zsh: Don't limit --bind options to completing directories

You can mount a non-directory onto a non-directory.

Signed-off-by: Simon McVittie <smcv@collabora.com>
This commit is contained in:
Simon McVittie
2021-06-24 10:07:55 +01:00
parent da59325665
commit 2e70a23f58

View File

@@ -7,14 +7,14 @@ _bwrap_args=(
'--args[Parse NUL-separated args from FD]: :'
'--as-pid-1[Do not install a reaper process with PID=1]'
'--bind-data[Copy from FD to file which is bind-mounted on DEST]: : :'
'--bind-try[Equal to --bind but ignores non-existent SRC]: : _files -/ :'
'--bind[Bind mount the host path SRC on DEST]: : _files -/ :'
'--bind-try[Equal to --bind but ignores non-existent SRC]: : _files :'
'--bind[Bind mount the host path SRC on DEST]: : _files :'
'--block-fd[Block on FD until some data to read is available]: :'
'--cap-add[Add cap CAP when running as privileged user]: :->caps'
'--cap-drop[Drop cap CAP when running as privileged user]: :->caps'
'--chdir DIR[Change directory to DIR]: : _files -/'
'--dev-bind-try[Equal to --dev-bind but ignores non-existent SRC]: : _files -/ :'
'--dev-bind[Bind mount the host path SRC on DEST, allowing device access]: : _files -/ :'
'--dev-bind-try[Equal to --dev-bind but ignores non-existent SRC]: : _files :'
'--dev-bind[Bind mount the host path SRC on DEST, allowing device access]: : _files :'
'--dev[Mount new dev on DEST]: :'
"--die-with-parent[Kills with SIGKILL child process (COMMAND) when bwrap or bwrap's parent dies.]"
'--dir[Create dir at DEST]: :'
@@ -33,8 +33,8 @@ _bwrap_args=(
'--proc[Mount new procfs on DEST]: :'
'--remount-ro[Remount DEST as readonly; does not recursively remount]: :'
'--ro-bind-data[Copy from FD to file which is readonly bind-mounted on DEST]: : :'
'--ro-bind-try[Equal to --ro-bind but ignores non-existent SRC]: : _files -/ :'
'--ro-bind[Bind mount the host path SRC readonly on DEST]: : _files -/ :'
'--ro-bind-try[Equal to --ro-bind but ignores non-existent SRC]: : _files :'
'--ro-bind[Bind mount the host path SRC readonly on DEST]: : _files :'
'--seccomp[Load and use seccomp rules from FD]: :'
'--setenv[Set an environment variable]: :'
'--symlink[Create symlink at DEST with target SRC]: : :'