Source: rootlesskit Maintainer: Debian Go Packaging Team Uploaders: Shengjing Zhu , Section: golang Testsuite: autopkgtest-pkg-go Priority: optional Build-Depends: debhelper-compat (= 13), dh-golang, golang-any, golang-github-gofrs-flock-dev, golang-github-gorilla-mux-dev, golang-github-gotestyourself-gotest.tools-dev, golang-github-insomniacslk-dhcp-dev, golang-github-moby-sys-dev, golang-github-sirupsen-logrus-dev, golang-github-urfave-cli-v2-dev (>= 2.3.0~), golang-golang-x-sys-dev, Standards-Version: 4.6.1 Vcs-Browser: https://salsa.debian.org/go-team/packages/rootlesskit Vcs-Git: https://salsa.debian.org/go-team/packages/rootlesskit.git Homepage: https://github.com/rootless-containers/rootlesskit Rules-Requires-Root: no XS-Go-Import-Path: github.com/rootless-containers/rootlesskit Package: rootlesskit Section: admin Architecture: linux-any Depends: uidmap, ${misc:Depends}, ${shlibs:Depends}, Built-Using: ${misc:Built-Using}, Recommends: slirp4netns, Description: Linux-native "fake root" for rootless containers The purpose of RootlessKit is to run Docker and Kubernetes as an unprivileged user (known as "Rootless mode"), so as to protect the real root on the host from potential container-breakout attacks. . RootlessKit creates user_namespaces(7) and mount_namespaces(7), and executes newuidmap(1)/newgidmap(1) along with subuid(5) and subgid(5). . RootlessKit also supports isolating network_namespaces(7) with userspace NAT using "slirp". . This Debian package doesn't support vpnkit mode. . On Debian system, kernel.unprivileged_userns_clone should be enabled. Package: golang-github-rootless-containers-rootlesskit-dev Architecture: all Multi-Arch: foreign Depends: golang-github-gofrs-flock-dev, golang-github-gorilla-mux-dev, golang-github-insomniacslk-dhcp-dev, golang-github-moby-sys-dev, golang-github-sirupsen-logrus-dev, golang-golang-x-sys-dev, ${misc:Depends}, ${shlibs:Depends}, Description: Linux-native "fake root" for rootless containers (library) The purpose of RootlessKit is to run Docker and Kubernetes as an unprivileged user (known as "Rootless mode"), so as to protect the real root on the host from potential container-breakout attacks. . RootlessKit creates user_namespaces(7) and mount_namespaces(7), and executes newuidmap(1)/newgidmap(1) along with subuid(5) and subgid(5). . RootlessKit also supports isolating network_namespaces(7) with userspace NAT using "slirp". . This package contains the development files.