/** * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. * SPDX-License-Identifier: Apache-2.0. */ #pragma once #include #include #include #include namespace Aws { namespace Utils { namespace Json { class JsonValue; class JsonView; } // namespace Json } // namespace Utils namespace ECS { namespace Model { /** *

The Linux capabilities for the container that are added to or dropped from * the default configuration provided by Docker. For more information about the * default capabilities and the non-default available capabilities, see Runtime * privilege and Linux capabilities in the Docker run reference. For * more detailed information about these Linux capabilities, see the capabilities(7) * Linux manual page.

See Also:

AWS * API Reference

*/ class KernelCapabilities { public: AWS_ECS_API KernelCapabilities(); AWS_ECS_API KernelCapabilities(Aws::Utils::Json::JsonView jsonValue); AWS_ECS_API KernelCapabilities& operator=(Aws::Utils::Json::JsonView jsonValue); AWS_ECS_API Aws::Utils::Json::JsonValue Jsonize() const; /** *

The Linux capabilities for the container that have been added to the default * configuration provided by Docker. This parameter maps to CapAdd in * the Create * a container section of the Docker Remote API and the * --cap-add option to docker * run.

Tasks launched on Fargate only support adding the * SYS_PTRACE kernel capability.

Valid values: * "ALL" | "AUDIT_CONTROL" | "AUDIT_WRITE" | "BLOCK_SUSPEND" | "CHOWN" | * "DAC_OVERRIDE" | "DAC_READ_SEARCH" | "FOWNER" | "FSETID" | "IPC_LOCK" | * "IPC_OWNER" | "KILL" | "LEASE" | "LINUX_IMMUTABLE" | "MAC_ADMIN" | * "MAC_OVERRIDE" | "MKNOD" | "NET_ADMIN" | "NET_BIND_SERVICE" | "NET_BROADCAST" | * "NET_RAW" | "SETFCAP" | "SETGID" | "SETPCAP" | "SETUID" | "SYS_ADMIN" | * "SYS_BOOT" | "SYS_CHROOT" | "SYS_MODULE" | "SYS_NICE" | "SYS_PACCT" | * "SYS_PTRACE" | "SYS_RAWIO" | "SYS_RESOURCE" | "SYS_TIME" | "SYS_TTY_CONFIG" | * "SYSLOG" | "WAKE_ALARM"

*/ inline const Aws::Vector& GetAdd() const{ return m_add; } /** *

The Linux capabilities for the container that have been added to the default * configuration provided by Docker. This parameter maps to CapAdd in * the Create * a container section of the Docker Remote API and the * --cap-add option to docker * run.

Tasks launched on Fargate only support adding the * SYS_PTRACE kernel capability.

Valid values: * "ALL" | "AUDIT_CONTROL" | "AUDIT_WRITE" | "BLOCK_SUSPEND" | "CHOWN" | * "DAC_OVERRIDE" | "DAC_READ_SEARCH" | "FOWNER" | "FSETID" | "IPC_LOCK" | * "IPC_OWNER" | "KILL" | "LEASE" | "LINUX_IMMUTABLE" | "MAC_ADMIN" | * "MAC_OVERRIDE" | "MKNOD" | "NET_ADMIN" | "NET_BIND_SERVICE" | "NET_BROADCAST" | * "NET_RAW" | "SETFCAP" | "SETGID" | "SETPCAP" | "SETUID" | "SYS_ADMIN" | * "SYS_BOOT" | "SYS_CHROOT" | "SYS_MODULE" | "SYS_NICE" | "SYS_PACCT" | * "SYS_PTRACE" | "SYS_RAWIO" | "SYS_RESOURCE" | "SYS_TIME" | "SYS_TTY_CONFIG" | * "SYSLOG" | "WAKE_ALARM"

*/ inline bool AddHasBeenSet() const { return m_addHasBeenSet; } /** *

The Linux capabilities for the container that have been added to the default * configuration provided by Docker. This parameter maps to CapAdd in * the Create * a container section of the Docker Remote API and the * --cap-add option to docker * run.

