@docker/sdk
Advanced tools
+1
-1
| { | ||
| "version": "0.1.18", | ||
| "version": "0.1.22", | ||
| "license": "Apache-2.0", | ||
@@ -4,0 +4,0 @@ "main": "index.js", |
@@ -90,2 +90,8 @@ // package: com.docker.api.protos.containers.v1 | ||
| hasHostConfig(): boolean; | ||
| clearHostConfig(): void; | ||
| getHostConfig(): HostConfig | undefined; | ||
| setHostConfig(value?: HostConfig): Container; | ||
| serializeBinary(): Uint8Array; | ||
@@ -117,5 +123,43 @@ toObject(includeInstance?: boolean): Container.AsObject; | ||
| restartPolicyCondition: string, | ||
| hostConfig?: HostConfig.AsObject, | ||
| } | ||
| } | ||
| export class HostConfig extends jspb.Message { | ||
| getMemoryReservation(): number; | ||
| setMemoryReservation(value: number): HostConfig; | ||
| getMemoryLimit(): number; | ||
| setMemoryLimit(value: number): HostConfig; | ||
| getCpuReservation(): number; | ||
| setCpuReservation(value: number): HostConfig; | ||
| getCpuLimit(): number; | ||
| setCpuLimit(value: number): HostConfig; | ||
| getRestartPolicy(): string; | ||
| setRestartPolicy(value: string): HostConfig; | ||
| serializeBinary(): Uint8Array; | ||
| toObject(includeInstance?: boolean): HostConfig.AsObject; | ||
| static toObject(includeInstance: boolean, msg: HostConfig): HostConfig.AsObject; | ||
| static extensions: {[key: number]: jspb.ExtensionFieldInfo<jspb.Message>}; | ||
| static extensionsBinary: {[key: number]: jspb.ExtensionFieldBinaryInfo<jspb.Message>}; | ||
| static serializeBinaryToWriter(message: HostConfig, writer: jspb.BinaryWriter): void; | ||
| static deserializeBinary(bytes: Uint8Array): HostConfig; | ||
| static deserializeBinaryFromReader(message: HostConfig, reader: jspb.BinaryReader): HostConfig; | ||
| } | ||
| export namespace HostConfig { | ||
| export type AsObject = { | ||
| memoryReservation: number, | ||
| memoryLimit: number, | ||
| cpuReservation: number, | ||
| cpuLimit: number, | ||
| restartPolicy: string, | ||
| } | ||
| } | ||
| export class InspectRequest extends jspb.Message { | ||
@@ -360,3 +404,13 @@ getId(): string; | ||
| clearCommandList(): void; | ||
| getCommandList(): Array<string>; | ||
| setCommandList(value: Array<string>): RunRequest; | ||
| addCommand(value: string, index?: number): string; | ||
| clearEnvironmentList(): void; | ||
| getEnvironmentList(): Array<string>; | ||
| setEnvironmentList(value: Array<string>): RunRequest; | ||
| addEnvironment(value: string, index?: number): string; | ||
| serializeBinary(): Uint8Array; | ||
@@ -383,2 +437,4 @@ toObject(includeInstance?: boolean): RunRequest.AsObject; | ||
| restartPolicyCondition: string, | ||
| commandList: Array<string>, | ||
| environmentList: Array<string>, | ||
| } | ||
@@ -385,0 +441,0 @@ } |
@@ -48,2 +48,3 @@ // | ||
| uint64 memory_usage = 6; | ||
| // kept for breaking change for now, moved to HostConfig | ||
| uint64 memory_limit = 7; | ||
@@ -54,7 +55,18 @@ uint64 pids_current = 8; | ||
| repeated Port ports = 11; | ||
| // kept for breaking change for now, moved to HostConfig | ||
| uint64 cpu_limit = 12; | ||
| string platform = 13; | ||
| // kept for breaking change for now, moved to HostConfig | ||
| string restart_policy_condition = 14; | ||
| HostConfig host_config = 15; | ||
| } | ||
| message HostConfig { | ||
| uint64 memory_reservation = 1; | ||
| uint64 memory_limit = 2; | ||
| uint64 cpu_reservation = 3; | ||
| uint64 cpu_limit = 4; | ||
| string restart_policy = 5; | ||
| } | ||
| message InspectRequest { | ||
@@ -108,2 +120,4 @@ string id = 1; | ||
| string restart_policy_condition = 8; | ||
| repeated string command = 9; | ||
| repeated string environment = 10; | ||
| } | ||
@@ -110,0 +124,0 @@ |
Sorry, the diff of this file is too big to display
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
399595
4.02%8934
4.75%