New Research: Supply Chain Attack on Axios Pulls Malicious Dependency from npm.Details →
Socket
Book a DemoSign in
Socket

@docker/sdk

Package Overview
Dependencies
Maintainers
8
Versions
13
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

@docker/sdk - npm Package Compare versions

Comparing version
0.1.18
to
0.1.22
+1
-1
package.json
{
"version": "0.1.18",
"version": "0.1.22",
"license": "Apache-2.0",

@@ -4,0 +4,0 @@ "main": "index.js",

@@ -90,2 +90,8 @@ // package: com.docker.api.protos.containers.v1

hasHostConfig(): boolean;
clearHostConfig(): void;
getHostConfig(): HostConfig | undefined;
setHostConfig(value?: HostConfig): Container;
serializeBinary(): Uint8Array;

@@ -117,5 +123,43 @@ toObject(includeInstance?: boolean): Container.AsObject;

restartPolicyCondition: string,
hostConfig?: HostConfig.AsObject,
}
}
export class HostConfig extends jspb.Message {
getMemoryReservation(): number;
setMemoryReservation(value: number): HostConfig;
getMemoryLimit(): number;
setMemoryLimit(value: number): HostConfig;
getCpuReservation(): number;
setCpuReservation(value: number): HostConfig;
getCpuLimit(): number;
setCpuLimit(value: number): HostConfig;
getRestartPolicy(): string;
setRestartPolicy(value: string): HostConfig;
serializeBinary(): Uint8Array;
toObject(includeInstance?: boolean): HostConfig.AsObject;
static toObject(includeInstance: boolean, msg: HostConfig): HostConfig.AsObject;
static extensions: {[key: number]: jspb.ExtensionFieldInfo<jspb.Message>};
static extensionsBinary: {[key: number]: jspb.ExtensionFieldBinaryInfo<jspb.Message>};
static serializeBinaryToWriter(message: HostConfig, writer: jspb.BinaryWriter): void;
static deserializeBinary(bytes: Uint8Array): HostConfig;
static deserializeBinaryFromReader(message: HostConfig, reader: jspb.BinaryReader): HostConfig;
}
export namespace HostConfig {
export type AsObject = {
memoryReservation: number,
memoryLimit: number,
cpuReservation: number,
cpuLimit: number,
restartPolicy: string,
}
}
export class InspectRequest extends jspb.Message {

@@ -360,3 +404,13 @@ getId(): string;

clearCommandList(): void;
getCommandList(): Array<string>;
setCommandList(value: Array<string>): RunRequest;
addCommand(value: string, index?: number): string;
clearEnvironmentList(): void;
getEnvironmentList(): Array<string>;
setEnvironmentList(value: Array<string>): RunRequest;
addEnvironment(value: string, index?: number): string;
serializeBinary(): Uint8Array;

@@ -383,2 +437,4 @@ toObject(includeInstance?: boolean): RunRequest.AsObject;

restartPolicyCondition: string,
commandList: Array<string>,
environmentList: Array<string>,
}

@@ -385,0 +441,0 @@ }

@@ -48,2 +48,3 @@ //

uint64 memory_usage = 6;
// kept for breaking change for now, moved to HostConfig
uint64 memory_limit = 7;

@@ -54,7 +55,18 @@ uint64 pids_current = 8;

repeated Port ports = 11;
// kept for breaking change for now, moved to HostConfig
uint64 cpu_limit = 12;
string platform = 13;
// kept for breaking change for now, moved to HostConfig
string restart_policy_condition = 14;
HostConfig host_config = 15;
}
message HostConfig {
uint64 memory_reservation = 1;
uint64 memory_limit = 2;
uint64 cpu_reservation = 3;
uint64 cpu_limit = 4;
string restart_policy = 5;
}
message InspectRequest {

@@ -108,2 +120,4 @@ string id = 1;

string restart_policy_condition = 8;
repeated string command = 9;
repeated string environment = 10;
}

@@ -110,0 +124,0 @@

Sorry, the diff of this file is too big to display