#[non_exhaustive]pub struct TaskContainerDetailsBuilder { /* private fields */ }
Expand description
A builder for TaskContainerDetails
.
Implementations§
Source§impl TaskContainerDetailsBuilder
impl TaskContainerDetailsBuilder
Sourcepub fn command(self, input: impl Into<String>) -> Self
pub fn command(self, input: impl Into<String>) -> Self
Appends an item to command
.
To override the contents of this collection use set_command
.
The command that's passed to the container. This parameter maps to Cmd
in the Create a container section of the Docker Remote API and the COMMAND
parameter to docker run. For more information, see https://docs.docker.com/engine/reference/builder/#cmd.
Sourcepub fn set_command(self, input: Option<Vec<String>>) -> Self
pub fn set_command(self, input: Option<Vec<String>>) -> Self
The command that's passed to the container. This parameter maps to Cmd
in the Create a container section of the Docker Remote API and the COMMAND
parameter to docker run. For more information, see https://docs.docker.com/engine/reference/builder/#cmd.
Sourcepub fn get_command(&self) -> &Option<Vec<String>>
pub fn get_command(&self) -> &Option<Vec<String>>
The command that's passed to the container. This parameter maps to Cmd
in the Create a container section of the Docker Remote API and the COMMAND
parameter to docker run. For more information, see https://docs.docker.com/engine/reference/builder/#cmd.
Sourcepub fn depends_on(self, input: TaskContainerDependency) -> Self
pub fn depends_on(self, input: TaskContainerDependency) -> Self
Appends an item to depends_on
.
To override the contents of this collection use set_depends_on
.
A list of containers that this container depends on.
Sourcepub fn set_depends_on(self, input: Option<Vec<TaskContainerDependency>>) -> Self
pub fn set_depends_on(self, input: Option<Vec<TaskContainerDependency>>) -> Self
A list of containers that this container depends on.
Sourcepub fn get_depends_on(&self) -> &Option<Vec<TaskContainerDependency>>
pub fn get_depends_on(&self) -> &Option<Vec<TaskContainerDependency>>
A list of containers that this container depends on.
Sourcepub fn environment(self, input: KeyValuePair) -> Self
pub fn environment(self, input: KeyValuePair) -> Self
Appends an item to environment
.
To override the contents of this collection use set_environment
.
The environment variables to pass to a container. This parameter maps to Env
in the Create a container section of the Docker Remote API and the --env
option to docker run.
We don't recommend using plaintext environment variables for sensitive information, such as credential data.
Sourcepub fn set_environment(self, input: Option<Vec<KeyValuePair>>) -> Self
pub fn set_environment(self, input: Option<Vec<KeyValuePair>>) -> Self
The environment variables to pass to a container. This parameter maps to Env
in the Create a container section of the Docker Remote API and the --env
option to docker run.
We don't recommend using plaintext environment variables for sensitive information, such as credential data.
Sourcepub fn get_environment(&self) -> &Option<Vec<KeyValuePair>>
pub fn get_environment(&self) -> &Option<Vec<KeyValuePair>>
The environment variables to pass to a container. This parameter maps to Env
in the Create a container section of the Docker Remote API and the --env
option to docker run.
We don't recommend using plaintext environment variables for sensitive information, such as credential data.
Sourcepub fn essential(self, input: bool) -> Self
pub fn essential(self, input: bool) -> Self
If the essential parameter of a container is marked as true
, and that container fails or stops for any reason, all other containers that are part of the task are stopped. If the essential
parameter of a container is marked as false, its failure doesn't affect the rest of the containers in a task. If this parameter is omitted, a container is assumed to be essential.
All jobs must have at least one essential container. If you have an application that's composed of multiple containers, group containers that are used for a common purpose into components, and separate the different components into multiple task definitions. For more information, see Application Architecture in the Amazon Elastic Container Service Developer Guide.
Sourcepub fn set_essential(self, input: Option<bool>) -> Self
pub fn set_essential(self, input: Option<bool>) -> Self
If the essential parameter of a container is marked as true
, and that container fails or stops for any reason, all other containers that are part of the task are stopped. If the essential
parameter of a container is marked as false, its failure doesn't affect the rest of the containers in a task. If this parameter is omitted, a container is assumed to be essential.
