1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49
|
Source: bubblewrap
Section: admin
Priority: optional
Maintainer: Utopia Maintenance Team <pkg-utopia-maintainers@lists.alioth.debian.org>
Uploaders:
Laszlo Boszormenyi (GCS) <gcs@debian.org>,
Simon McVittie <smcv@debian.org>,
Build-Depends:
bash-completion,
debhelper-compat (= 13),
docbook-xml,
docbook-xsl,
iproute2 <!nocheck>,
libcap-dev,
libcap2-bin <!nocheck>,
libipc-run-perl <!nocheck>,
libselinux1-dev,
meson,
perl:any <!nocheck>,
pkgconf,
python3:any <!nocheck>,
xsltproc,
Standards-Version: 4.7.0
Homepage: https://github.com/containers/bubblewrap
Vcs-Git: https://salsa.debian.org/debian/bubblewrap.git
Vcs-Browser: https://salsa.debian.org/debian/bubblewrap
Rules-Requires-Root: no
Package: bubblewrap
Architecture: linux-any
Multi-Arch: foreign
Depends:
${misc:Depends},
${shlibs:Depends},
Recommends:
procps,
Description: utility for unprivileged chroot and namespace manipulation
bubblewrap uses Linux namespaces to launch unprivileged containers.
These containers can be used to sandbox semi-trusted applications such
as Flatpak apps, image/video thumbnailers and web browser components,
or to run programs in a different library stack such as a Flatpak runtime
or a different Debian release.
.
By default, this package relies on a kernel with user namespaces enabled.
Official Debian and Ubuntu kernels are suitable.
.
On kernels without user namespaces, system administrators can make the
bwrap executable setuid root, allowing it to create unprivileged
containers even though ordinary user processes cannot.
|