Merge pull request #6903 from ashley-cui/problemlang

Fix & add notes regarding problematic language in codebase
This commit is contained in:
OpenShift Merge Robot
2020-07-15 17:18:26 -04:00
committed by GitHub
6 changed files with 27 additions and 18 deletions

View File

@ -580,7 +580,7 @@ process.
Create a bind mount. If you specify, ` -v /HOST-DIR:/CONTAINER-DIR`, Podman Create a bind mount. If you specify, ` -v /HOST-DIR:/CONTAINER-DIR`, Podman
bind mounts `/HOST-DIR` in the host to `/CONTAINER-DIR` in the Podman bind mounts `/HOST-DIR` in the host to `/CONTAINER-DIR` in the Podman
container. The `OPTIONS` are a comma delimited list and can be: container. The `OPTIONS` are a comma delimited list and can be: <sup>[[1]](#Footnote1)</sup>
* [rw|ro] * [rw|ro]
* [z|Z|O] * [z|Z|O]
@ -643,7 +643,7 @@ be specified only for bind mounted volumes and not for internal volumes or
named volumes. For mount propagation to work on the source mount point (mount point named volumes. For mount propagation to work on the source mount point (mount point
where source dir is mounted on) has to have the right propagation properties. For where source dir is mounted on) has to have the right propagation properties. For
shared volumes, the source mount point has to be shared. And for slave volumes, shared volumes, the source mount point has to be shared. And for slave volumes,
the source mount has to be either shared or slave. the source mount has to be either shared or slave. <sup>[[1]](#Footnote1)</sup>
Use `df <source-dir>` to determine the source mount and then use Use `df <source-dir>` to determine the source mount and then use
`findmnt -o TARGET,PROPAGATION <source-mount-dir>` to determine propagation `findmnt -o TARGET,PROPAGATION <source-mount-dir>` to determine propagation
@ -651,7 +651,7 @@ properties of source mount, if `findmnt` utility is not available, the source mo
can be determined by looking at the mount entry in `/proc/self/mountinfo`. Look can be determined by looking at the mount entry in `/proc/self/mountinfo`. Look
at `optional fields` and see if any propagation properties are specified. at `optional fields` and see if any propagation properties are specified.
`shared:X` means the mount is `shared`, `master:X` means the mount is `slave` and if `shared:X` means the mount is `shared`, `master:X` means the mount is `slave` and if
nothing is there that means the mount is `private`. nothing is there that means the mount is `private`. <sup>[[1]](#Footnote1)</sup>
To change propagation properties of a mount point use the `mount` command. For To change propagation properties of a mount point use the `mount` command. For
example, to bind mount the source directory `/foo` do example, to bind mount the source directory `/foo` do
@ -755,3 +755,6 @@ podman(1), buildah(1), containers-registries.conf(5), crun(8), runc(8), useradd(
May 2018, Minor revisions added by Joe Doss <joe@solidadmin.com> May 2018, Minor revisions added by Joe Doss <joe@solidadmin.com>
December 2017, Originally compiled by Tom Sweeney <tsweeney@redhat.com> December 2017, Originally compiled by Tom Sweeney <tsweeney@redhat.com>
## FOOTNOTES
<a name="Footnote1">1</a>: The Podman project is committed to inclusivity, a core value of open source. The `master` and `slave` mount propagation terminology used here is problematic and divisive, and should be changed. However, these terms are currently used within the Linux kernel and must be used as-is at this time. When the kernel maintainers rectify this usage, Podman will follow suit immediately.