All jobs must have at least one essential container. If you have an application that's composed of multiple containers, group containers that are used for a common purpose into components, and separate the different components into multiple task definitions. For more information, see Application Architecture in the Amazon Elastic Container Service Developer Guide.
Sourcepub fn get_essential(&self) -> &Option<bool>
pub fn get_essential(&self) -> &Option<bool>
If the essential parameter of a container is marked as true
, and that container fails or stops for any reason, all other containers that are part of the task are stopped. If the essential
parameter of a container is marked as false, its failure doesn't affect the rest of the containers in a task. If this parameter is omitted, a container is assumed to be essential.
All jobs must have at least one essential container. If you have an application that's composed of multiple containers, group containers that are used for a common purpose into components, and separate the different components into multiple task definitions. For more information, see Application Architecture in the Amazon Elastic Container Service Developer Guide.
Sourcepub fn firelens_configuration(self, input: FirelensConfiguration) -> Self
pub fn firelens_configuration(self, input: FirelensConfiguration) -> Self
The FireLens configuration for the container. This is used to specify and configure a log router for container logs. For more information, see Custom log routing in the Amazon Elastic Container Service Developer Guide.
Sourcepub fn set_firelens_configuration(
self,
input: Option<FirelensConfiguration>,
) -> Self
pub fn set_firelens_configuration( self, input: Option<FirelensConfiguration>, ) -> Self
The FireLens configuration for the container. This is used to specify and configure a log router for container logs. For more information, see Custom log routing in the Amazon Elastic Container Service Developer Guide.
Sourcepub fn get_firelens_configuration(&self) -> &Option<FirelensConfiguration>
pub fn get_firelens_configuration(&self) -> &Option<FirelensConfiguration>
The FireLens configuration for the container. This is used to specify and configure a log router for container logs. For more information, see Custom log routing in the Amazon Elastic Container Service Developer Guide.
Sourcepub fn image(self, input: impl Into<String>) -> Self
pub fn image(self, input: impl Into<String>) -> Self
The image used to start a container. This string is passed directly to the Docker daemon. By default, images in the Docker Hub registry are available. Other repositories are specified with either repository-url/image:tag
or repository-url/image@digest
. Up to 255 letters (uppercase and lowercase), numbers, hyphens, underscores, colons, periods, forward slashes, and number signs are allowed. This parameter maps to Image
in the Create a container section of the Docker Remote API and the IMAGE
parameter of the docker run .
Sourcepub fn set_image(self, input: Option<String>) -> Self
pub fn set_image(self, input: Option<String>) -> Self
The image used to start a container. This string is passed directly to the Docker daemon. By default, images in the Docker Hub registry are available. Other repositories are specified with either repository-url/image:tag
or repository-url/image@digest
. Up to 255 letters (uppercase and lowercase), numbers, hyphens, underscores, colons, periods, forward slashes, and number signs are allowed. This parameter maps to Image
in the Create a container section of the Docker Remote API and the IMAGE
parameter of the docker run .
Sourcepub fn get_image(&self) -> &Option<String>
pub fn get_image(&self) -> &Option<String>
The image used to start a container. This string is passed directly to the Docker daemon. By default, images in the Docker Hub registry are available. Other repositories are specified with either repository-url/image:tag
or repository-url/image@digest
. Up to 255 letters (uppercase and lowercase), numbers, hyphens, underscores, colons, periods, forward slashes, and number signs are allowed. This parameter maps to Image
in the Create a container section of the Docker Remote API and the IMAGE
parameter of the docker run .
Sourcepub fn linux_parameters(self, input: LinuxParameters) -> Self
pub fn linux_parameters(self, input: LinuxParameters) -> Self
Linux-specific modifications that are applied to the container, such as Linux kernel capabilities. For more information, see KernelCapabilities.
This parameter is not supported for Windows containers.
Sourcepub fn set_linux_parameters(self, input: Option<LinuxParameters>) -> Self
pub fn set_linux_parameters(self, input: Option<LinuxParameters>) -> Self
Linux-specific modifications that are applied to the container, such as Linux kernel capabilities. For more information, see KernelCapabilities.
