Bubblewrap is a setuid implementation of user namespaces, or sandboxing, that provides access to a subset of kernel user namespace features. Bubblewrap allows user owned processes to run in an isolated environment with limited access to the underlying filesystem.
This package is known to build and work properly using an LFS 12.4 platform.
Download (HTTP): https://github.com/containers/bubblewrap/releases/download/v0.11.0/bubblewrap-0.11.0.tar.xz
Download SHA256 Sum: 988fd6b232dafa04b8b8198723efeaccdb3c6aa9c1c7936219d5791a8b7a8646
Download MD5 sum: 630eec714ea04729efd116ea85a715a3
Download size: 376.8 KB
Estimated disk space required: 2,783.9 KB
Estimated build time: less than 0.1 SBU
libxslt-1.1.43 (to generate manual pages), libseccomp-2.6.0 (built with python bindings, for tests), bash-completion, and SELinux
When this package began, upstream expected it could be installed suid-root. That was a long time ago, suid-root is generally considered a bad idea. As well as the default namespaces, this package requires the optional User namespace to be enabled. If that has not yet been enabled, select the following option in the kernel configuration and recompile the kernel:
Prepare Bubblewrap by running the following commands:
meson setup build --prefix=/usr --buildtype=release
ninja -C build
Next, if you desire to run the test suite, fix an issue caused by the
merged-/usr configuration in LFS and as a non-root
To test the results, issue:
sed 's@symlink usr/lib64@ro-bind-try /lib64@' -i ../tests/libtest.sh
ninja -C build test
Now Install, as the root user:
ninja -C build install