- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 25 for Howard (0.2 sec)
-
licenses/github.com/docker/docker/contrib/busybox/LICENSE
The MIT License (MIT) Copyright (c) 2015 John Howard (Microsoft) Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Tue Feb 15 21:25:06 GMT 2022 - 1.1K bytes - Viewed (0) -
licenses/github.com/howardjohn/unshare-go/LICENSE
file or class name and description of purpose be included on the same "printed page" as the copyright notice for easier identification within third-party archives. Copyright 2023 John Howard Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Wed Jan 31 07:51:36 GMT 2024 - 11.1K bytes - Viewed (0) -
cni/pkg/config/config.go
// The HTTP port for monitoring MonitoringPort int // The UDS server address that CNI plugin will send log to. LogUDSAddress string // The watch server socket address that CNI plugin will forward CNI events to. CNIEventAddress string // The ztunnel server socket address that the ztunnel will connect to. ZtunnelUDSAddress string // Whether ambient is enabled AmbientEnabled bool
Go - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Tue Apr 30 22:24:38 GMT 2024 - 5.5K bytes - Viewed (0) -
istioctl/pkg/writer/compare/testdata/configdump_diff.json
"allow_connect": true }, "server_name": "istio-envoy", "forward_client_cert_details": "APPEND_FORWARD", "set_current_client_cert_details": { "subject": true, "dns": true, "uri": true
Json - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Tue Mar 12 10:02:09 GMT 2024 - 51.6K bytes - Viewed (1) -
cni/README.md
This component accomplishes that in the following ways: 1. By installing a separate, very basic "CNI plugin" binary onto the node to forward low-level pod lifecycle events (CmdAdd/CmdDel/etc) from whatever node-level CNI subsystem is in use to this node agent for processing via socket. 1. By running as a node-level daemonset that:
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Fri May 03 19:29:42 GMT 2024 - 12.3K bytes - Viewed (0) -
manifests/charts/istiod-remote/templates/crd-all.gen.yaml
type: object directResponse: description: A HTTP rule can either return a direct_response, redirect or forward (default) traffic. properties: body: description: Specifies the content of the response body. oneOf:
Others - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Mon Apr 22 20:20:47 GMT 2024 - 606.1K bytes - Viewed (0) -
common-protos/k8s.io/api/apps/v1beta2/generated.proto
// MaxUnavailableStatefulSet feature. The field applies to all pods in the range 0 to // Replicas-1. That means if there is any unavailable pod in the range 0 to Replicas-1, it // will be counted towards MaxUnavailable. // +optional optional k8s.io.apimachinery.pkg.util.intstr.IntOrString maxUnavailable = 2; } // Scale represents a scaling request for a resource. message Scale {
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Mon Mar 11 18:43:24 GMT 2024 - 36.4K bytes - Viewed (0) -
architecture/ambient/ztunnel.md
In the end, [after evaluation](https://docs.google.com/document/d/1c2123cKuYsBDpIon9FFdctWTUIMFweSjgwG7r8l3818/edit), the decision was to move forward with a Rust implementation. This offered performance benefits that were too large to leave on the table, as well as opportunities to tune to our specific needs. ## Configuration protocol
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Thu Apr 25 22:35:16 GMT 2024 - 16.6K bytes - Viewed (0) -
architecture/ambient/peer-authentication.md
upon discussion in the [ztunnel hairpinning doc](https://docs.google.com/document/d/1uM1c3zzoehiijh1ZpZuJ1-SzuVVupenv8r5yuCaFshs/edit#heading=h.dwbqvwmg6ud3)) When a ztunnel receives traffic (authenticated or not) from a workload, it will forward that traffic to the Waypoint proxy **after** applying any `TRANSPORT` layer policies (i.e. `Authorization`s). Thus, if the destination workload has at least the equivalent of a `STRICT` `PeerAuthentication`, unauthenticated traffic will be rejected...
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Wed Aug 09 22:09:18 GMT 2023 - 3.9K bytes - Viewed (0) -
common-protos/k8s.io/api/batch/v1/generated.proto
// running pods are terminated. // - Ignore: indicates that the counter towards the .backoffLimit is not // incremented and a replacement pod is created. // - Count: indicates that the pod is handled in the default way - the // counter towards the .backoffLimit is incremented. // Additional values are considered to be added in the future. Clients should
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Mon Mar 11 18:43:24 GMT 2024 - 21.1K bytes - Viewed (0)