Tasks launched on Fargate only support adding the * SYS_PTRACE kernel capability.

Valid values: * "ALL" | "AUDIT_CONTROL" | "AUDIT_WRITE" | "BLOCK_SUSPEND" | "CHOWN" | * "DAC_OVERRIDE" | "DAC_READ_SEARCH" | "FOWNER" | "FSETID" | "IPC_LOCK" | * "IPC_OWNER" | "KILL" | "LEASE" | "LINUX_IMMUTABLE" | "MAC_ADMIN" | * "MAC_OVERRIDE" | "MKNOD" | "NET_ADMIN" | "NET_BIND_SERVICE" | "NET_BROADCAST" | * "NET_RAW" | "SETFCAP" | "SETGID" | "SETPCAP" | "SETUID" | "SYS_ADMIN" | * "SYS_BOOT" | "SYS_CHROOT" | "SYS_MODULE" | "SYS_NICE" | "SYS_PACCT" | * "SYS_PTRACE" | "SYS_RAWIO" | "SYS_RESOURCE" | "SYS_TIME" | "SYS_TTY_CONFIG" | * "SYSLOG" | "WAKE_ALARM"

*/ inline void SetAdd(const Aws::Vector& value) { m_addHasBeenSet = true; m_add = value; } /** *

The Linux capabilities for the container that have been added to the default * configuration provided by Docker. This parameter maps to CapAdd in * the Create * a container section of the Docker Remote API and the * --cap-add option to docker * run.

Tasks launched on Fargate only support adding the * SYS_PTRACE kernel capability.

Valid values: * "ALL" | "AUDIT_CONTROL" | "AUDIT_WRITE" | "BLOCK_SUSPEND" | "CHOWN" | * "DAC_OVERRIDE" | "DAC_READ_SEARCH" | "FOWNER" | "FSETID" | "IPC_LOCK" | * "IPC_OWNER" | "KILL" | "LEASE" | "LINUX_IMMUTABLE" | "MAC_ADMIN" | * "MAC_OVERRIDE" | "MKNOD" | "NET_ADMIN" | "NET_BIND_SERVICE" | "NET_BROADCAST" | * "NET_RAW" | "SETFCAP" | "SETGID" | "SETPCAP" | "SETUID" | "SYS_ADMIN" | * "SYS_BOOT" | "SYS_CHROOT" | "SYS_MODULE" | "SYS_NICE" | "SYS_PACCT" | * "SYS_PTRACE" | "SYS_RAWIO" | "SYS_RESOURCE" | "SYS_TIME" | "SYS_TTY_CONFIG" | * "SYSLOG" | "WAKE_ALARM"

*/ inline void SetAdd(Aws::Vector&& value) { m_addHasBeenSet = true; m_add = std::move(value); } /** *

The Linux capabilities for the container that have been added to the default * configuration provided by Docker. This parameter maps to CapAdd in * the Create * a container section of the Docker Remote API and the * --cap-add option to docker * run.

Tasks launched on Fargate only support adding the * SYS_PTRACE kernel capability.

Valid values: * "ALL" | "AUDIT_CONTROL" | "AUDIT_WRITE" | "BLOCK_SUSPEND" | "CHOWN" | * "DAC_OVERRIDE" | "DAC_READ_SEARCH" | "FOWNER" | "FSETID" | "IPC_LOCK" | * "IPC_OWNER" | "KILL" | "LEASE" | "LINUX_IMMUTABLE" | "MAC_ADMIN" | * "MAC_OVERRIDE" | "MKNOD" | "NET_ADMIN" | "NET_BIND_SERVICE" | "NET_BROADCAST" | * "NET_RAW" | "SETFCAP" | "SETGID" | "SETPCAP" | "SETUID" | "SYS_ADMIN" | * "SYS_BOOT" | "SYS_CHROOT" | "SYS_MODULE" | "SYS_NICE" | "SYS_PACCT" | * "SYS_PTRACE" | "SYS_RAWIO" | "SYS_RESOURCE" | "SYS_TIME" | "SYS_TTY_CONFIG" | * "SYSLOG" | "WAKE_ALARM"

