summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorSam Thursfield <ssssam@gmail.com>2016-04-01 12:30:16 +0100
committerSam Thursfield <ssssam@gmail.com>2016-04-01 12:30:16 +0100
commit3d85c6087586b402382d9e6c033c00db5a1facc5 (patch)
tree0c42fcf05b3327a3c841ac01e0a553655e08d3f3
parent3ecb5a7da5e9558de798fc7ee8de7d37d9e6fc71 (diff)
downloadsandboxlib-3d85c6087586b402382d9e6c033c00db5a1facc5.tar.gz
README: link to Awesome Linux Containers, move 'further reading' section
-rw-r--r--README.rst18
1 files changed, 10 insertions, 8 deletions
diff --git a/README.rst b/README.rst
index 2d4873c..3198e65 100644
--- a/README.rst
+++ b/README.rst
@@ -150,13 +150,6 @@ purpose!
.. _GNOME: https://www.gnome.org/
.. _xdg-app: https://github.com/alexlarsson/xdg-app
-Further reading
-~~~~~~~~~~~~~~~
-
-- `Sandboxing for multi-tenant applications <https://web.archive.org/web/20121129121538/http://blog.technologyofcontent.com/2011/04/sandboxing-for-multi-tenant-applications>`_ (archived)
-- `StackOverflow question "Run an untrusted C program in a sandbox in Linux that prevents it from opening files, forking, etc.? <https://stackoverflow.com/questions/4249063/run-an-untrusted-c-program-in-a-sandbox-in-linux-that-prevents-it-from-opening-f>`_
-- `StackOverflow question "How to "jail" a process without being root? <https://unix.stackexchange.com/questions/6433/how-to-jail-a-process-without-being-root>`_
-
Containerisation
----------------
@@ -314,8 +307,17 @@ YBD
The YBD_ build tool (from Baserock_) `triggered the creation of the
'sandboxlib' library <https://github.com/devcurmudgeon/ybd/issues/32>`_.
+Further reading
+---------------
+
+- `Awesome Linux Containers` <https://github.com/Friz-zy/awesome-linux-containers>_
+
+- `Sandboxing for multi-tenant applications <https://web.archive.org/web/20121129121538/http://blog.technologyofcontent.com/2011/04/sandboxing-for-multi-tenant-applications>`_ (archived)
+- `StackOverflow question "Run an untrusted C program in a sandbox in Linux that prevents it from opening files, forking, etc.? <https://stackoverflow.com/questions/4249063/run-an-untrusted-c-program-in-a-sandbox-in-linux-that-prevents-it-from-opening-f>`_
+- `StackOverflow question "How to "jail" a process without being root? <https://unix.stackexchange.com/questions/6433/how-to-jail-a-process-without-being-root>`_
+
License
--------
+=======
License is GPLv2 but other licensing can be considered on request