#[non_exhaustive]pub struct ContainerDefinitionBuilder { /* private fields */ }
Expand description
A builder for ContainerDefinition
.
Implementations§
Source§impl ContainerDefinitionBuilder
impl ContainerDefinitionBuilder
Sourcepub fn name(self, input: impl Into<String>) -> Self
pub fn name(self, input: impl Into<String>) -> Self
The name of a container. If you're linking multiple containers together in a task definition, the name
of one container can be entered in the links
of another container to connect the containers. Up to 255 letters (uppercase and lowercase), numbers, underscores, and hyphens are allowed. This parameter maps to name
in the docker container create command and the --name
option to docker run.
Sourcepub fn set_name(self, input: Option<String>) -> Self
pub fn set_name(self, input: Option<String>) -> Self
The name of a container. If you're linking multiple containers together in a task definition, the name
of one container can be entered in the links
of another container to connect the containers. Up to 255 letters (uppercase and lowercase), numbers, underscores, and hyphens are allowed. This parameter maps to name
in the docker container create command and the --name
option to docker run.
Sourcepub fn get_name(&self) -> &Option<String>
pub fn get_name(&self) -> &Option<String>
The name of a container. If you're linking multiple containers together in a task definition, the name
of one container can be entered in the links
of another container to connect the containers. Up to 255 letters (uppercase and lowercase), numbers, underscores, and hyphens are allowed. This parameter maps to name
in the docker container create command and the --name
option to docker run.
Sourcepub fn image(self, input: impl Into<String>) -> Self
pub fn image(self, input: impl Into<String>) -> Self
The image used to start a container. This string is passed directly to the Docker daemon. By default, images in the Docker Hub registry are available. Other repositories are specified with either repository-url/image:tag
or repository-url/image@digest
. Up to 255 letters (uppercase and lowercase), numbers, hyphens, underscores, colons, periods, forward slashes, and number signs are allowed. This parameter maps to Image
in the docker container create command and the IMAGE
parameter of docker run.
-
When a new task starts, the Amazon ECS container agent pulls the latest version of the specified image and tag for the container to use. However, subsequent updates to a repository image aren't propagated to already running tasks.
-
Images in Amazon ECR repositories can be specified by either using the full
registry/repository:tag
orregistry/repository@digest
. For example,012345678910.dkr.ecr.
or.amazonaws.com/ :latest 012345678910.dkr.ecr.
..amazonaws.com/ @sha256:94afd1f2e64d908bc90dbca0035a5b567EXAMPLE -
Images in official repositories on Docker Hub use a single name (for example,
ubuntu
ormongo
). -
Images in other repositories on Docker Hub are qualified with an organization name (for example,
amazon/amazon-ecs-agent
). -
Images in other online repositories are qualified further by a domain name (for example,
quay.io/assemblyline/ubuntu
).
Sourcepub fn set_image(self, input: Option<String>) -> Self
pub fn set_image(self, input: Option<String>) -> Self
The image used to start a container. This string is passed directly to the Docker daemon. By default, images in the Docker Hub registry are available. Other repositories are specified with either repository-url/image:tag
or repository-url/image@digest
. Up to 255 letters (uppercase and lowercase), numbers, hyphens, underscores, colons, periods, forward slashes, and number signs are allowed. This parameter maps to Image
in the docker container create command and the IMAGE
parameter of docker run.
-
When a new task starts, the Amazon ECS container agent pulls the latest version of the specified image and tag for the container to use. However, subsequent updates to a repository image aren't propagated to already running tasks.
-
Images in Amazon ECR repositories can be specified by either using the full
registry/repository:tag
orregistry/repository@digest
. For example,012345678910.dkr.ecr.
or.amazonaws.com/ :latest 012345678910.dkr.ecr.
..amazonaws.com/ @sha256:94afd1f2e64d908bc90dbca0035a5b567EXAMPLE -
Images in official repositories on Docker Hub use a single name (for example,
ubuntu
ormongo
). -
Images in other repositories on Docker Hub are qualified with an organization name (for example,
amazon/amazon-ecs-agent
). -
Images in other online repositories are qualified further by a domain name (for example,
quay.io/assemblyline/ubuntu
).
Sourcepub fn get_image(&self) -> &Option<String>
pub fn get_image(&self) -> &Option<String>
The image used to start a container. This string is passed directly to the Docker daemon. By default, images in the Docker Hub registry are available. Other repositories are specified with either repository-url/image:tag
or repository-url/image@digest
. Up to 255 letters (uppercase and lowercase), numbers, hyphens, underscores, colons, periods, forward slashes, and number signs are allowed. This parameter maps to Image
in the docker container create command and the IMAGE
parameter of docker run.
-
When a new task starts, the Amazon ECS container agent pulls the latest version of the specified image and tag for the container to use. However, subsequent updates to a repository image aren't propagated to already running tasks.
-
Images in Amazon ECR repositories can be specified by either using the full
registry/repository:tag
orregistry/repository@digest
. For example,012345678910.dkr.ecr.
or.amazonaws.com/ :latest 012345678910.dkr.ecr.
..amazonaws.com/ @sha256:94afd1f2e64d908bc90dbca0035a5b567EXAMPLE -
Images in official repositories on Docker Hub use a single name (for example,
ubuntu
ormongo
). -
Images in other repositories on Docker Hub are qualified with an organization name (for example,
amazon/amazon-ecs-agent
). -
Images in other online repositories are qualified further by a domain name (for example,
quay.io/assemblyline/ubuntu
).
Sourcepub fn repository_credentials(self, input: RepositoryCredentials) -> Self
pub fn repository_credentials(self, input: RepositoryCredentials) -> Self
The private repository authentication credentials to use.
Sourcepub fn set_repository_credentials(
self,
input: Option<RepositoryCredentials>,
) -> Self
pub fn set_repository_credentials( self, input: Option<RepositoryCredentials>, ) -> Self
The private repository authentication credentials to use.
Sourcepub fn get_repository_credentials(&self) -> &Option<RepositoryCredentials>
pub fn get_repository_credentials(&self) -> &Option<RepositoryCredentials>
The private repository authentication credentials to use.
Sourcepub fn cpu(self, input: i32) -> Self
pub fn cpu(self, input: i32) -> Self
The number of cpu
units reserved for the container. This parameter maps to CpuShares
in the docker container create commandand the --cpu-shares
option to docker run.
This field is optional for tasks using the Fargate launch type, and the only requirement is that the total amount of CPU reserved for all containers within a task be lower than the task-level cpu
value.
You can determine the number of CPU units that are available per EC2 instance type by multiplying the vCPUs listed for that instance type on the Amazon EC2 Instances detail page by 1,024.
Linux containers share unallocated CPU units with other containers on the container instance with the same ratio as their allocated amount. For example, if you run a single-container task on a single-core instance type with 512 CPU units specified for that container, and that's the only task running on the container instance, that container could use the full 1,024 CPU unit share at any given time. However, if you launched another copy of the same task on that container instance, each task is guaranteed a minimum of 512 CPU units when needed. Moreover, each container could float to higher CPU usage if the other container was not using it. If both tasks were 100% active all of the time, they would be limited to 512 CPU units.
On Linux container instances, the Docker daemon on the container instance uses the CPU value to calculate the relative CPU share ratios for running containers. The minimum valid CPU share value that the Linux kernel allows is 2, and the maximum valid CPU share value that the Linux kernel allows is 262144. However, the CPU parameter isn't required, and you can use CPU values below 2 or above 262144 in your container definitions. For CPU values below 2 (including null) or above 262144, the behavior varies based on your Amazon ECS container agent version:
-
Agent versions less than or equal to 1.1.0: Null and zero CPU values are passed to Docker as 0, which Docker then converts to 1,024 CPU shares. CPU values of 1 are passed to Docker as 1, which the Linux kernel converts to two CPU shares.
-
Agent versions greater than or equal to 1.2.0: Null, zero, and CPU values of 1 are passed to Docker as 2.
-
Agent versions greater than or equal to 1.84.0: CPU values greater than 256 vCPU are passed to Docker as 256, which is equivalent to 262144 CPU shares.
On Windows container instances, the CPU limit is enforced as an absolute limit, or a quota. Windows containers only have access to the specified amount of CPU that's described in the task definition. A null or zero CPU value is passed to Docker as 0
, which Windows interprets as 1% of one CPU.
Sourcepub fn set_cpu(self, input: Option<i32>) -> Self
pub fn set_cpu(self, input: Option<i32>) -> Self
The number of cpu
units reserved for the container. This parameter maps to CpuShares
in the docker container create commandand the --cpu-shares
option to docker run.
This field is optional for tasks using the Fargate launch type, and the only requirement is that the total amount of CPU reserved for all containers within a task be lower than the task-level cpu
value.
You can determine the number of CPU units that are available per EC2 instance type by multiplying the vCPUs listed for that instance type on the Amazon EC2 Instances detail page by 1,024.
Linux containers share unallocated CPU units with other containers on the container instance with the same ratio as their allocated amount. For example, if you run a single-container task on a single-core instance type with 512 CPU units specified for that container, and that's the only task running on the container instance, that container could use the full 1,024 CPU unit share at any given time. However, if you launched another copy of the same task on that container instance, each task is guaranteed a minimum of 512 CPU units when needed. Moreover, each container could float to higher CPU usage if the other container was not using it. If both tasks were 100% active all of the time, they would be limited to 512 CPU units.
On Linux container instances, the Docker daemon on the container instance uses the CPU value to calculate the relative CPU share ratios for running containers. The minimum valid CPU share value that the Linux kernel allows is 2, and the maximum valid CPU share value that the Linux kernel allows is 262144. However, the CPU parameter isn't required, and you can use CPU values below 2 or above 262144 in your container definitions. For CPU values below 2 (including null) or above 262144, the behavior varies based on your Amazon ECS container agent version:
-
Agent versions less than or equal to 1.1.0: Null and zero CPU values are passed to Docker as 0, which Docker then converts to 1,024 CPU shares. CPU values of 1 are passed to Docker as 1, which the Linux kernel converts to two CPU shares.
-
Agent versions greater than or equal to 1.2.0: Null, zero, and CPU values of 1 are passed to Docker as 2.
-
Agent versions greater than or equal to 1.84.0: CPU values greater than 256 vCPU are passed to Docker as 256, which is equivalent to 262144 CPU shares.
On Windows container instances, the CPU limit is enforced as an absolute limit, or a quota. Windows containers only have access to the specified amount of CPU that's described in the task definition. A null or zero CPU value is passed to Docker as 0
, which Windows interprets as 1% of one CPU.
Sourcepub fn get_cpu(&self) -> &Option<i32>
pub fn get_cpu(&self) -> &Option<i32>
The number of cpu
units reserved for the container. This parameter maps to CpuShares
in the docker container create commandand the --cpu-shares
option to docker run.
This field is optional for tasks using the Fargate launch type, and the only requirement is that the total amount of CPU reserved for all containers within a task be lower than the task-level cpu
value.
You can determine the number of CPU units that are available per EC2 instance type by multiplying the vCPUs listed for that instance type on the Amazon EC2 Instances detail page by 1,024.
