. "${GRIMOIRE}/MESON_FUNCTIONS"
           SPELL=bubblewrap
         VERSION=0.11.2
     SOURCE_HASH="sha256:69abc30005d2186baf7737feacd8da35633b93cf5af38838ecff17c5f8e924f6:UPSTREAM_HASH"
  SECURITY_PATCH=1
          SOURCE=${SPELL}-${VERSION}.tar.xz
SOURCE_DIRECTORY="${BUILD_DIRECTORY}/${SPELL}-${VERSION}"
   SOURCE_URL[0]=https://github.com/containers/${SPELL}/releases/download/v${VERSION}/${SOURCE}
# Watch: https://github.com/containers/bubblewrap/tags tags/v([0-9.]+)[.]tar
        WEB_SITE=https://www.github.com/containers/bubblewrap/
      LICENSE[0]=LGPL
         ENTERED=20221120
        KEYWORDS="flatpak"
           SHORT="bubblewrap - Unprivileged sandboxing tool"
cat << EOF
The goal of bubblewrap is to run an application in a sandbox,
where it has restricted access to parts of the operating system
or user data such as the home directory.
EOF
