aboutsummaryrefslogtreecommitdiffstats
path: root/src/zsh_completion/_firejail.in
diff options
context:
space:
mode:
Diffstat (limited to 'src/zsh_completion/_firejail.in')
-rw-r--r--src/zsh_completion/_firejail.in4
1 files changed, 3 insertions, 1 deletions
diff --git a/src/zsh_completion/_firejail.in b/src/zsh_completion/_firejail.in
index 8383d83d3..605000e31 100644
--- a/src/zsh_completion/_firejail.in
+++ b/src/zsh_completion/_firejail.in
@@ -103,7 +103,7 @@ _firejail_args=(
103 '--join-or-start=-[join the sandbox or start a new one name|pid]: :_all_firejails' 103 '--join-or-start=-[join the sandbox or start a new one name|pid]: :_all_firejails'
104 '--keep-config-pulse[disable automatic ~/.config/pulse init]' 104 '--keep-config-pulse[disable automatic ~/.config/pulse init]'
105 '--keep-dev-shm[/dev/shm directory is untouched (even with --private-dev)]' 105 '--keep-dev-shm[/dev/shm directory is untouched (even with --private-dev)]'
106 '--keep-fd[inherit open file descriptors to sandbox]' 106 '--keep-fd[inherit open file descriptors to sandbox]: :'
107 '--keep-var-tmp[/var/tmp directory is untouched]' 107 '--keep-var-tmp[/var/tmp directory is untouched]'
108 '--machine-id[spoof /etc/machine-id with a random id]' 108 '--machine-id[spoof /etc/machine-id with a random id]'
109 '--memory-deny-write-execute[seccomp filter to block attempts to create memory mappings that are both writable and executable]' 109 '--memory-deny-write-execute[seccomp filter to block attempts to create memory mappings that are both writable and executable]'
@@ -141,6 +141,8 @@ _firejail_args=(
141 "--quiet[turn off Firejail's output.]" 141 "--quiet[turn off Firejail's output.]"
142 '*--read-only=-[set directory or file read-only]: :_files' 142 '*--read-only=-[set directory or file read-only]: :_files'
143 '*--read-write=-[set directory or file read-write]: :_files' 143 '*--read-write=-[set directory or file read-write]: :_files'
144 '--restrict-namespaces[seccomp filter that blocks attempts to create new namespaces]'
145 '--restrict-namespaces=-[seccomp filter that blocks attempts to create specified namespaces]: :'
144 "--rlimit-as=-[set the maximum size of the process's virtual memory (address space) in bytes]: :" 146 "--rlimit-as=-[set the maximum size of the process's virtual memory (address space) in bytes]: :"
145 '--rlimit-cpu=-[set the maximum CPU time in seconds]: :' 147 '--rlimit-cpu=-[set the maximum CPU time in seconds]: :'
146 '--rlimit-fsize=-[set the maximum file size that can be created by a process]: :' 148 '--rlimit-fsize=-[set the maximum file size that can be created by a process]: :'