- Sort Score
- Num 10 results
- Language All
Results 201 - 210 of 459 for secrets (0.06 seconds)
-
CHANGELOG/CHANGELOG-1.16.md
- Remove iSCSI volume storage cleartext secrets in logs ([#81215](https://github.com/kubernetes/kubernetes/pull/81215), [@zouyee](https://github.com/zouyee))
Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Wed Oct 23 20:13:20 GMT 2024 - 345.2K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.20.md
improves the security posture in the mounting process where the volumes are ACL’ed on the pods’ service account without handing out unnecessary permissions to the CSI drivers’ service account. This feature is especially important for secret-handling CSI drivers, such as the secrets-store-csi-driver. Since these tokens can be rotated and short-lived, this feature also provides a knob for CSI drivers to receive `NodePublishVolume` RPC calls periodically with the new token. This knob is also useful when volumes...
Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Wed Jan 19 21:05:45 GMT 2022 - 409K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.18.md
- Reverts breaking change to inline AzureFile volumes in v1.18.15-v1.18.17; referenced secrets are now correctly searched for in the same namespace as the pod as in previous releases. ([#100397](https://github.com/kubernetes/kubernetes/pull/100397), [@andyzhangx](https://github.com/andyzhangx)) [SIG Cloud Provider and Storage]
Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Wed Jun 16 17:18:28 GMT 2021 - 373.2K bytes - Click Count (0) -
internal/kms/secret-key.go
// KMS that uses s as builtin single key as KMS implementation. func ParseSecretKey(s string) (*KMS, error) { v := strings.SplitN(s, ":", 2) if len(v) != 2 { return nil, errors.New("kms: invalid secret key format") } keyID, b64Key := v[0], v[1] key, err := base64.StdEncoding.DecodeString(b64Key) if err != nil { return nil, err } return NewBuiltin(keyID, key) }
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Mon Apr 21 16:23:51 GMT 2025 - 8.4K bytes - Click Count (0) -
internal/kms/secret-key_test.go
Harshavardhana <******@****.***> 1744208919 -0700
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Wed Apr 09 14:28:39 GMT 2025 - 2.9K bytes - Click Count (0) -
tests/test_response_model_as_return_annotation.py
return DBUser(name="John", surname="Doe", password_hash="secret") @app.get("/response_model_list_of_model-no_annotation", response_model=list[User]) def response_model_list_of_model_no_annotation(): return [ DBUser(name="John", surname="Doe", password_hash="secret"), DBUser(name="Jane", surname="Does", password_hash="secret2"), ]
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Tue Feb 17 09:59:14 GMT 2026 - 50.3K bytes - Click Count (0) -
docs/en/docs/release-notes.md
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Apr 03 12:07:04 GMT 2026 - 631K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.22.md
- Fix a bug that `--disabled-metrics` doesn't function well. (#105793, @Huang-Wei) [SIG API Machinery, Cluster Lifecycle and Instrumentation] - Fix a panic in kubectl when creating secrets with an improper output type (#106356, @lauchokyip) [SIG CLI] - Fix concurrent map access causing panics when logging timed-out API calls. (#106112, @marseel) [SIG API Machinery]
Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Tue Dec 13 12:43:45 GMT 2022 - 454.1K bytes - Click Count (0) -
docs/es/docs/tutorial/security/oauth2-jwt.md
/// ## Manejo de tokens JWT { #handle-jwt-tokens } Importa los módulos instalados. Crea una clave secreta aleatoria que se usará para firmar los tokens JWT. Para generar una clave secreta segura al azar usa el comando: <div class="termy"> ```console $ openssl rand -hex 32 09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7 ```Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:15:55 GMT 2026 - 11.5K bytes - Click Count (0) -
docs/fr/docs/tutorial/security/oauth2-jwt.md
/// ## Gérer les jetons JWT { #handle-jwt-tokens } Importez les modules installés. Créez une clé secrète aléatoire qui sera utilisée pour signer les jetons JWT. Pour générer une clé secrète aléatoire sécurisée, utilisez la commande : <div class="termy"> ```console $ openssl rand -hex 32Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:37:13 GMT 2026 - 12.6K bytes - Click Count (0)