1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45
/*
* supports a RESTful API for the Libpod library
*
* This documentation describes the Podman v2.x+ RESTful API. It consists of a Docker-compatible API and a Libpod API providing support for Podman’s unique features such as pods. To start the service and keep it running for 5,000 seconds (-t 0 runs forever): podman system service -t 5000 & You can then use cURL on the socket using requests documented below. NOTE: if you install the package podman-docker, it will create a symbolic link for /run/docker.sock to /run/podman/podman.sock NOTE: Some fields in the API response JSON are encoded as omitempty, which means that if said field has a zero value, they will not be encoded in the API response. This is a feature to help reduce the size of the JSON responses returned via the API. NOTE: Due to the limitations of [go-swagger](https://github.com/go-swagger/go-swagger), some field values that have a complex type show up as null in the docs as well as in the API responses. This is because the zero value for the field type is null. The field description in the docs will state what type the field is expected to be for such cases. See podman-system-service(1) for more information. Quick Examples: 'podman info' curl --unix-socket /run/podman/podman.sock http://d/v5.0.0/libpod/info 'podman pull quay.io/containers/podman' curl -XPOST --unix-socket /run/podman/podman.sock -v 'http://d/v5.0.0/images/create?fromImage=quay.io%2Fcontainers%2Fpodman' 'podman list images' curl --unix-socket /run/podman/podman.sock -v 'http://d/v5.0.0/libpod/images/json' | jq
*
* The version of the OpenAPI document: 5.0.0
* Contact: podman@lists.podman.io
* Generated by: https://openapi-generator.tech
*/
use crate::models;
use serde::{Deserialize, Serialize};
/// InspectExecProcess : InspectExecProcess contains information about the process in a given exec session.
#[derive(Clone, Default, Debug, PartialEq, Serialize, Deserialize)]
pub struct InspectExecProcess {
/// Arguments are the arguments to the entrypoint command of the exec session.
#[serde(rename = "arguments", skip_serializing_if = "Option::is_none")]
pub arguments: Option<Vec<String>>,
/// Entrypoint is the entrypoint for the exec session (the command that will be executed in the container).
#[serde(rename = "entrypoint", skip_serializing_if = "Option::is_none")]
pub entrypoint: Option<String>,
/// Privileged is whether the exec session will be started with elevated privileges.
#[serde(rename = "privileged", skip_serializing_if = "Option::is_none")]
pub privileged: Option<bool>,
/// Tty is whether the exec session created a terminal.
#[serde(rename = "tty", skip_serializing_if = "Option::is_none")]
pub tty: Option<bool>,
/// User is the user the exec session was started as.
#[serde(rename = "user", skip_serializing_if = "Option::is_none")]
pub user: Option<String>,
}
impl InspectExecProcess {
/// InspectExecProcess contains information about the process in a given exec session.
pub fn new() -> InspectExecProcess {
InspectExecProcess {
arguments: None,
entrypoint: None,
privileged: None,
tty: None,
user: None,
}
}
}