Struct ContainerSecurityConfig

Source
pub struct ContainerSecurityConfig {
Show 17 fields pub apparmor_profile: Option<String>, pub cap_add: Option<Vec<String>>, pub cap_drop: Option<Vec<String>>, pub groups: Option<Vec<String>>, pub idmappings: Option<IdMappingOptions>, pub mask: Option<Vec<String>>, pub no_new_privileges: Option<bool>, pub privileged: Option<bool>, pub procfs_opts: Option<Vec<String>>, pub read_only_filesystem: Option<bool>, pub seccomp_policy: Option<String>, pub seccomp_profile_path: Option<String>, pub selinux_opts: Option<Vec<String>>, pub umask: Option<String>, pub unmask: Option<Vec<String>>, pub user: Option<String>, pub userns: Option<Namespace>,
}
Expand description

ContainerSecurityConfig is a container’s security features, including SELinux, Apparmor, and Seccomp.

Fields§

§apparmor_profile: Option<String>

ApparmorProfile is the name of the Apparmor profile the container will use. Optional.

§cap_add: Option<Vec<String>>

CapAdd are capabilities which will be added to the container. Conflicts with Privileged. Optional.

§cap_drop: Option<Vec<String>>

CapDrop are capabilities which will be removed from the container. Conflicts with Privileged. Optional.

§groups: Option<Vec<String>>

Groups are a list of supplemental groups the container’s user will be granted access to. Optional.

§idmappings: Option<IdMappingOptions>§mask: Option<Vec<String>>

Mask is the path we want to mask in the container. This masks the paths given in addition to the default list. Optional

§no_new_privileges: Option<bool>

NoNewPrivileges is whether the container will set the no new privileges flag on create, which disables gaining additional privileges (e.g. via setuid) in the container.

§privileged: Option<bool>

Privileged is whether the container is privileged. Privileged does the following: Adds all devices on the system to the container. Adds all capabilities to the container. Disables Seccomp, SELinux, and Apparmor confinement. (Though SELinux can be manually re-enabled). TODO: this conflicts with things. TODO: this does more.

§procfs_opts: Option<Vec<String>>

ProcOpts are the options used for the proc mount.

§read_only_filesystem: Option<bool>

ReadOnlyFilesystem indicates that everything will be mounted as read-only

§seccomp_policy: Option<String>

SeccompPolicy determines which seccomp profile gets applied the container. valid values: empty,default,image

§seccomp_profile_path: Option<String>

SeccompProfilePath is the path to a JSON file containing the container’s Seccomp profile. If not specified, no Seccomp profile will be used. Optional.

§selinux_opts: Option<Vec<String>>

SelinuxProcessLabel is the process label the container will use. If SELinux is enabled and this is not specified, a label will be automatically generated if not specified. Optional.

§umask: Option<String>

Umask is the umask the init process of the container will be run with.

§unmask: Option<Vec<String>>

Unmask is the path we want to unmask in the container. To override all the default paths that are masked, set unmask=ALL.

§user: Option<String>

User is the user the container will be run as. Can be given as a UID or a username; if a username, it will be resolved within the container, using the container’s /etc/passwd. If unset, the container will be run as root. Optional.

§userns: Option<Namespace>

Trait Implementations§

Source§

impl Clone for ContainerSecurityConfig

Source§

fn clone(&self) -> ContainerSecurityConfig

Returns a copy of the value. Read more
1.0.0 · Source§

fn clone_from(&mut self, source: &Self)

Performs copy-assignment from source. Read more
Source§

impl Debug for ContainerSecurityConfig

Source§

fn fmt(&self, f: &mut Formatter<'_>) -> Result<(), Error>

Formats the value using the given formatter. Read more
Source§

impl<'de> Deserialize<'de> for ContainerSecurityConfig

Source§

fn deserialize<__D>( __deserializer: __D, ) -> Result<ContainerSecurityConfig, <__D as Deserializer<'de>>::Error>
where __D: Deserializer<'de>,

Deserialize this value from the given Serde deserializer. Read more
Source§

impl PartialEq for ContainerSecurityConfig

Source§

fn eq(&self, other: &ContainerSecurityConfig) -> bool

Tests for self and other values to be equal, and is used by ==.
1.0.0 · Source§

fn ne(&self, other: &Rhs) -> bool

Tests for !=. The default implementation is almost always sufficient, and should not be overridden without very good reason.
Source§

impl Serialize for ContainerSecurityConfig

Source§

fn serialize<__S>( &self, __serializer: __S, ) -> Result<<__S as Serializer>::Ok, <__S as Serializer>::Error>
where __S: Serializer,

Serialize this value into the given Serde serializer. Read more
Source§

impl StructuralPartialEq for ContainerSecurityConfig

Auto Trait Implementations§

Blanket Implementations§

Source§

impl<T> Any for T
where T: 'static + ?Sized,

Source§

fn type_id(&self) -> TypeId

Gets the TypeId of self. Read more
Source§

impl<T> Borrow<T> for T
where T: ?Sized,

Source§

fn borrow(&self) -> &T

Immutably borrows from an owned value. Read more
Source§

impl<T> BorrowMut<T> for T
where T: ?Sized,

Source§

fn borrow_mut(&mut self) -> &mut T

Mutably borrows from an owned value. Read more
Source§

impl<T> CloneToUninit for T
where T: Clone,

Source§

unsafe fn clone_to_uninit(&self, dest: *mut u8)

🔬This is a nightly-only experimental API. (clone_to_uninit)
Performs copy-assignment from self to dest. Read more
Source§

impl<T> From<T> for T

Source§

fn from(t: T) -> T

Returns the argument unchanged.

Source§

impl<T> Instrument for T

Source§

fn instrument(self, span: Span) -> Instrumented<Self>

Instruments this type with the provided Span, returning an Instrumented wrapper. Read more
Source§

fn in_current_span(self) -> Instrumented<Self>

Instruments this type with the current Span, returning an Instrumented wrapper. Read more
Source§

impl<T, U> Into<U> for T
where U: From<T>,

Source§

fn into(self) -> U

Calls U::from(self).

That is, this conversion is whatever the implementation of From<T> for U chooses to do.

Source§

impl<T> ToOwned for T
where T: Clone,

Source§

type Owned = T

The resulting type after obtaining ownership.
Source§

fn to_owned(&self) -> T

Creates owned data from borrowed data, usually by cloning. Read more
Source§

fn clone_into(&self, target: &mut T)

Uses borrowed data to replace owned data, usually by cloning. Read more
Source§

impl<T, U> TryFrom<U> for T
where U: Into<T>,

Source§

type Error = Infallible

The type returned in the event of a conversion error.
Source§

fn try_from(value: U) -> Result<T, <T as TryFrom<U>>::Error>

Performs the conversion.
Source§

impl<T, U> TryInto<U> for T
where U: TryFrom<T>,

Source§

type Error = <U as TryFrom<T>>::Error

The type returned in the event of a conversion error.
Source§

fn try_into(self) -> Result<U, <U as TryFrom<T>>::Error>

Performs the conversion.
Source§

impl<T> WithSubscriber for T

Source§

fn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self>
where S: Into<Dispatch>,

Attaches the provided Subscriber to this type, returning a WithDispatch wrapper. Read more
Source§

fn with_current_subscriber(self) -> WithDispatch<Self>

Attaches the current default Subscriber to this type, returning a WithDispatch wrapper. Read more
Source§

impl<T> DeserializeOwned for T
where T: for<'de> Deserialize<'de>,

Source§

impl<T> ErasedDestructor for T
where T: 'static,

Source§

impl<T> MaybeSendSync for T