- Sort Score
- Result 10 results
- Languages All
Results 201 - 210 of 279 for readdir (0.15 sec)
-
src/mdo/reader-stax.vm
} //-- void setAddLocationInformation(boolean) #end public ${root.name} read(Reader reader) throws XMLStreamException { #if ( $locationTracking ) return read(reader, true, null); #else return read(reader, true); #end } /** * @param reader a reader object. * @param strict a strict object. * @throws XMLStreamException XMLStreamException if
Registered: Wed Jun 12 09:55:16 UTC 2024 - Last Modified: Mon Mar 25 10:50:01 UTC 2024 - 38.1K bytes - Viewed (0) -
manifests/charts/istiod-remote/templates/reader-clusterrole.yaml
{{ $mcsAPIGroup := or .Values.pilot.env.MCS_API_GROUP "multicluster.x-k8s.io" }} apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: istio-reader-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }} labels: app: istio-reader release: {{ .Release.Name }} rules: - apiGroups: - "config.istio.io" - "security.istio.io" - "networking.istio.io"
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Apr 02 08:32:06 UTC 2024 - 2.2K bytes - Viewed (0) -
manifests/charts/istiod-remote/templates/reader-clusterrolebinding.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: istio-reader-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }} labels: app: istio-reader release: {{ .Release.Name }} roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: istio-reader-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }}
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Jul 12 16:44:21 UTC 2021 - 589 bytes - Viewed (0) -
cluster/addons/metrics-server/resource-reader.yaml
xin.li <******@****.***> 1716688621 +0800
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun May 26 01:57:01 UTC 2024 - 988 bytes - Viewed (0) -
manifests/charts/base/templates/reader-serviceaccount.yaml
# This service account aggregates reader permissions for the revisions in a given cluster # Should be used for remote secret creation. apiVersion: v1 kind: ServiceAccount {{- if .Values.global.imagePullSecrets }} imagePullSecrets: {{- range .Values.global.imagePullSecrets }} - name: {{ . }} {{- end }} {{- end }} metadata: name: istio-reader-service-account namespace: {{ .Values.global.istioNamespace }} labels:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon May 31 07:10:20 UTC 2021 - 489 bytes - Viewed (0) -
cluster/addons/metrics-server/auth-reader.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: metrics-server-auth-reader namespace: kube-system labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: extension-apiserver-authentication-reader subjects: - kind: ServiceAccount name: metrics-server
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Sep 03 20:14:57 UTC 2017 - 419 bytes - Viewed (0) -
manifests/charts/istio-control/istio-discovery/templates/reader-clusterrole.yaml
{{ $mcsAPIGroup := or .Values.pilot.env.MCS_API_GROUP "multicluster.x-k8s.io" }} apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: istio-reader-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }} labels: app: istio-reader release: {{ .Release.Name }} rules: - apiGroups: - "config.istio.io" - "security.istio.io" - "networking.istio.io"
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Apr 02 08:32:06 UTC 2024 - 2.2K bytes - Viewed (0) -
manifests/charts/istio-control/istio-discovery/templates/reader-clusterrolebinding.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: istio-reader-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }} labels: app: istio-reader release: {{ .Release.Name }} roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: istio-reader-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }}
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Jul 12 16:44:21 UTC 2021 - 589 bytes - Viewed (0) -
manifests/charts/istiod-remote/templates/reader-serviceaccount.yaml
# This service account aggregates reader permissions for the revisions in a given cluster # Should be used for remote secret creation. apiVersion: v1 kind: ServiceAccount {{- if .Values.global.imagePullSecrets }} imagePullSecrets: {{- range .Values.global.imagePullSecrets }} - name: {{ . }} {{- end }} {{- end }} metadata: name: istio-reader-service-account namespace: {{ .Values.global.istioNamespace }} labels:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Jul 12 16:44:21 UTC 2021 - 489 bytes - Viewed (0) -
src/internal/coverage/slicereader/slr_test.go
} g64 = slr.ReadULEB128() if g64 != e64 { t.Fatalf("slr.ReadULEB128() got %d want %d", g64, e64) } gs1 := readStr(slr) if gs1 != s1 { t.Fatalf("readStr got %s want %s", gs1, s1) } gs2 := readStr(slr) if gs2 != s2 { t.Fatalf("readStr got %s want %s", gs2, s2) } if _, err := slr.Seek(4, io.SeekStart); err != nil { t.Fatal(err) } off := slr.Offset() if off != 4 {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue May 23 11:36:28 UTC 2023 - 1.9K bytes - Viewed (0)