Linux containers share unallocated CPU units with other containers on the container instance with the same ratio as their allocated amount. For example, if you run a single-container task on a single-core instance type with 512 CPU units specified for that container, and that's the only task running on the container instance, that container could use the full 1,024 CPU unit share at any given time. However, if you launched another copy of the same task on that container instance, each task is guaranteed a minimum of 512 CPU units when needed. Moreover, each container could float to higher CPU usage if the other container was not using it. If both tasks were 100% active all of the time, they would be limited to 512 CPU units.
On Linux container instances, the Docker daemon on the container instance uses the CPU value to calculate the relative CPU share ratios for running containers. The minimum valid CPU share value that the Linux kernel allows is 2, and the maximum valid CPU share value that the Linux kernel allows is 262144. However, the CPU parameter isn't required, and you can use CPU values below 2 or above 262144 in your container definitions. For CPU values below 2 (including null) or above 262144, the behavior varies based on your Amazon ECS container agent version:
-
Agent versions less than or equal to 1.1.0: Null and zero CPU values are passed to Docker as 0, which Docker then converts to 1,024 CPU shares. CPU values of 1 are passed to Docker as 1, which the Linux kernel converts to two CPU shares.
-
Agent versions greater than or equal to 1.2.0: Null, zero, and CPU values of 1 are passed to Docker as 2.
-
Agent versions greater than or equal to 1.84.0: CPU values greater than 256 vCPU are passed to Docker as 256, which is equivalent to 262144 CPU shares.
On Windows container instances, the CPU limit is enforced as an absolute limit, or a quota. Windows containers only have access to the specified amount of CPU that's described in the task definition. A null or zero CPU value is passed to Docker as 0
, which Windows interprets as 1% of one CPU.
Sourcepub fn memory(self, input: i32) -> Self
pub fn memory(self, input: i32) -> Self
The amount (in MiB) of memory to present to the container. If your container attempts to exceed the memory specified here, the container is killed. The total amount of memory reserved for all containers within a task must be lower than the task memory
value, if one is specified. This parameter maps to Memory
in the docker container create command and the --memory
option to docker run.
If using the Fargate launch type, this parameter is optional.
If using the EC2 launch type, you must specify either a task-level memory value or a container-level memory value. If you specify both a container-level memory
and memoryReservation
value, memory
must be greater than memoryReservation
. If you specify memoryReservation
, then that value is subtracted from the available memory resources for the container instance where the container is placed. Otherwise, the value of memory
is used.
The Docker 20.10.0 or later daemon reserves a minimum of 6 MiB of memory for a container. So, don't specify less than 6 MiB of memory for your containers.
The Docker 19.03.13-ce or earlier daemon reserves a minimum of 4 MiB of memory for a container. So, don't specify less than 4 MiB of memory for your containers.
Sourcepub fn set_memory(self, input: Option<i32>) -> Self
pub fn set_memory(self, input: Option<i32>) -> Self
The amount (in MiB) of memory to present to the container. If your container attempts to exceed the memory specified here, the container is killed. The total amount of memory reserved for all containers within a task must be lower than the task memory
value, if one is specified. This parameter maps to Memory
in the docker container create command and the --memory
option to docker run.
If using the Fargate launch type, this parameter is optional.
If using the EC2 launch type, you must specify either a task-level memory value or a container-level memory value. If you specify both a container-level memory
and memoryReservation
value, memory
must be greater than memoryReservation
. If you specify memoryReservation
, then that value is subtracted from the available memory resources for the container instance where the container is placed. Otherwise, the value of memory
is used.
The Docker 20.10.0 or later daemon reserves a minimum of 6 MiB of memory for a container. So, don't specify less than 6 MiB of memory for your containers.
The Docker 19.03.13-ce or earlier daemon reserves a minimum of 4 MiB of memory for a container. So, don't specify less than 4 MiB of memory for your containers.
Sourcepub fn get_memory(&self) -> &Option<i32>
pub fn get_memory(&self) -> &Option<i32>
The amount (in MiB) of memory to present to the container. If your container attempts to exceed the memory specified here, the container is killed. The total amount of memory reserved for all containers within a task must be lower than the task memory
value, if one is specified. This parameter maps to Memory
in the docker container create command and the --memory
option to docker run.
If using the Fargate launch type, this parameter is optional.
If using the EC2 launch type, you must specify either a task-level memory value or a container-level memory value. If you specify both a container-level memory
and memoryReservation
value, memory
must be greater than memoryReservation
. If you specify memoryReservation
, then that value is subtracted from the available memory resources for the container instance where the container is placed. Otherwise, the value of memory
is used.
The Docker 20.10.0 or later daemon reserves a minimum of 6 MiB of memory for a container. So, don't specify less than 6 MiB of memory for your containers.
The Docker 19.03.13-ce or earlier daemon reserves a minimum of 4 MiB of memory for a container. So, don't specify less than 4 MiB of memory for your containers.
Sourcepub fn memory_reservation(self, input: i32) -> Self
pub fn memory_reservation(self, input: i32) -> Self
The soft limit (in MiB) of memory to reserve for the container. When system memory is under heavy contention, Docker attempts to keep the container memory to this soft limit. However, your container can consume more memory when it needs to, up to either the hard limit specified with the memory
parameter (if applicable), or all of the available memory on the container instance, whichever comes first. This parameter maps to MemoryReservation
in the docker container create command and the --memory-reservation
option to docker run.
If a task-level memory value is not specified, you must specify a non-zero integer for one or both of memory
or memoryReservation
in a container definition. If you specify both, memory
must be greater than memoryReservation
. If you specify memoryReservation
, then that value is subtracted from the available memory resources for the container instance where the container is placed. Otherwise, the value of memory
is used.
For example, if your container normally uses 128 MiB of memory, but occasionally bursts to 256 MiB of memory for short periods of time, you can set a memoryReservation
of 128 MiB, and a memory
hard limit of 300 MiB. This configuration would allow the container to only reserve 128 MiB of memory from the remaining resources on the container instance, but also allow the container to consume more memory resources when needed.
The Docker 20.10.0 or later daemon reserves a minimum of 6 MiB of memory for a container. So, don't specify less than 6 MiB of memory for your containers.
The Docker 19.03.13-ce or earlier daemon reserves a minimum of 4 MiB of memory for a container. So, don't specify less than 4 MiB of memory for your containers.
Sourcepub fn set_memory_reservation(self, input: Option<i32>) -> Self
pub fn set_memory_reservation(self, input: Option<i32>) -> Self
The soft limit (in MiB) of memory to reserve for the container. When system memory is under heavy contention, Docker attempts to keep the container memory to this soft limit. However, your container can consume more memory when it needs to, up to either the hard limit specified with the memory
parameter (if applicable), or all of the available memory on the container instance, whichever comes first. This parameter maps to MemoryReservation
in the docker container create command and the --memory-reservation
option to docker run.
If a task-level memory value is not specified, you must specify a non-zero integer for one or both of memory
or memoryReservation
in a container definition. If you specify both, memory
must be greater than memoryReservation
. If you specify memoryReservation
, then that value is subtracted from the available memory resources for the container instance where the container is placed. Otherwise, the value of memory
is used.
For example, if your container normally uses 128 MiB of memory, but occasionally bursts to 256 MiB of memory for short periods of time, you can set a memoryReservation
of 128 MiB, and a memory
hard limit of 300 MiB. This configuration would allow the container to only reserve 128 MiB of memory from the remaining resources on the container instance, but also allow the container to consume more memory resources when needed.
The Docker 20.10.0 or later daemon reserves a minimum of 6 MiB of memory for a container. So, don't specify less than 6 MiB of memory for your containers.
The Docker 19.03.13-ce or earlier daemon reserves a minimum of 4 MiB of memory for a container. So, don't specify less than 4 MiB of memory for your containers.
Sourcepub fn get_memory_reservation(&self) -> &Option<i32>
pub fn get_memory_reservation(&self) -> &Option<i32>
The soft limit (in MiB) of memory to reserve for the container. When system memory is under heavy contention, Docker attempts to keep the container memory to this soft limit. However, your container can consume more memory when it needs to, up to either the hard limit specified with the memory
parameter (if applicable), or all of the available memory on the container instance, whichever comes first. This parameter maps to MemoryReservation
in the docker container create command and the --memory-reservation
option to docker run.
If a task-level memory value is not specified, you must specify a non-zero integer for one or both of memory
or memoryReservation
in a container definition. If you specify both, memory
must be greater than memoryReservation
. If you specify memoryReservation
, then that value is subtracted from the available memory resources for the container instance where the container is placed. Otherwise, the value of memory
is used.
For example, if your container normally uses 128 MiB of memory, but occasionally bursts to 256 MiB of memory for short periods of time, you can set a memoryReservation
of 128 MiB, and a memory
hard limit of 300 MiB. This configuration would allow the container to only reserve 128 MiB of memory from the remaining resources on the container instance, but also allow the container to consume more memory resources when needed.
The Docker 20.10.0 or later daemon reserves a minimum of 6 MiB of memory for a container. So, don't specify less than 6 MiB of memory for your containers.
The Docker 19.03.13-ce or earlier daemon reserves a minimum of 4 MiB of memory for a container. So, don't specify less than 4 MiB of memory for your containers.
Sourcepub fn links(self, input: impl Into<String>) -> Self
pub fn links(self, input: impl Into<String>) -> Self
Appends an item to links
.
To override the contents of this collection use set_links
.
The links
parameter allows containers to communicate with each other without the need for port mappings. This parameter is only supported if the network mode of a task definition is bridge
. The name:internalName
construct is analogous to name:alias
in Docker links. Up to 255 letters (uppercase and lowercase), numbers, underscores, and hyphens are allowed.. This parameter maps to Links
in the docker container create command and the --link
option to docker run.
This parameter is not supported for Windows containers.
Containers that are collocated on a single container instance may be able to communicate with each other without requiring links or host port mappings. Network isolation is achieved on the container instance using security groups and VPC settings.
Sourcepub fn set_links(self, input: Option<Vec<String>>) -> Self
pub fn set_links(self, input: Option<Vec<String>>) -> Self
The links
parameter allows containers to communicate with each other without the need for port mappings. This parameter is only supported if the network mode of a task definition is bridge
. The name:internalName
construct is analogous to name:alias
in Docker links. Up to 255 letters (uppercase and lowercase), numbers, underscores, and hyphens are allowed.. This parameter maps to Links
in the docker container create command and the --link
option to docker run.
This parameter is not supported for Windows containers.
Containers that are collocated on a single container instance may be able to communicate with each other without requiring links or host port mappings. Network isolation is achieved on the container instance using security groups and VPC settings.
Sourcepub fn get_links(&self) -> &Option<Vec<String>>
pub fn get_links(&self) -> &Option<Vec<String>>
The links
parameter allows containers to communicate with each other without the need for port mappings. This parameter is only supported if the network mode of a task definition is bridge
. The name:internalName
construct is analogous to name:alias
in Docker links. Up to 255 letters (uppercase and lowercase), numbers, underscores, and hyphens are allowed.. This parameter maps to Links
in the docker container create command and the --link
option to docker run.
This parameter is not supported for Windows containers.
Containers that are collocated on a single container instance may be able to communicate with each other without requiring links or host port mappings. Network isolation is achieved on the container instance using security groups and VPC settings.
Sourcepub fn port_mappings(self, input: PortMapping) -> Self
pub fn port_mappings(self, input: PortMapping) -> Self
Appends an item to port_mappings
.
