Skip to content

Commit

Permalink
Docs: Change whitelist/blacklist to allowlist/denylist
Browse files Browse the repository at this point in the history
PR #1388 already changed whitelist/blacklist to allowlist/denylist, but the
example in the configuration documentation was left out.
  • Loading branch information
fhemberger authored and eikenb committed Apr 23, 2021
1 parent dfd1b0e commit 9a33205
Showing 1 changed file with 6 additions and 6 deletions.
12 changes: 6 additions & 6 deletions docs/configuration.md
Original file line number Diff line number Diff line change
Expand Up @@ -443,7 +443,7 @@ template {
# These are functions that are not permitted in the template. If a template
# includes one of these functions, it will exit with an error.
function_blacklist = []
function_denylist = []
# If a sandbox path is provided, any path provided to the `file` function is
# checked that it falls within the sandbox path. Relative paths that try to
Expand Down Expand Up @@ -528,7 +528,7 @@ exec {
# below to inject into the child's runtime environment. If a custom
# environment variable shares its name with a system environment variable,
# the custom environment variable takes precedence. Even if pristine,
# whitelist, or blacklist is specified, all values in this option
# allowlist, or denylist is specified, all values in this option
# are given to the child process.
custom = ["PATH=$PATH:/etc/myapp/bin"]
Expand All @@ -537,16 +537,16 @@ exec {
# specified, only those environment variables matching the given patterns
# are exposed to the child process. These strings are matched using Go's
# glob function, so wildcards are permitted.
whitelist = ["CONSUL_*"]
allowlist = ["CONSUL_*"]
# This specifies a list of environment variables to exclusively prohibit in
# the list of environment variables exposed to the child process. If
# specified, any environment variables matching the given patterns will not
# be exposed to the child process, even if they are whitelisted. The values
# in this option take precedence over the values in the whitelist.
# be exposed to the child process, even if they are in the allowlist. The
# values in this option take precedence over the values in the allowlist.
# These strings are matched using Go's glob function, so wildcards are
# permitted.
blacklist = ["VAULT_*"]
denylist = ["VAULT_*"]
}
# This defines the signal that will be sent to the child process when a
Expand Down

0 comments on commit 9a33205

Please sign in to comment.