Update usage of whitelist in project
Signed-off-by: Michael Crosby <michael@thepasture.io>
This commit is contained in:
		
							
								
								
									
										2
									
								
								SCOPE.md
									
									
									
									
									
								
							
							
						
						
									
										2
									
								
								SCOPE.md
									
									
									
									
									
								
							| @@ -52,6 +52,6 @@ containerd is designed to be embedded into a larger system, hence it only includ | ||||
|  | ||||
| ### How is the scope changed? | ||||
|  | ||||
| The scope of this project is a whitelist. | ||||
| The scope of this project is an allowed list. | ||||
| If it's not mentioned as being in scope, it is out of scope. | ||||
| For the scope of this project to change it requires a 100% vote from all maintainers of the project. | ||||
|   | ||||
| @@ -47,7 +47,7 @@ func arches() []specs.Arch { | ||||
| 	} | ||||
| } | ||||
|  | ||||
| // DefaultProfile defines the whitelist for the default seccomp profile. | ||||
| // DefaultProfile defines the allowed syscalls for the default seccomp profile. | ||||
| func DefaultProfile(sp *specs.Spec) *specs.LinuxSeccomp { | ||||
| 	syscalls := []specs.LinuxSyscall{ | ||||
| 		{ | ||||
|   | ||||
| @@ -20,7 +20,7 @@ package seccomp | ||||
|  | ||||
| import specs "github.com/opencontainers/runtime-spec/specs-go" | ||||
|  | ||||
| // DefaultProfile defines the whitelist for the default seccomp profile. | ||||
| // DefaultProfile defines the allowed syscalls for the default seccomp profile. | ||||
| func DefaultProfile(sp *specs.Spec) *specs.LinuxSeccomp { | ||||
| 	return &specs.LinuxSeccomp{} | ||||
| } | ||||
|   | ||||
		Reference in New Issue
	
	Block a user
	 Michael Crosby
					Michael Crosby