This project has retired. For details please refer to its Attic page.
Protos.LinuxInfo.Builder
JavaScript is disabled on your browser.
Skip navigation links
  • Summary:
  • Nested |
  • Field |
  • Constr |
  • Method
  • Detail:
  • Field |
  • Constr |
  • Method
org.apache.mesos

Class Protos.LinuxInfo.Builder

    • Method Detail

      • getDescriptor

        public static final com.google.protobuf.Descriptors.Descriptor getDescriptor()
      • internalGetFieldAccessorTable

        protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable()
      • getDescriptorForType

        public com.google.protobuf.Descriptors.Descriptor getDescriptorForType()
      • setField

        public Protos.LinuxInfo.Builder setField(com.google.protobuf.Descriptors.FieldDescriptor field,
         java.lang.Object value)
      • setRepeatedField

        public Protos.LinuxInfo.Builder setRepeatedField(com.google.protobuf.Descriptors.FieldDescriptor field,
         int index,
         java.lang.Object value)
      • addRepeatedField

        public Protos.LinuxInfo.Builder addRepeatedField(com.google.protobuf.Descriptors.FieldDescriptor field,
         java.lang.Object value)
      • isInitialized

        public final boolean isInitialized()
      • mergeFrom

        public Protos.LinuxInfo.Builder mergeFrom(com.google.protobuf.CodedInputStream input,
         com.google.protobuf.ExtensionRegistryLite extensionRegistry)
         throws java.io.IOException
        Throws:
        java.io.IOException
      • hasCapabilityInfo

        @Deprecated
        public boolean hasCapabilityInfo()
        Deprecated.
         Since 1.4.0, deprecated in favor of `effective_capabilities`.
         
        optional .mesos.CapabilityInfo capability_info = 1 [deprecated = true];
        Specified by:
        hasCapabilityInfo in interface Protos.LinuxInfoOrBuilder
      • setCapabilityInfo

        @Deprecated
        public Protos.LinuxInfo.Builder setCapabilityInfo(Protos.CapabilityInfo value)
        Deprecated.
         Since 1.4.0, deprecated in favor of `effective_capabilities`.
         
        optional .mesos.CapabilityInfo capability_info = 1 [deprecated = true];
      • setCapabilityInfo

        @Deprecated
        public Protos.LinuxInfo.Builder setCapabilityInfo(Protos.CapabilityInfo.Builder builderForValue)
        Deprecated.
         Since 1.4.0, deprecated in favor of `effective_capabilities`.
         
        optional .mesos.CapabilityInfo capability_info = 1 [deprecated = true];
      • mergeCapabilityInfo

        @Deprecated
        public Protos.LinuxInfo.Builder mergeCapabilityInfo(Protos.CapabilityInfo value)
        Deprecated.
         Since 1.4.0, deprecated in favor of `effective_capabilities`.
         
        optional .mesos.CapabilityInfo capability_info = 1 [deprecated = true];
      • clearCapabilityInfo

        @Deprecated
        public Protos.LinuxInfo.Builder clearCapabilityInfo()
        Deprecated.
         Since 1.4.0, deprecated in favor of `effective_capabilities`.
         
        optional .mesos.CapabilityInfo capability_info = 1 [deprecated = true];
      • getCapabilityInfoBuilder

        @Deprecated
        public Protos.CapabilityInfo.Builder getCapabilityInfoBuilder()
        Deprecated.
         Since 1.4.0, deprecated in favor of `effective_capabilities`.
         
        optional .mesos.CapabilityInfo capability_info = 1 [deprecated = true];
      • hasBoundingCapabilities

        public boolean hasBoundingCapabilities()
         The set of capabilities that are allowed but not initially
         granted to tasks.
         
        optional .mesos.CapabilityInfo bounding_capabilities = 2;
        Specified by:
        hasBoundingCapabilities in interface Protos.LinuxInfoOrBuilder
      • setBoundingCapabilities

        public Protos.LinuxInfo.Builder setBoundingCapabilities(Protos.CapabilityInfo value)
         The set of capabilities that are allowed but not initially
         granted to tasks.
         
        optional .mesos.CapabilityInfo bounding_capabilities = 2;
      • mergeBoundingCapabilities

        public Protos.LinuxInfo.Builder mergeBoundingCapabilities(Protos.CapabilityInfo value)
         The set of capabilities that are allowed but not initially
         granted to tasks.
         
        optional .mesos.CapabilityInfo bounding_capabilities = 2;
      • clearBoundingCapabilities

        public Protos.LinuxInfo.Builder clearBoundingCapabilities()
         The set of capabilities that are allowed but not initially
         granted to tasks.
         
