- Sort Score
- Num 10 results
- Language All
Results 1181 - 1190 of 1,199 for diferente (0.12 seconds)
-
okhttp/src/jvmTest/kotlin/okhttp3/URLConnectionTest.kt
assertFailsWith<IOException> { getResponse(newRequest("/foo")) }.also { expected -> when (expected) { is SSLHandshakeException -> { // Allow conscrypt to fail in different ways if (!platform.isConscrypt()) { assertThat(expected.cause!!).isInstanceOf<CertificateException>() } } is TlsFatalAlert -> {} else -> throw expected
Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Sat Jun 21 20:36:35 GMT 2025 - 133.2K bytes - Click Count (0) -
cmd/server_test.go
c.Assert(err, nil) // Asserting the response status for expected value of http.StatusOK. c.Assert(response.StatusCode, http.StatusOK) } // TestContentTypePersists - Object upload with different Content-type is first done. // And then a HEAD and GET request on these objects are done to validate if the same Content-Type set during upload persists. func (s *TestSuiteCommon) TestContentTypePersists(c *check) {
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 118.1K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.29.md
### Bug or Regression - Fix a scheduler preemption issue where the victim pod was not deleted due to incorrect status patching. This issue occurred when the preemptor and victim pods had different QoS classes in their status, causing the preemption to fail entirely. ([#126694](https://github.com/kubernetes/kubernetes/pull/126694), [@Huang-Wei](https://github.com/Huang-Wei)) [SIG Scheduling]
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Wed Mar 12 00:36:01 GMT 2025 - 429.6K bytes - Click Count (1) -
CHANGELOG/CHANGELOG-1.8.md
* Azure file persistent volumes can use a new `secretNamespace` field to reference a secret in a different namespace than the one containing their bound persistent volume claim. The azure file persistent volume provisioner honors a corresponding `secretNamespace` storage class parameter to determine where to place secrets containing the storage account...
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Tue Feb 20 15:45:02 GMT 2024 - 312.2K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.16.md
- For volumes that allow attaches across multiple nodes, attach and detach operations across different nodes are now executed in parallel. ([#89240](https://github.com/kubernetes/kubernetes/pull/89240), [@verult](https://github.com/verult)) [SIG Apps, Node and Storage]
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Wed Oct 23 20:13:20 GMT 2024 - 345.2K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.23.md
### CVE-2022-3162: Unauthorized read of Custom Resources A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read. **Affected Versions**: - kube-apiserver v1.25.0 - v1.25.3 - kube-apiserver v1.24.0 - v1.24.7 - kube-apiserver v1.23.0 - v1.23.13
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Tue Feb 28 21:06:52 GMT 2023 - 424.5K bytes - Click Count (0) -
lib/fips140/v1.0.0-c2097c7c.zip
| // +--------- // | Random Number | // +--------- // | | // | ... | // | | // +--------- // The common components(signatureR, signatureS, hashedMessage, privateKey and // random number) each takes block size of bytes. The block size is different for // different curves and is set by canUseKDSA function. var params [4096]byte // Copy content into the parameter block. In the sign case, // we copy hashed message, private key and random number into // the parameter block. We skip the signature slots....
Created: Tue Dec 30 11:13:12 GMT 2025 - Last Modified: Thu Sep 25 19:53:19 GMT 2025 - 642.7K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.22.md
### CVE-2022-3162: Unauthorized read of Custom Resources A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read. **Affected Versions**: - kube-apiserver v1.25.0 - v1.25.3 - kube-apiserver v1.24.0 - v1.24.7 - kube-apiserver v1.23.0 - v1.23.13
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Tue Dec 13 12:43:45 GMT 2022 - 454.1K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.28.md
### Bug or Regression - Fix a scheduler preemption issue where the victim pod was not deleted due to incorrect status patching. This issue occurred when the preemptor and victim pods had different QoS classes in their status, causing the preemption to fail entirely. ([#126695](https://github.com/kubernetes/kubernetes/pull/126695), [@Huang-Wei](https://github.com/Huang-Wei)) [SIG Scheduling]
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Fri Sep 05 03:47:18 GMT 2025 - 456.9K bytes - Click Count (1) -
lib/fips140/v1.1.0-rc1.zip
| // +--------- // | Random Number | // +--------- // | | // | ... | // | | // +--------- // The common components(signatureR, signatureS, hashedMessage, privateKey and // random number) each takes block size of bytes. The block size is different for // different curves and is set by canUseKDSA function. var params [4096]byte // Copy content into the parameter block. In the sign case, // we copy hashed message, private key and random number into // the parameter block. We skip the signature slots....
Created: Tue Dec 30 11:13:12 GMT 2025 - Last Modified: Thu Dec 11 16:27:41 GMT 2025 - 663K bytes - Click Count (0)