Search Options

Results per page
Sort
Preferred Languages
Advance

Results 201 - 210 of 279 for readdir (0.15 sec)

  1. src/mdo/reader-stax.vm

        } //-- void setAddLocationInformation(boolean)
    #end
    
        public ${root.name} read(Reader reader) throws XMLStreamException {
    #if ( $locationTracking )
            return read(reader, true, null);
    #else
            return read(reader, true);
    #end
        }
    
        /**
         * @param reader a reader object.
         * @param strict a strict object.
         * @throws XMLStreamException XMLStreamException if
    Registered: Wed Jun 12 09:55:16 UTC 2024
    - Last Modified: Mon Mar 25 10:50:01 UTC 2024
    - 38.1K bytes
    - Viewed (0)
  2. manifests/charts/istiod-remote/templates/reader-clusterrole.yaml

    {{ $mcsAPIGroup := or .Values.pilot.env.MCS_API_GROUP "multicluster.x-k8s.io" }}
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRole
    metadata:
      name: istio-reader-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }}
      labels:
        app: istio-reader
        release: {{ .Release.Name }}
    rules:
      - apiGroups:
          - "config.istio.io"
          - "security.istio.io"
          - "networking.istio.io"
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue Apr 02 08:32:06 UTC 2024
    - 2.2K bytes
    - Viewed (0)
  3. manifests/charts/istiod-remote/templates/reader-clusterrolebinding.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: istio-reader-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }}
      labels:
        app: istio-reader
        release: {{ .Release.Name }}
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: istio-reader-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }}
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Jul 12 16:44:21 UTC 2021
    - 589 bytes
    - Viewed (0)
  4. cluster/addons/metrics-server/resource-reader.yaml

    xin.li <******@****.***> 1716688621 +0800
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun May 26 01:57:01 UTC 2024
    - 988 bytes
    - Viewed (0)
  5. manifests/charts/base/templates/reader-serviceaccount.yaml

    # This service account aggregates reader permissions for the revisions in a given cluster
    # Should be used for remote secret creation.
    apiVersion: v1
    kind: ServiceAccount
      {{- if .Values.global.imagePullSecrets }}
    imagePullSecrets:
      {{- range .Values.global.imagePullSecrets }}
      - name: {{ . }}
        {{- end }}
        {{- end }}
    metadata:
      name: istio-reader-service-account
      namespace: {{ .Values.global.istioNamespace }}
      labels:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon May 31 07:10:20 UTC 2021
    - 489 bytes
    - Viewed (0)
  6. cluster/addons/metrics-server/auth-reader.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    kind: RoleBinding
    metadata:
      name: metrics-server-auth-reader
      namespace: kube-system
      labels:
        kubernetes.io/cluster-service: "true"
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: Role
      name: extension-apiserver-authentication-reader
    subjects:
    - kind: ServiceAccount
      name: metrics-server
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Sep 03 20:14:57 UTC 2017
    - 419 bytes
    - Viewed (0)
  7. manifests/charts/istio-control/istio-discovery/templates/reader-clusterrole.yaml

    {{ $mcsAPIGroup := or .Values.pilot.env.MCS_API_GROUP "multicluster.x-k8s.io" }}
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRole
    metadata:
      name: istio-reader-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }}
      labels:
        app: istio-reader
        release: {{ .Release.Name }}
    rules:
      - apiGroups:
          - "config.istio.io"
          - "security.istio.io"
          - "networking.istio.io"
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue Apr 02 08:32:06 UTC 2024
    - 2.2K bytes
    - Viewed (0)
  8. manifests/charts/istio-control/istio-discovery/templates/reader-clusterrolebinding.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: istio-reader-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }}
      labels:
        app: istio-reader
        release: {{ .Release.Name }}
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: istio-reader-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }}
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Jul 12 16:44:21 UTC 2021
    - 589 bytes
    - Viewed (0)
  9. manifests/charts/istiod-remote/templates/reader-serviceaccount.yaml

    # This service account aggregates reader permissions for the revisions in a given cluster
    # Should be used for remote secret creation.
    apiVersion: v1
    kind: ServiceAccount
      {{- if .Values.global.imagePullSecrets }}
    imagePullSecrets:
      {{- range .Values.global.imagePullSecrets }}
      - name: {{ . }}
        {{- end }}
        {{- end }}
    metadata:
      name: istio-reader-service-account
      namespace: {{ .Values.global.istioNamespace }}
      labels:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Jul 12 16:44:21 UTC 2021
    - 489 bytes
    - Viewed (0)
  10. src/internal/coverage/slicereader/slr_test.go

    		}
    		g64 = slr.ReadULEB128()
    		if g64 != e64 {
    			t.Fatalf("slr.ReadULEB128() got %d want %d", g64, e64)
    		}
    		gs1 := readStr(slr)
    		if gs1 != s1 {
    			t.Fatalf("readStr got %s want %s", gs1, s1)
    		}
    		gs2 := readStr(slr)
    		if gs2 != s2 {
    			t.Fatalf("readStr got %s want %s", gs2, s2)
    		}
    		if _, err := slr.Seek(4, io.SeekStart); err != nil {
    			t.Fatal(err)
    		}
    		off := slr.Offset()
    		if off != 4 {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue May 23 11:36:28 UTC 2023
    - 1.9K bytes
    - Viewed (0)
Back to top