Builder

class Builder : GeneratedMessage.Builder<BuilderT> , GuestPolicyOrBuilder
# Language Settings: Policy

Guest "policies" define the access rights granted to a given guest language VM. Policies are defined by the host and
enforced at runtime.
Protobuf type elide.meta.GuestPolicy

Functions

Link copied to clipboard
open fun addRepeatedField(field: Descriptors.FieldDescriptor, value: Any): BuilderT
abstract fun addRepeatedField(field: Descriptors.FieldDescriptor, value: Any): Message.Builder
Link copied to clipboard
abstract fun build(): MessageLite
open fun build(): GuestPolicy
Link copied to clipboard
abstract fun buildPartial(): MessageLite
Link copied to clipboard
open fun clear(): BuilderType
abstract fun clear(): Message.Builder
Link copied to clipboard
## Policies: Allow-all.

Allows all host access for the guest language. This means the guest language can load classes, access I/O, and
perform other potentially sensitive or dangerous operations. Exercise extreme caution enabling this policy.
bool allow_all = 1;
Link copied to clipboard
Whether to allow the guest language to call native code. Defaults to `false`.
bool allow_native = 5;
Link copied to clipboard
Maximum execution time to allow for execution within this guest; there is a sensible Elide-wide default if
unspecified. Expressed in a count of milliseconds. `0` disables the restriction.
uint64 execution_time = 11;
Link copied to clipboard
open fun clearField(field: Descriptors.FieldDescriptor): BuilderT
abstract fun clearField(field: Descriptors.FieldDescriptor): Message.Builder
Link copied to clipboard
Whether to allow the guest language to access host-side environment. Defaults to `false`.
bool host_env = 8;
Link copied to clipboard
Whether to allow the guest language to access host-side I/O. Defaults to `false`.
bool host_io = 6;
Link copied to clipboard
Whether to allow the guest language to access host-side networking. Defaults to `false`.
bool host_net = 7;
Link copied to clipboard
## Policies: Integrated.

Allows some host access for the guest language; this includes values shared in callbacks and invocation bindings.
The guest language can only load certain classes, cannot access host I/O (by default), and is *allowed* to call
native code; this mode should be used when all executing code is under the developer's control.
bool integrated = 2;
Link copied to clipboard
## Policies: Isolated.

Allows no host access for the guest language. This means the guest language cannot load classes, access host I/O,
or perform other potentially sensitive or dangerous operations. Resources used by guest languages can be capped
or otherwise controlled.
bool isolated = 3;
Link copied to clipboard
Maximum memory to allow for allocation within this guest language; there is a sensible Elide-wide default if
unspecified. Expressed as a count of bytes. `0` disables the restriction.
uint32 max_memory = 9;
Link copied to clipboard
open fun clearOneof(oneof: Descriptors.OneofDescriptor): BuilderType
open fun clearOneof(oneof: Descriptors.OneofDescriptor): BuilderT
abstract fun clearOneof(oneof: Descriptors.OneofDescriptor): Message.Builder
Link copied to clipboard
Link copied to clipboard
Whether to allow process control for the guest; the guest will be able to launch OS-native processes if this flag
is activated. In most secure operating modes this flag defaults to being off.
bool processes = 12;
Link copied to clipboard
## Policies: Sandbox.

Like the `ISOLATED` policy, but applies a stronger sandbox; allows no host access for the guest language. This
means the guest language cannot load classes, access host I/O, or perform other potentially sensitive or
dangerous operations. Resources used by guest languages can be capped or otherwise controlled.

If available, hardware isolation is used; otherwise, software isolation is used.
bool sandbox = 4;
Link copied to clipboard
Maximum stack depth to allow for execution within this guest; there is a sensible Elide-wide default if
unspecified. Specified as a numeric count. `0` disables the restriction.
uint32 stack_depth = 10;
Link copied to clipboard
Whether to allow thread control for the guest; the guest will be able to launch OS-native threads if this flag is
activated. In most secure operating modes this flag defaults to being off.
bool threads = 13;
Link copied to clipboard
open fun clone(): BuilderType
open fun clone(): BuilderT
abstract fun clone(): Message.Builder
Link copied to clipboard
Link copied to clipboard
open fun getAllFields(): Map<Descriptors.FieldDescriptor, Any>
Link copied to clipboard
open fun getAllowAll(): Boolean
## Policies: Allow-all.