This parameter is not supported for Windows containers.
Sourcepub fn get_linux_parameters(&self) -> &Option<LinuxParameters>
pub fn get_linux_parameters(&self) -> &Option<LinuxParameters>
Linux-specific modifications that are applied to the container, such as Linux kernel capabilities. For more information, see KernelCapabilities.
This parameter is not supported for Windows containers.
Sourcepub fn log_configuration(self, input: LogConfiguration) -> Self
pub fn log_configuration(self, input: LogConfiguration) -> Self
The log configuration specification for the container.
This parameter maps to LogConfig
in the Create a container section of the Docker Remote API and the --log-driver
option to docker run.
By default, containers use the same logging driver that the Docker daemon uses. However the container can use a different logging driver than the Docker daemon by specifying a log driver with this parameter in the container definition. To use a different logging driver for a container, the log system must be configured properly on the container instance (or on a different log server for remote logging options). For more information about the options for different supported log drivers, see Configure logging drivers in the Docker documentation.
Amazon ECS currently supports a subset of the logging drivers available to the Docker daemon (shown in the LogConfiguration
data type). Additional log drivers may be available in future releases of the Amazon ECS container agent.
This parameter requires version 1.18 of the Docker Remote API or greater on your container instance. To check the Docker Remote API version on your container instance, log in to your container instance and run the following command: sudo docker version --format '{{.Server.APIVersion}}'
The Amazon ECS container agent running on a container instance must register the logging drivers available on that instance with the ECS_AVAILABLE_LOGGING_DRIVERS
environment variable before containers placed on that instance can use these log configuration options. For more information, see Amazon ECS container agent configuration in the Amazon Elastic Container Service Developer Guide.
Sourcepub fn set_log_configuration(self, input: Option<LogConfiguration>) -> Self
pub fn set_log_configuration(self, input: Option<LogConfiguration>) -> Self
The log configuration specification for the container.
This parameter maps to LogConfig
in the Create a container section of the Docker Remote API and the --log-driver
option to docker run.
By default, containers use the same logging driver that the Docker daemon uses. However the container can use a different logging driver than the Docker daemon by specifying a log driver with this parameter in the container definition. To use a different logging driver for a container, the log system must be configured properly on the container instance (or on a different log server for remote logging options). For more information about the options for different supported log drivers, see Configure logging drivers in the Docker documentation.
Amazon ECS currently supports a subset of the logging drivers available to the Docker daemon (shown in the LogConfiguration
data type). Additional log drivers may be available in future releases of the Amazon ECS container agent.
This parameter requires version 1.18 of the Docker Remote API or greater on your container instance. To check the Docker Remote API version on your container instance, log in to your container instance and run the following command: sudo docker version --format '{{.Server.APIVersion}}'
The Amazon ECS container agent running on a container instance must register the logging drivers available on that instance with the ECS_AVAILABLE_LOGGING_DRIVERS
environment variable before containers placed on that instance can use these log configuration options. For more information, see Amazon ECS container agent configuration in the Amazon Elastic Container Service Developer Guide.
Sourcepub fn get_log_configuration(&self) -> &Option<LogConfiguration>
pub fn get_log_configuration(&self) -> &Option<LogConfiguration>
The log configuration specification for the container.
This parameter maps to LogConfig
in the Create a container section of the Docker Remote API and the --log-driver
option to docker run.
By default, containers use the same logging driver that the Docker daemon uses. However the container can use a different logging driver than the Docker daemon by specifying a log driver with this parameter in the container definition. To use a different logging driver for a container, the log system must be configured properly on the container instance (or on a different log server for remote logging options). For more information about the options for different supported log drivers, see Configure logging drivers in the Docker documentation.
Amazon ECS currently supports a subset of the logging drivers available to the Docker daemon (shown in the LogConfiguration
data type). Additional log drivers may be available in future releases of the Amazon ECS container agent.
