diff --git a/completions/zsh/_bwrap b/completions/zsh/_bwrap index a3211b9..d512506 100755 --- a/completions/zsh/_bwrap +++ b/completions/zsh/_bwrap @@ -14,6 +14,7 @@ _bwrap_args=( '--cap-drop[Drop cap CAP when running as privileged user]:capability to add:->caps' '--chdir[Change directory to DIR]:working directory for sandbox: _files -/' '--chmod[Set permissions]: :_guard "[0-7]#" "permissions in octal":path to set permissions:_files' + '--clearenv[Unset all environment variables]' '--dev-bind-try[Equal to --dev-bind but ignores non-existent SRC]:source:_files:destination:_files' '--dev-bind[Bind mount the host path SRC on DEST, allowing device access]:source:_files:destination:_files' '--dev[Mount new dev on DEST]:mount point for /dev:_files -/' @@ -43,7 +44,7 @@ _bwrap_args=( '--sync-fd[Keep this fd open while sandbox is running]: :_guard "[0-9]#" "file descriptor to keep open"' '--tmpfs[Mount new tmpfs on DEST]:mount point for tmpfs:_files -/' '--uid[Custom uid in the sandbox (requires --unshare-user or --userns)]: :_guard "[0-9]#" "numeric group ID"' - '--unsetenv[Unset an environment variable]:variable to unset:_parameters -g "*export*"' + '(--clearenv)--unsetenv[Unset an environment variable]:variable to unset:_parameters -g "*export*"' '--unshare-all[Unshare every namespace we support by default]' '--unshare-cgroup-try[Create new cgroup namespace if possible else continue by skipping it]' '--unshare-cgroup[Create new cgroup namespace]'