summary refs log tree commit diff
path: root/gnu
diff options
context:
space:
mode:
authorTobias Geerinckx-Rice <me@tobias.gr>2019-04-24 19:29:25 +0200
committerTobias Geerinckx-Rice <me@tobias.gr>2019-04-25 04:42:16 +0200
commit7ecd1761a236a2256e420032d561aa6c372d95a8 (patch)
tree032fbaaaa95906ffbbc25ca3f09d91ffc4d3ca75 /gnu
parentac32a451fa59a4c92516eccae6069f322a6d03a2 (diff)
downloadguix-7ecd1761a236a2256e420032d561aa6c372d95a8.tar.gz
gnu: bubblewrap: Edit description.
* gnu/packages/virtualization.scm (bubblewrap)[description]: Mark up & edit.
Diffstat (limited to 'gnu')
-rw-r--r--gnu/packages/virtualization.scm10
1 files changed, 5 insertions, 5 deletions
diff --git a/gnu/packages/virtualization.scm b/gnu/packages/virtualization.scm
index 4bdbbb39b6..bf3729ba93 100644
--- a/gnu/packages/virtualization.scm
+++ b/gnu/packages/virtualization.scm
@@ -1089,11 +1089,11 @@ virtual machines.")
     (home-page "https://github.com/projectatomic/bubblewrap")
     (synopsis "Unprivileged sandboxing tool")
     (description "Bubblewrap is aimed at running applications in a sandbox,
-where it has restricted access to parts of the operating system or user data
-such as the home directory.  Bubblewrap always creates a new mount namespace,
-and the user can specify exactly what parts of the filesystem should be visible
-in the sandbox.  Any such directories specified is mounted nodev by default,
-and can be made readonly.")
+restricting their access to parts of the operating system or user data such as
+the home directory.  Bubblewrap always creates a new mount namespace, and the
+user can specify exactly what parts of the file system should be made visible
+in the sandbox.  These directories are mounted with the @code{nodev) option
+by default and can be made read-only.")
     (license license:lgpl2.0+)))
 
 (define-public bochs