This parameter requires version 1.18 of the Docker Remote API or greater on your container instance. To check the Docker Remote API version on your container instance, log in to your container instance and run the following command: sudo docker version --format '{{.Server.APIVersion}}'
The Amazon ECS container agent running on a container instance must register the logging drivers available on that instance with the ECS_AVAILABLE_LOGGING_DRIVERS
environment variable before containers placed on that instance can use these log configuration options. For more information, see Amazon ECS container agent configuration in the Amazon Elastic Container Service Developer Guide.
Sourcepub fn mount_points(self, input: MountPoint) -> Self
pub fn mount_points(self, input: MountPoint) -> Self
Appends an item to mount_points
.
To override the contents of this collection use set_mount_points
.
The mount points for data volumes in your container.
This parameter maps to Volumes
in the Create a container section of the Docker Remote API and the --volume
option to docker run.
Windows containers can mount whole directories on the same drive as $env:ProgramData
. Windows containers can't mount directories on a different drive, and mount point can't be across drives.
Sourcepub fn set_mount_points(self, input: Option<Vec<MountPoint>>) -> Self
pub fn set_mount_points(self, input: Option<Vec<MountPoint>>) -> Self
The mount points for data volumes in your container.
This parameter maps to Volumes
in the Create a container section of the Docker Remote API and the --volume
option to docker run.
Windows containers can mount whole directories on the same drive as $env:ProgramData
. Windows containers can't mount directories on a different drive, and mount point can't be across drives.
Sourcepub fn get_mount_points(&self) -> &Option<Vec<MountPoint>>
pub fn get_mount_points(&self) -> &Option<Vec<MountPoint>>
The mount points for data volumes in your container.
This parameter maps to Volumes
in the Create a container section of the Docker Remote API and the --volume
option to docker run.
Windows containers can mount whole directories on the same drive as $env:ProgramData
. Windows containers can't mount directories on a different drive, and mount point can't be across drives.
Sourcepub fn privileged(self, input: bool) -> Self
pub fn privileged(self, input: bool) -> Self
When this parameter is true
, the container is given elevated privileges on the host container instance (similar to the root
user). This parameter maps to Privileged
in the Create a container section of the Docker Remote API and the --privileged
option to docker run.
This parameter is not supported for Windows containers or tasks run on Fargate.
Sourcepub fn set_privileged(self, input: Option<bool>) -> Self
pub fn set_privileged(self, input: Option<bool>) -> Self
When this parameter is true
, the container is given elevated privileges on the host container instance (similar to the root
user). This parameter maps to Privileged
in the Create a container section of the Docker Remote API and the --privileged
option to docker run.
This parameter is not supported for Windows containers or tasks run on Fargate.
Sourcepub fn get_privileged(&self) -> &Option<bool>
pub fn get_privileged(&self) -> &Option<bool>
When this parameter is true
, the container is given elevated privileges on the host container instance (similar to the root
user). This parameter maps to Privileged
in the Create a container section of the Docker Remote API and the --privileged
option to docker run.
This parameter is not supported for Windows containers or tasks run on Fargate.
Sourcepub fn readonly_root_filesystem(self, input: bool) -> Self
pub fn readonly_root_filesystem(self, input: bool) -> Self
When this parameter is true, the container is given read-only access to its root file system. This parameter maps to ReadonlyRootfs
in the Create a container section of the Docker Remote API and the --read-only
option to docker run.
This parameter is not supported for Windows containers.
Sourcepub fn set_readonly_root_filesystem(self, input: Option<bool>) -> Self
pub fn set_readonly_root_filesystem(self, input: Option<bool>) -> Self
When this parameter is true, the container is given read-only access to its root file system. This parameter maps to ReadonlyRootfs
in the Create a container section of the Docker Remote API and the --read-only
option to docker run.
This parameter is not supported for Windows containers.
Sourcepub fn get_readonly_root_filesystem(&self) -> &Option<bool>
pub fn get_readonly_root_filesystem(&self) -> &Option<bool>
When this parameter is true, the container is given read-only access to its root file system. This parameter maps to ReadonlyRootfs
in the Create a container section of the Docker Remote API and the --read-only
option to docker run.
This parameter is not supported for Windows containers.
Sourcepub fn repository_credentials(self, input: RepositoryCredentials) -> Self
pub fn repository_credentials(self, input: RepositoryCredentials) -> Self
The private repository authentication credentials to use.