*/ inline KernelCapabilities& WithAdd(const Aws::Vector& value) { SetAdd(value); return *this;} /** *

The Linux capabilities for the container that have been added to the default * configuration provided by Docker. This parameter maps to CapAdd in * the Create * a container section of the Docker Remote API and the * --cap-add option to docker * run.

Tasks launched on Fargate only support adding the * SYS_PTRACE kernel capability.

Valid values: * "ALL" | "AUDIT_CONTROL" | "AUDIT_WRITE" | "BLOCK_SUSPEND" | "CHOWN" | * "DAC_OVERRIDE" | "DAC_READ_SEARCH" | "FOWNER" | "FSETID" | "IPC_LOCK" | * "IPC_OWNER" | "KILL" | "LEASE" | "LINUX_IMMUTABLE" | "MAC_ADMIN" | * "MAC_OVERRIDE" | "MKNOD" | "NET_ADMIN" | "NET_BIND_SERVICE" | "NET_BROADCAST" | * "NET_RAW" | "SETFCAP" | "SETGID" | "SETPCAP" | "SETUID" | "SYS_ADMIN" | * "SYS_BOOT" | "SYS_CHROOT" | "SYS_MODULE" | "SYS_NICE" | "SYS_PACCT" | * "SYS_PTRACE" | "SYS_RAWIO" | "SYS_RESOURCE" | "SYS_TIME" | "SYS_TTY_CONFIG" | * "SYSLOG" | "WAKE_ALARM"

*/ inline KernelCapabilities& WithAdd(Aws::Vector&& value) { SetAdd(std::move(value)); return *this;} /** *

The Linux capabilities for the container that have been added to the default * configuration provided by Docker. This parameter maps to CapAdd in * the Create * a container section of the Docker Remote API and the * --cap-add option to docker * run.

Tasks launched on Fargate only support adding the * SYS_PTRACE kernel capability.

Valid values: * "ALL" | "AUDIT_CONTROL" | "AUDIT_WRITE" | "BLOCK_SUSPEND" | "CHOWN" | * "DAC_OVERRIDE" | "DAC_READ_SEARCH" | "FOWNER" | "FSETID" | "IPC_LOCK" | * "IPC_OWNER" | "KILL" | "LEASE" | "LINUX_IMMUTABLE" | "MAC_ADMIN" | * "MAC_OVERRIDE" | "MKNOD" | "NET_ADMIN" | "NET_BIND_SERVICE" | "NET_BROADCAST" | * "NET_RAW" | "SETFCAP" | "SETGID" | "SETPCAP" | "SETUID" | "SYS_ADMIN" | * "SYS_BOOT" | "SYS_CHROOT" | "SYS_MODULE" | "SYS_NICE" | "SYS_PACCT" | * "SYS_PTRACE" | "SYS_RAWIO" | "SYS_RESOURCE" | "SYS_TIME" | "SYS_TTY_CONFIG" | * "SYSLOG" | "WAKE_ALARM"

*/ inline KernelCapabilities& AddAdd(const Aws::String& value) { m_addHasBeenSet = true; m_add.push_back(value); return *this; } /** *

The Linux capabilities for the container that have been added to the default * configuration provided by Docker. This parameter maps to CapAdd in * the Create * a container section of the Docker Remote API and the * --cap-add option to docker * run.

Tasks launched on Fargate only support adding the * SYS_PTRACE kernel capability.