View File

@ -488,7 +488,7 @@ Tune a container's memory swappiness behavior. Accepts an integer between 0 and
Attach a filesystem mount to the container Attach a filesystem mount to the container
Current supported mount TYPES are `bind`, `volume`, and `tmpfs`. Current supported mount TYPES are `bind`, `volume`, and `tmpfs`. <sup>[[1]](#Footnote1)</sup>
e.g. e.g.
@ -884,7 +884,7 @@ Set the UTS mode for the container
Create a bind mount. If you specify, ` -v /HOST-DIR:/CONTAINER-DIR`, podman Create a bind mount. If you specify, ` -v /HOST-DIR:/CONTAINER-DIR`, podman
bind mounts `/HOST-DIR` in the host to `/CONTAINER-DIR` in the podman bind mounts `/HOST-DIR` in the host to `/CONTAINER-DIR` in the podman
container. The `OPTIONS` are a comma delimited list and can be: container. The `OPTIONS` are a comma delimited list and can be: <sup>[[1]](#Footnote1)</sup>
* [rw|ro] * [rw|ro]
* [z|Z] * [z|Z]
@ -936,7 +936,7 @@ this behavior by specifying a volume mount propagation property. Making a
volume `shared` mounts done under that volume inside container will be volume `shared` mounts done under that volume inside container will be
visible on host and vice versa. Making a volume `slave` enables only one visible on host and vice versa. Making a volume `slave` enables only one
way mount propagation and that is mounts done on host under that volume way mount propagation and that is mounts done on host under that volume
will be visible inside container but not the other way around. will be visible inside container but not the other way around. <sup>[[1]](#Footnote1)</sup>
To control mount propagation property of volume one can use `:[r]shared`, To control mount propagation property of volume one can use `:[r]shared`,
`:[r]slave` or `:[r]private` propagation flag. Propagation property can `:[r]slave` or `:[r]private` propagation flag. Propagation property can
@ -944,7 +944,7 @@ be specified only for bind mounted volumes and not for internal volumes or
named volumes. For mount propagation to work source mount point (mount point named volumes. For mount propagation to work source mount point (mount point
where source dir is mounted on) has to have right propagation properties. For where source dir is mounted on) has to have right propagation properties. For
shared volumes, source mount point has to be shared. And for slave volumes, shared volumes, source mount point has to be shared. And for slave volumes,
source mount has to be either shared or slave. source mount has to be either shared or slave. <sup>[[1]](#Footnote1)</sup>
If you want to recursively mount a volume and all of it's submounts into a If you want to recursively mount a volume and all of it's submounts into a
container, then you can use the `rbind` option. By default the bind option is container, then you can use the `rbind` option. By default the bind option is
@ -971,7 +971,7 @@ properties of source mount. If `findmnt` utility is not available, then one
can look at mount entry for source mount point in `/proc/self/mountinfo`. Look can look at mount entry for source mount point in `/proc/self/mountinfo`. Look
at `optional fields` and see if any propagation properties are specified. at `optional fields` and see if any propagation properties are specified.
`shared:X` means mount is `shared`, `master:X` means mount is `slave` and if `shared:X` means mount is `shared`, `master:X` means mount is `slave` and if
nothing is there that means mount is `private`. nothing is there that means mount is `private`. <sup>[[1]](#Footnote1)</sup>
To change propagation properties of a mount point use `mount` command. For To change propagation properties of a mount point use `mount` command. For
example, if one wants to bind mount source directory `/foo` one can do example, if one wants to bind mount source directory `/foo` one can do
@ -1117,3 +1117,6 @@ November 2014, updated by Sven Dowideit <SvenDowideit@home.org.au>
September 2014, updated by Sven Dowideit <SvenDowideit@home.org.au> September 2014, updated by Sven Dowideit <SvenDowideit@home.org.au>
August 2014, updated by Sven Dowideit <SvenDowideit@home.org.au> August 2014, updated by Sven Dowideit <SvenDowideit@home.org.au>
## FOOTNOTES
<a name="Footnote1">1</a>: The Podman project is committed to inclusivity, a core value of open source. The `master` and `slave` mount propagation terminology used here is problematic and divisive, and should be changed. However, these terms are currently used within the Linux kernel and must be used as-is at this time. When the kernel maintainers rectify this usage, Podman will follow suit immediately.

View File

@ -30,8 +30,8 @@ If no configuration is found for any of these scopes, the default value (specifi
Trust **type** provides a way to: Trust **type** provides a way to:
Whitelist ("accept") or Allowlist ("accept") or
Blacklist ("reject") registries or Denylist ("reject") registries or
Require signature (“signedBy”). Require signature (“signedBy”).
Trust may be updated using the command **podman image trust set** for an existing trust scope. Trust may be updated using the command **podman image trust set** for an existing trust scope.