Allows all host access for the guest language. This means the guest language can load classes, access I/O, and
perform other potentially sensitive or dangerous operations. Exercise extreme caution enabling this policy.
bool allow_all = 1;
Link copied to clipboard
Whether to allow the guest language to call native code. Defaults to `false`.
bool allow_native = 5;
Link copied to clipboard
abstract fun getDefaultInstanceForType(): MessageLite
Link copied to clipboard
fun getDescriptor(): Descriptors.Descriptor
Link copied to clipboard
open fun getDescriptorForType(): Descriptors.Descriptor
Link copied to clipboard
Maximum execution time to allow for execution within this guest; there is a sensible Elide-wide default if
unspecified. Expressed in a count of milliseconds. `0` disables the restriction.
uint64 execution_time = 11;
Link copied to clipboard
open fun getField(field: Descriptors.FieldDescriptor): Any
Link copied to clipboard
open fun getFieldBuilder(field: Descriptors.FieldDescriptor): Message.Builder
Link copied to clipboard
open fun getHostEnv(): Boolean
Whether to allow the guest language to access host-side environment. Defaults to `false`.
bool host_env = 8;
Link copied to clipboard
open fun getHostIo(): Boolean
Whether to allow the guest language to access host-side I/O. Defaults to `false`.
bool host_io = 6;
Link copied to clipboard
open fun getHostNet(): Boolean
Whether to allow the guest language to access host-side networking. Defaults to `false`.
bool host_net = 7;
Link copied to clipboard
## Policies: Integrated.

Allows some host access for the guest language; this includes values shared in callbacks and invocation bindings.
The guest language can only load certain classes, cannot access host I/O (by default), and is *allowed* to call
native code; this mode should be used when all executing code is under the developer's control.
bool integrated = 2;
Link copied to clipboard
open fun getIsolated(): Boolean
## Policies: Isolated.

Allows no host access for the guest language. This means the guest language cannot load classes, access host I/O,
or perform other potentially sensitive or dangerous operations. Resources used by guest languages can be capped
or otherwise controlled.
bool isolated = 3;
Link copied to clipboard
open fun getMaxMemory(): Int
Maximum memory to allow for allocation within this guest language; there is a sensible Elide-wide default if
unspecified. Expressed as a count of bytes. `0` disables the restriction.
uint32 max_memory = 9;
Link copied to clipboard
open fun getOneofFieldDescriptor(oneof: Descriptors.OneofDescriptor): Descriptors.FieldDescriptor
Link copied to clipboard
Link copied to clipboard
open fun getProcesses(): Boolean
Whether to allow process control for the guest; the guest will be able to launch OS-native processes if this flag
is activated. In most secure operating modes this flag defaults to being off.
bool processes = 12;
Link copied to clipboard
open fun getRepeatedField(field: Descriptors.FieldDescriptor, index: Int): Any
Link copied to clipboard
open fun getRepeatedFieldBuilder(field: Descriptors.FieldDescriptor, index: Int): Message.Builder
Link copied to clipboard
open fun getRepeatedFieldCount(field: Descriptors.FieldDescriptor): Int
Link copied to clipboard
open fun getSandbox(): Boolean
## Policies: Sandbox.

Like the `ISOLATED` policy, but applies a stronger sandbox; allows no host access for the guest language. This
means the guest language cannot load classes, access host I/O, or perform other potentially sensitive or
dangerous operations. Resources used by guest languages can be capped or otherwise controlled.

If available, hardware isolation is used; otherwise, software isolation is used.
bool sandbox = 4;
Link copied to clipboard
open fun getStackDepth(): Int
Maximum stack depth to allow for execution within this guest; there is a sensible Elide-wide default if
unspecified. Specified as a numeric count. `0` disables the restriction.
uint32 stack_depth = 10;
Link copied to clipboard
open fun getThreads(): Boolean
Whether to allow thread control for the guest; the guest will be able to launch OS-native threads if this flag is
activated. In most secure operating modes this flag defaults to being off.
bool threads = 13;
Link copied to clipboard
fun getUnknownFields(): UnknownFieldSet
Link copied to clipboard
open fun hasAllowAll(): Boolean
## Policies: Allow-all.

Allows all host access for the guest language. This means the guest language can load classes, access I/O, and
perform other potentially sensitive or dangerous operations. Exercise extreme caution enabling this policy.
bool allow_all = 1;
Link copied to clipboard
open fun hasField(field: Descriptors.FieldDescriptor): Boolean
Link copied to clipboard
## Policies: Integrated.

Allows some host access for the guest language; this includes values shared in callbacks and invocation bindings.
The guest language can only load certain classes, cannot access host I/O (by default), and is *allowed* to call
native code; this mode should be used when all executing code is under the developer's control.
bool integrated = 2;
Link copied to clipboard
open fun hasIsolated(): Boolean
## Policies: Isolated.

Allows no host access for the guest language. This means the guest language cannot load classes, access host I/O,
or perform other potentially sensitive or dangerous operations. Resources used by guest languages can be capped
or otherwise controlled.
bool isolated = 3;
Link copied to clipboard
open fun hasOneof(oneof: Descriptors.OneofDescriptor): Boolean
Link copied to clipboard
open fun hasSandbox(): Boolean
## Policies: Sandbox.

