Class AddEscapeWhiteListRequest

    • Constructor Detail

      • AddEscapeWhiteListRequest

        public AddEscapeWhiteListRequest()
      • AddEscapeWhiteListRequest

        public AddEscapeWhiteListRequest​(AddEscapeWhiteListRequest source)
        NOTE: Any ambiguous key set via .set("AnyKey", "value") will be a shallow copy, and any explicit key, i.e Foo, set via .setFoo("value") will be a deep copy.
    • Method Detail

      • getEventType

        public String[] getEventType()
        Get 加白名单事件类型 ESCAPE_CGROUPS:利用cgroup机制逃逸 ESCAPE_TAMPER_SENSITIVE_FILE:篡改敏感文件逃逸 ESCAPE_DOCKER_API:访问Docker API接口逃逸 ESCAPE_VUL_OCCURRED:逃逸漏洞利用 MOUNT_SENSITIVE_PTAH:敏感路径挂载 PRIVILEGE_CONTAINER_START:特权容器 PRIVILEGE:程序提权逃逸
        Returns:
        EventType 加白名单事件类型 ESCAPE_CGROUPS:利用cgroup机制逃逸 ESCAPE_TAMPER_SENSITIVE_FILE:篡改敏感文件逃逸 ESCAPE_DOCKER_API:访问Docker API接口逃逸 ESCAPE_VUL_OCCURRED:逃逸漏洞利用 MOUNT_SENSITIVE_PTAH:敏感路径挂载 PRIVILEGE_CONTAINER_START:特权容器 PRIVILEGE:程序提权逃逸
      • setEventType

        public void setEventType​(String[] EventType)
        Set 加白名单事件类型 ESCAPE_CGROUPS:利用cgroup机制逃逸 ESCAPE_TAMPER_SENSITIVE_FILE:篡改敏感文件逃逸 ESCAPE_DOCKER_API:访问Docker API接口逃逸 ESCAPE_VUL_OCCURRED:逃逸漏洞利用 MOUNT_SENSITIVE_PTAH:敏感路径挂载 PRIVILEGE_CONTAINER_START:特权容器 PRIVILEGE:程序提权逃逸
        Parameters:
        EventType - 加白名单事件类型 ESCAPE_CGROUPS:利用cgroup机制逃逸 ESCAPE_TAMPER_SENSITIVE_FILE:篡改敏感文件逃逸 ESCAPE_DOCKER_API:访问Docker API接口逃逸 ESCAPE_VUL_OCCURRED:逃逸漏洞利用 MOUNT_SENSITIVE_PTAH:敏感路径挂载 PRIVILEGE_CONTAINER_START:特权容器 PRIVILEGE:程序提权逃逸
      • getImageIDs

        public String[] getImageIDs()
        Get 加白名单镜像ID数组
        Returns:
        ImageIDs 加白名单镜像ID数组
      • setImageIDs

        public void setImageIDs​(String[] ImageIDs)
        Set 加白名单镜像ID数组
        Parameters:
        ImageIDs - 加白名单镜像ID数组