To override the contents of this collection use set_port_mappings
.
The list of port mappings for the container. Port mappings allow containers to access ports on the host container instance to send or receive traffic.
For task definitions that use the awsvpc
network mode, only specify the containerPort
. The hostPort
can be left blank or it must be the same value as the containerPort
.
Port mappings on Windows use the NetNAT
gateway address rather than localhost
. There's no loopback for port mappings on Windows, so you can't access a container's mapped port from the host itself.
This parameter maps to PortBindings
in the the docker container create command and the --publish
option to docker run. If the network mode of a task definition is set to none
, then you can't specify port mappings. If the network mode of a task definition is set to host
, then host ports must either be undefined or they must match the container port in the port mapping.
After a task reaches the RUNNING
status, manual and automatic host and container port assignments are visible in the Network Bindings section of a container description for a selected task in the Amazon ECS console. The assignments are also visible in the networkBindings
section DescribeTasks responses.
Sourcepub fn set_port_mappings(self, input: Option<Vec<PortMapping>>) -> Self
pub fn set_port_mappings(self, input: Option<Vec<PortMapping>>) -> Self
The list of port mappings for the container. Port mappings allow containers to access ports on the host container instance to send or receive traffic.
For task definitions that use the awsvpc
network mode, only specify the containerPort
. The hostPort
can be left blank or it must be the same value as the containerPort
.
Port mappings on Windows use the NetNAT
gateway address rather than localhost
. There's no loopback for port mappings on Windows, so you can't access a container's mapped port from the host itself.
This parameter maps to PortBindings
in the the docker container create command and the --publish
option to docker run. If the network mode of a task definition is set to none
, then you can't specify port mappings. If the network mode of a task definition is set to host
, then host ports must either be undefined or they must match the container port in the port mapping.
After a task reaches the RUNNING
status, manual and automatic host and container port assignments are visible in the Network Bindings section of a container description for a selected task in the Amazon ECS console. The assignments are also visible in the networkBindings
section DescribeTasks responses.
Sourcepub fn get_port_mappings(&self) -> &Option<Vec<PortMapping>>
pub fn get_port_mappings(&self) -> &Option<Vec<PortMapping>>
The list of port mappings for the container. Port mappings allow containers to access ports on the host container instance to send or receive traffic.
For task definitions that use the awsvpc
network mode, only specify the containerPort
. The hostPort
can be left blank or it must be the same value as the containerPort
.
Port mappings on Windows use the NetNAT
gateway address rather than localhost
. There's no loopback for port mappings on Windows, so you can't access a container's mapped port from the host itself.
This parameter maps to PortBindings
in the the docker container create command and the --publish
option to docker run. If the network mode of a task definition is set to none
, then you can't specify port mappings. If the network mode of a task definition is set to host
, then host ports must either be undefined or they must match the container port in the port mapping.
After a task reaches the RUNNING
status, manual and automatic host and container port assignments are visible in the Network Bindings section of a container description for a selected task in the Amazon ECS console. The assignments are also visible in the networkBindings
section DescribeTasks responses.
Sourcepub fn essential(self, input: bool) -> Self
pub fn essential(self, input: bool) -> Self
If the essential
parameter of a container is marked as true
, and that container fails or stops for any reason, all other containers that are part of the task are stopped. If the essential
parameter of a container is marked as false
, its failure doesn't affect the rest of the containers in a task. If this parameter is omitted, a container is assumed to be essential.
All tasks must have at least one essential container. If you have an application that's composed of multiple containers, group containers that are used for a common purpose into components, and separate the different components into multiple task definitions. For more information, see Application Architecture in the Amazon Elastic Container Service Developer Guide.
Sourcepub fn set_essential(self, input: Option<bool>) -> Self
pub fn set_essential(self, input: Option<bool>) -> Self
If the essential
parameter of a container is marked as true
, and that container fails or stops for any reason, all other containers that are part of the task are stopped. If the essential
parameter of a container is marked as false
, its failure doesn't affect the rest of the containers in a task. If this parameter is omitted, a container is assumed to be essential.
All tasks must have at least one essential container. If you have an application that's composed of multiple containers, group containers that are used for a common purpose into components, and separate the different components into multiple task definitions. For more information, see Application Architecture in the Amazon Elastic Container Service Developer Guide.
Sourcepub fn get_essential(&self) -> &Option<bool>
pub fn get_essential(&self) -> &Option<bool>
If the essential
parameter of a container is marked as true
, and that container fails or stops for any reason, all other containers that are part of the task are stopped. If the essential
parameter of a container is marked as false
, its failure doesn't affect the rest of the containers in a task. If this parameter is omitted, a container is assumed to be essential.
All tasks must have at least one essential container. If you have an application that's composed of multiple containers, group containers that are used for a common purpose into components, and separate the different components into multiple task definitions. For more information, see Application Architecture in the Amazon Elastic Container Service Developer Guide.
Sourcepub fn restart_policy(self, input: ContainerRestartPolicy) -> Self
pub fn restart_policy(self, input: ContainerRestartPolicy) -> Self
The restart policy for a container. When you set up a restart policy, Amazon ECS can restart the container without needing to replace the task. For more information, see Restart individual containers in Amazon ECS tasks with container restart policies in the Amazon Elastic Container Service Developer Guide.
Sourcepub fn set_restart_policy(self, input: Option<ContainerRestartPolicy>) -> Self
pub fn set_restart_policy(self, input: Option<ContainerRestartPolicy>) -> Self
The restart policy for a container. When you set up a restart policy, Amazon ECS can restart the container without needing to replace the task. For more information, see Restart individual containers in Amazon ECS tasks with container restart policies in the Amazon Elastic Container Service Developer Guide.
Sourcepub fn get_restart_policy(&self) -> &Option<ContainerRestartPolicy>
pub fn get_restart_policy(&self) -> &Option<ContainerRestartPolicy>
The restart policy for a container. When you set up a restart policy, Amazon ECS can restart the container without needing to replace the task. For more information, see Restart individual containers in Amazon ECS tasks with container restart policies in the Amazon Elastic Container Service Developer Guide.
Sourcepub fn entry_point(self, input: impl Into<String>) -> Self
pub fn entry_point(self, input: impl Into<String>) -> Self
Appends an item to entry_point
.
To override the contents of this collection use set_entry_point
.
Early versions of the Amazon ECS container agent don't properly handle entryPoint
parameters. If you have problems using entryPoint
, update your container agent or enter your commands and arguments as command
array items instead.
The entry point that's passed to the container. This parameter maps to Entrypoint
in the docker container create command and the --entrypoint
option to docker run.
Sourcepub fn set_entry_point(self, input: Option<Vec<String>>) -> Self
pub fn set_entry_point(self, input: Option<Vec<String>>) -> Self
Early versions of the Amazon ECS container agent don't properly handle entryPoint
parameters. If you have problems using entryPoint
, update your container agent or enter your commands and arguments as command
array items instead.
The entry point that's passed to the container. This parameter maps to Entrypoint
in the docker container create command and the --entrypoint
option to docker run.
Sourcepub fn get_entry_point(&self) -> &Option<Vec<String>>
pub fn get_entry_point(&self) -> &Option<Vec<String>>
Early versions of the Amazon ECS container agent don't properly handle entryPoint
parameters. If you have problems using entryPoint
, update your container agent or enter your commands and arguments as command
array items instead.
The entry point that's passed to the container. This parameter maps to Entrypoint
in the docker container create command and the --entrypoint
option to docker run.
Sourcepub fn command(self, input: impl Into<String>) -> Self
pub fn command(self, input: impl Into<String>) -> Self
Appends an item to command
.
To override the contents of this collection use set_command
.
The command that's passed to the container. This parameter maps to Cmd
in the docker container create command and the COMMAND
parameter to docker run. If there are multiple arguments, each argument is a separated string in the array.
Sourcepub fn set_command(self, input: Option<Vec<String>>) -> Self
pub fn set_command(self, input: Option<Vec<String>>) -> Self
The command that's passed to the container. This parameter maps to Cmd
in the docker container create command and the COMMAND
parameter to docker run. If there are multiple arguments, each argument is a separated string in the array.
Sourcepub fn get_command(&self) -> &Option<Vec<String>>
pub fn get_command(&self) -> &Option<Vec<String>>
The command that's passed to the container. This parameter maps to Cmd
in the docker container create command and the COMMAND
parameter to docker run. If there are multiple arguments, each argument is a separated string in the array.
Sourcepub fn environment(self, input: KeyValuePair) -> Self
pub fn environment(self, input: KeyValuePair) -> Self
Appends an item to environment
.
To override the contents of this collection use set_environment
.
The environment variables to pass to a container. This parameter maps to Env
in the docker container create command and the --env
option to docker run.
We don't recommend that you use plaintext environment variables for sensitive information, such as credential data.
Sourcepub fn set_environment(self, input: Option<Vec<KeyValuePair>>) -> Self
pub fn set_environment(self, input: Option<Vec<KeyValuePair>>) -> Self
The environment variables to pass to a container. This parameter maps to Env
in the docker container create command and the --env
option to docker run.
We don't recommend that you use plaintext environment variables for sensitive information, such as credential data.
Sourcepub fn get_environment(&self) -> &Option<Vec<KeyValuePair>>
pub fn get_environment(&self) -> &Option<Vec<KeyValuePair>>
The environment variables to pass to a container. This parameter maps to Env
in the docker container create command and the --env
option to docker run.
We don't recommend that you use plaintext environment variables for sensitive information, such as credential data.
Sourcepub fn environment_files(self, input: EnvironmentFile) -> Self
pub fn environment_files(self, input: EnvironmentFile) -> Self
Appends an item to environment_files
.
To override the contents of this collection use set_environment_files
.
A list of files containing the environment variables to pass to a container. This parameter maps to the --env-file
option to docker run.
You can specify up to ten environment files. The file must have a .env
file extension. Each line in an environment file contains an environment variable in VARIABLE=VALUE
format. Lines beginning with #
are treated as comments and are ignored.
If there are environment variables specified using the environment
parameter in a container definition, they take precedence over the variables contained within an environment file. If multiple environment files are specified that contain the same variable, they're processed from the top down. We recommend that you use unique variable names. For more information, see Specifying Environment Variables in the Amazon Elastic Container Service Developer Guide.
Sourcepub fn set_environment_files(self, input: Option<Vec<EnvironmentFile>>) -> Self
pub fn set_environment_files(self, input: Option<Vec<EnvironmentFile>>) -> Self
A list of files containing the environment variables to pass to a container. This parameter maps to the --env-file
option to docker run.
You can specify up to ten environment files. The file must have a .env
file extension. Each line in an environment file contains an environment variable in VARIABLE=VALUE
format. Lines beginning with #
are treated as comments and are ignored.
If there are environment variables specified using the environment
parameter in a container definition, they take precedence over the variables contained within an environment file. If multiple environment files are specified that contain the same variable, they're processed from the top down. We recommend that you use unique variable names. For more information, see Specifying Environment Variables in the Amazon Elastic Container Service Developer Guide.
Sourcepub fn get_environment_files(&self) -> &Option<Vec<EnvironmentFile>>
pub fn get_environment_files(&self) -> &Option<Vec<EnvironmentFile>>
A list of files containing the environment variables to pass to a container. This parameter maps to the --env-file
option to docker run.
