Core execution tool for unprivileged containers
https://github.com/projectatomic/bubblewrap
Bubblewrap (%{_bindir}/bwrap) is a core execution engine for unprivileged
containers that works as a setuid binary on kernels without
user namespaces.
- Links to Virtualization:containers / bubblewrap
- Has a link diff
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout home:dirkmueller:Factory/bubblewrap && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
_link | 0000000133 133 Bytes | |
bubblewrap-0.7.0.tar.xz | 0000147700 144 KB | |
bubblewrap.changes | 0000019452 19 KB | |
bubblewrap.spec | 0000002573 2.51 KB |
Revision 2 (latest revision is 3)
Dirk Mueller (dirkmueller)
committed
(revision 2)
- update to v0.7.0: * --size option controls the size of a subsequent --tmpfs (#509) * Better error messages if a mount operation fails (#472) * Better error message if creating the new user namespace fails with ENOSPC (#487) * When building as a Meson subproject, a RUNPATH can be set on the executable to make it easier to bundle its libcap dependency * Fix test failures when running as uid 0 but with limited capabilities (#510) * Use POSIX command -v in preference to non-standard which (#527) * Fix a copy/paste error in --help (#531)
Comments 0