Skip to content

Commit 0f83109

Browse files
committed
Update usage of whitelist in project
Signed-off-by: Michael Crosby <[email protected]>
1 parent 38cb1c1 commit 0f83109

3 files changed

Lines changed: 3 additions & 3 deletions

File tree

SCOPE.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,6 +52,6 @@ containerd is designed to be embedded into a larger system, hence it only includ
5252

5353
### How is the scope changed?
5454

55-
The scope of this project is a whitelist.
55+
The scope of this project is an allowed list.
5656
If it's not mentioned as being in scope, it is out of scope.
5757
For the scope of this project to change it requires a 100% vote from all maintainers of the project.

contrib/seccomp/seccomp_default.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ func arches() []specs.Arch {
4747
}
4848
}
4949

50-
// DefaultProfile defines the whitelist for the default seccomp profile.
50+
// DefaultProfile defines the allowed syscalls for the default seccomp profile.
5151
func DefaultProfile(sp *specs.Spec) *specs.LinuxSeccomp {
5252
syscalls := []specs.LinuxSyscall{
5353
{

contrib/seccomp/seccomp_default_unsupported.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ package seccomp
2020

2121
import specs "github.com/opencontainers/runtime-spec/specs-go"
2222

23-
// DefaultProfile defines the whitelist for the default seccomp profile.
23+
// DefaultProfile defines the allowed syscalls for the default seccomp profile.
2424
func DefaultProfile(sp *specs.Spec) *specs.LinuxSeccomp {
2525
return &specs.LinuxSeccomp{}
2626
}

0 commit comments

Comments
 (0)