Sourcepub fn set_repository_credentials(
self,
input: Option<RepositoryCredentials>,
) -> Self
pub fn set_repository_credentials( self, input: Option<RepositoryCredentials>, ) -> Self
The private repository authentication credentials to use.
Sourcepub fn get_repository_credentials(&self) -> &Option<RepositoryCredentials>
pub fn get_repository_credentials(&self) -> &Option<RepositoryCredentials>
The private repository authentication credentials to use.
Sourcepub fn resource_requirements(self, input: ResourceRequirement) -> Self
pub fn resource_requirements(self, input: ResourceRequirement) -> Self
Appends an item to resource_requirements
.
To override the contents of this collection use set_resource_requirements
.
The type and amount of a resource to assign to a container. The only supported resource is a GPU.
Sourcepub fn set_resource_requirements(
self,
input: Option<Vec<ResourceRequirement>>,
) -> Self
pub fn set_resource_requirements( self, input: Option<Vec<ResourceRequirement>>, ) -> Self
The type and amount of a resource to assign to a container. The only supported resource is a GPU.
Sourcepub fn get_resource_requirements(&self) -> &Option<Vec<ResourceRequirement>>
pub fn get_resource_requirements(&self) -> &Option<Vec<ResourceRequirement>>
The type and amount of a resource to assign to a container. The only supported resource is a GPU.
Sourcepub fn secrets(self, input: Secret) -> Self
pub fn secrets(self, input: Secret) -> Self
Appends an item to secrets
.
To override the contents of this collection use set_secrets
.
The secrets to pass to the container. For more information, see Specifying Sensitive Data in the Amazon Elastic Container Service Developer Guide.
Sourcepub fn set_secrets(self, input: Option<Vec<Secret>>) -> Self
pub fn set_secrets(self, input: Option<Vec<Secret>>) -> Self
The secrets to pass to the container. For more information, see Specifying Sensitive Data in the Amazon Elastic Container Service Developer Guide.
Sourcepub fn get_secrets(&self) -> &Option<Vec<Secret>>
pub fn get_secrets(&self) -> &Option<Vec<Secret>>
The secrets to pass to the container. For more information, see Specifying Sensitive Data in the Amazon Elastic Container Service Developer Guide.
Sourcepub fn ulimits(self, input: Ulimit) -> Self
pub fn ulimits(self, input: Ulimit) -> Self
Appends an item to ulimits
.
To override the contents of this collection use set_ulimits
.
A list of ulimits
to set in the container. If a ulimit
value is specified in a task definition, it overrides the default values set by Docker. This parameter maps to Ulimits
in the Create a container section of the Docker Remote API and the --ulimit
option to docker run.
Amazon ECS tasks hosted on Fargate use the default resource limit values set by the operating system with the exception of the nofile resource limit parameter which Fargate overrides. The nofile
resource limit sets a restriction on the number of open files that a container can use. The default nofile
soft limit is 1024
and the default hard limit is 65535
.
This parameter requires version 1.18 of the Docker Remote API or greater on your container instance. To check the Docker Remote API version on your container instance, log in to your container instance and run the following command: sudo docker version --format '{{.Server.APIVersion}}'
This parameter is not supported for Windows containers.
Sourcepub fn set_ulimits(self, input: Option<Vec<Ulimit>>) -> Self
pub fn set_ulimits(self, input: Option<Vec<Ulimit>>) -> Self
A list of ulimits
to set in the container. If a ulimit
value is specified in a task definition, it overrides the default values set by Docker. This parameter maps to Ulimits
in the Create a container section of the Docker Remote API and the --ulimit
option to docker run.
Amazon ECS tasks hosted on Fargate use the default resource limit values set by the operating system with the exception of the nofile resource limit parameter which Fargate overrides. The nofile
resource limit sets a restriction on the number of open files that a container can use. The default nofile
soft limit is 1024
and the default hard limit is 65535
.
This parameter requires version 1.18 of the Docker Remote API or greater on your container instance. To check the Docker Remote API version on your container instance, log in to your container instance and run the following command: sudo docker version --format '{{.Server.APIVersion}}'
This parameter is not supported for Windows containers.
