 3;
    }
    
    // ClusterRoleBinding references a ClusterRole, but not contain it.  It can reference a ClusterRole in the global namespace,
    // and adds who information via Subject.
    // Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 ClusterRoleBinding, and will no longer be served in v1.22.
    message ClusterRoleBinding {
      // Standard object's metadata.
      // +optional
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Mon Mar 11 18:43:24 GMT 2024
    - 8.5K bytes
    - Viewed (0)
  3. common-protos/k8s.io/api/rbac/v1beta1/generated.proto

      // +optional
      optional AggregationRule aggregationRule = 3;
    }
    
    // ClusterRoleBinding references a ClusterRole, but not contain it.  It can reference a ClusterRole in the global namespace,
    // and adds who information via Subject.
    // Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 ClusterRoleBinding, and will no longer be served in v1.22.
    message ClusterRoleBinding {
      // Standard object's metadata.
      // +optional
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Mon Mar 11 18:43:24 GMT 2024
    - 8.6K bytes
    - Viewed (0)
  4. .github/pull_request_template.md

    **Please provide a description of this PR:**
    
    
    
    **To help us figure out who should review this PR, please put an X in all the areas that this PR affects.**
    
    - [ ] Ambient
    - [ ] Configuration Infrastructure
    - [ ] Docs
    - [ ] Dual Stack
    - [ ] Installation
    - [ ] Networking
    - [ ] Performance and Scalability
    - [ ] Policies and Telemetry
    - [ ] Security
    - [ ] Test and Release
    - [ ] User Experience
    - [ ] Developer Infrastructure
    
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Fri Aug 25 14:29:43 GMT 2023
    - 718 bytes
    - Viewed (0)
  5. okhttp/src/main/kotlin/okhttp3/HttpUrl.kt

     *
     * ```java
     * HttpUrl url = HttpUrl.parse("http://who-let-the-dogs.out").newBuilder()
     *     .addPathSegment("_Who?_")
     *     .query("_Who?_")
     *     .fragment("_Who?_")
     *     .build();
     * System.out.println(url);
     * ```
     *
     * This prints:
     *
     * ```
     * http://who-let-the-dogs.out/_Who%3F_?_Who?_#_Who?_
     * ```
     *
    Plain Text
    - Registered: Fri May 03 11:42:14 GMT 2024
    - Last Modified: Tue Jan 09 12:33:05 GMT 2024
    - 63.5K bytes
    - Viewed (1)
  6. common-protos/k8s.io/api/certificates/v1alpha1/generated.proto

    // user in the cluster, because they can be mounted by pods using the
    // `clusterTrustBundle` projection.  All service accounts have read access to
    // ClusterTrustBundles by default.  Users who only have namespace-level access
    // to a cluster can read ClusterTrustBundles by impersonating a serviceaccount
    // that they have access to.
    //
    // It can be optionally associated with a particular assigner, in which case it
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Mon Mar 11 18:43:24 GMT 2024
    - 4.2K bytes
    - Viewed (0)
  7. maven-core/src/site/apt/inheritance.apt

      maven occur, the maven inheritance model must be pinned against a particular
      modelVersion. This is required so that a change from modelVersion 4.0.0 to
      4.1.0 doesn't cause compatibility problems with users who have not upgraded
      their projects. It also allows for a certain amount of legacy support into the
      future. Therefore, we should rename this file from pom.xml in the maven-core
    Plain Text
    - Registered: Sun Apr 28 03:35:10 GMT 2024
    - Last Modified: Mon Jul 18 17:22:19 GMT 2022
    - 3.5K bytes
    - Viewed (0)
  8. okhttp/src/main/kotlin/okhttp3/CacheControl.kt

      @get:JvmName("minFreshSeconds") val minFreshSeconds: Int,
      /**
       * This field's name "only-if-cached" is misleading. It actually means "do not use the network".
       * It is set by a client who only wants to make a request if it can be fully satisfied by the
       * cache. Cached responses that would require validation (ie. conditional gets) are not permitted
       * if this header is set.
       */
    Plain Text
    - Registered: Fri May 03 11:42:14 GMT 2024
    - Last Modified: Mon Apr 15 13:41:01 GMT 2024
    - 10K bytes
    - Viewed (0)
  9. docs/sts/client-grants.md

    # AssumeRoleWithClientGrants [![Slack](https://slack.min.io/slack?type=svg)](https://slack.min.io)
    
    ## Introduction
    
    Returns a set of temporary security credentials for applications/clients who have been authenticated through client credential grants provided by identity provider. Example providers include KeyCloak, Okta etc.
    
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Sep 29 04:28:45 GMT 2022
    - 7.2K bytes
    - Viewed (1)
  10. SECURITY.md

        how we can reproduce your findings. For memory corruption triggerable in
        TensorFlow models, please demonstrate an exploit against one of Alphabet's
        models in <https://tfhub.dev/>
      - An explanation of who can exploit this vulnerability, and what they gain
        when doing so. Write an attack scenario that demonstrates how your issue
        violates the use cases and security assumptions defined in the threat model.
    Plain Text
    - Registered: Tue May 07 12:40:20 GMT 2024
    - Last Modified: Sun Oct 01 06:06:35 GMT 2023
    - 9.6K bytes
    - Viewed (0)
Back to top