        optional .mesos.CapabilityInfo bounding_capabilities = 2;
      • getBoundingCapabilitiesBuilder

        public Protos.CapabilityInfo.Builder getBoundingCapabilitiesBuilder()
         The set of capabilities that are allowed but not initially
         granted to tasks.
         
        optional .mesos.CapabilityInfo bounding_capabilities = 2;
      • hasEffectiveCapabilities

        public boolean hasEffectiveCapabilities()
         Represents the set of capabilities that the task will
         be executed with.
         
        optional .mesos.CapabilityInfo effective_capabilities = 3;
        Specified by:
        hasEffectiveCapabilities in interface Protos.LinuxInfoOrBuilder
      • setEffectiveCapabilities

        public Protos.LinuxInfo.Builder setEffectiveCapabilities(Protos.CapabilityInfo value)
         Represents the set of capabilities that the task will
         be executed with.
         
        optional .mesos.CapabilityInfo effective_capabilities = 3;
      • mergeEffectiveCapabilities

        public Protos.LinuxInfo.Builder mergeEffectiveCapabilities(Protos.CapabilityInfo value)
         Represents the set of capabilities that the task will
         be executed with.
         
        optional .mesos.CapabilityInfo effective_capabilities = 3;
      • clearEffectiveCapabilities

        public Protos.LinuxInfo.Builder clearEffectiveCapabilities()
         Represents the set of capabilities that the task will
         be executed with.
         
        optional .mesos.CapabilityInfo effective_capabilities = 3;
      • getEffectiveCapabilitiesBuilder

        public Protos.CapabilityInfo.Builder getEffectiveCapabilitiesBuilder()
         Represents the set of capabilities that the task will
         be executed with.
         
        optional .mesos.CapabilityInfo effective_capabilities = 3;
      • hasSharePidNamespace

        public boolean hasSharePidNamespace()
         If set as 'true', the container shares the pid namespace with
         its parent. If the container is a top level container, it will
         share the pid namespace with the agent. If the container is a
         nested container, it will share the pid namespace with its
         parent container. This field will be ignored if 'namespaces/pid'
         isolator is not enabled.
         
        optional bool share_pid_namespace = 4;
        Specified by:
        hasSharePidNamespace in interface Protos.LinuxInfoOrBuilder
      • getSharePidNamespace

        public boolean getSharePidNamespace()
         If set as 'true', the container shares the pid namespace with
         its parent. If the container is a top level container, it will
         share the pid namespace with the agent. If the container is a
         nested container, it will share the pid namespace with its
         parent container. This field will be ignored if 'namespaces/pid'
         isolator is not enabled.
         
        optional bool share_pid_namespace = 4;
        Specified by:
        getSharePidNamespace in interface Protos.LinuxInfoOrBuilder
      • setSharePidNamespace

        public Protos.LinuxInfo.Builder setSharePidNamespace(boolean value)
         If set as 'true', the container shares the pid namespace with
         its parent. If the container is a top level container, it will
         share the pid namespace with the agent. If the container is a
         nested container, it will share the pid namespace with its
         parent container. This field will be ignored if 'namespaces/pid'
         isolator is not enabled.
         
        optional bool share_pid_namespace = 4;
      • clearSharePidNamespace

        public Protos.LinuxInfo.Builder clearSharePidNamespace()
         If set as 'true', the container shares the pid namespace with
         its parent. If the container is a top level container, it will
         share the pid namespace with the agent. If the container is a
         nested container, it will share the pid namespace with its
         parent container. This field will be ignored if 'namespaces/pid'
         isolator is not enabled.
         
        optional bool share_pid_namespace = 4;
      • hasSeccomp

        public boolean hasSeccomp()
         Represents Seccomp configuration, which is used for syscall filtering.
         This field is used to override the agent's default Seccomp configuration.
         
        optional .mesos.SeccompInfo seccomp = 5;
        Specified by:
        hasSeccomp in interface Protos.LinuxInfoOrBuilder
      • getSeccomp

        public Protos.SeccompInfo getSeccomp()
         Represents Seccomp configuration, which is used for syscall filtering.
         This field is used to override the agent's default Seccomp configuration.
         
        optional .mesos.SeccompInfo seccomp = 5;
        Specified by:
        getSeccomp in interface Protos.LinuxInfoOrBuilder
      • setSeccomp

        public Protos.LinuxInfo.Builder setSeccomp(Protos.SeccompInfo value)
         Represents Seccomp configuration, which is used for syscall filtering.
         This field is used to override the agent's default Seccomp configuration.
         