Like the `ISOLATED` policy, but applies a stronger sandbox; allows no host access for the guest language. This
means the guest language cannot load classes, access host I/O, or perform other potentially sensitive or
dangerous operations. Resources used by guest languages can be capped or otherwise controlled.

If available, hardware isolation is used; otherwise, software isolation is used.
bool sandbox = 4;
Link copied to clipboard
Link copied to clipboard
open fun mergeDelimitedFrom(input: InputStream, extensionRegistry: ExtensionRegistryLite): Boolean
Link copied to clipboard
abstract fun mergeFrom(other: Message): Message.Builder
open fun mergeFrom(other: Message): GuestPolicy.Builder
open fun mergeFrom(input: CodedInputStream, extensionRegistry: ExtensionRegistryLite): GuestPolicy.Builder
Link copied to clipboard
open fun mergeUnknownFields(unknownFields: UnknownFieldSet): BuilderType
open fun mergeUnknownFields(unknownFields: UnknownFieldSet): BuilderT
abstract fun mergeUnknownFields(unknownFields: UnknownFieldSet): Message.Builder
Link copied to clipboard
open fun newBuilderForField(field: Descriptors.FieldDescriptor): Message.Builder
Link copied to clipboard
## Policies: Allow-all.

Allows all host access for the guest language. This means the guest language can load classes, access I/O, and
perform other potentially sensitive or dangerous operations. Exercise extreme caution enabling this policy.
bool allow_all = 1;
Link copied to clipboard
Whether to allow the guest language to call native code. Defaults to `false`.
bool allow_native = 5;
Link copied to clipboard
Maximum execution time to allow for execution within this guest; there is a sensible Elide-wide default if
unspecified. Expressed in a count of milliseconds. `0` disables the restriction.
uint64 execution_time = 11;
Link copied to clipboard
open fun setField(field: Descriptors.FieldDescriptor, value: Any): BuilderT
abstract fun setField(field: Descriptors.FieldDescriptor, value: Any): Message.Builder
Link copied to clipboard
Whether to allow the guest language to access host-side environment. Defaults to `false`.
bool host_env = 8;
Link copied to clipboard
Whether to allow the guest language to access host-side I/O. Defaults to `false`.
bool host_io = 6;
Link copied to clipboard
Whether to allow the guest language to access host-side networking. Defaults to `false`.
bool host_net = 7;
Link copied to clipboard
## Policies: Integrated.

Allows some host access for the guest language; this includes values shared in callbacks and invocation bindings.
The guest language can only load certain classes, cannot access host I/O (by default), and is *allowed* to call
native code; this mode should be used when all executing code is under the developer's control.
bool integrated = 2;
Link copied to clipboard
## Policies: Isolated.

Allows no host access for the guest language. This means the guest language cannot load classes, access host I/O,
or perform other potentially sensitive or dangerous operations. Resources used by guest languages can be capped
or otherwise controlled.
bool isolated = 3;
Link copied to clipboard
Maximum memory to allow for allocation within this guest language; there is a sensible Elide-wide default if
unspecified. Expressed as a count of bytes. `0` disables the restriction.
uint32 max_memory = 9;
Link copied to clipboard
Whether to allow process control for the guest; the guest will be able to launch OS-native processes if this flag
is activated. In most secure operating modes this flag defaults to being off.
bool processes = 12;
Link copied to clipboard
open fun setRepeatedField(field: Descriptors.FieldDescriptor, index: Int, value: Any): BuilderT
abstract fun setRepeatedField(field: Descriptors.FieldDescriptor, index: Int, value: Any): Message.Builder
Link copied to clipboard
## Policies: Sandbox.

Like the `ISOLATED` policy, but applies a stronger sandbox; allows no host access for the guest language. This
means the guest language cannot load classes, access host I/O, or perform other potentially sensitive or
dangerous operations. Resources used by guest languages can be capped or otherwise controlled.

If available, hardware isolation is used; otherwise, software isolation is used.
bool sandbox = 4;
Link copied to clipboard
Maximum stack depth to allow for execution within this guest; there is a sensible Elide-wide default if
unspecified. Specified as a numeric count. `0` disables the restriction.
uint32 stack_depth = 10;
Link copied to clipboard
Whether to allow thread control for the guest; the guest will be able to launch OS-native threads if this flag is
activated. In most secure operating modes this flag defaults to being off.
bool threads = 13;
Link copied to clipboard
open fun setUnknownFields(unknownFields: UnknownFieldSet): BuilderT
abstract fun setUnknownFields(unknownFields: UnknownFieldSet): Message.Builder
Link copied to clipboard
open fun toString(): String