|
| 1 | +package oci; |
| 2 | + |
| 3 | +// LinuxStateDirectory holds the container's state information |
| 4 | +message DefaultState { |
| 5 | + // TODO(vbatts) not as elegant in some ways, but there is not a concept of const here |
| 6 | + optional string Directory = 1 [default = "/run/opencontainer/containers"]; |
| 7 | +} |
| 8 | + |
| 9 | +// LinuxRuntime hosts the Linux-only runtime information |
| 10 | +message LinuxRuntime { |
| 11 | + // UIDMapping specifies user mappings for supporting user namespaces on linux. |
| 12 | + repeated IDMapping UIDMapping = 1; |
| 13 | + // GIDMapping specifies group mappings for supporting user namespaces on linux. |
| 14 | + repeated IDMapping GIDMapping = 2; |
| 15 | + // Rlimits specifies rlimit options to apply to the container's process. |
| 16 | + repeated Rlimit Rlimits = 3; |
| 17 | + // Sysctl are a set of key value pairs that are set for the container on start |
| 18 | + repeated StringStringEntry Sysctl = 4; |
| 19 | + // Resources contain cgroup information for handling resource constraints |
| 20 | + // for the container |
| 21 | + optional Resources Resources = 5; |
| 22 | + // CgroupsPath specifies the path to cgroups that are created and/or joined by the container. |
| 23 | + // The path is expected to be relative to the cgroups mountpoint. |
| 24 | + // If resources are specified, the cgroups at CgroupsPath will be updated based on resources. |
| 25 | + optional string CgroupsPath = 6; |
| 26 | + // Namespaces contains the namespaces that are created and/or joined by the container |
| 27 | + repeated Namespace Namespaces = 7; |
| 28 | + // Devices are a list of device nodes that are created and enabled for the container |
| 29 | + repeated Device Devices = 8; |
| 30 | + // ApparmorProfile specified the apparmor profile for the container. |
| 31 | + optional string ApparmorProfile = 9; |
| 32 | + // SelinuxProcessLabel specifies the selinux context that the container process is run as. |
| 33 | + optional string SelinuxProcessLabel = 10; |
| 34 | + // Seccomp specifies the seccomp security settings for the container. |
| 35 | + optional Seccomp Seccomp = 11; |
| 36 | + // RootfsPropagation is the rootfs mount propagation mode for the container |
| 37 | + optional string RootfsPropagation = 12; |
| 38 | +} |
| 39 | + |
| 40 | +// IDMapping specifies UID/GID mappings |
| 41 | +message IDMapping { |
| 42 | + // HostID is the UID/GID of the host user or group |
| 43 | + optional int32 HostID = 1; |
| 44 | + // ContainerID is the UID/GID of the container's user or group |
| 45 | + optional int32 ContainerID = 2; |
| 46 | + // Size is the length of the range of IDs mapped between the two namespaces |
| 47 | + optional int32 Size = 3; |
| 48 | +} |
| 49 | + |
| 50 | +// Rlimit type and restrictions |
| 51 | +message Rlimit { |
| 52 | + // Type of the rlimit to set |
| 53 | + optional string Type = 1; |
| 54 | + // Hard is the hard limit for the specified type |
| 55 | + optional uint64 Hard = 2; |
| 56 | + // Soft is the soft limit for the specified type |
| 57 | + optional uint64 Soft = 3; |
| 58 | +} |
| 59 | + |
| 60 | +// StringStringEntry is more backwards compatible protobuf associative map (than map<string, Mount>) |
| 61 | +message StringStringEntry { |
| 62 | + required string key = 1; |
| 63 | + required string value = 2; |
| 64 | +} |
| 65 | + |
| 66 | +// Resources has container runtime resource constraints |
| 67 | +message Resources { |
| 68 | + // DisableOOMKiller disables the OOM killer for out of memory conditions |
| 69 | + optional bool DisableOOMKiller = 1; |
| 70 | + // Memory restriction configuration |
| 71 | + optional Memory Memory = 2; |
| 72 | + // CPU resource restriction configuration |
| 73 | + optional CPU CPU = 3; |
| 74 | + // Task resource restriction configuration. |
| 75 | + optional Pids Pids = 4; |
| 76 | + // BlockIO restriction configuration |
| 77 | + optional BlockIO BlockIO = 5; |
| 78 | + // Hugetlb limit (in bytes) |
| 79 | + repeated HugepageLimit HugepageLimits = 6; |
| 80 | + // Network restriction configuration |
| 81 | + optional Network Network = 7; |
| 82 | +} |
| 83 | + |
| 84 | +// Memory for Linux cgroup 'memory' resource management |
| 85 | +message Memory { |
| 86 | + // Memory limit (in bytes) |
| 87 | + optional int64 Limit = 1; |
| 88 | + // Memory reservation or soft_limit (in bytes) |
| 89 | + optional int64 Reservation = 2; |
| 90 | + // Total memory usage (memory + swap); set `-1' to disable swap |
| 91 | + optional int64 Swap = 3; |
| 92 | + // Kernel memory limit (in bytes) |
| 93 | + optional int64 Kernel = 4; |
| 94 | + // How aggressive the kernel will swap memory pages. Range from 0 to 100. Set -1 to use system default |
| 95 | + optional int64 Swappiness = 5; |
| 96 | +} |
| 97 | + |
| 98 | +// CPU for Linux cgroup 'cpu' resource management |
| 99 | +message CPU { |