        optional .mesos.SeccompInfo seccomp = 5;
      • setSeccomp

        public Protos.LinuxInfo.Builder setSeccomp(Protos.SeccompInfo.Builder builderForValue)
         Represents Seccomp configuration, which is used for syscall filtering.
         This field is used to override the agent's default Seccomp configuration.
         
        optional .mesos.SeccompInfo seccomp = 5;
      • mergeSeccomp

        public Protos.LinuxInfo.Builder mergeSeccomp(Protos.SeccompInfo value)
         Represents Seccomp configuration, which is used for syscall filtering.
         This field is used to override the agent's default Seccomp configuration.
         
        optional .mesos.SeccompInfo seccomp = 5;
      • clearSeccomp

        public Protos.LinuxInfo.Builder clearSeccomp()
         Represents Seccomp configuration, which is used for syscall filtering.
         This field is used to override the agent's default Seccomp configuration.
         
        optional .mesos.SeccompInfo seccomp = 5;
      • getSeccompBuilder

        public Protos.SeccompInfo.Builder getSeccompBuilder()
         Represents Seccomp configuration, which is used for syscall filtering.
         This field is used to override the agent's default Seccomp configuration.
         
        optional .mesos.SeccompInfo seccomp = 5;
      • hasIpcMode

        public boolean hasIpcMode()
         There are two special cases that we need to handle for this field:
         1. This field is not set: For backward compatibility we will keep the
         previous behavior: Top level container will have its own IPC namespace
         and nested container will share the IPC namespace from its parent
         container. If the container does not have its own rootfs, it will share
         agent's /dev/shm, otherwise it will have its own /dev/shm.
         2. The `namespaces/ipc` isolator is not enabled: This field will be ignored
         in this case. For backward compatibility, in the `filesystem/linux`
         isolator we will keep the previous behavior: Any containers will share
         IPC namespace from agent, and if the container does not have its own
         rootfs, it will also share agent's /dev/shm, otherwise it will have its
         own /dev/shm.
         TODO(qianzhang): Remove the support for the above two cases after the
         deprecation cycle (started in 1.9). Eventually we want a single isolator
         (`namespaces/ipc`) to handle both IPC namespace and /dev/shm, and decouple
         /dev/shm from container's rootfs (i.e., whether a container will have its
         own /dev/shm depends on its `ipc_mode` instead of whether the container
         has its own rootfs).
         
        optional .mesos.LinuxInfo.IpcMode ipc_mode = 6;
        Specified by:
        hasIpcMode in interface Protos.LinuxInfoOrBuilder
      • getIpcMode

        public Protos.LinuxInfo.IpcMode getIpcMode()
         There are two special cases that we need to handle for this field:
         1. This field is not set: For backward compatibility we will keep the
         previous behavior: Top level container will have its own IPC namespace
         and nested container will share the IPC namespace from its parent
         container. If the container does not have its own rootfs, it will share
         agent's /dev/shm, otherwise it will have its own /dev/shm.
         2. The `namespaces/ipc` isolator is not enabled: This field will be ignored
         in this case. For backward compatibility, in the `filesystem/linux`
         isolator we will keep the previous behavior: Any containers will share
         IPC namespace from agent, and if the container does not have its own
         rootfs, it will also share agent's /dev/shm, otherwise it will have its
         own /dev/shm.
         TODO(qianzhang): Remove the support for the above two cases after the
         deprecation cycle (started in 1.9). Eventually we want a single isolator
         (`namespaces/ipc`) to handle both IPC namespace and /dev/shm, and decouple
         /dev/shm from container's rootfs (i.e., whether a container will have its
         own /dev/shm depends on its `ipc_mode` instead of whether the container
         has its own rootfs).
         
        optional .mesos.LinuxInfo.IpcMode ipc_mode = 6;
        Specified by:
        getIpcMode in interface Protos.LinuxInfoOrBuilder
      • setIpcMode

