]>
Commit | Line | Data |
---|---|---|
14228c0d MB |
1 | #compdef systemd-nspawn |
2 | ||
3 | _nspawn-caps(){ | |
4 | local -a _caps | |
5 | _caps=( CAP_CHOWN CAP_DAC_OVERRIDE CAP_DAC_READ_SEARCH | |
6 | CAP_FOWNER CAP_FSETID CAP_IPC_OWNER CAP_KILL CAP_LEASE CAP_LINUX_IMMUTABLE | |
7 | CAP_NET_BIND_SERVICE CAP_NET_BROADCAST CAP_NET_RAW CAP_SETGID CAP_SETFCAP CAP_SETPCAP | |
8 | CAP_SETUID CAP_SYS_ADMIN CAP_SYS_CHROOT CAP_SYS_NICE CAP_SYS_PTRACE CAP_SYS_TTY_CONFIG | |
9 | CAP_SYS_RESOURCE CAP_SYS_BOOT ) | |
10 | _values -s , 'capabilities' "$_caps[@]" | |
11 | } | |
12 | ||
13 | _arguments \ | |
e3bff60a MP |
14 | {-h,--help}'[Show this help.]' \ |
15 | '--version[Print a short version string and exit.]' \ | |
16 | {--quiet,-q}'[Turns off any status output by the tool itself.]' \ | |
14228c0d | 17 | {--directory=,-D+}'[Directory to use as file system root for the namespace container. If omitted the current directory will be used.]:directories:_directories' \ |
e3bff60a MP |
18 | '--template=[Initialize root directory from template directory, if missing.]:template:_directories' \ |
19 | {--ephemeral,-x}'[Run container with snapshot of root directory, and remove it after exit.]' \ | |
60f067b4 JS |
20 | {--image=,-i+}'[Disk image to mount the root directory for the container from.]' \ |
21 | {--boot=,-b+}'[Automatically search for an init binary and invoke it instead of a shell or a user supplied program.]' \ | |
14228c0d | 22 | {--user=,-u+}'[Run the command under specified user, create home directory and cd into it.]' \ |
60f067b4 | 23 | {--machine=,-M+}'[Sets the machine name for this container.]' \ |
14228c0d | 24 | '--uuid=[Set the specified uuid for the container.]' \ |
e3bff60a | 25 | {--slice=,-S+}'[Make the container part of the specified slice, instead of the default machine.slice.]' \ |
60f067b4 JS |
26 | '--private-network[Disconnect networking of the container from the host.]' \ |
27 | '--network-interface=[Assign the specified network interface to the container.]' \ | |
28 | '--network-macvlan=[Create a "macvlan" interface of the specified Ethernet network interface and add it to the container.]' \ | |
e3bff60a MP |
29 | '--network-ipvlan=[Create a ipvlan network interface based on an existing network interface to the container.]' \ |
30 | {--network-veth,-n}'[Create a virtual Ethernet link (veth) between host and container.]' \ | |
60f067b4 | 31 | '--network-bridge=[Adds the host side of the Ethernet link created with --network-veth to the specified bridge.]' \ |
e3bff60a | 32 | {--port=,-p+}'[Expose a container IP port on the host.]' \ |
60f067b4 JS |
33 | {--selinux-context=,-Z+}'[Sets the SELinux security context to be used to label processes in the container.]' \ |
34 | {--selinux-apifs-context=,-L+}'[Sets the SELinux security context to be used to label files in the virtual API file systems in the container.]' \ | |
14228c0d | 35 | '--capability=[List one or more additional capabilities to grant the container.]:capabilities:_nspawn-caps' \ |
e3bff60a MP |
36 | '--drop-capability=[Specify one or more additional capabilities to drop for the containerm]:capabilities:_nspawn-caps' \ |
37 | "--link-journal=[Control whether the container's journal shall be made visible to the host system.]:options:(no host guest auto)" \ | |
60f067b4 JS |
38 | '-j[Equivalent to --link-journal=guest.]' \ |
39 | '--read-only[Mount the root file system read only for the container.]' \ | |
40 | '--bind=[Bind mount a file or directory from the host into the container.]' \ | |
41 | '--bind-ro=[Bind mount a file or directory from the host into the container (read-only).]' \ | |
e3bff60a | 42 | '--tmpfs=[Mount an empty tmpfs to the specified directory.]' \ |
60f067b4 JS |
43 | '--setenv=[Specifies an environment variable assignment to pass to the init process in the container, in the format "NAME=VALUE".]' \ |
44 | '--share-system[Allows the container to share certain system facilities with the host.]' \ | |
45 | '--register=[Controls whether the container is registered with systemd-machined(8).]' \ | |
46 | '--keep-unit[Instead of creating a transient scope unit to run the container in, simply register the service or scope unit systemd-nspawn has been invoked in with systemd-machined(8).]' \ | |
47 | '--personality=[Control the architecture ("personality") reported by uname(2) in the container.]' \ | |
e3bff60a | 48 | '--volatile=[Run the system in volatile mode.]:volatile:(no yes state)' |