You can specify up to ten environment files. The file must have a .env
file extension. Each line in an environment file contains an environment variable in VARIABLE=VALUE
format. Lines beginning with #
are treated as comments and are ignored.
If there are environment variables specified using the environment
parameter in a container definition, they take precedence over the variables contained within an environment file. If multiple environment files are specified that contain the same variable, they're processed from the top down. We recommend that you use unique variable names. For more information, see Specifying Environment Variables in the Amazon Elastic Container Service Developer Guide.
Sourcepub fn mount_points(self, input: MountPoint) -> Self
pub fn mount_points(self, input: MountPoint) -> Self
Appends an item to mount_points
.
To override the contents of this collection use set_mount_points
.
The mount points for data volumes in your container.
This parameter maps to Volumes
in the docker container create command and the --volume
option to docker run.
Windows containers can mount whole directories on the same drive as $env:ProgramData
. Windows containers can't mount directories on a different drive, and mount point can't be across drives.
Sourcepub fn set_mount_points(self, input: Option<Vec<MountPoint>>) -> Self
pub fn set_mount_points(self, input: Option<Vec<MountPoint>>) -> Self
The mount points for data volumes in your container.
This parameter maps to Volumes
in the docker container create command and the --volume
option to docker run.
Windows containers can mount whole directories on the same drive as $env:ProgramData
. Windows containers can't mount directories on a different drive, and mount point can't be across drives.
Sourcepub fn get_mount_points(&self) -> &Option<Vec<MountPoint>>
pub fn get_mount_points(&self) -> &Option<Vec<MountPoint>>
The mount points for data volumes in your container.
This parameter maps to Volumes
in the docker container create command and the --volume
option to docker run.
Windows containers can mount whole directories on the same drive as $env:ProgramData
. Windows containers can't mount directories on a different drive, and mount point can't be across drives.
Sourcepub fn volumes_from(self, input: VolumeFrom) -> Self
pub fn volumes_from(self, input: VolumeFrom) -> Self
Appends an item to volumes_from
.
To override the contents of this collection use set_volumes_from
.
Data volumes to mount from another container. This parameter maps to VolumesFrom
in the docker container create command and the --volumes-from
option to docker run.
Sourcepub fn set_volumes_from(self, input: Option<Vec<VolumeFrom>>) -> Self
pub fn set_volumes_from(self, input: Option<Vec<VolumeFrom>>) -> Self
Data volumes to mount from another container. This parameter maps to VolumesFrom
in the docker container create command and the --volumes-from
option to docker run.
Sourcepub fn get_volumes_from(&self) -> &Option<Vec<VolumeFrom>>
pub fn get_volumes_from(&self) -> &Option<Vec<VolumeFrom>>
Data volumes to mount from another container. This parameter maps to VolumesFrom
in the docker container create command and the --volumes-from
option to docker run.
Sourcepub fn linux_parameters(self, input: LinuxParameters) -> Self
pub fn linux_parameters(self, input: LinuxParameters) -> Self
Linux-specific modifications that are applied to the default Docker container configuration, such as Linux kernel capabilities. For more information see KernelCapabilities.
This parameter is not supported for Windows containers.
Sourcepub fn set_linux_parameters(self, input: Option<LinuxParameters>) -> Self
pub fn set_linux_parameters(self, input: Option<LinuxParameters>) -> Self
Linux-specific modifications that are applied to the default Docker container configuration, such as Linux kernel capabilities. For more information see KernelCapabilities.
This parameter is not supported for Windows containers.
Sourcepub fn get_linux_parameters(&self) -> &Option<LinuxParameters>
pub fn get_linux_parameters(&self) -> &Option<LinuxParameters>
Linux-specific modifications that are applied to the default Docker container configuration, such as Linux kernel capabilities. For more information see KernelCapabilities.
This parameter is not supported for Windows containers.
Sourcepub fn secrets(self, input: Secret) -> Self
pub fn secrets(self, input: Secret) -> Self
Appends an item to secrets
.
To override the contents of this collection use set_secrets
.
The secrets to pass to the container. For more information, see Specifying Sensitive Data in the Amazon Elastic Container Service Developer Guide.
Sourcepub fn set_secrets(self, input: Option<Vec<Secret>>) -> Self
pub fn set_secrets(self, input: Option<Vec<Secret>>) -> Self
The secrets to pass to the container. For more information, see Specifying Sensitive Data in the Amazon Elastic Container Service Developer Guide.
Sourcepub fn get_secrets(&self) -> &Option<Vec<Secret>>
pub fn get_secrets(&self) -> &Option<Vec<Secret>>
The secrets to pass to the container. For more information, see Specifying Sensitive Data in the Amazon Elastic Container Service Developer Guide.
Sourcepub fn depends_on(self, input: ContainerDependency) -> Self
pub fn depends_on(self, input: ContainerDependency) -> Self
Appends an item to depends_on
.
To override the contents of this collection use set_depends_on
.
The dependencies defined for container startup and shutdown. A container can contain multiple dependencies on other containers in a task definition. When a dependency is defined for container startup, for container shutdown it is reversed.
For tasks using the EC2 launch type, the container instances require at least version 1.26.0 of the container agent to turn on container dependencies. However, we recommend using the latest container agent version. For information about checking your agent version and updating to the latest version, see Updating the Amazon ECS Container Agent in the Amazon Elastic Container Service Developer Guide. If you're using an Amazon ECS-optimized Linux AMI, your instance needs at least version 1.26.0-1 of the ecs-init
package. If your container instances are launched from version 20190301
or later, then they contain the required versions of the container agent and ecs-init
. For more information, see Amazon ECS-optimized Linux AMI in the Amazon Elastic Container Service Developer Guide.
For tasks using the Fargate launch type, the task or service requires the following platforms:
-
Linux platform version
1.3.0
or later. -
Windows platform version
1.0.0
or later.
Sourcepub fn set_depends_on(self, input: Option<Vec<ContainerDependency>>) -> Self
pub fn set_depends_on(self, input: Option<Vec<ContainerDependency>>) -> Self
The dependencies defined for container startup and shutdown. A container can contain multiple dependencies on other containers in a task definition. When a dependency is defined for container startup, for container shutdown it is reversed.
For tasks using the EC2 launch type, the container instances require at least version 1.26.0 of the container agent to turn on container dependencies. However, we recommend using the latest container agent version. For information about checking your agent version and updating to the latest version, see Updating the Amazon ECS Container Agent in the Amazon Elastic Container Service Developer Guide. If you're using an Amazon ECS-optimized Linux AMI, your instance needs at least version 1.26.0-1 of the ecs-init
package. If your container instances are launched from version 20190301
or later, then they contain the required versions of the container agent and ecs-init
. For more information, see Amazon ECS-optimized Linux AMI in the Amazon Elastic Container Service Developer Guide.
For tasks using the Fargate launch type, the task or service requires the following platforms:
-
Linux platform version
1.3.0
or later. -
Windows platform version
1.0.0
or later.
Sourcepub fn get_depends_on(&self) -> &Option<Vec<ContainerDependency>>
pub fn get_depends_on(&self) -> &Option<Vec<ContainerDependency>>
The dependencies defined for container startup and shutdown. A container can contain multiple dependencies on other containers in a task definition. When a dependency is defined for container startup, for container shutdown it is reversed.
For tasks using the EC2 launch type, the container instances require at least version 1.26.0 of the container agent to turn on container dependencies. However, we recommend using the latest container agent version. For information about checking your agent version and updating to the latest version, see Updating the Amazon ECS Container Agent in the Amazon Elastic Container Service Developer Guide. If you're using an Amazon ECS-optimized Linux AMI, your instance needs at least version 1.26.0-1 of the ecs-init
package. If your container instances are launched from version 20190301
or later, then they contain the required versions of the container agent and ecs-init
. For more information, see Amazon ECS-optimized Linux AMI in the Amazon Elastic Container Service Developer Guide.
For tasks using the Fargate launch type, the task or service requires the following platforms:
-
Linux platform version
1.3.0
or later. -
Windows platform version
1.0.0
or later.
Sourcepub fn start_timeout(self, input: i32) -> Self
pub fn start_timeout(self, input: i32) -> Self
Time duration (in seconds) to wait before giving up on resolving dependencies for a container. For example, you specify two containers in a task definition with containerA having a dependency on containerB reaching a COMPLETE
, SUCCESS
, or HEALTHY
status. If a startTimeout
value is specified for containerB and it doesn't reach the desired status within that time then containerA gives up and not start. This results in the task transitioning to a STOPPED
state.
When the ECS_CONTAINER_START_TIMEOUT
container agent configuration variable is used, it's enforced independently from this start timeout value.
For tasks using the Fargate launch type, the task or service requires the following platforms:
-
Linux platform version
1.3.0
or later. -
Windows platform version
1.0.0
or later.
For tasks using the EC2 launch type, your container instances require at least version 1.26.0
of the container agent to use a container start timeout value. However, we recommend using the latest container agent version. For information about checking your agent version and updating to the latest version, see Updating the Amazon ECS Container Agent in the Amazon Elastic Container Service Developer Guide. If you're using an Amazon ECS-optimized Linux AMI, your instance needs at least version 1.26.0-1
of the ecs-init
package. If your container instances are launched from version 20190301
or later, then they contain the required versions of the container agent and ecs-init
. For more information, see Amazon ECS-optimized Linux AMI in the Amazon Elastic Container Service Developer Guide.
The valid values for Fargate are 2-120 seconds.
Sourcepub fn set_start_timeout(self, input: Option<i32>) -> Self
pub fn set_start_timeout(self, input: Option<i32>) -> Self
Time duration (in seconds) to wait before giving up on resolving dependencies for a container. For example, you specify two containers in a task definition with containerA having a dependency on containerB reaching a COMPLETE
, SUCCESS
, or HEALTHY
status. If a startTimeout
value is specified for containerB and it doesn't reach the desired status within that time then containerA gives up and not start. This results in the task transitioning to a STOPPED
state.
When the ECS_CONTAINER_START_TIMEOUT
container agent configuration variable is used, it's enforced independently from this start timeout value.
For tasks using the Fargate launch type, the task or service requires the following platforms:
-
Linux platform version
1.3.0
or later. -
Windows platform version
1.0.0
or later.
For tasks using the EC2 launch type, your container instances require at least version 1.26.0
of the container agent to use a container start timeout value. However, we recommend using the latest container agent version. For information about checking your agent version and updating to the latest version, see Updating the Amazon ECS Container Agent in the Amazon Elastic Container Service Developer Guide. If you're using an Amazon ECS-optimized Linux AMI, your instance needs at least version 1.26.0-1
of the ecs-init
package. If your container instances are launched from version 20190301
or later, then they contain the required versions of the container agent and ecs-init
. For more information, see Amazon ECS-optimized Linux AMI in the Amazon Elastic Container Service Developer Guide.
The valid values for Fargate are 2-120 seconds.
Sourcepub fn get_start_timeout(&self) -> &Option<i32>
pub fn get_start_timeout(&self) -> &Option<i32>
Time duration (in seconds) to wait before giving up on resolving dependencies for a container. For example, you specify two containers in a task definition with containerA having a dependency on containerB reaching a COMPLETE
, SUCCESS
, or HEALTHY
status. If a startTimeout
value is specified for containerB and it doesn't reach the desired status within that time then containerA gives up and not start. This results in the task transitioning to a STOPPED
state.