        public Protos.LinuxInfo.Builder setIpcMode(Protos.LinuxInfo.IpcMode value)
         There are two special cases that we need to handle for this field:
         1. This field is not set: For backward compatibility we will keep the
         previous behavior: Top level container will have its own IPC namespace
         and nested container will share the IPC namespace from its parent
         container. If the container does not have its own rootfs, it will share
         agent's /dev/shm, otherwise it will have its own /dev/shm.
         2. The `namespaces/ipc` isolator is not enabled: This field will be ignored
         in this case. For backward compatibility, in the `filesystem/linux`
         isolator we will keep the previous behavior: Any containers will share
         IPC namespace from agent, and if the container does not have its own
         rootfs, it will also share agent's /dev/shm, otherwise it will have its
         own /dev/shm.
         TODO(qianzhang): Remove the support for the above two cases after the
         deprecation cycle (started in 1.9). Eventually we want a single isolator
         (`namespaces/ipc`) to handle both IPC namespace and /dev/shm, and decouple
         /dev/shm from container's rootfs (i.e., whether a container will have its
         own /dev/shm depends on its `ipc_mode` instead of whether the container
         has its own rootfs).
         
        optional .mesos.LinuxInfo.IpcMode ipc_mode = 6;
      • clearIpcMode

        public Protos.LinuxInfo.Builder clearIpcMode()
         There are two special cases that we need to handle for this field:
         1. This field is not set: For backward compatibility we will keep the
         previous behavior: Top level container will have its own IPC namespace
         and nested container will share the IPC namespace from its parent
         container. If the container does not have its own rootfs, it will share
         agent's /dev/shm, otherwise it will have its own /dev/shm.
         2. The `namespaces/ipc` isolator is not enabled: This field will be ignored
         in this case. For backward compatibility, in the `filesystem/linux`
         isolator we will keep the previous behavior: Any containers will share
         IPC namespace from agent, and if the container does not have its own
         rootfs, it will also share agent's /dev/shm, otherwise it will have its
         own /dev/shm.
         TODO(qianzhang): Remove the support for the above two cases after the
         deprecation cycle (started in 1.9). Eventually we want a single isolator
         (`namespaces/ipc`) to handle both IPC namespace and /dev/shm, and decouple
         /dev/shm from container's rootfs (i.e., whether a container will have its
         own /dev/shm depends on its `ipc_mode` instead of whether the container
         has its own rootfs).
         
        optional .mesos.LinuxInfo.IpcMode ipc_mode = 6;
      • hasShmSize

        public boolean hasShmSize()
         Size of /dev/shm in MB. If not set, the size of the /dev/shm for container
         will be value of the `--default_container_shm_size` agent flag, if that
         flag is not set too, the size of the /dev/shm will be half of the host RAM
         which is the default behavior of Linux. This field will be ignored for the
         container which shares /dev/shm from its parent and it will be also ignored
         for any containers if the `namespaces/ipc` isolator is not enabled. Please
         note that we only support setting this field when the `ipc_mode` field is
         set to `PRIVATE` otherwise the container launch will be rejected.
         
        optional uint32 shm_size = 7;
        Specified by:
        hasShmSize in interface Protos.LinuxInfoOrBuilder
      • getShmSize

        public int getShmSize()
         Size of /dev/shm in MB. If not set, the size of the /dev/shm for container
         will be value of the `--default_container_shm_size` agent flag, if that
         flag is not set too, the size of the /dev/shm will be half of the host RAM
         which is the default behavior of Linux. This field will be ignored for the
         container which shares /dev/shm from its parent and it will be also ignored
         for any containers if the `namespaces/ipc` isolator is not enabled. Please
         note that we only support setting this field when the `ipc_mode` field is
         set to `PRIVATE` otherwise the container launch will be rejected.
         
        optional uint32 shm_size = 7;
        Specified by:
        getShmSize in interface Protos.LinuxInfoOrBuilder
      • setShmSize

        public Protos.LinuxInfo.Builder setShmSize(int value)
         Size of /dev/shm in MB. If not set, the size of the /dev/shm for container
         will be value of the `--default_container_shm_size` agent flag, if that
         flag is not set too, the size of the /dev/shm will be half of the host RAM
         which is the default behavior of Linux. This field will be ignored for the
         container which shares /dev/shm from its parent and it will be also ignored
         for any containers if the `namespaces/ipc` isolator is not enabled. Please
         note that we only support setting this field when the `ipc_mode` field is
         set to `PRIVATE` otherwise the container launch will be rejected.
         
        optional uint32 shm_size = 7;
      • clearShmSize

        public Protos.LinuxInfo.Builder clearShmSize()
         Size of /dev/shm in MB. If not set, the size of the /dev/shm for container
         will be value of the `--default_container_shm_size` agent flag, if that
         flag is not set too, the size of the /dev/shm will be half of the host RAM
         which is the default behavior of Linux. This field will be ignored for the
         container which shares /dev/shm from its parent and it will be also ignored
         for any containers if the `namespaces/ipc` isolator is not enabled. Please
         note that we only support setting this field when the `ipc_mode` field is
         set to `PRIVATE` otherwise the container launch will be rejected.
         
