diff options
author | Tobias Geerinckx-Rice <me@tobias.gr> | 2019-04-24 19:29:25 +0200 |
---|---|---|
committer | Tobias Geerinckx-Rice <me@tobias.gr> | 2019-04-25 04:42:16 +0200 |
commit | 7ecd1761a236a2256e420032d561aa6c372d95a8 (patch) | |
tree | 032fbaaaa95906ffbbc25ca3f09d91ffc4d3ca75 /gnu | |
parent | ac32a451fa59a4c92516eccae6069f322a6d03a2 (diff) | |
download | guix-7ecd1761a236a2256e420032d561aa6c372d95a8.tar.gz |
gnu: bubblewrap: Edit description.
* gnu/packages/virtualization.scm (bubblewrap)[description]: Mark up & edit.
Diffstat (limited to 'gnu')
-rw-r--r-- | gnu/packages/virtualization.scm | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/gnu/packages/virtualization.scm b/gnu/packages/virtualization.scm index 4bdbbb39b6..bf3729ba93 100644 --- a/gnu/packages/virtualization.scm +++ b/gnu/packages/virtualization.scm @@ -1089,11 +1089,11 @@ virtual machines.") (home-page "https://github.com/projectatomic/bubblewrap") (synopsis "Unprivileged sandboxing tool") (description "Bubblewrap is aimed at running applications in a sandbox, -where it has restricted access to parts of the operating system or user data -such as the home directory. Bubblewrap always creates a new mount namespace, -and the user can specify exactly what parts of the filesystem should be visible -in the sandbox. Any such directories specified is mounted nodev by default, -and can be made readonly.") +restricting their access to parts of the operating system or user data such as +the home directory. Bubblewrap always creates a new mount namespace, and the +user can specify exactly what parts of the file system should be made visible +in the sandbox. These directories are mounted with the @code{nodev) option +by default and can be made read-only.") (license license:lgpl2.0+))) (define-public bochs |