Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 381 - 387 of 387 for retrieval (0.61 seconds)

  1. CHANGELOG/CHANGELOG-1.6.md

    * Make EnableCRI default to true ([#41378](https://github.com/kubernetes/kubernetes/pull/41378), [@yujuhong](https://github.com/yujuhong))
    Created: Fri Apr 03 09:05:14 GMT 2026
    - Last Modified: Thu Dec 24 02:28:26 GMT 2020
    - 304K bytes
    - Click Count (0)
  2. src/main/java/org/codelibs/fess/mylasta/direction/FessConfig.java

         * The value is, e.g. title,url,content,doc_id,content_title,content_description <br>
         * comment: <br>
         * Enhanced RAG flow settings.<br>
         * Fields to retrieve for full document content.
         * @return The value of found property. (NotNull: if not found, exception but basically no way)
         */
        String getRagChatContentFields();
    
        /**
    Created: Tue Mar 31 13:07:34 GMT 2026
    - Last Modified: Sat Mar 28 06:59:19 GMT 2026
    - 576.9K bytes
    - Click Count (2)
  3. CHANGELOG/CHANGELOG-1.23.md

    affected if an untrusted user can to modify Node objects and send requests proxying through them.
    
    Kubernetes supports node proxying, which allows clients of kube-apiserver to access endpoints of a Kubelet to establish connections to Pods, retrieve container logs, and more. While Kubernetes already validates the proxying address for Nodes, a bug in kube-apiserver made it possible to bypass this validation. Bypassing this validation could allow authenticated requests destined for Nodes to be...
    Created: Fri Apr 03 09:05:14 GMT 2026
    - Last Modified: Tue Feb 28 21:06:52 GMT 2023
    - 424.5K bytes
    - Click Count (0)
  4. CHANGELOG/CHANGELOG-1.22.md

    affected if an untrusted user can to modify Node objects and send requests proxying through them.
    
    Kubernetes supports node proxying, which allows clients of kube-apiserver to access endpoints of a Kubelet to establish connections to Pods, retrieve container logs, and more. While Kubernetes already validates the proxying address for Nodes, a bug in kube-apiserver made it possible to bypass this validation. Bypassing this validation could allow authenticated requests destined for Nodes to be...
    Created: Fri Apr 03 09:05:14 GMT 2026
    - Last Modified: Tue Dec 13 12:43:45 GMT 2022
    - 454.1K bytes
    - Click Count (0)
  5. CHANGELOG/CHANGELOG-1.25.md

    affected if an untrusted user can to modify Node objects and send requests proxying through them.
    
    Kubernetes supports node proxying, which allows clients of kube-apiserver to access endpoints of a Kubelet to establish connections to Pods, retrieve container logs, and more. While Kubernetes already validates the proxying address for Nodes, a bug in kube-apiserver made it possible to bypass this validation. Bypassing this validation could allow authenticated requests destined for Nodes to be...
    Created: Fri Apr 03 09:05:14 GMT 2026
    - Last Modified: Mon May 06 09:23:20 GMT 2024
    - 419.1K bytes
    - Click Count (0)
  6. lib/fips140/v1.26.0.zip

    Additional Comment 1: "For key pairs generated for use with approved KEMs in // FIPS 203, the PCT shall consist of applying the encapsulation key ek to // encapsulate a shared secret K leading to ciphertext c, and then applying // decapsulation key dk to retrieve the same shared secret K. The PCT passes if // the two shared secret K values are equal. The PCT shall be performed either // when keys are generated/imported, prior to the first exportation, or prior to // the first operational use (if not exported...
    Created: Tue Apr 07 11:13:11 GMT 2026
    - Last Modified: Thu Jan 08 17:58:32 GMT 2026
    - 660.3K bytes
    - Click Count (0)
  7. lib/fips140/v1.0.0-c2097c7c.zip

    Additional Comment 1: "For key pairs generated for use with approved KEMs in // FIPS 203, the PCT shall consist of applying the encapsulation key ek to // encapsulate a shared secret K leading to ciphertext c, and then applying // decapsulation key dk to retrieve the same shared secret K. The PCT passes if // the two shared secret K values are equal. The PCT shall be performed either // when keys are generated/imported, prior to the first exportation, or prior to // the first operational use (if not exported...
    Created: Tue Apr 07 11:13:11 GMT 2026
    - Last Modified: Thu Sep 25 19:53:19 GMT 2025
    - 642.7K bytes
    - Click Count (0)
Back to Top