@@ -13,67 +13,67 @@ import (
1313)
1414
1515var generateFlags = []cli.Flag {
16- cli.StringFlag {Name : "output" , Usage : "output file (defaults to stdout)" },
17- cli.StringFlag {Name : "rootfs" , Value : "rootfs" , Usage : "path to the rootfs" },
18- cli.BoolFlag {Name : "read-only" , Usage : "make the container's rootfs read-only" },
19- cli.BoolFlag {Name : "privileged" , Usage : "enable privileged container settings" },
20- cli.BoolFlag {Name : "no-new-privileges" , Usage : "set no new privileges bit for the container process" },
21- cli.BoolFlag {Name : "tty" , Usage : "allocate a new tty for the container process" },
22- cli.StringFlag {Name : "hostname" , Usage : "hostname value for the container" },
23- cli.IntFlag {Name : "uid" , Usage : "uid for the process" },
24- cli.IntFlag {Name : "gid" , Usage : "gid for the process" },
25- cli.StringSliceFlag {Name : "groups" , Usage : "supplementary groups for the process" },
16+ cli.StringFlag {Name : "apparmor" , Usage : "specifies the the apparmor profile for the container" },
17+ cli.StringFlag {Name : "arch" , Value : runtime .GOARCH , Usage : "architecture the container is created for" },
18+ cli.StringSliceFlag {Name : "args" , Usage : "command to run in the container" },
19+ cli.StringSliceFlag {Name : "bind" , Usage : "bind mount directories src:dest:(rw,ro)" },
2620 cli.StringSliceFlag {Name : "cap-add" , Usage : "add Linux capabilities" },
2721 cli.StringSliceFlag {Name : "cap-drop" , Usage : "drop Linux capabilities" },
2822 cli.StringFlag {Name : "cgroup" , Usage : "cgroup namespace" },
29- cli.StringFlag {Name : "network" , Usage : "network namespace" },
30- cli.StringFlag {Name : "mount" , Usage : "mount namespace" },
31- cli.StringFlag {Name : "pid" , Usage : "pid namespace" },
32- cli.StringFlag {Name : "ipc" , Usage : "ipc namespace" },
33- cli.StringFlag {Name : "user" , Usage : "user namespace" },
34- cli.StringFlag {Name : "uts" , Usage : "uts namespace" },
35- cli.StringFlag {Name : "selinux-label" , Usage : "process selinux label" },
36- cli.StringFlag {Name : "mount-label" , Usage : "selinux mount context label" },
37- cli.StringSliceFlag {Name : "tmpfs" , Usage : "mount tmpfs" },
38- cli.StringSliceFlag {Name : "args" , Usage : "command to run in the container" },
39- cli.StringSliceFlag {Name : "env" , Usage : "add environment variable e.g. key=value" },
4023 cli.StringFlag {Name : "cgroups-path" , Usage : "specify the path to the cgroups" },
41- cli.StringFlag {Name : "mount-cgroups" , Value : "no" , Usage : "mount cgroups (rw,ro,no)" },
42- cli.StringSliceFlag {Name : "bind" , Usage : "bind mount directories src:dest:(rw,ro)" },
43- cli.StringSliceFlag {Name : "prestart" , Usage : "path to prestart hooks" },
44- cli.StringSliceFlag {Name : "poststart" , Usage : "path to poststart hooks" },
45- cli.StringSliceFlag {Name : "poststop" , Usage : "path to poststop hooks" },
46- cli.StringFlag {Name : "root-propagation" , Usage : "mount propagation for root" },
47- cli.StringFlag {Name : "os" , Value : runtime .GOOS , Usage : "operating system the container is created for" },
48- cli.StringFlag {Name : "arch" , Value : runtime .GOARCH , Usage : "architecture the container is created for" },
4924 cli.StringFlag {Name : "cwd" , Value : "/" , Usage : "current working directory for the process" },
50- cli.StringSliceFlag {Name : "uidmappings" , Usage : "add UIDMappings e.g HostID:ContainerID:Size" },
