Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 131 - 140 of 140 for retrieval (0.19 seconds)

The search processing time has exceeded the limit. The displayed results may be partial.

  1. CHANGELOG/CHANGELOG-1.19.md

    - Fixed bug that caused cAdvisor to incorrectly detect single-socket multi-NUMA topology. ([#99209](https://github.com/kubernetes/kubernetes/pull/99209), [@iwankgb](https://github.com/iwankgb)) [SIG Node]
    - Fixes kubelet to retrieve number of sockets from cAdvisor MachineInfo, instead of assuming it to be equal to number of NUMA nodes. ([#99771](https://github.com/kubernetes/kubernetes/pull/99771), [@iwankgb](https://github.com/iwankgb)) [SIG Node]
    Created: Fri Dec 26 09:05:12 GMT 2025
    - Last Modified: Wed Jan 05 05:42:32 GMT 2022
    - 489.7K bytes
    - Click Count (0)
  2. CHANGELOG/CHANGELOG-1.32.md

      In order to perform an unsafe deletion of a corrupt resource, the user must enable the option for the delete
      request. A resource is considered corrupt if it can not be successfully retrieved from the storage due to
      a) transformation error e.g. decryption failure, or b) the object failed to decode. Normal deletion flow is
      attempted first, and if it fails with a corrupt resource error then it triggers unsafe delete.
    Created: Fri Dec 26 09:05:12 GMT 2025
    - Last Modified: Tue Dec 16 18:27:41 GMT 2025
    - 448.1K bytes
    - Click Count (0)
  3. doc/go_spec.html

    var v *T           // v has value nil, static type *T
    x = 42             // x has value 42 and dynamic type int
    x = v              // x has value (*T)(nil) and dynamic type *T
    </pre>
    
    <p>
    A variable's value is retrieved by referring to the variable in an
    <a href="#Expressions">expression</a>; it is the most recent value
    <a href="#Assignment_statements">assigned</a> to the variable.
    Created: Tue Dec 30 11:13:12 GMT 2025
    - Last Modified: Tue Dec 02 23:07:19 GMT 2025
    - 286.5K bytes
    - Click Count (1)
  4. CHANGELOG/CHANGELOG-1.24.md

    affected if an untrusted user can to modify Node objects and send requests proxying through them.
    
    Kubernetes supports node proxying, which allows clients of kube-apiserver to access endpoints of a Kubelet to establish connections to Pods, retrieve container logs, and more. While Kubernetes already validates the proxying address for Nodes, a bug in kube-apiserver made it possible to bypass this validation. Bypassing this validation could allow authenticated requests destined for Nodes to be...
    Created: Fri Dec 26 09:05:12 GMT 2025
    - Last Modified: Thu Aug 24 00:02:43 GMT 2023
    - 473.4K bytes
    - Click Count (0)
  5. CHANGELOG/CHANGELOG-1.6.md

    * Make EnableCRI default to true ([#41378](https://github.com/kubernetes/kubernetes/pull/41378), [@yujuhong](https://github.com/yujuhong))
    Created: Fri Dec 26 09:05:12 GMT 2025
    - Last Modified: Thu Dec 24 02:28:26 GMT 2020
    - 304K bytes
    - Click Count (0)
  6. CHANGELOG/CHANGELOG-1.25.md

    affected if an untrusted user can to modify Node objects and send requests proxying through them.
    
    Kubernetes supports node proxying, which allows clients of kube-apiserver to access endpoints of a Kubelet to establish connections to Pods, retrieve container logs, and more. While Kubernetes already validates the proxying address for Nodes, a bug in kube-apiserver made it possible to bypass this validation. Bypassing this validation could allow authenticated requests destined for Nodes to be...
    Created: Fri Dec 26 09:05:12 GMT 2025
    - Last Modified: Mon May 06 09:23:20 GMT 2024
    - 419.1K bytes
    - Click Count (0)
  7. CHANGELOG/CHANGELOG-1.23.md

    affected if an untrusted user can to modify Node objects and send requests proxying through them.
    
    Kubernetes supports node proxying, which allows clients of kube-apiserver to access endpoints of a Kubelet to establish connections to Pods, retrieve container logs, and more. While Kubernetes already validates the proxying address for Nodes, a bug in kube-apiserver made it possible to bypass this validation. Bypassing this validation could allow authenticated requests destined for Nodes to be...
    Created: Fri Dec 26 09:05:12 GMT 2025
    - Last Modified: Tue Feb 28 21:06:52 GMT 2023
    - 424.5K bytes
    - Click Count (0)
  8. CHANGELOG/CHANGELOG-1.22.md

    affected if an untrusted user can to modify Node objects and send requests proxying through them.
    
    Kubernetes supports node proxying, which allows clients of kube-apiserver to access endpoints of a Kubelet to establish connections to Pods, retrieve container logs, and more. While Kubernetes already validates the proxying address for Nodes, a bug in kube-apiserver made it possible to bypass this validation. Bypassing this validation could allow authenticated requests destined for Nodes to be...
    Created: Fri Dec 26 09:05:12 GMT 2025
    - Last Modified: Tue Dec 13 12:43:45 GMT 2022
    - 454.1K bytes
    - Click Count (0)
  9. lib/fips140/v1.0.0-c2097c7c.zip

    Additional Comment 1: "For key pairs generated for use with approved KEMs in // FIPS 203, the PCT shall consist of applying the encapsulation key ek to // encapsulate a shared secret K leading to ciphertext c, and then applying // decapsulation key dk to retrieve the same shared secret K. The PCT passes if // the two shared secret K values are equal. The PCT shall be performed either // when keys are generated/imported, prior to the first exportation, or prior to // the first operational use (if not exported...
    Created: Tue Dec 30 11:13:12 GMT 2025
    - Last Modified: Thu Sep 25 19:53:19 GMT 2025
    - 642.7K bytes
    - Click Count (0)
  10. lib/fips140/v1.1.0-rc1.zip

    Additional Comment 1: "For key pairs generated for use with approved KEMs in // FIPS 203, the PCT shall consist of applying the encapsulation key ek to // encapsulate a shared secret K leading to ciphertext c, and then applying // decapsulation key dk to retrieve the same shared secret K. The PCT passes if // the two shared secret K values are equal. The PCT shall be performed either // when keys are generated/imported, prior to the first exportation, or prior to // the first operational use (if not exported...
    Created: Tue Dec 30 11:13:12 GMT 2025
    - Last Modified: Thu Dec 11 16:27:41 GMT 2025
    - 663K bytes
    - Click Count (0)
Back to Top