procjail 0.1.0

Process sandbox for running untrusted code — Linux namespaces, seccomp, firejail, bubblewrap, rlimits
Documentation
1
2
3
4
5
6
7
8
9
10
11
12
13
14
# Contributing to procjail

We welcome contributions! Please review our standard guidelines below.

## Code Quality Requirements

- All tests must pass: `cargo test`
- Code must be formatted: `cargo fmt`
- Linting must be clean: `cargo clippy -- -D warnings`

## Guidelines
- Follow the Rust API Guidelines.
- Keep the `max_memory_bytes` and `max_cpu_seconds` configurable logic intact.
- Add tests for new edge cases or bugs.