Source: bubblewrap
Section: admin
Priority: optional
Maintainer: linuxmangaka <linuxmangaka@gmail.com>
Rules-Requires-Root: no
Build-Depends: debhelper-compat (= 13),
 bash-completion,
 docbook-xml,
 docbook-xsl,
 iproute2 <!nocheck>,
 libcap-dev,
 libcap2-bin <!nocheck>,
 libipc-run-perl <!nocheck>,
 libselinux1-dev,
 meson,
 ninja-build,
 perl:any <!nocheck>,
 pkgconf,
 pkg-config,
 python3:any <!nocheck>,
 xsltproc,
Standards-Version: 4.6.2
Homepage: https://github.com/containers/bubblewrap
Vcs-Browser: https://salsa.debian.org/debian/bubblewrap
Vcs-Git: https://salsa.debian.org/debian/bubblewrap.git

Package: bubblewrap
Architecture: linux-any
Multi-Arch: foreign
Depends: ${shlibs:Depends},
 ${misc:Depends},
Recommends: procps,
Description: Low-level unprivileged sandboxing tool used by Flatpak and similar projects
 Many container runtime tools like systemd-nspawn, docker, etc. focus on providing infrastructure for system administrators and orchestration tools (e.g. Kubernetes) to run containers. These tools are not suitable to give to unprivileged users, because it is trivial to turn such access into a fully privileged root shell on the host.