When the ECS_CONTAINER_START_TIMEOUT
container agent configuration variable is used, it's enforced independently from this start timeout value.
For tasks using the Fargate launch type, the task or service requires the following platforms:
-
Linux platform version
1.3.0
or later. -
Windows platform version
1.0.0
or later.
For tasks using the EC2 launch type, your container instances require at least version 1.26.0
of the container agent to use a container start timeout value. However, we recommend using the latest container agent version. For information about checking your agent version and updating to the latest version, see Updating the Amazon ECS Container Agent in the Amazon Elastic Container Service Developer Guide. If you're using an Amazon ECS-optimized Linux AMI, your instance needs at least version 1.26.0-1
of the ecs-init
package. If your container instances are launched from version 20190301
or later, then they contain the required versions of the container agent and ecs-init
. For more information, see Amazon ECS-optimized Linux AMI in the Amazon Elastic Container Service Developer Guide.
The valid values for Fargate are 2-120 seconds.
Sourcepub fn stop_timeout(self, input: i32) -> Self
pub fn stop_timeout(self, input: i32) -> Self
Time duration (in seconds) to wait before the container is forcefully killed if it doesn't exit normally on its own.
For tasks using the Fargate launch type, the task or service requires the following platforms:
-
Linux platform version
1.3.0
or later. -
Windows platform version
1.0.0
or later.
For tasks that use the Fargate launch type, the max stop timeout value is 120 seconds and if the parameter is not specified, the default value of 30 seconds is used.
For tasks that use the EC2 launch type, if the stopTimeout
parameter isn't specified, the value set for the Amazon ECS container agent configuration variable ECS_CONTAINER_STOP_TIMEOUT
is used. If neither the stopTimeout
parameter or the ECS_CONTAINER_STOP_TIMEOUT
agent configuration variable are set, then the default values of 30 seconds for Linux containers and 30 seconds on Windows containers are used. Your container instances require at least version 1.26.0 of the container agent to use a container stop timeout value. However, we recommend using the latest container agent version. For information about checking your agent version and updating to the latest version, see Updating the Amazon ECS Container Agent in the Amazon Elastic Container Service Developer Guide. If you're using an Amazon ECS-optimized Linux AMI, your instance needs at least version 1.26.0-1 of the ecs-init
package. If your container instances are launched from version 20190301
or later, then they contain the required versions of the container agent and ecs-init
. For more information, see Amazon ECS-optimized Linux AMI in the Amazon Elastic Container Service Developer Guide.
The valid values for Fargate are 2-120 seconds.
Sourcepub fn set_stop_timeout(self, input: Option<i32>) -> Self
pub fn set_stop_timeout(self, input: Option<i32>) -> Self
Time duration (in seconds) to wait before the container is forcefully killed if it doesn't exit normally on its own.
For tasks using the Fargate launch type, the task or service requires the following platforms:
-
Linux platform version
1.3.0
or later. -
Windows platform version
1.0.0
or later.
For tasks that use the Fargate launch type, the max stop timeout value is 120 seconds and if the parameter is not specified, the default value of 30 seconds is used.
For tasks that use the EC2 launch type, if the stopTimeout
parameter isn't specified, the value set for the Amazon ECS container agent configuration variable ECS_CONTAINER_STOP_TIMEOUT
is used. If neither the stopTimeout
parameter or the ECS_CONTAINER_STOP_TIMEOUT
agent configuration variable are set, then the default values of 30 seconds for Linux containers and 30 seconds on Windows containers are used. Your container instances require at least version 1.26.0 of the container agent to use a container stop timeout value. However, we recommend using the latest container agent version. For information about checking your agent version and updating to the latest version, see Updating the Amazon ECS Container Agent in the Amazon Elastic Container Service Developer Guide. If you're using an Amazon ECS-optimized Linux AMI, your instance needs at least version 1.26.0-1 of the ecs-init
package. If your container instances are launched from version 20190301
or later, then they contain the required versions of the container agent and ecs-init
. For more information, see Amazon ECS-optimized Linux AMI in the Amazon Elastic Container Service Developer Guide.
The valid values for Fargate are 2-120 seconds.
Sourcepub fn get_stop_timeout(&self) -> &Option<i32>
pub fn get_stop_timeout(&self) -> &Option<i32>
Time duration (in seconds) to wait before the container is forcefully killed if it doesn't exit normally on its own.
For tasks using the Fargate launch type, the task or service requires the following platforms:
-
Linux platform version
1.3.0
or later. -
Windows platform version
1.0.0
or later.
For tasks that use the Fargate launch type, the max stop timeout value is 120 seconds and if the parameter is not specified, the default value of 30 seconds is used.
For tasks that use the EC2 launch type, if the stopTimeout
parameter isn't specified, the value set for the Amazon ECS container agent configuration variable ECS_CONTAINER_STOP_TIMEOUT
is used. If neither the stopTimeout
parameter or the ECS_CONTAINER_STOP_TIMEOUT
agent configuration variable are set, then the default values of 30 seconds for Linux containers and 30 seconds on Windows containers are used. Your container instances require at least version 1.26.0 of the container agent to use a container stop timeout value. However, we recommend using the latest container agent version. For information about checking your agent version and updating to the latest version, see Updating the Amazon ECS Container Agent in the Amazon Elastic Container Service Developer Guide. If you're using an Amazon ECS-optimized Linux AMI, your instance needs at least version 1.26.0-1 of the ecs-init
package. If your container instances are launched from version 20190301
or later, then they contain the required versions of the container agent and ecs-init
. For more information, see Amazon ECS-optimized Linux AMI in the Amazon Elastic Container Service Developer Guide.
The valid values for Fargate are 2-120 seconds.
Sourcepub fn version_consistency(self, input: VersionConsistency) -> Self
pub fn version_consistency(self, input: VersionConsistency) -> Self
Specifies whether Amazon ECS will resolve the container image tag provided in the container definition to an image digest. By default, the value is enabled
. If you set the value for a container as disabled
, Amazon ECS will not resolve the provided container image tag to a digest and will use the original image URI specified in the container definition for deployment. For more information about container image resolution, see Container image resolution in the Amazon ECS Developer Guide.
Sourcepub fn set_version_consistency(self, input: Option<VersionConsistency>) -> Self
pub fn set_version_consistency(self, input: Option<VersionConsistency>) -> Self
Specifies whether Amazon ECS will resolve the container image tag provided in the container definition to an image digest. By default, the value is enabled
. If you set the value for a container as disabled
, Amazon ECS will not resolve the provided container image tag to a digest and will use the original image URI specified in the container definition for deployment. For more information about container image resolution, see Container image resolution in the Amazon ECS Developer Guide.
Sourcepub fn get_version_consistency(&self) -> &Option<VersionConsistency>
pub fn get_version_consistency(&self) -> &Option<VersionConsistency>
Specifies whether Amazon ECS will resolve the container image tag provided in the container definition to an image digest. By default, the value is enabled
. If you set the value for a container as disabled
, Amazon ECS will not resolve the provided container image tag to a digest and will use the original image URI specified in the container definition for deployment. For more information about container image resolution, see Container image resolution in the Amazon ECS Developer Guide.
Sourcepub fn hostname(self, input: impl Into<String>) -> Self
pub fn hostname(self, input: impl Into<String>) -> Self
The hostname to use for your container. This parameter maps to Hostname
in the docker container create command and the --hostname
option to docker run.
The hostname
parameter is not supported if you're using the awsvpc
network mode.
Sourcepub fn set_hostname(self, input: Option<String>) -> Self
pub fn set_hostname(self, input: Option<String>) -> Self
The hostname to use for your container. This parameter maps to Hostname
in the docker container create command and the --hostname
option to docker run.
The hostname
parameter is not supported if you're using the awsvpc
network mode.
Sourcepub fn get_hostname(&self) -> &Option<String>
pub fn get_hostname(&self) -> &Option<String>
The hostname to use for your container. This parameter maps to Hostname
in the docker container create command and the --hostname
option to docker run.
The hostname
parameter is not supported if you're using the awsvpc
network mode.
Sourcepub fn user(self, input: impl Into<String>) -> Self
pub fn user(self, input: impl Into<String>) -> Self
The user to use inside the container. This parameter maps to User
in the docker container create command and the --user
option to docker run.
When running tasks using the host
network mode, don't run containers using the root user (UID 0). We recommend using a non-root user for better security.
You can specify the user
using the following formats. If specifying a UID or GID, you must specify it as a positive integer.
-
user
-
user:group
-
uid
-
uid:gid
-
user:gid
-
uid:group
This parameter is not supported for Windows containers.
Sourcepub fn set_user(self, input: Option<String>) -> Self
pub fn set_user(self, input: Option<String>) -> Self
The user to use inside the container. This parameter maps to User
in the docker container create command and the --user
option to docker run.
When running tasks using the host
network mode, don't run containers using the root user (UID 0). We recommend using a non-root user for better security.
You can specify the user
using the following formats. If specifying a UID or GID, you must specify it as a positive integer.
-
user
-
user:group
-
uid
-
uid:gid
-
user:gid
-
uid:group
This parameter is not supported for Windows containers.
Sourcepub fn get_user(&self) -> &Option<String>
pub fn get_user(&self) -> &Option<String>
The user to use inside the container. This parameter maps to User
in the docker container create command and the --user
option to docker run.
When running tasks using the host
network mode, don't run containers using the root user (UID 0). We recommend using a non-root user for better security.
You can specify the user
using the following formats. If specifying a UID or GID, you must specify it as a positive integer.
-
user
-
user:group
-
uid
-
uid:gid
-
user:gid
-
uid:group
This parameter is not supported for Windows containers.
Sourcepub fn working_directory(self, input: impl Into<String>) -> Self
pub fn working_directory(self, input: impl Into<String>) -> Self
The working directory to run commands inside the container in. This parameter maps to WorkingDir
in the docker container create command and the --workdir
option to docker run.
Sourcepub fn set_working_directory(self, input: Option<String>) -> Self
pub fn set_working_directory(self, input: Option<String>) -> Self
The working directory to run commands inside the container in. This parameter maps to WorkingDir
in the docker container create command and the --workdir
option to docker run.
Sourcepub fn get_working_directory(&self) -> &Option<String>
pub fn get_working_directory(&self) -> &Option<String>
The working directory to run commands inside the container in. This parameter maps to WorkingDir
in the docker container create command and the --workdir
option to docker run.
Sourcepub fn disable_networking(self, input: bool) -> Self
pub fn disable_networking(self, input: bool) -> Self
When this parameter is true, networking is off within the container. This parameter maps to NetworkDisabled
in the docker container create command.
This parameter is not supported for Windows containers.
Sourcepub fn set_disable_networking(self, input: Option<bool>) -> Self
pub fn set_disable_networking(self, input: Option<bool>) -> Self
When this parameter is true, networking is off within the container. This parameter maps to NetworkDisabled
in the docker container create command.
This parameter is not supported for Windows containers.
Sourcepub fn get_disable_networking(&self) -> &Option<bool>
pub fn get_disable_networking(&self) -> &Option<bool>
When this parameter is true, networking is off within the container. This parameter maps to NetworkDisabled
in the docker container create command.
This parameter is not supported for Windows containers.
