[lxc-devel] [lxd/master] doc/instances: Fix swapped description
stgraber on Github
lxc-bot at linuxcontainers.org
Fri Apr 17 18:33:50 UTC 2020
A non-text attachment was scrubbed...
Name: not available
Type: text/x-mailbox
Size: 354 bytes
Desc: not available
URL: <http://lists.linuxcontainers.org/pipermail/lxc-devel/attachments/20200417/013f76cc/attachment.bin>
-------------- next part --------------
From 8a42dcf392561948a6c4fdfbfc85038fba02e356 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?St=C3=A9phane=20Graber?= <stgraber at ubuntu.com>
Date: Fri, 17 Apr 2020 14:33:35 -0400
Subject: [PATCH] doc/instances: Fix swapped description
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Signed-off-by: Stéphane Graber <stgraber at ubuntu.com>
---
doc/instances.md | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/doc/instances.md b/doc/instances.md
index b35c9d7b23..160464fe61 100644
--- a/doc/instances.md
+++ b/doc/instances.md
@@ -87,8 +87,8 @@ security.syscalls.blacklist\_default | boolean | true | no
security.syscalls.intercept.mknod | boolean | false | no | container | Handles the `mknod` and `mknodat` system calls (allows creation of a limited subset of char/block devices)
security.syscalls.intercept.mount | boolean | false | no | container | Handles the `mount` system call
security.syscalls.intercept.mount.allowed | string | - | yes | container | Specify a comma-separated list of filesystems that are safe to mount for processes inside the instance
-security.syscalls.intercept.mount.fuse | string | - | yes | container | Whether to mount shiftfs on top of filesystems handled through mount syscall interception
-security.syscalls.intercept.mount.shift | boolean | false | yes | container | Whether to redirect mounts of a given filesystem to their fuse implemenation (e.g. ext4=fuse2fs)
+security.syscalls.intercept.mount.fuse | string | - | yes | container | Whether to redirect mounts of a given filesystem to their fuse implemenation (e.g. ext4=fuse2fs)
+security.syscalls.intercept.mount.shift | boolean | false | yes | container | Whether to mount shiftfs on top of filesystems handled through mount syscall interception
security.syscalls.intercept.setxattr | boolean | false | no | container | Handles the `setxattr` system call (allows setting a limited subset of restricted extended attributes)
security.syscalls.whitelist | string | - | no | container | A '\n' separated list of syscalls to whitelist (mutually exclusive with security.syscalls.blacklist\*)
snapshots.schedule | string | - | no | - | Cron expression (`<minute> <hour> <dom> <month> <dow>`)
More information about the lxc-devel
mailing list