View File

@ -495,7 +495,7 @@ Tune a container's memory swappiness behavior. Accepts an integer between *0* an
Attach a filesystem mount to the container Attach a filesystem mount to the container
Current supported mount TYPEs are **bind**, **volume**, and **tmpfs**. Current supported mount TYPEs are **bind**, **volume**, and **tmpfs**. <sup>[[1]](#Footnote1)</sup>
e.g. e.g.
@ -754,7 +754,7 @@ Security Options
- **label=disable**: Turn off label separation for the container - **label=disable**: Turn off label separation for the container
- **no-new-privileges**: Disable container processes from gaining additional privileges - **no-new-privileges**: Disable container processes from gaining additional privileges
- **seccomp=unconfined**: Turn off seccomp confinement for the container - **seccomp=unconfined**: Turn off seccomp confinement for the container
- **seccomp**=_profile.json_: Whitelisted syscalls seccomp JSON file to be used as a seccomp filter - **seccomp**=_profile.json_: Allowed syscall list seccomp JSON file to be used as a seccomp filter
Note: Labeling can be disabled for all containers by setting **label=false** in the **libpod.conf**(5) file. Note: Labeling can be disabled for all containers by setting **label=false** in the **libpod.conf**(5) file.
@ -924,7 +924,7 @@ container. Similarly, _source-volume_:_/container-dir_ will mount the volume
in the host to the container. If no such named volume exists, Podman will in the host to the container. If no such named volume exists, Podman will
create one. create one.
The _options_ is a comma delimited list and can be: The _options_ is a comma delimited list and can be: <sup>[[1]](#Footnote1)</sup>
* **rw**|**ro** * **rw**|**ro**
* **z**|**Z** * **z**|**Z**
@ -974,7 +974,7 @@ this behavior by specifying a volume mount propagation property. Making a
volume shared mounts done under that volume inside container will be volume shared mounts done under that volume inside container will be
visible on host and vice versa. Making a volume **slave** enables only one visible on host and vice versa. Making a volume **slave** enables only one
way mount propagation and that is mounts done on host under that volume way mount propagation and that is mounts done on host under that volume
will be visible inside container but not the other way around. will be visible inside container but not the other way around. <sup>[[1]](#Footnote1)</sup>
To control mount propagation property of volume one can use [**r**]**shared**, To control mount propagation property of volume one can use [**r**]**shared**,
[**r**]**slave** or [**r**]**private** propagation flag. Propagation property can [**r**]**slave** or [**r**]**private** propagation flag. Propagation property can
@ -982,7 +982,7 @@ be specified only for bind mounted volumes and not for internal volumes or
named volumes. For mount propagation to work source mount point (mount point named volumes. For mount propagation to work source mount point (mount point
where source dir is mounted on) has to have right propagation properties. For where source dir is mounted on) has to have right propagation properties. For
shared volumes, source mount point has to be shared. And for slave volumes, shared volumes, source mount point has to be shared. And for slave volumes,
source mount has to be either shared or slave. source mount has to be either shared or slave. <sup>[[1]](#Footnote1)</sup>
If you want to recursively mount a volume and all of its submounts into a If you want to recursively mount a volume and all of its submounts into a
container, then you can use the **rbind** option. By default the bind option is container, then you can use the **rbind** option. By default the bind option is
@ -1009,7 +1009,7 @@ properties of source mount. If **findmnt**(1) utility is not available, then one
can look at mount entry for source mount point in _/proc/self/mountinfo_. Look can look at mount entry for source mount point in _/proc/self/mountinfo_. Look
at the "optional fields" and see if any propagation properties are specified. at the "optional fields" and see if any propagation properties are specified.
In there, **shared:N** means the mount is shared, **master:N** means mount In there, **shared:N** means the mount is shared, **master:N** means mount
is slave, and if nothing is there, the mount is private. is slave, and if nothing is there, the mount is private. <sup>[[1]](#Footnote1)</sup>
To change propagation properties of a mount point, use **mount**(8) command. For To change propagation properties of a mount point, use **mount**(8) command. For
example, if one wants to bind mount source directory _/foo_, one can do example, if one wants to bind mount source directory _/foo_, one can do
@ -1400,3 +1400,6 @@ July 2014, updated by Sven Dowideit <SvenDowideit@home.org.au>
June 2014, updated by Sven Dowideit <SvenDowideit@home.org.au> June 2014, updated by Sven Dowideit <SvenDowideit@home.org.au>
April 2014, Originally compiled by William Henry <whenry@redhat.com> based on docker.com source material and internal work. April 2014, Originally compiled by William Henry <whenry@redhat.com> based on docker.com source material and internal work.
## FOOTNOTES
<a name="Footnote1">1</a>: The Podman project is committed to inclusivity, a core value of open source. The `master` and `slave` mount propagation terminology used here is problematic and divisive, and should be changed. However, these terms are currently used within the Linux kernel and must be used as-is at this time. When the kernel maintainers rectify this usage, Podman will follow suit immediately.

View File

@ -641,7 +641,7 @@ func ValidateSysctls(strSlice []string) (map[string]string, error) {
} }
} }
if !foundMatch { if !foundMatch {
return nil, errors.Errorf("sysctl '%s' is not whitelisted", arr[0]) return nil, errors.Errorf("sysctl '%s' is not allowed", arr[0])
} }
} }
return sysctl, nil return sysctl, nil

View File

@ -30,7 +30,7 @@ can easily fail
* Only other supported driver is VFS. * Only other supported driver is VFS.
* No CNI Support * No CNI Support
* CNI wants to modify IPTables, plus other network manipulation that requires CAP_SYS_ADMIN. * CNI wants to modify IPTables, plus other network manipulation that requires CAP_SYS_ADMIN.
* There is potential we could probably do some sort of blacklisting of the relevant plugins, and add a new plugin for rootless networking - slirp4netns as one example and there may be others * There is potential we could probably do some sort of denylisting of the relevant plugins, and add a new plugin for rootless networking - slirp4netns as one example and there may be others
* Cannot use ping out of the box. * Cannot use ping out of the box.
* [(Can be fixed by setting sysctl on host)](https://github.com/containers/libpod/blob/master/troubleshooting.md#6-rootless-containers-cannot-ping-hosts) * [(Can be fixed by setting sysctl on host)](https://github.com/containers/libpod/blob/master/troubleshooting.md#6-rootless-containers-cannot-ping-hosts)
* Requires new shadow-utils (not found in older (RHEL7/Centos7 distros) Should be fixed in RHEL7.7 release) * Requires new shadow-utils (not found in older (RHEL7/Centos7 distros) Should be fixed in RHEL7.7 release)