slackbuilds/system/bubblewrap
Heinz Wiesinger 63daf9f79a All: Support $PRINT_PACKAGE_NAME env var
Signed-off-by: Heinz Wiesinger <pprkut@slackbuilds.org>
2021-07-17 21:55:09 +02:00
..
README system/bubblewrap: Added (unprivileged sandboxing tool). 2017-01-21 07:04:33 +07:00
bubblewrap.SlackBuild All: Support $PRINT_PACKAGE_NAME env var 2021-07-17 21:55:09 +02:00
bubblewrap.info system/bubblewrap: Updated for version 0.4.0. 2020-02-01 09:00:34 +07:00
slack-desc system/bubblewrap: Added (unprivileged sandboxing tool). 2017-01-21 07:04:33 +07:00

README

Bubblewrap

Many container runtime tools like systemd-nspawn, docker, etc. focus on
providing infrastructure for system administrators and orchestration tools
(e.g. Kubernetes) to run containers.

These tools are not suitable to give to unprivileged users, because it is
trivial to turn such access into to a fully privileged root shell on the host.