Skip to content

Commit

Permalink
Browse files Browse the repository at this point in the history
Update usage of whitelist in project
Signed-off-by: Michael Crosby <michael@thepasture.io>
  • Loading branch information
crosbymichael committed Jun 8, 2020
1 parent 38cb1c1 commit 0f83109
Show file tree
Hide file tree
Showing 3 changed files with 3 additions and 3 deletions.
2 changes: 1 addition & 1 deletion SCOPE.md
Expand Up @@ -52,6 +52,6 @@ containerd is designed to be embedded into a larger system, hence it only includ

### How is the scope changed?

The scope of this project is a whitelist.
The scope of this project is an allowed list.
If it's not mentioned as being in scope, it is out of scope.
For the scope of this project to change it requires a 100% vote from all maintainers of the project.
2 changes: 1 addition & 1 deletion contrib/seccomp/seccomp_default.go
Expand Up @@ -47,7 +47,7 @@ func arches() []specs.Arch {
}
}

// DefaultProfile defines the whitelist for the default seccomp profile.
// DefaultProfile defines the allowed syscalls for the default seccomp profile.
func DefaultProfile(sp *specs.Spec) *specs.LinuxSeccomp {
syscalls := []specs.LinuxSyscall{
{
Expand Down
2 changes: 1 addition & 1 deletion contrib/seccomp/seccomp_default_unsupported.go
Expand Up @@ -20,7 +20,7 @@ package seccomp

import specs "github.com/opencontainers/runtime-spec/specs-go"

// DefaultProfile defines the whitelist for the default seccomp profile.
// DefaultProfile defines the allowed syscalls for the default seccomp profile.
func DefaultProfile(sp *specs.Spec) *specs.LinuxSeccomp {
return &specs.LinuxSeccomp{}
}

0 comments on commit 0f83109

Please sign in to comment.