Get all deployments of an image.
A JWT bearer token to be passed once authenticated.
UUID of an image.
Status string for the Application compute node.
Search on all fields (image status and compute node name).
Sort fields. In the format of key1:ASC,key2:DESC,key3:DESC
Maximum number of images to return.
Number of images to skip from start.
Details of image deployments.
Current page number
Total pages as per the item counts and page limit.
Number of items to limit in a page.
Total number of unfiltered items.
Total number of items as per the current filter.
Detailed info of an app running on a compute node.
A certificate request or issued certificate.
Certificate ID.
Certificate status.
The certificate signing request.
The certificate itself, if issued.
The node relevant to this certificate, if known.
The app relevant to this certificate, if known.
The build relevant to this certificate, if known.
App compute node creation time.
Compute Node Id.
Compute Node Name.
Run status info of an app for a compute node.
Status string for the app on a compute node.
Time since the status change.
The app attestation date.
Detailed info of an application image.
Image Id.
Docker info of an image.
Image docker image name.
Image docker version.
Build docker image sha.
Docker image size in MiB (units of 2**20 bytes).
List of ports exposed by the Docker image.
A port exposed by a docker container.
A valid, specific port number from 1..65535 (inclusive).
Protocol Associated with a Port exposed by a docker container.
Timestamp of image addition to the system (number of seconds since epoch).
Timestamp of when the image was updated (number of seconds since epoch).
App Id.
App name.
Status string for the image.
Time since the status change.
Status string for the image deployment.
The time when the deployment status changed.
Info on a application enclave.
mrenclave of an image, as a hex string.
mrsigner of an image, as a hex string.
ISV Product Id.
ISV Security Version Number.
Image attributes
mrenclave as a hex string.
Nitro enclave hash algorithm
A contiguous measure of the contents of the image file, without the section data as a hex string.
A contiguous measure of the contents of the image file, without the section data as a hex string.
A contiguous measure of the contents of the image file, without the section data as a hex string.
ACI generated policy that represents the containers to run and other security restrictions.
Base64-encoded output of azure confcom acipolicygen tool.
App Description.
Memory size required for the image.
Threads required for the image.
Advanced settings for apps and images.
Entrypoint for the container.
List of read-write files and/or directories which are encrypted using the enclave sealing key Default encrypted directories - enclave-os protects the content in these files by encrypting them using the enclave sealing key. Anyone is allowed to read from or write to these files but only the enclave application can see it's contents in plain text.
- /tmp
- /run
- /ftx-efs
- /opt/fortanix/enclave-os/app-config/rw Tips while debugging -> The default encrypted directories visible to the guest application as /tmp, /run and /ftx-efs are available in the container filesystem at /opt/fortanix/enclave-os/default-efs-dirs/.
Certificate issuance strategy
Certificate subject common name, typically a DNS name
Type of key to generate
Key parameters. Currently must be an instance of RsaKeyParam, but other types may be supported in the future.
Path to expose the key in the application filesystem
Path to expose the certificate in the application filesystem
Java runtime mode for conversion.
List of read-write files and/or directories Default read-write directories - enclave-os doesn't provide any security measures for these files and anyone is allowed to read from or write to these files.
- /etc/hosts
- /etc/resolv.conf
- /etc/hostname
Allow command line arguments converter flag for an image.
Environment variables that will be passed to the manifest file when the container is converted.
Environment variables with supplied default values, but that may be overridden at runtime.
image name if curated app.
UUID of pending build whitelist task for the build
Application configurations attached to the image.
Id of the corresponding marketplace listing.
This object encodes a suggested manner for launching a confidential application. It may need to be configured further depending on your environment.
The Microsoft ARM Template for launching this build. May require some properties (such as the join token).
Flag indicating if file persistence is enabled. This is only for Nitro Enclaves.
Group Id
App heartbeat message count.
Key Id for app heartbeat.
App running in debug mode or not.