Merge pull request #4313 from crosbymichael/allow-list

Update usage of whitelist in project
This commit is contained in:
Derek McGowan 2020-06-08 12:35:20 -07:00 committed by GitHub
commit 4e6d38606c
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
3 changed files with 3 additions and 3 deletions

View File

@ -52,6 +52,6 @@ containerd is designed to be embedded into a larger system, hence it only includ
### How is the scope changed? ### How is the scope changed?
The scope of this project is a whitelist. The scope of this project is an allowed list.
If it's not mentioned as being in scope, it is out of scope. If it's not mentioned as being in scope, it is out of scope.
For the scope of this project to change it requires a 100% vote from all maintainers of the project. For the scope of this project to change it requires a 100% vote from all maintainers of the project.

View File

@ -47,7 +47,7 @@ func arches() []specs.Arch {
} }
} }
// DefaultProfile defines the whitelist for the default seccomp profile. // DefaultProfile defines the allowed syscalls for the default seccomp profile.
func DefaultProfile(sp *specs.Spec) *specs.LinuxSeccomp { func DefaultProfile(sp *specs.Spec) *specs.LinuxSeccomp {
syscalls := []specs.LinuxSyscall{ syscalls := []specs.LinuxSyscall{
{ {

View File

@ -20,7 +20,7 @@ package seccomp
import specs "github.com/opencontainers/runtime-spec/specs-go" import specs "github.com/opencontainers/runtime-spec/specs-go"
// DefaultProfile defines the whitelist for the default seccomp profile. // DefaultProfile defines the allowed syscalls for the default seccomp profile.
func DefaultProfile(sp *specs.Spec) *specs.LinuxSeccomp { func DefaultProfile(sp *specs.Spec) *specs.LinuxSeccomp {
return &specs.LinuxSeccomp{} return &specs.LinuxSeccomp{}
} }