Valid values: * "ALL" | "AUDIT_CONTROL" | "AUDIT_WRITE" | "BLOCK_SUSPEND" | "CHOWN" | * "DAC_OVERRIDE" | "DAC_READ_SEARCH" | "FOWNER" | "FSETID" | "IPC_LOCK" | * "IPC_OWNER" | "KILL" | "LEASE" | "LINUX_IMMUTABLE" | "MAC_ADMIN" | * "MAC_OVERRIDE" | "MKNOD" | "NET_ADMIN" | "NET_BIND_SERVICE" | "NET_BROADCAST" | * "NET_RAW" | "SETFCAP" | "SETGID" | "SETPCAP" | "SETUID" | "SYS_ADMIN" | * "SYS_BOOT" | "SYS_CHROOT" | "SYS_MODULE" | "SYS_NICE" | "SYS_PACCT" | * "SYS_PTRACE" | "SYS_RAWIO" | "SYS_RESOURCE" | "SYS_TIME" | "SYS_TTY_CONFIG" | * "SYSLOG" | "WAKE_ALARM"

*/ inline KernelCapabilities& AddAdd(Aws::String&& value) { m_addHasBeenSet = true; m_add.push_back(std::move(value)); return *this; } /** *

The Linux capabilities for the container that have been added to the default * configuration provided by Docker. This parameter maps to CapAdd in * the Create * a container section of the Docker Remote API and the * --cap-add option to docker * run.

Tasks launched on Fargate only support adding the * SYS_PTRACE kernel capability.

Valid values: * "ALL" | "AUDIT_CONTROL" | "AUDIT_WRITE" | "BLOCK_SUSPEND" | "CHOWN" | * "DAC_OVERRIDE" | "DAC_READ_SEARCH" | "FOWNER" | "FSETID" | "IPC_LOCK" | * "IPC_OWNER" | "KILL" | "LEASE" | "LINUX_IMMUTABLE" | "MAC_ADMIN" | * "MAC_OVERRIDE" | "MKNOD" | "NET_ADMIN" | "NET_BIND_SERVICE" | "NET_BROADCAST" | * "NET_RAW" | "SETFCAP" | "SETGID" | "SETPCAP" | "SETUID" | "SYS_ADMIN" | * "SYS_BOOT" | "SYS_CHROOT" | "SYS_MODULE" | "SYS_NICE" | "SYS_PACCT" | * "SYS_PTRACE" | "SYS_RAWIO" | "SYS_RESOURCE" | "SYS_TIME" | "SYS_TTY_CONFIG" | * "SYSLOG" | "WAKE_ALARM"

*/ inline KernelCapabilities& AddAdd(const char* value) { m_addHasBeenSet = true; m_add.push_back(value); return *this; } /** *

The Linux capabilities for the container that have been removed from the * default configuration provided by Docker. This parameter maps to * CapDrop in the Create * a container section of the Docker Remote API and the * --cap-drop option to docker * run.

Valid values: "ALL" | "AUDIT_CONTROL" | "AUDIT_WRITE" | * "BLOCK_SUSPEND" | "CHOWN" | "DAC_OVERRIDE" | "DAC_READ_SEARCH" | "FOWNER" | * "FSETID" | "IPC_LOCK" | "IPC_OWNER" | "KILL" | "LEASE" | "LINUX_IMMUTABLE" | * "MAC_ADMIN" | "MAC_OVERRIDE" | "MKNOD" | "NET_ADMIN" | "NET_BIND_SERVICE" | * "NET_BROADCAST" | "NET_RAW" | "SETFCAP" | "SETGID" | "SETPCAP" | "SETUID" | * "SYS_ADMIN" | "SYS_BOOT" | "SYS_CHROOT" | "SYS_MODULE" | "SYS_NICE" | * "SYS_PACCT" | "SYS_PTRACE" | "SYS_RAWIO" | "SYS_RESOURCE" | "SYS_TIME" | * "SYS_TTY_CONFIG" | "SYSLOG" | "WAKE_ALARM"

*/ inline const Aws::Vector& GetDrop() const{ return m_drop; } /** *

The Linux capabilities for the container that have been removed from the * default configuration provided by Docker. This parameter maps to * CapDrop in the Create * a container section of the Docker Remote API and the * --cap-drop option to docker * run.

