
We can't combine --disable-userns with entering an existing user namespace via --userns if the existing user namespace was created with --disable-userns, because its ability to create nested user namespaces has already been disabled. However, the next best thing is to verify that we are already in the desired state. Signed-off-by: Simon McVittie <smcv@collabora.com>
76 lines
1.1 KiB
Bash
76 lines
1.1 KiB
Bash
# shellcheck shell=bash
|
|
|
|
# bash completion file for bubblewrap commands
|
|
#
|
|
|
|
_bwrap() {
|
|
local cur prev words cword
|
|
_init_completion || return
|
|
|
|
# Please keep sorted in LC_ALL=C order
|
|
local boolean_options="
|
|
--as-pid-1
|
|
--assert-userns-disabled
|
|
--clearenv
|
|
--disable-userns
|
|
--help
|
|
--new-session
|
|
--unshare-all
|
|
--unshare-cgroup
|
|
--unshare-cgroup-try
|
|
--unshare-ipc
|
|
--unshare-net
|
|
--unshare-pid
|
|
--unshare-user
|
|
--unshare-user-try
|
|
--unshare-uts
|
|
--version
|
|
"
|
|
|
|
# Please keep sorted in LC_ALL=C order
|
|
local options_with_args="
|
|
$boolean_optons
|
|
--add-seccomp-fd
|
|
--args
|
|
--bind
|
|
--bind-data
|
|
--block-fd
|
|
--cap-add
|
|
--cap-drop
|
|
--chdir
|
|
--chmod
|
|
--dev
|
|
--dev-bind
|
|
--die-with-parent
|
|
--dir
|
|
--exec-label
|
|
--file
|
|
--file-label
|
|
--gid
|
|
--hostname
|
|
--info-fd
|
|
--lock-file
|
|
--perms
|
|
--proc
|
|
--remount-ro
|
|
--ro-bind
|
|
--seccomp
|
|
--setenv
|
|
--size
|
|
--symlink
|
|
--sync-fd
|
|
--uid
|
|
--unsetenv
|
|
--userns-block-fd
|
|
"
|
|
|
|
if [[ "$cur" == -* ]]; then
|
|
COMPREPLY=( $( compgen -W "$boolean_options $options_with_args" -- "$cur" ) )
|
|
fi
|
|
|
|
return 0
|
|
}
|
|
complete -F _bwrap bwrap
|
|
|
|
# vim:set ft=bash:
|