Sourcepub fn privileged(self, input: bool) -> Self
pub fn privileged(self, input: bool) -> Self
When this parameter is true, the container is given elevated privileges on the host container instance (similar to the root
user). This parameter maps to Privileged
in the docker container create command and the --privileged
option to docker run
This parameter is not supported for Windows containers or tasks run on Fargate.
Sourcepub fn set_privileged(self, input: Option<bool>) -> Self
pub fn set_privileged(self, input: Option<bool>) -> Self
When this parameter is true, the container is given elevated privileges on the host container instance (similar to the root
user). This parameter maps to Privileged
in the docker container create command and the --privileged
option to docker run
This parameter is not supported for Windows containers or tasks run on Fargate.
Sourcepub fn get_privileged(&self) -> &Option<bool>
pub fn get_privileged(&self) -> &Option<bool>
When this parameter is true, the container is given elevated privileges on the host container instance (similar to the root
user). This parameter maps to Privileged
in the docker container create command and the --privileged
option to docker run
This parameter is not supported for Windows containers or tasks run on Fargate.
Sourcepub fn readonly_root_filesystem(self, input: bool) -> Self
pub fn readonly_root_filesystem(self, input: bool) -> Self
When this parameter is true, the container is given read-only access to its root file system. This parameter maps to ReadonlyRootfs
in the docker container create command and the --read-only
option to docker run.
This parameter is not supported for Windows containers.
Sourcepub fn set_readonly_root_filesystem(self, input: Option<bool>) -> Self
pub fn set_readonly_root_filesystem(self, input: Option<bool>) -> Self
When this parameter is true, the container is given read-only access to its root file system. This parameter maps to ReadonlyRootfs
in the docker container create command and the --read-only
option to docker run.
This parameter is not supported for Windows containers.
Sourcepub fn get_readonly_root_filesystem(&self) -> &Option<bool>
pub fn get_readonly_root_filesystem(&self) -> &Option<bool>
When this parameter is true, the container is given read-only access to its root file system. This parameter maps to ReadonlyRootfs
in the docker container create command and the --read-only
option to docker run.
This parameter is not supported for Windows containers.
Sourcepub fn dns_servers(self, input: impl Into<String>) -> Self
pub fn dns_servers(self, input: impl Into<String>) -> Self
Appends an item to dns_servers
.
To override the contents of this collection use set_dns_servers
.
A list of DNS servers that are presented to the container. This parameter maps to Dns
in the docker container create command and the --dns
option to docker run.
This parameter is not supported for Windows containers.
Sourcepub fn set_dns_servers(self, input: Option<Vec<String>>) -> Self
pub fn set_dns_servers(self, input: Option<Vec<String>>) -> Self
A list of DNS servers that are presented to the container. This parameter maps to Dns
in the docker container create command and the --dns
option to docker run.
This parameter is not supported for Windows containers.
Sourcepub fn get_dns_servers(&self) -> &Option<Vec<String>>
pub fn get_dns_servers(&self) -> &Option<Vec<String>>
A list of DNS servers that are presented to the container. This parameter maps to Dns
in the docker container create command and the --dns
option to docker run.
This parameter is not supported for Windows containers.
Sourcepub fn dns_search_domains(self, input: impl Into<String>) -> Self
pub fn dns_search_domains(self, input: impl Into<String>) -> Self
Appends an item to dns_search_domains
.
To override the contents of this collection use set_dns_search_domains
.
A list of DNS search domains that are presented to the container. This parameter maps to DnsSearch
in the docker container create command and the --dns-search
option to docker run.
This parameter is not supported for Windows containers.
Sourcepub fn set_dns_search_domains(self, input: Option<Vec<String>>) -> Self
pub fn set_dns_search_domains(self, input: Option<Vec<String>>) -> Self
A list of DNS search domains that are presented to the container. This parameter maps to DnsSearch
in the docker container create command and the --dns-search
option to docker run.
This parameter is not supported for Windows containers.
Sourcepub fn get_dns_search_domains(&self) -> &Option<Vec<String>>
pub fn get_dns_search_domains(&self) -> &Option<Vec<String>>
A list of DNS search domains that are presented to the container. This parameter maps to DnsSearch
in the docker container create command and the --dns-search
option to docker run.
This parameter is not supported for Windows containers.
Sourcepub fn extra_hosts(self, input: HostEntry) -> Self
pub fn extra_hosts(self, input: HostEntry) -> Self
Appends an item to extra_hosts
.
To override the contents of this collection use set_extra_hosts
.
A list of hostnames and IP address mappings to append to the /etc/hosts
file on the container. This parameter maps to ExtraHosts
in the docker container create command and the --add-host
option to docker run.
This parameter isn't supported for Windows containers or tasks that use the awsvpc
network mode.
Sourcepub fn set_extra_hosts(self, input: Option<Vec<HostEntry>>) -> Self
pub fn set_extra_hosts(self, input: Option<Vec<HostEntry>>) -> Self
A list of hostnames and IP address mappings to append to the /etc/hosts
file on the container. This parameter maps to ExtraHosts
in the docker container create command and the --add-host
option to docker run.
This parameter isn't supported for Windows containers or tasks that use the awsvpc
network mode.
Sourcepub fn get_extra_hosts(&self) -> &Option<Vec<HostEntry>>
pub fn get_extra_hosts(&self) -> &Option<Vec<HostEntry>>
A list of hostnames and IP address mappings to append to the /etc/hosts
file on the container. This parameter maps to ExtraHosts
in the docker container create command and the --add-host
option to docker run.
This parameter isn't supported for Windows containers or tasks that use the awsvpc
network mode.
Sourcepub fn docker_security_options(self, input: impl Into<String>) -> Self
pub fn docker_security_options(self, input: impl Into<String>) -> Self
Appends an item to docker_security_options
.
To override the contents of this collection use set_docker_security_options
.
A list of strings to provide custom configuration for multiple security systems. This field isn't valid for containers in tasks using the Fargate launch type.
For Linux tasks on EC2, this parameter can be used to reference custom labels for SELinux and AppArmor multi-level security systems.
For any tasks on EC2, this parameter can be used to reference a credential spec file that configures a container for Active Directory authentication. For more information, see Using gMSAs for Windows Containers and Using gMSAs for Linux Containers in the Amazon Elastic Container Service Developer Guide.
This parameter maps to SecurityOpt
in the docker container create command and the --security-opt
option to docker run.
The Amazon ECS container agent running on a container instance must register with the ECS_SELINUX_CAPABLE=true
or ECS_APPARMOR_CAPABLE=true
environment variables before containers placed on that instance can use these security options. For more information, see Amazon ECS Container Agent Configuration in the Amazon Elastic Container Service Developer Guide.
Valid values: "no-new-privileges" | "apparmor:PROFILE" | "label:value" | "credentialspec:CredentialSpecFilePath"
Sourcepub fn set_docker_security_options(self, input: Option<Vec<String>>) -> Self
pub fn set_docker_security_options(self, input: Option<Vec<String>>) -> Self
A list of strings to provide custom configuration for multiple security systems. This field isn't valid for containers in tasks using the Fargate launch type.
For Linux tasks on EC2, this parameter can be used to reference custom labels for SELinux and AppArmor multi-level security systems.
For any tasks on EC2, this parameter can be used to reference a credential spec file that configures a container for Active Directory authentication. For more information, see Using gMSAs for Windows Containers and Using gMSAs for Linux Containers in the Amazon Elastic Container Service Developer Guide.
This parameter maps to SecurityOpt
in the docker container create command and the --security-opt
option to docker run.
The Amazon ECS container agent running on a container instance must register with the ECS_SELINUX_CAPABLE=true
or ECS_APPARMOR_CAPABLE=true
environment variables before containers placed on that instance can use these security options. For more information, see Amazon ECS Container Agent Configuration in the Amazon Elastic Container Service Developer Guide.
Valid values: "no-new-privileges" | "apparmor:PROFILE" | "label:value" | "credentialspec:CredentialSpecFilePath"
Sourcepub fn get_docker_security_options(&self) -> &Option<Vec<String>>
pub fn get_docker_security_options(&self) -> &Option<Vec<String>>
A list of strings to provide custom configuration for multiple security systems. This field isn't valid for containers in tasks using the Fargate launch type.
For Linux tasks on EC2, this parameter can be used to reference custom labels for SELinux and AppArmor multi-level security systems.
For any tasks on EC2, this parameter can be used to reference a credential spec file that configures a container for Active Directory authentication. For more information, see Using gMSAs for Windows Containers and Using gMSAs for Linux Containers in the Amazon Elastic Container Service Developer Guide.
This parameter maps to SecurityOpt
in the docker container create command and the --security-opt
option to docker run.
The Amazon ECS container agent running on a container instance must register with the ECS_SELINUX_CAPABLE=true
or ECS_APPARMOR_CAPABLE=true
environment variables before containers placed on that instance can use these security options. For more information, see Amazon ECS Container Agent Configuration in the Amazon Elastic Container Service Developer Guide.
Valid values: "no-new-privileges" | "apparmor:PROFILE" | "label:value" | "credentialspec:CredentialSpecFilePath"
Sourcepub fn interactive(self, input: bool) -> Self
pub fn interactive(self, input: bool) -> Self
When this parameter is true
, you can deploy containerized applications that require stdin
or a tty
to be allocated. This parameter maps to OpenStdin
in the docker container create command and the --interactive
option to docker run.
Sourcepub fn set_interactive(self, input: Option<bool>) -> Self
pub fn set_interactive(self, input: Option<bool>) -> Self
When this parameter is true
, you can deploy containerized applications that require stdin
or a tty
to be allocated. This parameter maps to OpenStdin
in the docker container create command and the --interactive
option to docker run.
Sourcepub fn get_interactive(&self) -> &Option<bool>
pub fn get_interactive(&self) -> &Option<bool>
When this parameter is true
, you can deploy containerized applications that require stdin
or a tty
to be allocated. This parameter maps to OpenStdin
in the docker container create command and the --interactive
option to docker run.
Sourcepub fn pseudo_terminal(self, input: bool) -> Self
pub fn pseudo_terminal(self, input: bool) -> Self
When this parameter is true
, a TTY is allocated. This parameter maps to Tty
in the docker container create command and the --tty
option to docker run.
Sourcepub fn set_pseudo_terminal(self, input: Option<bool>) -> Self
pub fn set_pseudo_terminal(self, input: Option<bool>) -> Self
When this parameter is true
, a TTY is allocated. This parameter maps to Tty
in the docker container create command and the --tty
option to docker run.
Sourcepub fn get_pseudo_terminal(&self) -> &Option<bool>
pub fn get_pseudo_terminal(&self) -> &Option<bool>
When this parameter is true
, a TTY is allocated. This parameter maps to Tty
in the docker container create command and the --tty
option to docker run.
Sourcepub fn docker_labels(self, k: impl Into<String>, v: impl Into<String>) -> Self
pub fn docker_labels(self, k: impl Into<String>, v: impl Into<String>) -> Self
Adds a key-value pair to docker_labels
.
To override the contents of this collection use set_docker_labels
.
