- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 29 for Read (0.23 sec)
-
common-protos/k8s.io/api/core/v1/generated.proto
// cachingMode is the Host Caching mode: None, Read Only, Read Write. // +optional optional string cachingMode = 3; // fsType is Filesystem type to mount. // Must be a filesystem type supported by the host operating system. // Ex. "ext4", "xfs", "ntfs". Implicitly inferred to be "ext4" if unspecified. // +optional optional string fsType = 4; // readOnly Defaults to false (read/write). ReadOnly here will force
Plain Text - Registered: Wed Apr 17 22:53:10 GMT 2024 - Last Modified: Mon Mar 11 18:43:24 GMT 2024 - 255.8K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.21.md
- [Urgent Upgrade Notes](#urgent-upgrade-notes) - [(No, really, you MUST read this before you upgrade)](#no-really-you-must-read-this-before-you-upgrade) - [Changes by Kind](#changes-by-kind-13) - [Deprecation](#deprecation) - [API Change](#api-change-3) - [Feature](#feature-11)
Plain Text - Registered: Fri Apr 19 09:05:10 GMT 2024 - Last Modified: Fri Oct 14 07:03:14 GMT 2022 - 367.3K bytes - Viewed (4) -
CHANGELOG/CHANGELOG-1.22.md
This release contains changes that address the following vulnerabilities: ### CVE-2022-3162: Unauthorized read of Custom Resources A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read. **Affected Versions**: - kube-apiserver v1.25.0 - v1.25.3
Plain Text - Registered: Fri Apr 19 09:05:10 GMT 2024 - Last Modified: Tue Dec 13 12:43:45 GMT 2022 - 454.1K bytes - Viewed (1) -
CHANGELOG/CHANGELOG-1.25.md
### CVE-2022-3162: Unauthorized read of Custom Resources A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read. **Affected Versions**: - kube-apiserver v1.25.0 - v1.25.3
Plain Text - Registered: Fri Apr 19 09:05:10 GMT 2024 - Last Modified: Thu Nov 16 11:30:31 GMT 2023 - 419K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.24.md
### CVE-2022-3162: Unauthorized read of Custom Resources A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read. **Affected Versions**: - kube-apiserver v1.25.0 - v1.25.3
Plain Text - Registered: Fri Apr 19 09:05:10 GMT 2024 - Last Modified: Thu Aug 24 00:02:43 GMT 2023 - 473.4K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.17.md
- [Node binaries](#node-binaries-7) - [Changelog since v1.17.8](#changelog-since-v1178) - [Urgent Upgrade Notes](#urgent-upgrade-notes) - [(No, really, you MUST read this before you upgrade)](#no-really-you-must-read-this-before-you-upgrade) - [Changes by Kind](#changes-by-kind-8) - [Bug or Regression](#bug-or-regression-7) - [Dependencies](#dependencies-8) - [Added](#added-8)
Plain Text - Registered: Fri Apr 19 09:05:10 GMT 2024 - Last Modified: Thu Jan 28 10:44:33 GMT 2021 - 346.2K bytes - Viewed (1) -
api/go1.16.txt
pkg syscall (darwin-arm64), const PT_KILL ideal-int pkg syscall (darwin-arm64), const PT_READ_D = 2 pkg syscall (darwin-arm64), const PT_READ_D ideal-int pkg syscall (darwin-arm64), const PT_READ_I = 1 pkg syscall (darwin-arm64), const PT_READ_I ideal-int pkg syscall (darwin-arm64), const PT_READ_U = 3 pkg syscall (darwin-arm64), const PT_READ_U ideal-int pkg syscall (darwin-arm64), const PT_SIGEXC = 12
Plain Text - Registered: Tue Apr 23 11:13:09 GMT 2024 - Last Modified: Fri Dec 02 16:30:41 GMT 2022 - 479.2K bytes - Viewed (0) -
docs/en/docs/release-notes.md
Plain Text - Registered: Sun Apr 21 07:19:11 GMT 2024 - Last Modified: Fri Apr 19 19:30:49 GMT 2024 - 384.6K bytes - Viewed (1) -
CHANGELOG/CHANGELOG-1.23.md
This release contains changes that address the following vulnerabilities: ### CVE-2022-3162: Unauthorized read of Custom Resources A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read. **Affected Versions**: - kube-apiserver v1.25.0 - v1.25.3
Plain Text - Registered: Fri Apr 19 09:05:10 GMT 2024 - Last Modified: Tue Feb 28 21:06:52 GMT 2023 - 424.5K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.20.md
- [Summary API in kubelet doesn't have accelerator metrics](#summary-api-in-kubelet-doesnt-have-accelerator-metrics) - [Urgent Upgrade Notes](#urgent-upgrade-notes) - [(No, really, you MUST read this before you upgrade)](#no-really-you-must-read-this-before-you-upgrade) - [Changes by Kind](#changes-by-kind-14) - [Deprecation](#deprecation) - [API Change](#api-change-4) - [Feature](#feature-6)
Plain Text - Registered: Fri Apr 19 09:05:10 GMT 2024 - Last Modified: Wed Jan 19 21:05:45 GMT 2022 - 409K bytes - Viewed (0)