Search Options

Results per page
Sort
Preferred Languages
Advance

Results 11 - 20 of 30 for bodies (0.22 sec)

  1. CHANGELOG/CHANGELOG-1.16.md

    - For volumes that allow attaches across multiple nodes, attach and detach operations across different nodes are now executed in parallel. ([#89240](https://github.com/kubernetes/kubernetes/pull/89240), [@verult](h...
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Feb 11 10:00:57 UTC 2021
    - 345.2K bytes
    - Viewed (0)
  2. CHANGELOG/CHANGELOG-1.18.md

    - Bind metadata-agent containers to linux nodes to avoid Windows scheduling on kubernetes cluster includes linux nodes and windows nodes ([#83363](https://github.com/kubernetes/kubernetes/pull/83363), [@wawa0210](https://github.com/wawa0210)) [SIG Cluster Lifecycle, Instrumentation and Windows]
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Jun 16 17:18:28 UTC 2021
    - 373.2K bytes
    - Viewed (0)
  3. ChangeLog.md

    - [`KT-65404`](https://youtrack.jetbrains.com/issue/KT-65404) KAPT should print a warning if stub generation is triggered for an interface with method bodies but without -Xjvm-default=all or -Xjvm-default=all-compatibility
    Registered: Wed Jun 12 09:53:16 UTC 2024
    - Last Modified: Mon May 27 17:14:23 UTC 2024
    - 292.1K bytes
    - Viewed (0)
  4. CHANGELOG/CHANGELOG-1.24.md

        - [CVE-2023-3676: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3676-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation)
        - [CVE-2023-3955: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3955-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation)
      - [Changes by Kind](#changes-by-kind)
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Aug 24 00:02:43 UTC 2023
    - 473.4K bytes
    - Viewed (0)
  5. CHANGELOG/CHANGELOG-1.25.md

        - [CVE-2023-3955: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3955-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation)
        - [CVE-2023-3676: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3676-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation)
      - [Changes by Kind](#changes-by-kind-2)
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon May 06 09:23:20 UTC 2024
    - 419.1K bytes
    - Viewed (0)
  6. CHANGELOG/CHANGELOG-1.26.md

        - [CVE-2023-3955: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3955-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation)
        - [CVE-2023-3676: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3676-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation)
      - [Changes by Kind](#changes-by-kind-7)
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Mar 14 16:24:51 UTC 2024
    - 425.7K bytes
    - Viewed (0)
  7. staging/src/k8s.io/api/core/v1/generated.proto

      // NodeTaintsPolicy indicates how we will treat node taints when calculating
      // pod topology spread skew. Options are:
      // - Honor: nodes without taints, along with tainted nodes for which the incoming pod
      // has a toleration, are included.
      // - Ignore: node taints are ignored. All nodes are included.
      //
      // If this value is nil, the behavior is equivalent to the Ignore policy.
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed May 29 22:40:29 UTC 2024
    - 280.3K bytes
    - Viewed (0)
  8. pkg/apis/core/v1/zz_generated.conversion.go

    	out.HostIP = in.HostIP
    	out.HostIPs = *(*[]core.HostIP)(unsafe.Pointer(&in.HostIPs))
    	// WARNING: in.PodIP requires manual conversion: does not exist in peer-type
    	out.PodIPs = *(*[]core.PodIP)(unsafe.Pointer(&in.PodIPs))
    	out.StartTime = (*metav1.Time)(unsafe.Pointer(in.StartTime))
    	out.InitContainerStatuses = *(*[]core.ContainerStatus)(unsafe.Pointer(&in.InitContainerStatuses))
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed May 29 22:40:29 UTC 2024
    - 472.1K bytes
    - Viewed (0)
  9. CHANGELOG/CHANGELOG-1.22.md

    more. While Kubernetes already validates the proxying address for Nodes, a bug in kube-apiserver made it possible to bypass this validation. Bypassing this validation could allow authenticated requests destined for Nodes to be redirected to the API Server through its private network.
    
    The merged fix enforces validation against the proxying address for a Node. In some cases, the fix can break clients that depend on the `nodes/proxy` subresource, specifically if a kubelet advertises a localhost...
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Dec 13 12:43:45 UTC 2022
    - 454.1K bytes
    - Viewed (0)
  10. tensorflow/compiler/mlir/tf2xla/transforms/legalize_tf.cc

            getElementTypeOrSelf(offset.getType()), input_shape[axis]));
        offset = b.create<RemOp>(
            b.create<AddOp>(b.create<RemOp>(offset, axis_size), axis_size),
            axis_size);
    
        // Stack two copies of the dimension, then slice from the calculated
        // offset. This also works if shift is not constant.
        // DynamicSliceOp requires the sizes being integer, and we can get the
        // information from input shape.
    Registered: Sun Jun 16 05:45:23 UTC 2024
    - Last Modified: Tue Jun 11 20:00:43 UTC 2024
    - 291.8K bytes
    - Viewed (0)
Back to top