Sourcepub fn get_ulimits(&self) -> &Option<Vec<Ulimit>>
pub fn get_ulimits(&self) -> &Option<Vec<Ulimit>>
A list of ulimits
to set in the container. If a ulimit
value is specified in a task definition, it overrides the default values set by Docker. This parameter maps to Ulimits
in the Create a container section of the Docker Remote API and the --ulimit
option to docker run.
Amazon ECS tasks hosted on Fargate use the default resource limit values set by the operating system with the exception of the nofile resource limit parameter which Fargate overrides. The nofile
resource limit sets a restriction on the number of open files that a container can use. The default nofile
soft limit is 1024
and the default hard limit is 65535
.
This parameter requires version 1.18 of the Docker Remote API or greater on your container instance. To check the Docker Remote API version on your container instance, log in to your container instance and run the following command: sudo docker version --format '{{.Server.APIVersion}}'
This parameter is not supported for Windows containers.
Sourcepub fn user(self, input: impl Into<String>) -> Self
pub fn user(self, input: impl Into<String>) -> Self
The user to use inside the container. This parameter maps to User in the Create a container section of the Docker Remote API and the --user option to docker run.
When running tasks using the host
network mode, don't run containers using the root user (UID 0)
. We recommend using a non-root user for better security.
You can specify the user
using the following formats. If specifying a UID or GID, you must specify it as a positive integer.
-
user
-
user:group
-
uid
-
uid:gid
-
user:gi
-
uid:group
-
This parameter is not supported for Windows containers.
Sourcepub fn set_user(self, input: Option<String>) -> Self
pub fn set_user(self, input: Option<String>) -> Self
The user to use inside the container. This parameter maps to User in the Create a container section of the Docker Remote API and the --user option to docker run.
When running tasks using the host
network mode, don't run containers using the root user (UID 0)
. We recommend using a non-root user for better security.
You can specify the user
using the following formats. If specifying a UID or GID, you must specify it as a positive integer.
-
user
-
user:group
-
uid
-
uid:gid
-
user:gi
-
uid:group
-
This parameter is not supported for Windows containers.
Sourcepub fn get_user(&self) -> &Option<String>
pub fn get_user(&self) -> &Option<String>
The user to use inside the container. This parameter maps to User in the Create a container section of the Docker Remote API and the --user option to docker run.
When running tasks using the host
network mode, don't run containers using the root user (UID 0)
. We recommend using a non-root user for better security.
You can specify the user
using the following formats. If specifying a UID or GID, you must specify it as a positive integer.
-
user
-
user:group
-
uid
-
uid:gid
-
user:gi
-
uid:group
-
This parameter is not supported for Windows containers.
Sourcepub fn set_exit_code(self, input: Option<i32>) -> Self
pub fn set_exit_code(self, input: Option<i32>) -> Self
The exit code returned upon completion.
Sourcepub fn get_exit_code(&self) -> &Option<i32>
pub fn get_exit_code(&self) -> &Option<i32>
The exit code returned upon completion.
Sourcepub fn reason(self, input: impl Into<String>) -> Self
pub fn reason(self, input: impl Into<String>) -> Self
A short (255 max characters) human-readable string to provide additional details for a running or stopped container.
Sourcepub fn set_reason(self, input: Option<String>) -> Self
pub fn set_reason(self, input: Option<String>) -> Self
A short (255 max characters) human-readable string to provide additional details for a running or stopped container.
Sourcepub fn get_reason(&self) -> &Option<String>
pub fn get_reason(&self) -> &Option<String>
A short (255 max characters) human-readable string to provide additional details for a running or stopped container.
Sourcepub fn log_stream_name(self, input: impl Into<String>) -> Self
pub fn log_stream_name(self, input: impl Into<String>) -> Self
The name of the CloudWatch Logs log stream that's associated with the container. The log group for Batch jobs is /aws/batch/job. Each container attempt receives a log stream name when they reach the RUNNING
status.
Sourcepub fn set_log_stream_name(self, input: Option<String>) -> Self
pub fn set_log_stream_name(self, input: Option<String>) -> Self
The name of the CloudWatch Logs log stream that's associated with the container. The log group for Batch jobs is /aws/batch/job. Each container attempt receives a log stream name when they reach the RUNNING
status.