A key/value map of labels to add to the container. This parameter maps to Labels
in the docker container create command and the --label
option to docker run. This parameter requires version 1.18 of the Docker Remote API or greater on your container instance. To check the Docker Remote API version on your container instance, log in to your container instance and run the following command: sudo docker version --format '{{.Server.APIVersion}}'
Sourcepub fn set_docker_labels(self, input: Option<HashMap<String, String>>) -> Self
pub fn set_docker_labels(self, input: Option<HashMap<String, String>>) -> Self
A key/value map of labels to add to the container. This parameter maps to Labels
in the docker container create command and the --label
option to docker run. This parameter requires version 1.18 of the Docker Remote API or greater on your container instance. To check the Docker Remote API version on your container instance, log in to your container instance and run the following command: sudo docker version --format '{{.Server.APIVersion}}'
Sourcepub fn get_docker_labels(&self) -> &Option<HashMap<String, String>>
pub fn get_docker_labels(&self) -> &Option<HashMap<String, String>>
A key/value map of labels to add to the container. This parameter maps to Labels
in the docker container create command and the --label
option to docker run. This parameter requires version 1.18 of the Docker Remote API or greater on your container instance. To check the Docker Remote API version on your container instance, log in to your container instance and run the following command: sudo docker version --format '{{.Server.APIVersion}}'
Sourcepub fn ulimits(self, input: Ulimit) -> Self
pub fn ulimits(self, input: Ulimit) -> Self
Appends an item to ulimits
.
To override the contents of this collection use set_ulimits
.
A list of ulimits
to set in the container. If a ulimit
value is specified in a task definition, it overrides the default values set by Docker. This parameter maps to Ulimits
in the docker container create command and the --ulimit
option to docker run. Valid naming values are displayed in the Ulimit data type.
Amazon ECS tasks hosted on Fargate use the default resource limit values set by the operating system with the exception of the nofile
resource limit parameter which Fargate overrides. The nofile
resource limit sets a restriction on the number of open files that a container can use. The default nofile
soft limit is 65535
and the default hard limit is 65535
.
This parameter requires version 1.18 of the Docker Remote API or greater on your container instance. To check the Docker Remote API version on your container instance, log in to your container instance and run the following command: sudo docker version --format '{{.Server.APIVersion}}'
This parameter is not supported for Windows containers.
Sourcepub fn set_ulimits(self, input: Option<Vec<Ulimit>>) -> Self
pub fn set_ulimits(self, input: Option<Vec<Ulimit>>) -> Self
A list of ulimits
to set in the container. If a ulimit
value is specified in a task definition, it overrides the default values set by Docker. This parameter maps to Ulimits
in the docker container create command and the --ulimit
option to docker run. Valid naming values are displayed in the Ulimit data type.
Amazon ECS tasks hosted on Fargate use the default resource limit values set by the operating system with the exception of the nofile
resource limit parameter which Fargate overrides. The nofile
resource limit sets a restriction on the number of open files that a container can use. The default nofile
soft limit is 65535
and the default hard limit is 65535
.
This parameter requires version 1.18 of the Docker Remote API or greater on your container instance. To check the Docker Remote API version on your container instance, log in to your container instance and run the following command: sudo docker version --format '{{.Server.APIVersion}}'
This parameter is not supported for Windows containers.
Sourcepub fn get_ulimits(&self) -> &Option<Vec<Ulimit>>
pub fn get_ulimits(&self) -> &Option<Vec<Ulimit>>
A list of ulimits
to set in the container. If a ulimit
value is specified in a task definition, it overrides the default values set by Docker. This parameter maps to Ulimits
in the docker container create command and the --ulimit
option to docker run. Valid naming values are displayed in the Ulimit data type.
Amazon ECS tasks hosted on Fargate use the default resource limit values set by the operating system with the exception of the nofile
resource limit parameter which Fargate overrides. The nofile
resource limit sets a restriction on the number of open files that a container can use. The default nofile
soft limit is 65535
and the default hard limit is 65535
.
This parameter requires version 1.18 of the Docker Remote API or greater on your container instance. To check the Docker Remote API version on your container instance, log in to your container instance and run the following command: sudo docker version --format '{{.Server.APIVersion}}'
This parameter is not supported for Windows containers.
Sourcepub fn log_configuration(self, input: LogConfiguration) -> Self
pub fn log_configuration(self, input: LogConfiguration) -> Self
The log configuration specification for the container.
This parameter maps to LogConfig
in the docker container create command and the --log-driver
option to docker run. By default, containers use the same logging driver that the Docker daemon uses. However the container can use a different logging driver than the Docker daemon by specifying a log driver with this parameter in the container definition. To use a different logging driver for a container, the log system must be configured properly on the container instance (or on a different log server for remote logging options).
Amazon ECS currently supports a subset of the logging drivers available to the Docker daemon (shown in the LogConfiguration data type). Additional log drivers may be available in future releases of the Amazon ECS container agent.
This parameter requires version 1.18 of the Docker Remote API or greater on your container instance. To check the Docker Remote API version on your container instance, log in to your container instance and run the following command: sudo docker version --format '{{.Server.APIVersion}}'
The Amazon ECS container agent running on a container instance must register the logging drivers available on that instance with the ECS_AVAILABLE_LOGGING_DRIVERS
environment variable before containers placed on that instance can use these log configuration options. For more information, see Amazon ECS Container Agent Configuration in the Amazon Elastic Container Service Developer Guide.
Sourcepub fn set_log_configuration(self, input: Option<LogConfiguration>) -> Self
pub fn set_log_configuration(self, input: Option<LogConfiguration>) -> Self
The log configuration specification for the container.
This parameter maps to LogConfig
in the docker container create command and the --log-driver
option to docker run. By default, containers use the same logging driver that the Docker daemon uses. However the container can use a different logging driver than the Docker daemon by specifying a log driver with this parameter in the container definition. To use a different logging driver for a container, the log system must be configured properly on the container instance (or on a different log server for remote logging options).
Amazon ECS currently supports a subset of the logging drivers available to the Docker daemon (shown in the LogConfiguration data type). Additional log drivers may be available in future releases of the Amazon ECS container agent.
This parameter requires version 1.18 of the Docker Remote API or greater on your container instance. To check the Docker Remote API version on your container instance, log in to your container instance and run the following command: sudo docker version --format '{{.Server.APIVersion}}'
The Amazon ECS container agent running on a container instance must register the logging drivers available on that instance with the ECS_AVAILABLE_LOGGING_DRIVERS
environment variable before containers placed on that instance can use these log configuration options. For more information, see Amazon ECS Container Agent Configuration in the Amazon Elastic Container Service Developer Guide.
Sourcepub fn get_log_configuration(&self) -> &Option<LogConfiguration>
pub fn get_log_configuration(&self) -> &Option<LogConfiguration>
The log configuration specification for the container.
This parameter maps to LogConfig
in the docker container create command and the --log-driver
option to docker run. By default, containers use the same logging driver that the Docker daemon uses. However the container can use a different logging driver than the Docker daemon by specifying a log driver with this parameter in the container definition. To use a different logging driver for a container, the log system must be configured properly on the container instance (or on a different log server for remote logging options).
Amazon ECS currently supports a subset of the logging drivers available to the Docker daemon (shown in the LogConfiguration data type). Additional log drivers may be available in future releases of the Amazon ECS container agent.
This parameter requires version 1.18 of the Docker Remote API or greater on your container instance. To check the Docker Remote API version on your container instance, log in to your container instance and run the following command: sudo docker version --format '{{.Server.APIVersion}}'
The Amazon ECS container agent running on a container instance must register the logging drivers available on that instance with the ECS_AVAILABLE_LOGGING_DRIVERS
environment variable before containers placed on that instance can use these log configuration options. For more information, see Amazon ECS Container Agent Configuration in the Amazon Elastic Container Service Developer Guide.
Sourcepub fn health_check(self, input: HealthCheck) -> Self
pub fn health_check(self, input: HealthCheck) -> Self
The container health check command and associated configuration parameters for the container. This parameter maps to HealthCheck
in the docker container create command and the HEALTHCHECK
parameter of docker run.
Sourcepub fn set_health_check(self, input: Option<HealthCheck>) -> Self
pub fn set_health_check(self, input: Option<HealthCheck>) -> Self
The container health check command and associated configuration parameters for the container. This parameter maps to HealthCheck
in the docker container create command and the HEALTHCHECK
parameter of docker run.
Sourcepub fn get_health_check(&self) -> &Option<HealthCheck>
pub fn get_health_check(&self) -> &Option<HealthCheck>
The container health check command and associated configuration parameters for the container. This parameter maps to HealthCheck
in the docker container create command and the HEALTHCHECK
parameter of docker run.
Sourcepub fn system_controls(self, input: SystemControl) -> Self
pub fn system_controls(self, input: SystemControl) -> Self
Appends an item to system_controls
.
To override the contents of this collection use set_system_controls
.
A list of namespaced kernel parameters to set in the container. This parameter maps to Sysctls
in the docker container create command and the --sysctl
option to docker run. For example, you can configure net.ipv4.tcp_keepalive_time
setting to maintain longer lived connections.
Sourcepub fn set_system_controls(self, input: Option<Vec<SystemControl>>) -> Self
pub fn set_system_controls(self, input: Option<Vec<SystemControl>>) -> Self
A list of namespaced kernel parameters to set in the container. This parameter maps to Sysctls
in the docker container create command and the --sysctl
option to docker run. For example, you can configure net.ipv4.tcp_keepalive_time
setting to maintain longer lived connections.
Sourcepub fn get_system_controls(&self) -> &Option<Vec<SystemControl>>
pub fn get_system_controls(&self) -> &Option<Vec<SystemControl>>
A list of namespaced kernel parameters to set in the container. This parameter maps to Sysctls
in the docker container create command and the --sysctl
option to docker run. For example, you can configure net.ipv4.tcp_keepalive_time
setting to maintain longer lived connections.
Sourcepub fn resource_requirements(self, input: ResourceRequirement) -> Self
pub fn resource_requirements(self, input: ResourceRequirement) -> Self
Appends an item to resource_requirements
.
To override the contents of this collection use set_resource_requirements
.
The type and amount of a resource to assign to a container. The only supported resource is a GPU.
Sourcepub fn set_resource_requirements(
self,
input: Option<Vec<ResourceRequirement>>,
) -> Self
pub fn set_resource_requirements( self, input: Option<Vec<ResourceRequirement>>, ) -> Self
The type and amount of a resource to assign to a container. The only supported resource is a GPU.
Sourcepub fn get_resource_requirements(&self) -> &Option<Vec<ResourceRequirement>>
pub fn get_resource_requirements(&self) -> &Option<Vec<ResourceRequirement>>
The type and amount of a resource to assign to a container. The only supported resource is a GPU.
Sourcepub fn firelens_configuration(self, input: FirelensConfiguration) -> Self
pub fn firelens_configuration(self, input: FirelensConfiguration) -> Self
The FireLens configuration for the container. This is used to specify and configure a log router for container logs. For more information, see Custom Log Routing in the Amazon Elastic Container Service Developer Guide.
Sourcepub fn set_firelens_configuration(
self,
input: Option<FirelensConfiguration>,
) -> Self
pub fn set_firelens_configuration( self, input: Option<FirelensConfiguration>, ) -> Self
The FireLens configuration for the container. This is used to specify and configure a log router for container logs. For more information, see Custom Log Routing in the Amazon Elastic Container Service Developer Guide.