Valid values: "ALL" | "AUDIT_CONTROL" | "AUDIT_WRITE" | * "BLOCK_SUSPEND" | "CHOWN" | "DAC_OVERRIDE" | "DAC_READ_SEARCH" | "FOWNER" | * "FSETID" | "IPC_LOCK" | "IPC_OWNER" | "KILL" | "LEASE" | "LINUX_IMMUTABLE" | * "MAC_ADMIN" | "MAC_OVERRIDE" | "MKNOD" | "NET_ADMIN" | "NET_BIND_SERVICE" | * "NET_BROADCAST" | "NET_RAW" | "SETFCAP" | "SETGID" | "SETPCAP" | "SETUID" | * "SYS_ADMIN" | "SYS_BOOT" | "SYS_CHROOT" | "SYS_MODULE" | "SYS_NICE" | * "SYS_PACCT" | "SYS_PTRACE" | "SYS_RAWIO" | "SYS_RESOURCE" | "SYS_TIME" | * "SYS_TTY_CONFIG" | "SYSLOG" | "WAKE_ALARM"

*/ inline bool DropHasBeenSet() const { return m_dropHasBeenSet; } /** *

The Linux capabilities for the container that have been removed from the * default configuration provided by Docker. This parameter maps to * CapDrop in the Create * a container section of the Docker Remote API and the * --cap-drop option to docker * run.

Valid values: "ALL" | "AUDIT_CONTROL" | "AUDIT_WRITE" | * "BLOCK_SUSPEND" | "CHOWN" | "DAC_OVERRIDE" | "DAC_READ_SEARCH" | "FOWNER" | * "FSETID" | "IPC_LOCK" | "IPC_OWNER" | "KILL" | "LEASE" | "LINUX_IMMUTABLE" | * "MAC_ADMIN" | "MAC_OVERRIDE" | "MKNOD" | "NET_ADMIN" | "NET_BIND_SERVICE" | * "NET_BROADCAST" | "NET_RAW" | "SETFCAP" | "SETGID" | "SETPCAP" | "SETUID" | * "SYS_ADMIN" | "SYS_BOOT" | "SYS_CHROOT" | "SYS_MODULE" | "SYS_NICE" | * "SYS_PACCT" | "SYS_PTRACE" | "SYS_RAWIO" | "SYS_RESOURCE" | "SYS_TIME" | * "SYS_TTY_CONFIG" | "SYSLOG" | "WAKE_ALARM"

*/ inline void SetDrop(const Aws::Vector& value) { m_dropHasBeenSet = true; m_drop = value; } /** *

The Linux capabilities for the container that have been removed from the * default configuration provided by Docker. This parameter maps to * CapDrop in the Create * a container section of the Docker Remote API and the * --cap-drop option to docker * run.

Valid values: "ALL" | "AUDIT_CONTROL" | "AUDIT_WRITE" | * "BLOCK_SUSPEND" | "CHOWN" | "DAC_OVERRIDE" | "DAC_READ_SEARCH" | "FOWNER" | * "FSETID" | "IPC_LOCK" | "IPC_OWNER" | "KILL" | "LEASE" | "LINUX_IMMUTABLE" | * "MAC_ADMIN" | "MAC_OVERRIDE" | "MKNOD" | "NET_ADMIN" | "NET_BIND_SERVICE" | * "NET_BROADCAST" | "NET_RAW" | "SETFCAP" | "SETGID" | "SETPCAP" | "SETUID" | * "SYS_ADMIN" | "SYS_BOOT" | "SYS_CHROOT" | "SYS_MODULE" | "SYS_NICE" | * "SYS_PACCT" | "SYS_PTRACE" | "SYS_RAWIO" | "SYS_RESOURCE" | "SYS_TIME" | * "SYS_TTY_CONFIG" | "SYSLOG" | "WAKE_ALARM"

