* gnu/packages/virtualization.scm (bubblewrap)[source, home-page]: Follow
redirect to.
(version "0.3.3")
(source (origin
(method url-fetch)
- (uri (string-append "https://github.com/projectatomic/bubblewrap/"
+ (uri (string-append "https://github.com/containers/bubblewrap/"
"releases/download/v" version "/bubblewrap-"
version ".tar.xz"))
(sha256
(native-inputs
`(("python-2" ,python-2)
("util-linux" ,util-linux)))
- (home-page "https://github.com/projectatomic/bubblewrap")
+ (home-page "https://github.com/containers/bubblewrap")
(synopsis "Unprivileged sandboxing tool")
(description "Bubblewrap is aimed at running applications in a sandbox,
restricting their access to parts of the operating system or user data such as