mirror of
https://chromium.googlesource.com/crosvm/crosvm
synced 2025-01-30 04:19:20 +00:00
main: use - instead of _ for seccomp policy argument
The other options all user hyphens. Change-Id: I7f0ab307fd5e50deea8c276bc7a73e43cf692195 Signed-off-by: Dylan Reid <dgreid@chromium.org> Reviewed-on: https://chromium-review.googlesource.com/696714 Reviewed-by: Stephen Barber <smbarber@chromium.org>
This commit is contained in:
parent
6eb67123f9
commit
e026ef0918
1 changed files with 2 additions and 2 deletions
|
@ -882,7 +882,7 @@ fn set_argument(cfg: &mut Config, name: &str, value: Option<&str>) -> argument::
|
||||||
}
|
}
|
||||||
})?);
|
})?);
|
||||||
}
|
}
|
||||||
"seccomp_policy_dir" => {
|
"seccomp-policy-dir" => {
|
||||||
// Value is Some because we are in this match so it's safe to unwrap.
|
// Value is Some because we are in this match so it's safe to unwrap.
|
||||||
cfg.seccomp_policy_dir = Some(value.unwrap().to_owned());
|
cfg.seccomp_policy_dir = Some(value.unwrap().to_owned());
|
||||||
},
|
},
|
||||||
|
@ -923,7 +923,7 @@ fn run_vm(args: std::env::Args) {
|
||||||
"Path to put the control socket. If PATH is a directory, a name will be generated."),
|
"Path to put the control socket. If PATH is a directory, a name will be generated."),
|
||||||
Argument::short_flag('u', "multiprocess", "Run each device in a child process."),
|
Argument::short_flag('u', "multiprocess", "Run each device in a child process."),
|
||||||
Argument::value("cid", "CID", "Context ID for virtual sockets"),
|
Argument::value("cid", "CID", "Context ID for virtual sockets"),
|
||||||
Argument::value("seccomp_policy_dir", "PATH", "Path to seccomp .policy files."),
|
Argument::value("seccomp-policy-dir", "PATH", "Path to seccomp .policy files."),
|
||||||
Argument::short_flag('h', "help", "Print help message.")];
|
Argument::short_flag('h', "help", "Print help message.")];
|
||||||
|
|
||||||
let mut cfg = Config::default();
|
let mut cfg = Config::default();
|
||||||
|
|
Loading…
Reference in a new issue