#[non_exhaustive]pub struct FilesystemConfig {
pub allow_write: Vec<String>,
pub deny_write: Vec<String>,
pub deny_read: Vec<String>,
pub inherit_readable: bool,
}Expand description
Filesystem access rules.
Designed for coding agent scenarios: the full host filesystem remains
readable by default (binaries, dotfiles, shared libraries), while writes
are restricted to the working directory. Enforcement mechanism varies by
IsolationLevel:
None/CgroupTracking:AppArmor(Linux) or Seatbelt (macOS) profileNamespace: bind-mount policy derived from these rulesContainer: translated topodman --volumeflags
Fields (Non-exhaustive)§
This struct is marked as non-exhaustive
Struct { .. } syntax; cannot be matched against without a wildcard ..; and struct update syntax will not work.allow_write: Vec<String>Paths where writes are explicitly permitted.
Supports absolute paths and cwd-relative paths (including glob patterns
such as "./src/**"). Default: ["."] — working directory only.
deny_write: Vec<String>Paths where writes are blocked, evaluated after allow_write.
Example: ["./secrets/", ".env"]
deny_read: Vec<String>Paths where reads are blocked.
Example: ["/etc/shadow", "~/.ssh/id_rsa"]
inherit_readable: boolExpose the entire host filesystem as readable.
true by default — preserves access to binaries, dotfiles, and shared
libraries. In Namespace mode this causes the host root to be
bind-mounted read-only; deny_read entries are excluded.
Set to false for a stripped environment.
Trait Implementations§
Source§impl Clone for FilesystemConfig
impl Clone for FilesystemConfig
Source§fn clone(&self) -> FilesystemConfig
fn clone(&self) -> FilesystemConfig
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source. Read more