bubblewrap/debian/control

51 lines
1.6 KiB
Plaintext
Raw Normal View History

Source: bubblewrap
Section: admin
Priority: optional
Maintainer: openKylin Developers <packaging@lists.openkylin.top>
XSBC-Original-Maintainer: Utopia Maintenance Team <pkg-utopia-maintainers@lists.alioth.debian.org>
Uploaders:
Laszlo Boszormenyi (GCS) <gcs@debian.org>,
Simon McVittie <smcv@debian.org>,
Build-Depends:
bash-completion,
debhelper-compat (= 13),
docbook-xml,
docbook-xsl,
iproute2 <!nocheck>,
libcap-dev,
libcap2-bin <!nocheck>,
libipc-run-perl <!nocheck>,
libselinux1-dev,
meson,
perl:any <!nocheck>,
pkgconf,
python3:any <!nocheck>,
xsltproc,
Standards-Version: 4.6.2
Homepage: https://github.com/containers/bubblewrap
Vcs-Git: https://salsa.debian.org/debian/bubblewrap.git
Vcs-Browser: https://salsa.debian.org/debian/bubblewrap
Rules-Requires-Root: no
Package: bubblewrap
Architecture: linux-any
Multi-Arch: foreign
Depends:
${misc:Depends},
${shlibs:Depends},
Recommends:
procps,
Description: utility for unprivileged chroot and namespace manipulation
bubblewrap uses Linux namespaces to launch unprivileged containers.
These containers can be used to sandbox semi-trusted applications such
as Flatpak apps, image/video thumbnailers and web browser components,
or to run programs in a different library stack such as a Flatpak runtime
or a different Debian release.
.
By default, this package relies on a kernel with user namespaces enabled.
Official Debian and Ubuntu kernels are suitable.
.
On kernels without user namespaces, system administrators can make the
bwrap executable setuid root, allowing it to create unprivileged
containers even though ordinary user processes cannot.