*/ inline void SetDrop(Aws::Vector&& value) { m_dropHasBeenSet = true; m_drop = std::move(value); } /** *

The Linux capabilities for the container that have been removed from the * default configuration provided by Docker. This parameter maps to * CapDrop in the Create * a container section of the Docker Remote API and the * --cap-drop option to docker * run.

Valid values: "ALL" | "AUDIT_CONTROL" | "AUDIT_WRITE" | * "BLOCK_SUSPEND" | "CHOWN" | "DAC_OVERRIDE" | "DAC_READ_SEARCH" | "FOWNER" | * "FSETID" | "IPC_LOCK" | "IPC_OWNER" | "KILL" | "LEASE" | "LINUX_IMMUTABLE" | * "MAC_ADMIN" | "MAC_OVERRIDE" | "MKNOD" | "NET_ADMIN" | "NET_BIND_SERVICE" | * "NET_BROADCAST" | "NET_RAW" | "SETFCAP" | "SETGID" | "SETPCAP" | "SETUID" | * "SYS_ADMIN" | "SYS_BOOT" | "SYS_CHROOT" | "SYS_MODULE" | "SYS_NICE" | * "SYS_PACCT" | "SYS_PTRACE" | "SYS_RAWIO" | "SYS_RESOURCE" | "SYS_TIME" | * "SYS_TTY_CONFIG" | "SYSLOG" | "WAKE_ALARM"

*/ inline KernelCapabilities& WithDrop(const Aws::Vector& value) { SetDrop(value); return *this;} /** *

The Linux capabilities for the container that have been removed from the * default configuration provided by Docker. This parameter maps to * CapDrop in the Create * a container section of the Docker Remote API and the * --cap-drop option to docker * run.

Valid values: "ALL" | "AUDIT_CONTROL" | "AUDIT_WRITE" | * "BLOCK_SUSPEND" | "CHOWN" | "DAC_OVERRIDE" | "DAC_READ_SEARCH" | "FOWNER" | * "FSETID" | "IPC_LOCK" | "IPC_OWNER" | "KILL" | "LEASE" | "LINUX_IMMUTABLE" | * "MAC_ADMIN" | "MAC_OVERRIDE" | "MKNOD" | "NET_ADMIN" | "NET_BIND_SERVICE" | * "NET_BROADCAST" | "NET_RAW" | "SETFCAP" | "SETGID" | "SETPCAP" | "SETUID" | * "SYS_ADMIN" | "SYS_BOOT" | "SYS_CHROOT" | "SYS_MODULE" | "SYS_NICE" | * "SYS_PACCT" | "SYS_PTRACE" | "SYS_RAWIO" | "SYS_RESOURCE" | "SYS_TIME" | * "SYS_TTY_CONFIG" | "SYSLOG" | "WAKE_ALARM"

*/ inline KernelCapabilities& WithDrop(Aws::Vector&& value) { SetDrop(std::move(value)); return *this;} /** *

The Linux capabilities for the container that have been removed from the * default configuration provided by Docker. This parameter maps to * CapDrop in the Create * a container section of the Docker Remote API and the * --cap-drop option to docker * run.