| 100 | + // CPU shares (relative weight vs. other cgroups with cpu shares) |
| 101 | + optional int64 Shares = 1; |
| 102 | + // CPU hardcap limit (in usecs). Allowed cpu time in a given period |
| 103 | + optional int64 Quota = 2; |
| 104 | + // CPU period to be used for hardcapping (in usecs). 0 to use system default |
| 105 | + optional int64 Period = 3; |
| 106 | + // How many time CPU will use in realtime scheduling (in usecs) |
| 107 | + optional int64 RealtimeRuntime = 4; |
| 108 | + // CPU period to be used for realtime scheduling (in usecs) |
| 109 | + optional int64 RealtimePeriod = 5; |
| 110 | + // CPU to use within the cpuset |
| 111 | + optional string Cpus = 6; |
| 112 | + // MEM to use within the cpuset |
| 113 | + optional string Mems = 7; |
| 114 | +} |
| 115 | + |
| 116 | +// Pids for Linux cgroup 'pids' resource management (Linux 4.3) |
| 117 | +message Pids { |
| 118 | + // Maximum number of PIDs. A value < 0 implies "no limit". |
| 119 | + optional int64 Limit = 1; |
| 120 | +} |
| 121 | + |
| 122 | +// BlockIO for Linux cgroup 'blockio' resource management |
| 123 | +message BlockIO { |
| 124 | + // Specifies per cgroup weight, range is from 10 to 1000 |
| 125 | + optional int64 Weight = 1; |
| 126 | + // Weight per cgroup per device, can override BlkioWeight |
| 127 | + optional string WeightDevice = 2; |
| 128 | + // IO read rate limit per cgroup per device, bytes per second |
| 129 | + optional string ThrottleReadBpsDevice = 3; |
| 130 | + // IO write rate limit per cgroup per divice, bytes per second |
| 131 | + optional string ThrottleWriteBpsDevice = 4; |
| 132 | + // IO read rate limit per cgroup per device, IO per second |
| 133 | + optional string ThrottleReadIOpsDevice = 5; |
| 134 | + // IO write rate limit per cgroup per device, IO per second |
| 135 | + optional string ThrottleWriteIOpsDevice = 6; |
| 136 | +} |
| 137 | + |
| 138 | +// HugepageLimit structure corresponds to limiting kernel hugepages |
| 139 | +message HugepageLimit { |
| 140 | + optional string Pagesize = 1; |
| 141 | + optional int32 Limit = 2; |
| 142 | +} |
| 143 | + |
| 144 | +// Network identification and priority configuration |
| 145 | +message Network { |
| 146 | + // Set class identifier for container's network packets |
| 147 | + optional string ClassID = 1; |
| 148 | + // Set priority of network traffic for container |
| 149 | + repeated InterfacePriority Priorities = 2; |
| 150 | +} |
| 151 | + |
| 152 | +// InterfacePriority for network interfaces |
| 153 | +message InterfacePriority { |
| 154 | + // Name is the name of the network interface |
| 155 | + optional string Name = 1; |
| 156 | + // Priority for the interface |
| 157 | + optional int64 Priority = 2; |
| 158 | +} |
| 159 | + |
| 160 | +// Namespace is the configuration for a linux namespace |
| 161 | +message Namespace { |
| 162 | + // Type is the type of Linux namespace |
| 163 | + optional string Type = 1; |
| 164 | + // Path is a path to an existing namespace persisted on disk that can be joined |
| 165 | + // and is of the same type |
| 166 | + optional string Path = 2; |
| 167 | +} |
| 168 | + |
| 169 | +// Device represents the information on a Linux special device file |
| 170 | +message Device { |
| 171 | + // Path to the device. |
| 172 | + optional string Path = 1; |
| 173 | + // Device type, block, char, etc. |
| 174 | + // TODO(vbatts) ensure int32 is fine here, instead of golang's rune |
| 175 | + optional int32 Type = 2; |
| 176 | + // Major is the device's major number. |
| 177 | + optional int64 Major = 3; |
| 178 | + // Minor is the device's minor number. |
| 179 | + optional int64 Minor = 4; |
| 180 | + // Cgroup permissions format, rwm. |
| 181 | + optional string Permissions = 5; |
| 182 | + // FileMode permission bits for the device. |
| 183 | + // TODO(vbatts) os.FileMode is an octal uint32 |
| 184 | + optional uint32 FileMode = 6; |
| 185 | + // UID of the device. |
| 186 | + optional uint32 UID = 7; |
| 187 | + // Gid of the device. |
| 188 | + optional uint32 GID = 8; |
| 189 | +} |
| 190 | + |
| 191 | +// Seccomp represents syscall restrictions |
| 192 | +message Seccomp { |
| 193 | + // TODO(vbatts) string instead of "Action" type |
| 194 | + optional string DefaultAction = 1; |
| 195 | + repeated Syscall Syscalls = 2; |
| 196 | +} |
| 197 | + |
| 198 | +// Syscall is used to match a syscall in Seccomp |
| 199 | +message Syscall { |
| 200 | + optional string Name = 1; |
| 201 | + optional string Action = 2; |
| 202 | + repeated Arg Args = 3; |
| 203 | +} |
| 204 | + |
| 205 | +// Arg used for matching specific syscall arguments in Seccomp |
| 206 | +message Arg { |
| 207 | + optional uint32 Index = 1; |
| 208 | + optional uint64 Value = 2; |
| 209 | + optional uint64 ValueTwo = 3; |
| 210 | + // Op is the operator string |
| 211 | + optional string Op = 4; |
| 212 | +} |
| 213 | + |
0 commit comments