podman_autogen_api/models/container_exec_request.rs
1/*
2 * supports a RESTful API for the Libpod library
3 *
4 * This documentation describes the Podman v2.x+ RESTful API. It consists of a Docker-compatible API and a Libpod API providing support for Podman’s unique features such as pods. To start the service and keep it running for 5,000 seconds (-t 0 runs forever): podman system service -t 5000 & You can then use cURL on the socket using requests documented below. NOTE: if you install the package podman-docker, it will create a symbolic link for /run/docker.sock to /run/podman/podman.sock NOTE: Some fields in the API response JSON are encoded as omitempty, which means that if said field has a zero value, they will not be encoded in the API response. This is a feature to help reduce the size of the JSON responses returned via the API. NOTE: Due to the limitations of [go-swagger](https://github.com/go-swagger/go-swagger), some field values that have a complex type show up as null in the docs as well as in the API responses. This is because the zero value for the field type is null. The field description in the docs will state what type the field is expected to be for such cases. See podman-system-service(1) for more information. Quick Examples: 'podman info' curl --unix-socket /run/podman/podman.sock http://d/v5.0.0/libpod/info 'podman pull quay.io/containers/podman' curl -XPOST --unix-socket /run/podman/podman.sock -v 'http://d/v5.0.0/images/create?fromImage=quay.io%2Fcontainers%2Fpodman' 'podman list images' curl --unix-socket /run/podman/podman.sock -v 'http://d/v5.0.0/libpod/images/json' | jq
5 *
6 * The version of the OpenAPI document: 5.0.0
7 * Contact: podman@lists.podman.io
8 * Generated by: https://openapi-generator.tech
9 */
10
11use crate::models;
12use serde::{Deserialize, Serialize};
13
14#[derive(Clone, Default, Debug, PartialEq, Serialize, Deserialize)]
15pub struct ContainerExecRequest {
16 /// Attach to stderr of the exec command
17 #[serde(rename = "AttachStderr", skip_serializing_if = "Option::is_none")]
18 pub attach_stderr: Option<bool>,
19 /// Attach to stdin of the exec command
20 #[serde(rename = "AttachStdin", skip_serializing_if = "Option::is_none")]
21 pub attach_stdin: Option<bool>,
22 /// Attach to stdout of the exec command
23 #[serde(rename = "AttachStdout", skip_serializing_if = "Option::is_none")]
24 pub attach_stdout: Option<bool>,
25 /// Command to run, as a string or array of strings.
26 #[serde(rename = "Cmd", skip_serializing_if = "Option::is_none")]
27 pub cmd: Option<Vec<String>>,
28 /// \"Override the key sequence for detaching a container. Format is a single character [a-Z] or ctrl-<value> where <value> is one of: a-z, @, ^, [, , or _.\"
29 #[serde(rename = "DetachKeys", skip_serializing_if = "Option::is_none")]
30 pub detach_keys: Option<String>,
31 /// A list of environment variables in the form [\"VAR=value\", ...]
32 #[serde(rename = "Env", skip_serializing_if = "Option::is_none")]
33 pub env: Option<Vec<String>>,
34 /// Runs the exec process with extended privileges
35 #[serde(rename = "Privileged", skip_serializing_if = "Option::is_none")]
36 pub privileged: Option<bool>,
37 /// Allocate a pseudo-TTY
38 #[serde(rename = "Tty", skip_serializing_if = "Option::is_none")]
39 pub tty: Option<bool>,
40 /// \"The user, and optionally, group to run the exec process inside the container. Format is one of: user, user:group, uid, or uid:gid.\"
41 #[serde(rename = "User", skip_serializing_if = "Option::is_none")]
42 pub user: Option<String>,
43 /// The working directory for the exec process inside the container.
44 #[serde(rename = "WorkingDir", skip_serializing_if = "Option::is_none")]
45 pub working_dir: Option<String>,
46}
47
48impl ContainerExecRequest {
49 pub fn new() -> ContainerExecRequest {
50 ContainerExecRequest {
51 attach_stderr: None,
52 attach_stdin: None,
53 attach_stdout: None,
54 cmd: None,
55 detach_keys: None,
56 env: None,
57 privileged: None,
58 tty: None,
59 user: None,
60 working_dir: None,
61 }
62 }
63}