25+ cli.BoolFlag {Name : "disable-oom-kill" , Usage : "disable OOM Killer" },
26+ cli.StringSliceFlag {Name : "env" , Usage : "add environment variable e.g. key=value" },
27+ cli.IntFlag {Name : "gid" , Usage : "gid for the process" },
5128 cli.StringSliceFlag {Name : "gidmappings" , Usage : "add GIDMappings e.g HostID:ContainerID:Size" },
52- cli.StringSliceFlag {Name : "sysctl" , Usage : "add sysctl settings e.g net.ipv4.forward=1" },
53- cli.StringFlag {Name : "apparmor" , Usage : "specifies the the apparmor profile for the container" },
54- cli.StringFlag {Name : "seccomp-default" , Usage : "specifies the the defaultaction of Seccomp syscall restrictions" },
55- cli.StringSliceFlag {Name : "seccomp-arch" , Usage : "specifies Additional architectures permitted to be used for system calls" },
56- cli.StringSliceFlag {Name : "seccomp-syscalls" , Usage : "specifies Additional architectures permitted to be used for system calls, e.g Name:Action:Arg1_index/Arg1_value/Arg1_valuetwo/Arg1_op, Arg2_index/Arg2_value/Arg2_valuetwo/Arg2_op " },
57- cli.StringSliceFlag {Name : "seccomp-allow" , Usage : "specifies syscalls to be added to allowed" },
58- cli.StringSliceFlag {Name : "seccomp-errno" , Usage : "specifies syscalls to be added to list that returns an error" },
59- cli.StringFlag {Name : "template" , Usage : "base template to use for creating the configuration" },
29+ cli.StringSliceFlag {Name : "groups" , Usage : "supplementary groups for the process" },
30+ cli.StringFlag {Name : "hostname" , Usage : "hostname value for the container" },
31+ cli.StringFlag {Name : "ipc" , Usage : "ipc namespace" },
6032 cli.StringSliceFlag {Name : "label" , Usage : "add annotations to the configuration e.g. key=value" },
61- cli.BoolFlag {Name : "disable-oom-kill" , Usage : "disable OOM Killer" },
62- cli.IntFlag {Name : "oom-score-adj" , Usage : "oom_score_adj for the container" },
6333 cli.Uint64Flag {Name : "linux-cpu-shares" , Usage : "the relative share of CPU time available to the tasks in a cgroup" },
6434 cli.Uint64Flag {Name : "linux-cpu-period" , Usage : "the CPU period to be used for hardcapping (in usecs)" },
6535 cli.Uint64Flag {Name : "linux-cpu-quota" , Usage : "the allowed CPU time in a given period (in usecs)" },
66- cli.Uint64Flag {Name : "linux-realtime-runtime" , Usage : "the time realtime scheduling may use (in usecs)" },
67- cli.Uint64Flag {Name : "linux-realtime-period" , Usage : "CPU period to be used for realtime scheduling (in usecs)" },
6836 cli.StringFlag {Name : "linux-cpus" , Usage : "CPUs to use within the cpuset (default is to use any CPU available)" },
69- cli.StringFlag {Name : "linux-mems" , Usage : "list of memory nodes in the cpuset (default is to use any available memory node)" },
37+ cli.Uint64Flag {Name : "linux-mem-kernel-limit" , Usage : "kernel memory limit (in bytes)" },
38+ cli.Uint64Flag {Name : "linux-mem-kernel-tcp" , Usage : "kernel memory limit for tcp (in bytes)" },
7039 cli.Uint64Flag {Name : "linux-mem-limit" , Usage : "memory limit (in bytes)" },
7140 cli.Uint64Flag {Name : "linux-mem-reservation" , Usage : "memory reservation or soft limit (in bytes)" },
7241 cli.Uint64Flag {Name : "linux-mem-swap" , Usage : "total memory limit (memory + swap) (in bytes)" },
73- cli.Uint64Flag {Name : "linux-mem-kernel-limit" , Usage : "kernel memory limit (in bytes)" },
74- cli.Uint64Flag {Name : "linux-mem-kernel-tcp" , Usage : "kernel memory limit for tcp (in bytes)" },
