Skip to content

Commit 2ee65d8

Browse files
crosbymichaelthaJeztah
authored andcommitted
Update usage of whitelist in project
Signed-off-by: Michael Crosby <[email protected]> (cherry picked from commit 0f83109) Signed-off-by: Sebastiaan van Stijn <[email protected]>
1 parent 39052fa commit 2ee65d8

3 files changed

Lines changed: 3 additions & 3 deletions

File tree

SCOPE.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,6 +52,6 @@ containerd is designed to be embedded into a larger system, hence it only includ
5252

5353
### How is the scope changed?
5454

55-
The scope of this project is a whitelist.
55+
The scope of this project is an allowed list.
5656
If it's not mentioned as being in scope, it is out of scope.
5757
For the scope of this project to change it requires a 100% vote from all maintainers of the project.

contrib/seccomp/seccomp_default.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ func arches() []specs.Arch {
4747
}
4848
}
4949

50-
// DefaultProfile defines the whitelist for the default seccomp profile.
50+
// DefaultProfile defines the allowed syscalls for the default seccomp profile.
5151
func DefaultProfile(sp *specs.Spec) *specs.LinuxSeccomp {
5252
syscalls := []specs.LinuxSyscall{
5353
{

contrib/seccomp/seccomp_default_unsupported.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ package seccomp
2020

2121
import specs "github.com/opencontainers/runtime-spec/specs-go"
2222

23-
// DefaultProfile defines the whitelist for the default seccomp profile.
23+
// DefaultProfile defines the allowed syscalls for the default seccomp profile.
2424
func DefaultProfile(sp *specs.Spec) *specs.LinuxSeccomp {
2525
return &specs.LinuxSeccomp{}
2626
}

0 commit comments

Comments
 (0)