zsh: Don't limit --bind options to completing directories
You can mount a non-directory onto a non-directory. Signed-off-by: Simon McVittie <smcv@collabora.com>
This commit is contained in:
@@ -7,14 +7,14 @@ _bwrap_args=(
|
|||||||
'--args[Parse NUL-separated args from FD]: :'
|
'--args[Parse NUL-separated args from FD]: :'
|
||||||
'--as-pid-1[Do not install a reaper process with PID=1]'
|
'--as-pid-1[Do not install a reaper process with PID=1]'
|
||||||
'--bind-data[Copy from FD to file which is bind-mounted on DEST]: : :'
|
'--bind-data[Copy from FD to file which is bind-mounted on DEST]: : :'
|
||||||
'--bind-try[Equal to --bind but ignores non-existent SRC]: : _files -/ :'
|
'--bind-try[Equal to --bind but ignores non-existent SRC]: : _files :'
|
||||||
'--bind[Bind mount the host path SRC on DEST]: : _files -/ :'
|
'--bind[Bind mount the host path SRC on DEST]: : _files :'
|
||||||
'--block-fd[Block on FD until some data to read is available]: :'
|
'--block-fd[Block on FD until some data to read is available]: :'
|
||||||
'--cap-add[Add cap CAP when running as privileged user]: :->caps'
|
'--cap-add[Add cap CAP when running as privileged user]: :->caps'
|
||||||
'--cap-drop[Drop cap CAP when running as privileged user]: :->caps'
|
'--cap-drop[Drop cap CAP when running as privileged user]: :->caps'
|
||||||
'--chdir DIR[Change directory to DIR]: : _files -/'
|
'--chdir DIR[Change directory to DIR]: : _files -/'
|
||||||
'--dev-bind-try[Equal to --dev-bind but ignores non-existent SRC]: : _files -/ :'
|
'--dev-bind-try[Equal to --dev-bind but ignores non-existent SRC]: : _files :'
|
||||||
'--dev-bind[Bind mount the host path SRC on DEST, allowing device access]: : _files -/ :'
|
'--dev-bind[Bind mount the host path SRC on DEST, allowing device access]: : _files :'
|
||||||
'--dev[Mount new dev on DEST]: :'
|
'--dev[Mount new dev on DEST]: :'
|
||||||
"--die-with-parent[Kills with SIGKILL child process (COMMAND) when bwrap or bwrap's parent dies.]"
|
"--die-with-parent[Kills with SIGKILL child process (COMMAND) when bwrap or bwrap's parent dies.]"
|
||||||
'--dir[Create dir at DEST]: :'
|
'--dir[Create dir at DEST]: :'
|
||||||
@@ -33,8 +33,8 @@ _bwrap_args=(
|
|||||||
'--proc[Mount new procfs on DEST]: :'
|
'--proc[Mount new procfs on DEST]: :'
|
||||||
'--remount-ro[Remount DEST as readonly; does not recursively remount]: :'
|
'--remount-ro[Remount DEST as readonly; does not recursively remount]: :'
|
||||||
'--ro-bind-data[Copy from FD to file which is readonly bind-mounted on DEST]: : :'
|
'--ro-bind-data[Copy from FD to file which is readonly bind-mounted on DEST]: : :'
|
||||||
'--ro-bind-try[Equal to --ro-bind but ignores non-existent SRC]: : _files -/ :'
|
'--ro-bind-try[Equal to --ro-bind but ignores non-existent SRC]: : _files :'
|
||||||
'--ro-bind[Bind mount the host path SRC readonly on DEST]: : _files -/ :'
|
'--ro-bind[Bind mount the host path SRC readonly on DEST]: : _files :'
|
||||||
'--seccomp[Load and use seccomp rules from FD]: :'
|
'--seccomp[Load and use seccomp rules from FD]: :'
|
||||||
'--setenv[Set an environment variable]: :'
|
'--setenv[Set an environment variable]: :'
|
||||||
'--symlink[Create symlink at DEST with target SRC]: : :'
|
'--symlink[Create symlink at DEST with target SRC]: : :'
|
||||||
|
Reference in New Issue
Block a user