        optional uint32 shm_size = 7;
      • hasShareCgroups

        public boolean hasShareCgroups()
         If set as 'true', the container will share the cgroups from its parent
         container, otherwise it will have its own cgroups created. Please note:
         1. For tasks in a task group launched via the LAUNCH_GROUP operation,
         this field may be set to 'true' or 'false'. Resource limits may only be
         set for tasks in a task group when this field is set to 'false'.
         2. For tasks launched via the LAUNCH operation, this field may only be set
         to 'true', and in this case resource limits may be set on these tasks.
         3. For containers launched via the agent's LAUNCH_NESTED_CONTAINER_SESSION
         call, this field must be set to 'true'.
         4. For executor containers, this field may only be set to 'false'.
         5. All tasks under a single executor must share the same value of this
         field, if it is set. Note that this means that all tasks within a single
         task group must set this field to the same value.
         
        optional bool share_cgroups = 8 [default = true];
        Specified by:
        hasShareCgroups in interface Protos.LinuxInfoOrBuilder
      • getShareCgroups

        public boolean getShareCgroups()
         If set as 'true', the container will share the cgroups from its parent
         container, otherwise it will have its own cgroups created. Please note:
         1. For tasks in a task group launched via the LAUNCH_GROUP operation,
         this field may be set to 'true' or 'false'. Resource limits may only be
         set for tasks in a task group when this field is set to 'false'.
         2. For tasks launched via the LAUNCH operation, this field may only be set
         to 'true', and in this case resource limits may be set on these tasks.
         3. For containers launched via the agent's LAUNCH_NESTED_CONTAINER_SESSION
         call, this field must be set to 'true'.
         4. For executor containers, this field may only be set to 'false'.
         5. All tasks under a single executor must share the same value of this
         field, if it is set. Note that this means that all tasks within a single
         task group must set this field to the same value.
         
        optional bool share_cgroups = 8 [default = true];
        Specified by:
        getShareCgroups in interface Protos.LinuxInfoOrBuilder
      • setShareCgroups

        public Protos.LinuxInfo.Builder setShareCgroups(boolean value)
         If set as 'true', the container will share the cgroups from its parent
         container, otherwise it will have its own cgroups created. Please note:
         1. For tasks in a task group launched via the LAUNCH_GROUP operation,
         this field may be set to 'true' or 'false'. Resource limits may only be
         set for tasks in a task group when this field is set to 'false'.
         2. For tasks launched via the LAUNCH operation, this field may only be set
         to 'true', and in this case resource limits may be set on these tasks.
         3. For containers launched via the agent's LAUNCH_NESTED_CONTAINER_SESSION
         call, this field must be set to 'true'.
         4. For executor containers, this field may only be set to 'false'.
         5. All tasks under a single executor must share the same value of this
         field, if it is set. Note that this means that all tasks within a single
         task group must set this field to the same value.
         
        optional bool share_cgroups = 8 [default = true];
      • clearShareCgroups

        public Protos.LinuxInfo.Builder clearShareCgroups()
         If set as 'true', the container will share the cgroups from its parent
         container, otherwise it will have its own cgroups created. Please note:
         1. For tasks in a task group launched via the LAUNCH_GROUP operation,
         this field may be set to 'true' or 'false'. Resource limits may only be
         set for tasks in a task group when this field is set to 'false'.
         2. For tasks launched via the LAUNCH operation, this field may only be set
         to 'true', and in this case resource limits may be set on these tasks.
         3. For containers launched via the agent's LAUNCH_NESTED_CONTAINER_SESSION
         call, this field must be set to 'true'.
         4. For executor containers, this field may only be set to 'false'.
         5. All tasks under a single executor must share the same value of this
         field, if it is set. Note that this means that all tasks within a single
         task group must set this field to the same value.
         
        optional bool share_cgroups = 8 [default = true];
      • setUnknownFields

        public final Protos.LinuxInfo.Builder setUnknownFields(com.google.protobuf.UnknownFieldSet unknownFields)
      • mergeUnknownFields

        public final Protos.LinuxInfo.Builder mergeUnknownFields(com.google.protobuf.UnknownFieldSet unknownFields)
Skip navigation links
  • Summary:
  • Nested |
  • Field |
  • Constr |
  • Method
  • Detail:
  • Field |
  • Constr |
  • Method

AltStyle によって変換されたページ (->オリジナル) /