- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 19 for privileged (0.07 sec)
-
.devcontainer/devcontainer.json
{ "name": "istio build-tools", "image": "gcr.io/istio-testing/build-tools:master-c67afcee625a4b91bdde7da65c9867f98248691e", "privileged": true, "remoteEnv": { "USE_GKE_GCLOUD_AUTH_PLUGIN": "True", "BUILD_WITH_CONTAINER": "0", "CARGO_HOME": "/home/.cargo", "RUSTUP_HOME": "/home/.rustup" }, "features": { "ghcr.io/devcontainers/features/docker-outside-of-docker:1": {}, "ghcr.io/mpriscella/features/kind:1": {} },
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Wed Nov 06 04:52:54 UTC 2024 - 879 bytes - Viewed (0) -
cni/pkg/iptables/iptables.go
// within all pods as we do on the host. // // This should be fine, as the host binaries are all we have to work with here anyway, // as we are running within a privileged container - and we don't want to take the time to // redetect for each pod anyway. // // Extreme corner case: // If for some reason your host had both binaries, and you were injecting out-of-band
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Tue Oct 15 15:39:28 UTC 2024 - 23.3K bytes - Viewed (0) -
src/cmd/asm/internal/asm/testdata/riscv64.s
BINV X30, X5, X6 // 3393e269 BINV $63, X6 // 1313f36b BINVI $1, X7, X8 // 13941368 BSET X8, X9, X10 // 33958428 BSET $63, X9 // 9394f42b BSETI $1, X10, X11 // 93151528 // // Privileged ISA // // 3.3.1: Environment Call and Breakpoint ECALL // 73000000 SCALL // 73000000 EBREAK // 73001000 SBREAK // 73001000
Registered: Tue Nov 05 11:13:11 UTC 2024 - Last Modified: Fri Oct 25 12:05:29 UTC 2024 - 16.8K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.29.md
- Added a new `--init-only` command line flag to `kube-proxy`. Setting the flag makes `kube-proxy` perform its initial configuration that requires privileged mode, and then exit. The `--init-only` mode is intended to be executed in a privileged init container, so that the main container may run with a stricter `securityContext`. ([#120864](https://github.com/kubernetes/kubernetes/pull/120864), [@uablrek](https://github.com/uablrek)) [SIG Network...
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Wed Oct 23 04:37:31 UTC 2024 - 375.1K bytes - Viewed (1) -
cni/pkg/util/podutil.go
Patch( context.Background(), pod.Name, types.MergePatchType, annotationPatch, metav1.PatchOptions{}, // Both "pods" and "pods/status" can mutate the metadata. However, pods/status is lower privilege, so we use that instead. "status", ) return err } func AnnotateUnenrollPod(client kubernetes.Interface, pod *metav1.ObjectMeta) error {
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Wed Oct 09 16:05:45 UTC 2024 - 4.7K bytes - Viewed (0) -
cmd/warm-backend.go
Remove(ctx context.Context, object string, rv remoteVersionID) error InUse(ctx context.Context) (bool, error) } const probeObject = "probeobject" // checkWarmBackend checks if tier config credentials have sufficient privileges // to perform all operations defined in the WarmBackend interface. func checkWarmBackend(ctx context.Context, w WarmBackend) error { remoteVersionID, err := w.Put(ctx, probeObject, strings.NewReader("MinIO"), 5)
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Oct 31 22:10:24 UTC 2024 - 4K bytes - Viewed (0) -
compat/maven-compat/src/main/java/org/apache/maven/project/interpolation/StringSearchModelInterpolator.java
InterpolateObjectAction action = new InterpolateObjectAction(obj, valueSources, postProcessors, debugEnabled, this, getLogger()); ModelInterpolationException error = AccessController.doPrivileged(action); if (error != null) { throw error; } } finally { getInterpolator().clearAnswers(); } }
Registered: Sun Nov 03 03:35:11 UTC 2024 - Last Modified: Fri Oct 25 12:31:46 UTC 2024 - 14.1K bytes - Viewed (0) -
SECURITY.md
from anywhere, and executes the graphs it is sent without performing any checks. Therefore, if you run a `tf.train.Server` in your network, anybody with access to the network can execute arbitrary code with the privileges of the user running the `tf.train.Server`. ## Untrusted inputs during training and prediction TensorFlow supports a wide range of input data formats. For example it can
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Wed Oct 16 16:10:43 UTC 2024 - 9.6K bytes - Viewed (0) -
guava/src/com/google/common/hash/LittleEndianByteArray.java
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Sat Oct 19 00:26:48 UTC 2024 - 9.8K bytes - Viewed (0) -
docs/en/docs/tutorial/handling-errors.md
This client could be a browser with a frontend, a code from someone else, an IoT device, etc. You could need to tell the client that: * The client doesn't have enough privileges for that operation. * The client doesn't have access to that resource. * The item the client was trying to access doesn't exist. * etc.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 9.1K bytes - Viewed (0)