- Sort Score
- Result 10 results
- Languages All
Results 141 - 150 of 163 for Restriction (0.24 sec)
-
CHANGELOG/CHANGELOG-1.12.md
* Disable proxy to loopback and linklocal ([#71980](https://github.com/kubernetes/kubernetes/pull/71980), [@micahhausler](https://github.com/micahhausler)) * fix issue: vm sku restriction policy does not work in azure disk attach/detach ([#71941](https://github.com/kubernetes/kubernetes/pull/71941), [@andyzhangx](https://github.com/andyzhangx))
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Thu Feb 06 06:04:15 UTC 2020 - 293.8K bytes - Viewed (0) -
tensorflow/c/eager/dlpack.cc
namespace tensorflow { namespace { // Managing context for the DLManagedTensor, will manage the lifetime of // DLManagedTensor. When calling DLManagedTensor::deleter, it will notify the // original framework of destruction, and this context will be deleted also. struct TfDlManagedTensorCtx { TensorReference reference; std::vector<int64_t> shape; std::vector<int64_t> strides; DLManagedTensor tensor;
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Sat Oct 12 05:11:17 UTC 2024 - 12.9K bytes - Viewed (0) -
common-protos/k8s.io/api/certificates/v1/generated.proto
// 2. Permitted subjects: and behavior when a disallowed subject is requested. // 3. Required, permitted, or forbidden x509 extensions in the request (including whether subjectAltNames are allowed, which types, restrictions on allowed values) and behavior when a disallowed extension is requested. // 4. Required, permitted, or forbidden key usages / extended key usages.
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 11.6K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.10.md
* Fixed a panic in `kubectl run --attach ...` when the api server failed to create the runtime object (due to name conflict, PSP restriction, etc.) ([#61713](https://github.com/kubernetes/kubernetes/pull/61713), [@mountkin](https://github.com/mountkin))
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Thu May 05 13:44:43 UTC 2022 - 341.8K bytes - Viewed (0) -
apache-maven/src/main/appended-resources/licenses/CDDL+GPLv2-with-classpath-exception.txt
want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things. To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it.
Registered: Sun Nov 03 03:35:11 UTC 2024 - Last Modified: Fri May 17 19:14:22 UTC 2024 - 38.5K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
OAuth2 has the notion of "scopes". You can use them to add a specific set of permissions to a JWT token. Then you can give this token to a user directly or a third party, to interact with your API with a set of restrictions. You can learn how to use them and how they are integrated into **FastAPI** later in the **Advanced User Guide**. ## Recap
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sat Oct 26 11:45:10 UTC 2024 - 12.8K bytes - Viewed (0) -
tensorflow/c/c_test_util.cc
values[0] = v; return TF_NewTensor(TF_FLOAT, nullptr, 0, values, num_bytes, &FloatDeallocator, nullptr); } // All the *Helper methods are used as a workaround for the restrictions that // one cannot call ASSERT_* methods in non-void-returning functions (when // exceptions are disabled during compilation) void PlaceholderHelper(TF_Graph* graph, TF_Status* s, const char* name,
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Fri Oct 15 03:16:52 UTC 2021 - 17.8K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.23.md
**Detection**: Kubernetes Audit logs may indicate if the user name was misspelled to bypass the restriction placed on which user is a pod allowed to run as. If you find evidence that this vulnerability has been exploited, please contact ******@****.*** **Additional Details**:
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Tue Feb 28 21:06:52 UTC 2023 - 424.5K bytes - Viewed (0) -
docs/en/docs/deployment/concepts.md
* Handled internally by a cloud provider as part of their services (read below 👇) Another option is that you could use a **cloud service** that does more of the work including setting up HTTPS. It could have some restrictions or charge you more, etc. But in that case, you wouldn't have to set up a TLS Termination Proxy yourself. I'll show you some concrete examples in the next chapters. ---
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Wed Sep 18 16:09:57 UTC 2024 - 17.8K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.22.md
### Detection Kubernetes Audit logs may indicate if the user name was misspelled to bypass the restriction placed on which user is a pod allowed to run as. If you find evidence that this vulnerability has been exploited, please contact ******@****.*** #### Additional Details
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Tue Dec 13 12:43:45 UTC 2022 - 454.1K bytes - Viewed (0)