From d74fb5001e7c30de08a6536c03f0644f0fe25800 Mon Sep 17 00:00:00 2001 From: "W. Trevor King" Date: Thu, 30 Nov 2017 22:03:37 -0800 Subject: [PATCH] config*: Dedent paragraphs that aren't a list entry Like 5d9bbad3 (config: Dedent root paragraphs, since they aren't a list entry, 2017-11-08, #936). Ma Shimiao pointed out that there may be more instances of this [1], and this commit fixes all instances turned up with: $ git grep -B1 '^ [^ ]' | grep -A1 '[:-]\*\*' [1]: https://github.com/opencontainers/runtime-spec/pull/934#discussion_r154246493 Signed-off-by: W. Trevor King --- config-linux.md | 14 +++++++------- config.md | 32 ++++++++++++++++---------------- 2 files changed, 23 insertions(+), 23 deletions(-) diff --git a/config-linux.md b/config-linux.md index f73d893c9..366ec941b 100644 --- a/config-linux.md +++ b/config-linux.md @@ -458,10 +458,10 @@ The following parameters can be specified to set up the controller: ## IntelRdt **`intelRdt`** (object, OPTIONAL) represents the [Intel Resource Director Technology][intel-rdt-cat-kernel-interface]. - If `intelRdt` is set, the runtime MUST write the container process ID to the `/tasks` file in a mounted `resctrl` pseudo-filesystem, using the container ID from [`start`](runtime.md#start) and creating the `` directory if necessary. - If no mounted `resctrl` pseudo-filesystem is available in the [runtime mount namespace](glossary.md#runtime-namespace), the runtime MUST [generate an error](runtime.md#errors). +If `intelRdt` is set, the runtime MUST write the container process ID to the `/tasks` file in a mounted `resctrl` pseudo-filesystem, using the container ID from [`start`](runtime.md#start) and creating the `` directory if necessary. +If no mounted `resctrl` pseudo-filesystem is available in the [runtime mount namespace](glossary.md#runtime-namespace), the runtime MUST [generate an error](runtime.md#errors). - If `intelRdt` is not set, the runtime MUST NOT manipulate any `resctrl` pseudo-filesystems. +If `intelRdt` is not set, the runtime MUST NOT manipulate any `resctrl` pseudo-filesystems. The following parameters can be specified for the container: @@ -592,8 +592,8 @@ The following parameters can be specified to set up seccomp: ## Rootfs Mount Propagation **`rootfsPropagation`** (string, OPTIONAL) sets the rootfs's mount propagation. - Its value is either slave, private, shared or unbindable. - The [Shared Subtrees][sharedsubtree] article in the kernel documentation has more information about mount propagation. +Its value is either slave, private, shared or unbindable. +The [Shared Subtrees][sharedsubtree] article in the kernel documentation has more information about mount propagation. ### Example @@ -604,7 +604,7 @@ The following parameters can be specified to set up seccomp: ## Masked Paths **`maskedPaths`** (array of strings, OPTIONAL) will mask over the provided paths inside the container so that they cannot be read. - The values MUST be absolute paths in the [container namespace](glossary.md#container_namespace). +The values MUST be absolute paths in the [container namespace](glossary.md#container_namespace). ### Example @@ -617,7 +617,7 @@ The following parameters can be specified to set up seccomp: ## Readonly Paths **`readonlyPaths`** (array of strings, OPTIONAL) will set the provided paths as readonly inside the container. - The values MUST be absolute paths in the [container namespace](glossary.md#container-namespace). +The values MUST be absolute paths in the [container namespace](glossary.md#container-namespace). ### Example diff --git a/config.md b/config.md index 06801f5dd..9e5ac165b 100644 --- a/config.md +++ b/config.md @@ -65,9 +65,9 @@ On all other platforms, this field is REQUIRED. ## Mounts **`mounts`** (array of objects, OPTIONAL) specifies additional mounts beyond [`root`](#root). - The runtime MUST mount entries in the listed order. - For Linux, the parameters are as documented in [mount(2)][mount.2] system call man page. - For Solaris, the mount entry corresponds to the 'fs' resource in the [zonecfg(1M)][zonecfg.1m] man page. +The runtime MUST mount entries in the listed order. +For Linux, the parameters are as documented in [mount(2)][mount.2] system call man page. +For Solaris, the mount entry corresponds to the 'fs' resource in the [zonecfg(1M)][zonecfg.1m] man page. * **`destination`** (string, REQUIRED) Destination of mount point: path inside container. This value MUST be an absolute path. @@ -143,7 +143,7 @@ For POSIX platforms the `mounts` structure has the following fields: ## Process **`process`** (object, OPTIONAL) specifies the container process. - This property is REQUIRED when [`start`](runtime.md#start) is called. +This property is REQUIRED when [`start`](runtime.md#start) is called. * **`terminal`** (bool, OPTIONAL) specifies whether a terminal is attached to the process, defaults to false. As an example, if set to true on Linux a pseudoterminal pair is allocated for the process and the pseudoterminal slave is duplicated on the process's [standard streams][stdin.3]. @@ -433,18 +433,18 @@ Cleanup or debugging functions are examples of such a hook. ## Annotations **`annotations`** (object, OPTIONAL) contains arbitrary metadata for the container. - This information MAY be structured or unstructured. - Annotations MUST be a key-value map. - If there are no annotations then this property MAY either be absent or an empty map. - - Keys MUST be strings. - Keys MUST NOT be an empty string. - Keys SHOULD be named using a reverse domain notation - e.g. `com.example.myKey`. - Keys using the `org.opencontainers` namespace are reserved and MUST NOT be used by subsequent specifications. - Implementations that are reading/processing this configuration file MUST NOT generate an error if they encounter an unknown annotation key. - - Values MUST be strings. - Values MAY be an empty string. +This information MAY be structured or unstructured. +Annotations MUST be a key-value map. +If there are no annotations then this property MAY either be absent or an empty map. + +Keys MUST be strings. +Keys MUST NOT be an empty string. +Keys SHOULD be named using a reverse domain notation - e.g. `com.example.myKey`. +Keys using the `org.opencontainers` namespace are reserved and MUST NOT be used by subsequent specifications. +Implementations that are reading/processing this configuration file MUST NOT generate an error if they encounter an unknown annotation key. + +Values MUST be strings. +Values MAY be an empty string. ```json "annotations": {