package options
import "github.com/containerd/containerd/runtime/v2/runhcs/options"
Package options is a generated protocol buffer package.
It is generated from these files:
github.com/containerd/containerd/runtime/v2/runhcs/options/runhcs.proto
It has these top-level messages:
Options
Index ¶
- Variables
- type Options
- func (*Options) Descriptor() ([]byte, []int)
- func (m *Options) Marshal() (dAtA []byte, err error)
- func (m *Options) MarshalTo(dAtA []byte) (int, error)
- func (*Options) ProtoMessage()
- func (m *Options) Reset()
- func (m *Options) Size() (n int)
- func (this *Options) String() string
- func (m *Options) Unmarshal(dAtA []byte) error
- type Options_DebugType
- func (Options_DebugType) EnumDescriptor() ([]byte, []int)
- func (x Options_DebugType) String() string
- type Options_SandboxIsolation
Variables ¶
var ( ErrInvalidLengthRunhcs = fmt.Errorf("proto: negative length found during unmarshaling") ErrIntOverflowRunhcs = fmt.Errorf("proto: integer overflow") )
Types ¶
type Options ¶
type Options struct { // enable debug tracing Debug bool `protobuf:"varint,1,opt,name=debug,proto3" json:"debug,omitempty"` // debug tracing output type DebugType Options_DebugType `protobuf:"varint,2,opt,name=debug_type,json=debugType,proto3,enum=containerd.runhcs.v1.Options_DebugType" json:"debug_type,omitempty"` // registry key root for storage of the runhcs container state RegistryRoot string `protobuf:"bytes,3,opt,name=registry_root,json=registryRoot,proto3" json:"registry_root,omitempty"` // sandbox_image is the image to use for the sandbox that matches the // sandbox_platform. SandboxImage string `protobuf:"bytes,4,opt,name=sandbox_image,json=sandboxImage,proto3" json:"sandbox_image,omitempty"` // sandbox_platform is a CRI setting that specifies the platform // architecture for all sandbox's in this runtime. Values are // 'windows/amd64' and 'linux/amd64'. SandboxPlatform string `protobuf:"bytes,5,opt,name=sandbox_platform,json=sandboxPlatform,proto3" json:"sandbox_platform,omitempty"` // sandbox_isolation is a CRI setting that specifies the isolation level of // the sandbox. For Windows runtime PROCESS and HYPERVISOR are valid. For // LCOW only HYPERVISOR is valid and default if omitted. SandboxIsolation Options_SandboxIsolation `protobuf:"varint,6,opt,name=sandbox_isolation,json=sandboxIsolation,proto3,enum=containerd.runhcs.v1.Options_SandboxIsolation" json:"sandbox_isolation,omitempty"` }
func (*Options) Descriptor ¶
func (*Options) Marshal ¶
func (*Options) MarshalTo ¶
func (*Options) ProtoMessage ¶
func (*Options) ProtoMessage()
func (*Options) Reset ¶
func (m *Options) Reset()
func (*Options) Size ¶
func (*Options) String ¶
func (*Options) Unmarshal ¶
type Options_DebugType ¶
type Options_DebugType int32
const ( Options_NPIPE Options_DebugType = 0 Options_FILE Options_DebugType = 1 Options_ETW Options_DebugType = 2 )
func (Options_DebugType) EnumDescriptor ¶
func (Options_DebugType) EnumDescriptor() ([]byte, []int)
func (Options_DebugType) String ¶
func (x Options_DebugType) String() string
type Options_SandboxIsolation ¶
type Options_SandboxIsolation int32
const ( Options_PROCESS Options_SandboxIsolation = 0 Options_HYPERVISOR Options_SandboxIsolation = 1 )
func (Options_SandboxIsolation) EnumDescriptor ¶
func (Options_SandboxIsolation) EnumDescriptor() ([]byte, []int)
func (Options_SandboxIsolation) String ¶
func (x Options_SandboxIsolation) String() string
Source Files ¶
- Version
- v1.2.6
- Published
- Apr 5, 2019
- Platform
- linux/amd64
- Imports
- 6 packages
- Last checked
- 1 minute ago –
Tools for package owners.