Valid values: "ALL" | "AUDIT_CONTROL" | "AUDIT_WRITE" | * "BLOCK_SUSPEND" | "CHOWN" | "DAC_OVERRIDE" | "DAC_READ_SEARCH" | "FOWNER" | * "FSETID" | "IPC_LOCK" | "IPC_OWNER" | "KILL" | "LEASE" | "LINUX_IMMUTABLE" | * "MAC_ADMIN" | "MAC_OVERRIDE" | "MKNOD" | "NET_ADMIN" | "NET_BIND_SERVICE" | * "NET_BROADCAST" | "NET_RAW" | "SETFCAP" | "SETGID" | "SETPCAP" | "SETUID" | * "SYS_ADMIN" | "SYS_BOOT" | "SYS_CHROOT" | "SYS_MODULE" | "SYS_NICE" | * "SYS_PACCT" | "SYS_PTRACE" | "SYS_RAWIO" | "SYS_RESOURCE" | "SYS_TIME" | * "SYS_TTY_CONFIG" | "SYSLOG" | "WAKE_ALARM"

*/ inline KernelCapabilities& AddDrop(const Aws::String& value) { m_dropHasBeenSet = true; m_drop.push_back(value); return *this; } /** *

The Linux capabilities for the container that have been removed from the * default configuration provided by Docker. This parameter maps to * CapDrop in the Create * a container section of the Docker Remote API and the * --cap-drop option to docker * run.

Valid values: "ALL" | "AUDIT_CONTROL" | "AUDIT_WRITE" | * "BLOCK_SUSPEND" | "CHOWN" | "DAC_OVERRIDE" | "DAC_READ_SEARCH" | "FOWNER" | * "FSETID" | "IPC_LOCK" | "IPC_OWNER" | "KILL" | "LEASE" | "LINUX_IMMUTABLE" | * "MAC_ADMIN" | "MAC_OVERRIDE" | "MKNOD" | "NET_ADMIN" | "NET_BIND_SERVICE" | * "NET_BROADCAST" | "NET_RAW" | "SETFCAP" | "SETGID" | "SETPCAP" | "SETUID" | * "SYS_ADMIN" | "SYS_BOOT" | "SYS_CHROOT" | "SYS_MODULE" | "SYS_NICE" | * "SYS_PACCT" | "SYS_PTRACE" | "SYS_RAWIO" | "SYS_RESOURCE" | "SYS_TIME" | * "SYS_TTY_CONFIG" | "SYSLOG" | "WAKE_ALARM"

*/ inline KernelCapabilities& AddDrop(Aws::String&& value) { m_dropHasBeenSet = true; m_drop.push_back(std::move(value)); return *this; } /** *

The Linux capabilities for the container that have been removed from the * default configuration provided by Docker. This parameter maps to * CapDrop in the Create * a container section of the Docker Remote API and the * --cap-drop option to docker * run.

Valid values: "ALL" | "AUDIT_CONTROL" | "AUDIT_WRITE" | * "BLOCK_SUSPEND" | "CHOWN" | "DAC_OVERRIDE" | "DAC_READ_SEARCH" | "FOWNER" | * "FSETID" | "IPC_LOCK" | "IPC_OWNER" | "KILL" | "LEASE" | "LINUX_IMMUTABLE" | * "MAC_ADMIN" | "MAC_OVERRIDE" | "MKNOD" | "NET_ADMIN" | "NET_BIND_SERVICE" | * "NET_BROADCAST" | "NET_RAW" | "SETFCAP" | "SETGID" | "SETPCAP" | "SETUID" | * "SYS_ADMIN" | "SYS_BOOT" | "SYS_CHROOT" | "SYS_MODULE" | "SYS_NICE" | * "SYS_PACCT" | "SYS_PTRACE" | "SYS_RAWIO" | "SYS_RESOURCE" | "SYS_TIME" | * "SYS_TTY_CONFIG" | "SYSLOG" | "WAKE_ALARM"

*/ inline KernelCapabilities& AddDrop(const char* value) { m_dropHasBeenSet = true; m_drop.push_back(value); return *this; } private: Aws::Vector m_add; bool m_addHasBeenSet = false; Aws::Vector m_drop; bool m_dropHasBeenSet = false; }; } // namespace Model } // namespace ECS } // namespace Aws