Sourcepub fn get_log_stream_name(&self) -> &Option<String>
pub fn get_log_stream_name(&self) -> &Option<String>
The name of the CloudWatch Logs log stream that's associated with the container. The log group for Batch jobs is /aws/batch/job. Each container attempt receives a log stream name when they reach the RUNNING
status.
Sourcepub fn network_interfaces(self, input: NetworkInterface) -> Self
pub fn network_interfaces(self, input: NetworkInterface) -> Self
Appends an item to network_interfaces
.
To override the contents of this collection use set_network_interfaces
.
The network interfaces that are associated with the job.
Sourcepub fn set_network_interfaces(
self,
input: Option<Vec<NetworkInterface>>,
) -> Self
pub fn set_network_interfaces( self, input: Option<Vec<NetworkInterface>>, ) -> Self
The network interfaces that are associated with the job.
Sourcepub fn get_network_interfaces(&self) -> &Option<Vec<NetworkInterface>>
pub fn get_network_interfaces(&self) -> &Option<Vec<NetworkInterface>>
The network interfaces that are associated with the job.
Sourcepub fn build(self) -> TaskContainerDetails
pub fn build(self) -> TaskContainerDetails
Consumes the builder and constructs a TaskContainerDetails
.
Trait Implementations§
Source§impl Clone for TaskContainerDetailsBuilder
impl Clone for TaskContainerDetailsBuilder
Source§fn clone(&self) -> TaskContainerDetailsBuilder
fn clone(&self) -> TaskContainerDetailsBuilder
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moreSource§impl Debug for TaskContainerDetailsBuilder
impl Debug for TaskContainerDetailsBuilder
Source§impl Default for TaskContainerDetailsBuilder
impl Default for TaskContainerDetailsBuilder
Source§fn default() -> TaskContainerDetailsBuilder
fn default() -> TaskContainerDetailsBuilder
impl StructuralPartialEq for TaskContainerDetailsBuilder
Auto Trait Implementations§
impl Freeze for TaskContainerDetailsBuilder
impl RefUnwindSafe for TaskContainerDetailsBuilder
impl Send for TaskContainerDetailsBuilder
impl Sync for TaskContainerDetailsBuilder
impl Unpin for TaskContainerDetailsBuilder
impl UnwindSafe for TaskContainerDetailsBuilder
Blanket Implementations§
Source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
Source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Source§impl<T> CloneToUninit for Twhere
T: Clone,
impl<T> CloneToUninit for Twhere
T: Clone,
Source§impl<T> Instrument for T
impl<T> Instrument for T
Source§fn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
Source§fn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
Source§impl<T> IntoEither for T
impl<T> IntoEither for T
Source§fn into_either(self, into_left: bool) -> Either<Self, Self>
fn into_either(self, into_left: bool) -> Either<Self, Self>
self
into a Left
variant of Either<Self, Self>
if into_left
is true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read moreSource§fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
self
into a Left
variant of Either<Self, Self>
if into_left(&self)
returns true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read moreSource§impl<T> Paint for Twhere
T: ?Sized,
impl<T> Paint for Twhere
T: ?Sized,
Source§fn fg(&self, value: Color) -> Painted<&T>
fn fg(&self, value: Color) -> Painted<&T>
Returns a styled value derived from self
with the foreground set to
value
.
This method should be used rarely. Instead, prefer to use color-specific
builder methods like red()
and
green()
, which have the same functionality but are
pithier.
