- Sort Score
- Result 10 results
- Languages All
Results 381 - 390 of 408 for effort (0.9 sec)
-
docs/ko/docs/deployment/docker.md
# (1) FROM python:3.9 as requirements-stage # (2) WORKDIR /tmp # (3) RUN pip install poetry # (4) COPY ./pyproject.toml ./poetry.lock* /tmp/ # (5) RUN poetry export -f requirements.txt --output requirements.txt --without-hashes # (6) FROM python:3.9 # (7) WORKDIR /code # (8) COPY --from=requirements-stage /tmp/requirements.txt /code/requirements.txt
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sat Nov 09 16:39:20 UTC 2024 - 42.7K bytes - Viewed (0) -
cmd/api-errors.go
HTTPStatusCode: http.StatusNotFound, }, ErrAdminPolicyChangeAlreadyApplied: { Code: "XMinioAdminPolicyChangeAlreadyApplied", Description: "The specified policy change is already in effect.", HTTPStatusCode: http.StatusBadRequest, }, ErrAdminInvalidArgument: { Code: "XMinioAdminInvalidArgument", Description: "Invalid arguments specified.",Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Wed Apr 16 07:34:24 UTC 2025 - 93K bytes - Viewed (1) -
CHANGELOG/CHANGELOG-1.5.md
**What is the impact?** A user that is authorized to create pods can make use of any existing PodSecurityPolicy, even ones they are not authorized to use. **How can I mitigate this prior to installing 1.5.5?** 1. Export existing PodSecurityPolicy objects: * `kubectl get podsecuritypolicies -o yaml > psp.yaml`
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Thu Dec 24 02:28:26 UTC 2020 - 136.4K bytes - Viewed (0) -
android/guava/src/com/google/common/util/concurrent/ClosingFuture.java
* be thrown by calling {@code finishToFuture().get()} if this were the last step. Calling {@code * cancel()} on the returned future has no effect on the {@code ClosingFuture} pipeline. * * <p>{@code statusFuture} differs from most methods on {@code ClosingFuture}: You can make callsRegistered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Wed Jul 23 15:26:56 UTC 2025 - 97.8K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.7.md
In Namespaces that previously did not have the "DefaultDeny" annotation, you should delete any existing NetworkPolicy objects. These had no effect in the v1beta1 API, but with v1 semantics they might cause some traffic to be unintentionally blocked. ### Storage
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Thu May 05 13:44:43 UTC 2022 - 308.7K bytes - Viewed (1) -
doc/asm.html
runtime. To use vector instructions a machine must have both the vector facility (bit 129 in the facility list) and kernel support. Without kernel support a vector instruction will have no effect (it will be equivalent to a <code>NOP</code> instruction). </p> <p> Addressing modes: </p> <ul> <li> <code>(R5)(R6*1)</code>: The location at <code>R5</code> plus <code>R6</code>.
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Tue Nov 28 19:15:27 UTC 2023 - 36.3K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.10.md
* Webhooks now do not skip cluster-scoped resources. Before upgrading your Kubernetes clusters, double check whether you have configured webhooks for cluster-scoped objects (e.g., nodes, persistentVolume), as these webhooks will start to take effect. Delete/modify the configs if that's not desirable. ([#58185](https://github.com/kubernetes/kubernetes/pull/58185), [@caesarxuchao](https://github.com/caesarxuchao))
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Thu May 05 13:44:43 UTC 2022 - 341.8K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.3.md
All prior versions of docker will not be supported. #### ThirdPartyResource If you use ThirdPartyResource objects, they have moved from being namespaced-scoped to be cluster-scoped. Before upgrading to 1.3.0, export and delete any existing ThirdPartyResource objects using a 1.2.x client: kubectl get thirdpartyresource --all-namespaces -o yaml > tprs.yaml kubectl delete -f tprs.yaml
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Thu Dec 24 02:28:26 UTC 2020 - 84K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.11.md
* Many improvements to the upgrade process and other bug fixes ### SIG Instrumentation As far as Sig Instrumentation, the major change in Kubernetes 1.11 is the deprecation of Heapster as part of ongoing efforts to move to the new Kubernetes monitoring model. Clusters still using Heapster for autoscaling should be migrated over to metrics-server and the custom metrics API. See the deprecation section for more information. ### SIG Network
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Thu Feb 06 06:04:15 UTC 2020 - 328.4K bytes - Viewed (0) -
docs/ja/docs/deployment/docker.md
# (1) FROM python:3.9 as requirements-stage # (2) WORKDIR /tmp # (3) RUN pip install poetry # (4) COPY ./pyproject.toml ./poetry.lock* /tmp/ # (5) RUN poetry export -f requirements.txt --output requirements.txt --without-hashes # (6) FROM python:3.9 # (7) WORKDIR /code # (8) COPY --from=requirements-stage /tmp/requirements.txt /code/requirements.txt
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Mon Aug 12 21:47:53 UTC 2024 - 44.3K bytes - Viewed (0)