Sourcepub fn get_firelens_configuration(&self) -> &Option<FirelensConfiguration>
pub fn get_firelens_configuration(&self) -> &Option<FirelensConfiguration>
The FireLens configuration for the container. This is used to specify and configure a log router for container logs. For more information, see Custom Log Routing in the Amazon Elastic Container Service Developer Guide.
Sourcepub fn credential_specs(self, input: impl Into<String>) -> Self
pub fn credential_specs(self, input: impl Into<String>) -> Self
Appends an item to credential_specs
.
To override the contents of this collection use set_credential_specs
.
A list of ARNs in SSM or Amazon S3 to a credential spec (CredSpec
) file that configures the container for Active Directory authentication. We recommend that you use this parameter instead of the dockerSecurityOptions
. The maximum number of ARNs is 1.
There are two formats for each ARN.
- credentialspecdomainless:MyARN
-
You use
credentialspecdomainless:MyARN
to provide aCredSpec
with an additional section for a secret in Secrets Manager. You provide the login credentials to the domain in the secret.Each task that runs on any container instance can join different domains.
You can use this format without joining the container instance to a domain.
- credentialspec:MyARN
-
You use
credentialspec:MyARN
to provide aCredSpec
for a single domain.You must join the container instance to the domain before you start any tasks that use this task definition.
In both formats, replace MyARN
with the ARN in SSM or Amazon S3.
If you provide a credentialspecdomainless:MyARN
, the credspec
must provide a ARN in Secrets Manager for a secret containing the username, password, and the domain to connect to. For better security, the instance isn't joined to the domain for domainless authentication. Other applications on the instance can't use the domainless credentials. You can use this parameter to run tasks on the same instance, even it the tasks need to join different domains. For more information, see Using gMSAs for Windows Containers and Using gMSAs for Linux Containers.
Sourcepub fn set_credential_specs(self, input: Option<Vec<String>>) -> Self
pub fn set_credential_specs(self, input: Option<Vec<String>>) -> Self
A list of ARNs in SSM or Amazon S3 to a credential spec (CredSpec
) file that configures the container for Active Directory authentication. We recommend that you use this parameter instead of the dockerSecurityOptions
. The maximum number of ARNs is 1.
There are two formats for each ARN.
- credentialspecdomainless:MyARN
-
You use
credentialspecdomainless:MyARN
to provide aCredSpec
with an additional section for a secret in Secrets Manager. You provide the login credentials to the domain in the secret.Each task that runs on any container instance can join different domains.
You can use this format without joining the container instance to a domain.
- credentialspec:MyARN
-
You use
credentialspec:MyARN
to provide aCredSpec
for a single domain.You must join the container instance to the domain before you start any tasks that use this task definition.
In both formats, replace MyARN
with the ARN in SSM or Amazon S3.
If you provide a credentialspecdomainless:MyARN
, the credspec
must provide a ARN in Secrets Manager for a secret containing the username, password, and the domain to connect to. For better security, the instance isn't joined to the domain for domainless authentication. Other applications on the instance can't use the domainless credentials. You can use this parameter to run tasks on the same instance, even it the tasks need to join different domains. For more information, see Using gMSAs for Windows Containers and Using gMSAs for Linux Containers.
Sourcepub fn get_credential_specs(&self) -> &Option<Vec<String>>
pub fn get_credential_specs(&self) -> &Option<Vec<String>>
A list of ARNs in SSM or Amazon S3 to a credential spec (CredSpec
) file that configures the container for Active Directory authentication. We recommend that you use this parameter instead of the dockerSecurityOptions
. The maximum number of ARNs is 1.
There are two formats for each ARN.
- credentialspecdomainless:MyARN
-
You use
credentialspecdomainless:MyARN
to provide aCredSpec
with an additional section for a secret in Secrets Manager. You provide the login credentials to the domain in the secret.Each task that runs on any container instance can join different domains.
You can use this format without joining the container instance to a domain.
- credentialspec:MyARN
-
You use
credentialspec:MyARN
to provide aCredSpec
for a single domain.You must join the container instance to the domain before you start any tasks that use this task definition.
In both formats, replace MyARN
with the ARN in SSM or Amazon S3.
If you provide a credentialspecdomainless:MyARN
, the credspec
must provide a ARN in Secrets Manager for a secret containing the username, password, and the domain to connect to. For better security, the instance isn't joined to the domain for domainless authentication. Other applications on the instance can't use the domainless credentials. You can use this parameter to run tasks on the same instance, even it the tasks need to join different domains. For more information, see Using gMSAs for Windows Containers and Using gMSAs for Linux Containers.
Sourcepub fn build(self) -> ContainerDefinition
pub fn build(self) -> ContainerDefinition
Consumes the builder and constructs a ContainerDefinition
.
Trait Implementations§
Source§impl Clone for ContainerDefinitionBuilder
impl Clone for ContainerDefinitionBuilder
Source§fn clone(&self) -> ContainerDefinitionBuilder
fn clone(&self) -> ContainerDefinitionBuilder
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moreSource§impl Debug for ContainerDefinitionBuilder
impl Debug for ContainerDefinitionBuilder
Source§impl Default for ContainerDefinitionBuilder
impl Default for ContainerDefinitionBuilder
Source§fn default() -> ContainerDefinitionBuilder
fn default() -> ContainerDefinitionBuilder
impl StructuralPartialEq for ContainerDefinitionBuilder
Auto Trait Implementations§
impl Freeze for ContainerDefinitionBuilder
impl RefUnwindSafe for ContainerDefinitionBuilder
impl Send for ContainerDefinitionBuilder
impl Sync for ContainerDefinitionBuilder
impl Unpin for ContainerDefinitionBuilder
impl UnwindSafe for ContainerDefinitionBuilder
Blanket Implementations§
Source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
Source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Source§impl<T> CloneToUninit for Twhere
T: Clone,
impl<T> CloneToUninit for Twhere
T: Clone,
Source§impl<T> Instrument for T
impl<T> Instrument for T
Source§fn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
Source§fn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
Source§impl<T> IntoEither for T
impl<T> IntoEither for T
Source§fn into_either(self, into_left: bool) -> Either<Self, Self>
fn into_either(self, into_left: bool) -> Either<Self, Self>
self
into a Left
variant of Either<Self, Self>
if into_left
is true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read moreSource§fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
self
into a Left
variant of Either<Self, Self>
if into_left(&self)
returns true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read moreSource§impl<T> Paint for Twhere
T: ?Sized,
impl<T> Paint for Twhere
T: ?Sized,
Source§fn fg(&self, value: Color) -> Painted<&T>
fn fg(&self, value: Color) -> Painted<&T>
Returns a styled value derived from self
with the foreground set to
value
.
This method should be used rarely. Instead, prefer to use color-specific
builder methods like red()
and
green()
, which have the same functionality but are
pithier.
§Example
Set foreground color to white using fg()
:
use yansi::{Paint, Color};
painted.fg(Color::White);
Set foreground color to white using white()
.
use yansi::Paint;
painted.white();
Source§fn bright_black(&self) -> Painted<&T>
fn bright_black(&self) -> Painted<&T>
Source§fn bright_red(&self) -> Painted<&T>
fn bright_red(&self) -> Painted<&T>
Source§fn bright_green(&self) -> Painted<&T>
fn bright_green(&self) -> Painted<&T>
Source§fn bright_yellow(&self) -> Painted<&T>
fn bright_yellow(&self) -> Painted<&T>
Source§fn bright_blue(&self) -> Painted<&T>
fn bright_blue(&self) -> Painted<&T>
Source§fn bright_magenta(&self) -> Painted<&T>
fn bright_magenta(&self) -> Painted<&T>
Source§fn bright_cyan(&self) -> Painted<&T>
fn bright_cyan(&self) -> Painted<&T>
Source§fn bright_white(&self) -> Painted<&T>
fn bright_white(&self) -> Painted<&T>
Source§fn bg(&self, value: Color) -> Painted<&T>
fn bg(&self, value: Color) -> Painted<&T>
Returns a styled value derived from self
with the background set to
value
.
This method should be used rarely. Instead, prefer to use color-specific
builder methods like on_red()
and
on_green()
, which have the same functionality but
are pithier.
§Example
Set background color to red using fg()
:
use yansi::{Paint, Color};
painted.bg(Color::Red);
Set background color to red using on_red()
.
use yansi::Paint;
painted.on_red();
Source§fn on_primary(&self) -> Painted<&T>
fn on_primary(&self) -> Painted<&T>
Source§fn on_magenta(&self) -> Painted<&T>
fn on_magenta(&self) -> Painted<&T>
Source§fn on_bright_black(&self) -> Painted<&T>
fn on_bright_black(&self) -> Painted<&T>
Source§fn on_bright_red(&self) -> Painted<&T>
fn on_bright_red(&self) -> Painted<&T>
Source§fn on_bright_green(&self) -> Painted<&T>
fn on_bright_green(&self) -> Painted<&T>
Source§fn on_bright_yellow(&self) -> Painted<&T>
fn on_bright_yellow(&self) -> Painted<&T>
Source§fn on_bright_blue(&self) -> Painted<&T>
fn on_bright_blue(&self) -> Painted<&T>
Source§fn on_bright_magenta(&self) -> Painted<&T>
fn on_bright_magenta(&self) -> Painted<&T>
Source§fn on_bright_cyan(&self) -> Painted<&T>
fn on_bright_cyan(&self) -> Painted<&T>
Source§fn on_bright_white(&self) -> Painted<&T>
fn on_bright_white(&self) -> Painted<&T>
Source§fn attr(&self, value: Attribute) -> Painted<&T>
fn attr(&self, value: Attribute) -> Painted<&T>
Enables the styling Attribute
value
.
This method should be used rarely. Instead, prefer to use
attribute-specific builder methods like bold()
and
underline()
, which have the same functionality
but are pithier.
§Example
Make text bold using attr()
:
use yansi::{Paint, Attribute};
painted.attr(Attribute::Bold);
Make text bold using using bold()
.
use yansi::Paint;
painted.bold();
Source§fn rapid_blink(&self) -> Painted<&T>
fn rapid_blink(&self) -> Painted<&T>
Source§fn quirk(&self, value: Quirk) -> Painted<&T>
fn quirk(&self, value: Quirk) -> Painted<&T>
Enables the yansi
Quirk
value
.
This method should be used rarely. Instead, prefer to use quirk-specific
builder methods like mask()
and
wrap()
, which have the same functionality but are
pithier.
§Example
Enable wrapping using .quirk()
:
use yansi::{Paint, Quirk};
painted.quirk(Quirk::Wrap);
Enable wrapping using wrap()
.
use yansi::Paint;
painted.wrap();
Source§fn clear(&self) -> Painted<&T>
👎Deprecated since 1.0.1: renamed to resetting()
due to conflicts with Vec::clear()
.
The clear()
method will be removed in a future release.
fn clear(&self) -> Painted<&T>
resetting()
due to conflicts with Vec::clear()
.
The clear()
method will be removed in a future release.Source§fn whenever(&self, value: Condition) -> Painted<&T>
fn whenever(&self, value: Condition) -> Painted<&T>
Conditionally enable styling based on whether the Condition
value
applies. Replaces any previous condition.
See the crate level docs for more details.
§Example
Enable styling painted
only when both stdout
and stderr
are TTYs:
use yansi::{Paint, Condition};
painted.red().on_yellow().whenever(Condition::STDOUTERR_ARE_TTY);