diff options
| author | Victor Marmol <vmarmol@google.com> | 2015-07-08 13:49:23 -0700 |
|---|---|---|
| committer | Victor Marmol <vmarmol@google.com> | 2015-07-08 13:49:23 -0700 |
| commit | 252427ada3bd0f1a4e59388841bdf04855b7eea2 (patch) | |
| tree | d0c23b7dc2863b7db3e4b39f46e2b51337f8b9a8 | |
| parent | 1b3281d5d27c495145931aaebdd034c79b55717f (diff) | |
| parent | 4cc2b50a4497051324ceacf0d1fd7acb92d274d4 (diff) | |
Merge pull request #10950 from pmorie/hostpath
Change remaining instances of hostDir in docs to hostPath
| -rw-r--r-- | security.md | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/security.md b/security.md index 733f6818..c8f9bec7 100644 --- a/security.md +++ b/security.md @@ -54,7 +54,7 @@ Automated process users fall into the following categories: * are less focused on application security. Focused on operating system security. * protect the node from bad actors in containers, and properly-configured innocent containers from bad actors in other containers. * comfortable reasoning about the security properties of a system at the level of detail of Linux Capabilities, SELinux, AppArmor, etc. - * decides who can use which Linux Capabilities, run privileged containers, use hostDir, etc. + * decides who can use which Linux Capabilities, run privileged containers, use hostPath, etc. * e.g. a team that manages Ceph or a mysql server might be trusted to have raw access to storage devices in some organizations, but teams that develop the applications at higher layers would not. |