7542 cli.Uint64Flag {Name : "linux-mem-swappiness" , Usage : "how aggressive the kernel will swap memory pages (Range from 0 to 100)" },
43+ cli.StringFlag {Name : "linux-mems" , Usage : "list of memory nodes in the cpuset (default is to use any available memory node)" },
7644 cli.Int64Flag {Name : "linux-pids-limit" , Usage : "maximum number of PIDs" },
45+ cli.Uint64Flag {Name : "linux-realtime-period" , Usage : "CPU period to be used for realtime scheduling (in usecs)" },
46+ cli.Uint64Flag {Name : "linux-realtime-runtime" , Usage : "the time realtime scheduling may use (in usecs)" },
47+ cli.StringFlag {Name : "mount" , Usage : "mount namespace" },
48+ cli.StringFlag {Name : "mount-cgroups" , Value : "no" , Usage : "mount cgroups (rw,ro,no)" },
49+ cli.StringFlag {Name : "mount-label" , Usage : "selinux mount context label" },
50+ cli.StringFlag {Name : "network" , Usage : "network namespace" },
51+ cli.BoolFlag {Name : "no-new-privileges" , Usage : "set no new privileges bit for the container process" },
52+ cli.IntFlag {Name : "oom-score-adj" , Usage : "oom_score_adj for the container" },
53+ cli.StringFlag {Name : "os" , Value : runtime .GOOS , Usage : "operating system the container is created for" },
54+ cli.StringFlag {Name : "output" , Usage : "output file (defaults to stdout)" },
55+ cli.StringFlag {Name : "pid" , Usage : "pid namespace" },
56+ cli.StringSliceFlag {Name : "poststart" , Usage : "path to poststart hooks" },
57+ cli.StringSliceFlag {Name : "poststop" , Usage : "path to poststop hooks" },
58+ cli.StringSliceFlag {Name : "prestart" , Usage : "path to prestart hooks" },
59+ cli.BoolFlag {Name : "privileged" , Usage : "enable privileged container settings" },
60+ cli.BoolFlag {Name : "read-only" , Usage : "make the container's rootfs read-only" },
61+ cli.StringFlag {Name : "root-propagation" , Usage : "mount propagation for root" },
62+ cli.StringFlag {Name : "rootfs" , Value : "rootfs" , Usage : "path to the rootfs" },
63+ cli.StringSliceFlag {Name : "seccomp-arch" , Usage : "specifies Additional architectures permitted to be used for system calls" },
64+ cli.StringSliceFlag {Name : "seccomp-allow" , Usage : "specifies syscalls to be added to allowed" },
65+ cli.StringFlag {Name : "seccomp-default" , Usage : "specifies the the defaultaction of Seccomp syscall restrictions" },
66+ cli.StringSliceFlag {Name : "seccomp-errno" , Usage : "specifies syscalls to be added to list that returns an error" },
67+ cli.StringSliceFlag {Name : "seccomp-syscalls" , Usage : "specifies Additional architectures permitted to be used for system calls, e.g Name:Action:Arg1_index/Arg1_value/Arg1_valuetwo/Arg1_op, Arg2_index/Arg2_value/Arg2_valuetwo/Arg2_op " },
68+ cli.StringFlag {Name : "selinux-label" , Usage : "process selinux label" },
69+ cli.StringSliceFlag {Name : "sysctl" , Usage : "add sysctl settings e.g net.ipv4.forward=1" },
70+ cli.StringFlag {Name : "template" , Usage : "base template to use for creating the configuration" },
71+ cli.StringSliceFlag {Name : "tmpfs" , Usage : "mount tmpfs" },
72+ cli.BoolFlag {Name : "tty" , Usage : "allocate a new tty for the container process" },
73+ cli.IntFlag {Name : "uid" , Usage : "uid for the process" },
74+ cli.StringSliceFlag {Name : "uidmappings" , Usage : "add UIDMappings e.g HostID:ContainerID:Size" },
75+ cli.StringFlag {Name : "user" , Usage : "user namespace" },
76+ cli.StringFlag {Name : "uts" , Usage : "uts namespace" },
7777}
7878
7979var generateCommand = cli.Command {
0 commit comments