diff options
author | Sam Thursfield <ssssam@gmail.com> | 2016-04-01 12:30:16 +0100 |
---|---|---|
committer | Sam Thursfield <ssssam@gmail.com> | 2016-04-01 12:30:16 +0100 |
commit | 3d85c6087586b402382d9e6c033c00db5a1facc5 (patch) | |
tree | 0c42fcf05b3327a3c841ac01e0a553655e08d3f3 | |
parent | 3ecb5a7da5e9558de798fc7ee8de7d37d9e6fc71 (diff) | |
download | sandboxlib-3d85c6087586b402382d9e6c033c00db5a1facc5.tar.gz |
README: link to Awesome Linux Containers, move 'further reading' section
-rw-r--r-- | README.rst | 18 |
1 files changed, 10 insertions, 8 deletions
@@ -150,13 +150,6 @@ purpose! .. _GNOME: https://www.gnome.org/ .. _xdg-app: https://github.com/alexlarsson/xdg-app -Further reading -~~~~~~~~~~~~~~~ - -- `Sandboxing for multi-tenant applications <https://web.archive.org/web/20121129121538/http://blog.technologyofcontent.com/2011/04/sandboxing-for-multi-tenant-applications>`_ (archived) -- `StackOverflow question "Run an untrusted C program in a sandbox in Linux that prevents it from opening files, forking, etc.? <https://stackoverflow.com/questions/4249063/run-an-untrusted-c-program-in-a-sandbox-in-linux-that-prevents-it-from-opening-f>`_ -- `StackOverflow question "How to "jail" a process without being root? <https://unix.stackexchange.com/questions/6433/how-to-jail-a-process-without-being-root>`_ - Containerisation ---------------- @@ -314,8 +307,17 @@ YBD The YBD_ build tool (from Baserock_) `triggered the creation of the 'sandboxlib' library <https://github.com/devcurmudgeon/ybd/issues/32>`_. +Further reading +--------------- + +- `Awesome Linux Containers` <https://github.com/Friz-zy/awesome-linux-containers>_ + +- `Sandboxing for multi-tenant applications <https://web.archive.org/web/20121129121538/http://blog.technologyofcontent.com/2011/04/sandboxing-for-multi-tenant-applications>`_ (archived) +- `StackOverflow question "Run an untrusted C program in a sandbox in Linux that prevents it from opening files, forking, etc.? <https://stackoverflow.com/questions/4249063/run-an-untrusted-c-program-in-a-sandbox-in-linux-that-prevents-it-from-opening-f>`_ +- `StackOverflow question "How to "jail" a process without being root? <https://unix.stackexchange.com/questions/6433/how-to-jail-a-process-without-being-root>`_ + License -------- +======= License is GPLv2 but other licensing can be considered on request |