|
|
@ -18,15 +18,15 @@ type Profile struct {
|
|
|
|
Watchdog string
|
|
|
|
Watchdog string
|
|
|
|
// Optional wrapper binary to use when launching command (ex: tsocks)
|
|
|
|
// Optional wrapper binary to use when launching command (ex: tsocks)
|
|
|
|
Wrapper string
|
|
|
|
Wrapper string
|
|
|
|
// If true launch one container per instance, otherwise run all instances in same container
|
|
|
|
// If true launch one sandbox per instance, otherwise run all instances in same sandbox
|
|
|
|
Multi bool
|
|
|
|
Multi bool
|
|
|
|
// Disable mounting of sys and proc inside the container
|
|
|
|
// Disable mounting of sys and proc inside the sandbox
|
|
|
|
NoSysProc bool
|
|
|
|
NoSysProc bool
|
|
|
|
// Disable bind mounting of default directories (etc,usr,bin,lib,lib64)
|
|
|
|
// Disable bind mounting of default directories (etc,usr,bin,lib,lib64)
|
|
|
|
// Also disables default blacklist items (/sbin, /usr/sbin, /usr/bin/sudo)
|
|
|
|
// Also disables default blacklist items (/sbin, /usr/sbin, /usr/bin/sudo)
|
|
|
|
// Normally not used
|
|
|
|
// Normally not used
|
|
|
|
NoDefaults bool
|
|
|
|
NoDefaults bool
|
|
|
|
// Allow bind mounting of files passed as arguments inside the container
|
|
|
|
// Allow bind mounting of files passed as arguments inside the sandbox
|
|
|
|
AllowFiles bool `json:"allow_files"`
|
|
|
|
AllowFiles bool `json:"allow_files"`
|
|
|
|
// List of paths to bind mount inside jail
|
|
|
|
// List of paths to bind mount inside jail
|
|
|
|
Whitelist []WhitelistItem
|
|
|
|
Whitelist []WhitelistItem
|
|
|
@ -65,7 +65,7 @@ type EnvVar struct {
|
|
|
|
Value string
|
|
|
|
Value string
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// Container network definition
|
|
|
|
// Sandbox network definition
|
|
|
|
type NetworkProfile struct {
|
|
|
|
type NetworkProfile struct {
|
|
|
|
// One of empty, host, bridge
|
|
|
|
// One of empty, host, bridge
|
|
|
|
Nettype string `json:"type"`
|
|
|
|
Nettype string `json:"type"`
|
|
|
|