Docker image name
Credentials for authenticating to a docker registry
User name for docker registry authentication
Password for docker registry authentication. Note that this field may be redacted when it appears in API responses.
Docker image name
Credentials for authenticating to a docker registry
User name for docker registry authentication
Password for docker registry authentication. Note that this field may be redacted when it appears in API responses.
Allow command line arguments.
Allow Docker Pull failure.
Certificate issuance strategy
Certificate subject common name, typically a DNS name
Type of key to generate
Key parameters. Currently must be an instance of RsaKeyParam, but other types may be supported in the future.
Path to expose the key in the application filesystem
Path to expose the certificate in the application filesystem
Enables debug logging from EnclaveOS
Override the entrypoint of the original container
Override additional arguments to the container entrypoint
Enables Pushing Converted Image
List of manifest environment variables. For ACI, these fixed values become part of the security policy.
List of mutable environment variable default values. For ACI, these become deployment template parameters.
Type of the Java JVM used
Isvsvn
Isvprodid
Enclave memory size
Threads
Template for generating debug core dump file paths
Path for EnclaveOS log file
Add additional options to EnclaveOS manifest file
Configures a key to sign the converted image
Requests signing the converted image with a default key
Configures an SDKMS signing key. The key must be an RSA key with public exponent 3.
name of the signing key in SDKMS
API key to authenticate with SDKMS
List of read-write files and/or directories which are encrypted using the enclave sealing key Default encrypted directories - enclave-os protects the content in these files by encrypting them using the enclave sealing key. Anyone is allowed to read from or write to these files but only the enclave application can see it's contents in plain text.
- /tmp
- /run
- /ftx-efs
- /opt/fortanix/enclave-os/app-config/rw Tips while debugging -> The default encrypted directories visible to the guest application as /tmp, /run and /ftx-efs are available in the container filesystem at /opt/fortanix/enclave-os/default-efs-dirs/.
List of read only directories Default read-only directories - enclave-os protects the integrity of these files and hence only allows these files to be read and not modified.
- /
- /opt/fortanix/enclave-os/app-config/ro
List of read-write files and/or directories Default read-write directories - enclave-os doesn't provide any security measures for these files and anyone is allowed to read from or write to these files.
- /etc/hosts
- /etc/resolv.conf
- /etc/hostname
Registry and image name for the output container (same as outputImageName in the request)
Converted image name (with tag)
Converted image sha
Converted image size
Sgx Measurements
mrenclave as a hex string.