- Sort Score
- Result 10 results
- Languages All
Results 21 - 28 of 28 for notes (0.19 sec)
-
CHANGELOG/CHANGELOG-1.29.md
- [Server Binaries](#server-binaries-4) - [Node Binaries](#node-binaries-4) - [Container Images](#container-images-4) - [Changelog since v1.28.0](#changelog-since-v1280) - [Urgent Upgrade Notes](#urgent-upgrade-notes) - [(No, really, you MUST read this before you upgrade)](#no-really-you-must-read-this-before-you-upgrade) - [Changes by Kind](#changes-by-kind-4) - [Deprecation](#deprecation)
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Tue Apr 16 21:41:06 GMT 2024 - 299.9K bytes - Viewed (1) -
CHANGELOG/CHANGELOG-1.27.md
- [CVE-2023-3955: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3955-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation) - [CVE-2023-3676: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3676-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation) - [Changes by Kind](#changes-by-kind-8)
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Tue Apr 16 15:20:21 GMT 2024 - 434.3K bytes - Viewed (3) -
CHANGELOG/CHANGELOG-1.8.md
APIs are disabled by default. * The `system:node` role is no longer automatically granted to the `system:nodes` group in new clusters. The role gives broad read access to resources, including secrets and configmaps. Use the `Node` authorization mode to authorize the nodes in new clusters. To continue providing the `system:node` role to the members of the `system:nodes` group, create an installation-specific `ClusterRoleBinding` in the installation. ([#49638](https://github.com/kubern...
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Tue Feb 20 15:45:02 GMT 2024 - 312.2K bytes - Viewed (1) -
CHANGELOG/CHANGELOG-1.26.md
- [CVE-2023-3955: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3955-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation) - [CVE-2023-3676: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3676-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation) - [Changes by Kind](#changes-by-kind-7)
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Thu Mar 14 16:24:51 GMT 2024 - 425.7K bytes - Viewed (0) -
api/go1.16.txt
pkg syscall (darwin-arm64), const NOTE_LINK = 16 pkg syscall (darwin-arm64), const NOTE_LINK ideal-int pkg syscall (darwin-arm64), const NOTE_LOWAT = 1 pkg syscall (darwin-arm64), const NOTE_LOWAT ideal-int pkg syscall (darwin-arm64), const NOTE_NONE = 128 pkg syscall (darwin-arm64), const NOTE_NONE ideal-int pkg syscall (darwin-arm64), const NOTE_NSECONDS = 4
Plain Text - Registered: Tue May 07 11:14:38 GMT 2024 - Last Modified: Fri Dec 02 16:30:41 GMT 2022 - 479.2K bytes - Viewed (0) -
ChangeLog.md
- [`KT-46047`](https://youtrack.jetbrains.com/issue/KT-46047) FIR: incorrect type of integer literals - [`KT-57487`](https://youtrack.jetbrains.com/issue/KT-57487) [K2/N] Stdlib ArraysTest fails with `Class found but error nodes are not allowed` - [`KT-56951`](https://youtrack.jetbrains.com/issue/KT-56951) K2: False negative error on compound assignment for property of type Byte
Plain Text - Registered: Fri May 03 08:18:13 GMT 2024 - Last Modified: Thu Dec 21 17:48:12 GMT 2023 - 268.7K bytes - Viewed (1) -
api/go1.13.txt
pkg syscall (netbsd-arm64-cgo), const NOTE_EXIT = 2147483648 pkg syscall (netbsd-arm64-cgo), const NOTE_EXIT ideal-int pkg syscall (netbsd-arm64-cgo), const NOTE_EXTEND = 4 pkg syscall (netbsd-arm64-cgo), const NOTE_EXTEND ideal-int pkg syscall (netbsd-arm64-cgo), const NOTE_FORK = 1073741824 pkg syscall (netbsd-arm64-cgo), const NOTE_FORK ideal-int pkg syscall (netbsd-arm64-cgo), const NOTE_LINK = 16
Plain Text - Registered: Tue May 07 11:14:38 GMT 2024 - Last Modified: Thu Aug 08 18:44:16 GMT 2019 - 452.6K bytes - Viewed (0) -
common-protos/k8s.io/api/core/v1/generated.proto
// NodeTaintsPolicy indicates how we will treat node taints when calculating // pod topology spread skew. Options are: // - Honor: nodes without taints, along with tainted nodes for which the incoming pod // has a toleration, are included. // - Ignore: node taints are ignored. All nodes are included. // // If this value is nil, the behavior is equivalent to the Ignore policy.
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Mon Mar 11 18:43:24 GMT 2024 - 255.8K bytes - Viewed (0)