§Example
Set foreground color to white using fg()
:
use yansi::{Paint, Color};
painted.fg(Color::White);
Set foreground color to white using white()
.
use yansi::Paint;
painted.white();
Source§fn bright_black(&self) -> Painted<&T>
fn bright_black(&self) -> Painted<&T>
Source§fn bright_red(&self) -> Painted<&T>
fn bright_red(&self) -> Painted<&T>
Source§fn bright_green(&self) -> Painted<&T>
fn bright_green(&self) -> Painted<&T>
Source§fn bright_yellow(&self) -> Painted<&T>
fn bright_yellow(&self) -> Painted<&T>
Source§fn bright_blue(&self) -> Painted<&T>
fn bright_blue(&self) -> Painted<&T>
Source§fn bright_magenta(&self) -> Painted<&T>
fn bright_magenta(&self) -> Painted<&T>
Source§fn bright_cyan(&self) -> Painted<&T>
fn bright_cyan(&self) -> Painted<&T>
Source§fn bright_white(&self) -> Painted<&T>
fn bright_white(&self) -> Painted<&T>
Source§fn bg(&self, value: Color) -> Painted<&T>
fn bg(&self, value: Color) -> Painted<&T>
Returns a styled value derived from self
with the background set to
value
.
This method should be used rarely. Instead, prefer to use color-specific
builder methods like on_red()
and
on_green()
, which have the same functionality but
are pithier.
§Example
Set background color to red using fg()
:
use yansi::{Paint, Color};
painted.bg(Color::Red);
Set background color to red using on_red()
.
use yansi::Paint;
painted.on_red();
Source§fn on_primary(&self) -> Painted<&T>
fn on_primary(&self) -> Painted<&T>
Source§fn on_magenta(&self) -> Painted<&T>
fn on_magenta(&self) -> Painted<&T>
Source§fn on_bright_black(&self) -> Painted<&T>
fn on_bright_black(&self) -> Painted<&T>
Source§fn on_bright_red(&self) -> Painted<&T>
fn on_bright_red(&self) -> Painted<&T>
Source§fn on_bright_green(&self) -> Painted<&T>
fn on_bright_green(&self) -> Painted<&T>
Source§fn on_bright_yellow(&self) -> Painted<&T>
fn on_bright_yellow(&self) -> Painted<&T>
Source§fn on_bright_blue(&self) -> Painted<&T>
fn on_bright_blue(&self) -> Painted<&T>
Source§fn on_bright_magenta(&self) -> Painted<&T>
fn on_bright_magenta(&self) -> Painted<&T>
Source§fn on_bright_cyan(&self) -> Painted<&T>
fn on_bright_cyan(&self) -> Painted<&T>
Source§fn on_bright_white(&self) -> Painted<&T>
fn on_bright_white(&self) -> Painted<&T>
Source§fn attr(&self, value: Attribute) -> Painted<&T>
fn attr(&self, value: Attribute) -> Painted<&T>
Enables the styling Attribute
value
.
This method should be used rarely. Instead, prefer to use
attribute-specific builder methods like bold()
and
underline()
, which have the same functionality
but are pithier.
§Example
Make text bold using attr()
:
use yansi::{Paint, Attribute};
painted.attr(Attribute::Bold);
Make text bold using using bold()
.
use yansi::Paint;
painted.bold();
Source§fn rapid_blink(&self) -> Painted<&T>
fn rapid_blink(&self) -> Painted<&T>
Source§fn quirk(&self, value: Quirk) -> Painted<&T>
fn quirk(&self, value: Quirk) -> Painted<&T>
Enables the yansi
Quirk
value
.
This method should be used rarely. Instead, prefer to use quirk-specific
builder methods like mask()
and
wrap()
, which have the same functionality but are
pithier.
§Example
Enable wrapping using .quirk()
:
use yansi::{Paint, Quirk};
painted.quirk(Quirk::Wrap);
Enable wrapping using wrap()
.
use yansi::Paint;
painted.wrap();
Source§fn clear(&self) -> Painted<&T>
👎Deprecated since 1.0.1: renamed to resetting()
due to conflicts with Vec::clear()
.
The clear()
method will be removed in a future release.
fn clear(&self) -> Painted<&T>
resetting()
due to conflicts with Vec::clear()
.
The clear()
method will be removed in a future release.Source§fn whenever(&self, value: Condition) -> Painted<&T>
fn whenever(&self, value: Condition) -> Painted<&T>
Conditionally enable styling based on whether the Condition
value
applies. Replaces any previous condition.
See the crate level docs for more details.
§Example
Enable styling painted
only when both stdout
and stderr
are TTYs:
use yansi::{Paint, Condition};
painted.red().on_yellow().whenever(Condition::STDOUTERR_ARE_TTY);