- Sort Score
- Result 10 results
- Languages All
Results 1 - 7 of 7 for statsuser (1.95 sec)
-
.github/workflows/smokeshow.yml
name: Smokeshow on: workflow_run: workflows: [Test] types: [completed] permissions: statuses: write env: UV_SYSTEM_PYTHON: 1 jobs: smokeshow: runs-on: ubuntu-latest steps: - name: Dump GitHub context env: GITHUB_CONTEXT: ${{ toJson(github) }} run: echo "$GITHUB_CONTEXT" - uses: actions/checkout@v6 - uses: actions/setup-python@v6Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Tue Dec 16 17:36:42 UTC 2025 - 1.6K bytes - Viewed (0) -
.github/workflows/deploy-docs.yml
name: Deploy Docs on: workflow_run: workflows: - Build Docs types: - completed permissions: deployments: write issues: write pull-requests: write statuses: write env: UV_SYSTEM_PYTHON: 1 jobs: deploy-docs: runs-on: ubuntu-latest steps: - name: Dump GitHub context env: GITHUB_CONTEXT: ${{ toJson(github) }}Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Fri Nov 21 13:03:21 UTC 2025 - 2.8K bytes - Viewed (0) -
CHANGELOG.md
`@ExperimentalOkHttpApi`. You can safely use this release in production. * Fix: Attempt to read the response even if sending the request failed. This makes it possible to handle response statuses like `HTTP/1.1 431 "Request Header Fields Too Large`. * Fix: Handle multiple 1xx responses. * Fix: Address a performance bug in our internal task runner. We had a race condition that couldRegistered: Fri Dec 26 11:42:13 UTC 2025 - Last Modified: Fri Dec 05 16:02:59 UTC 2025 - 36.2K bytes - Viewed (2) -
CHANGELOG/CHANGELOG-1.35.md
- `kube-scheduler`: Pod statuses no longer include specific taint keys or values when scheduling fails due to untolerated taints. ([#134740](https://github.com/kubernetes/kubernetes/pull/134740), [@hoskeri](https://github.com/hoskeri))
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Wed Dec 17 13:01:55 UTC 2025 - 228.5K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.33.md
vulnerability exists in the NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks. When the DynamicResourceAllocation feature gate is enabled, the controller properly validates resource claim statuses during pod status updates but fails to perform equivalent validation during pod creation. This allows a compromised node to create mirror pods that access unauthorized dynamic resources, potentially leading to privilege escalation. **Affected...
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Wed Dec 10 01:15:24 UTC 2025 - 334.8K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.34.md
- Kube-scheduler: Pod statuses no longer include specific taint keys or values when scheduling fails because of untolerated taints ([#135023](https://github.com/kubernetes/kubernetes/pull/135023), [@hoskeri](https://github.com/hoskeri)) [SIG Scheduling]
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Wed Dec 10 01:13:50 UTC 2025 - 333.3K bytes - Viewed (2) -
CHANGELOG/CHANGELOG-1.32.md
vulnerability exists in the NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks. When the DynamicResourceAllocation feature gate is enabled, the controller properly validates resource claim statuses during pod status updates but fails to perform equivalent validation during pod creation. This allows a compromised node to create mirror pods that access unauthorized dynamic resources, potentially leading to privilege escalation. **Affected...
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Tue Dec 16 18:27:41 UTC 2025 - 448.1K bytes - Viewed (0)