haaninjo
Repos
9
Followers
8
Following
5

Events

haaninjo create branch main
Created at 2 weeks ago
haaninjo delete branch master
Created at 2 weeks ago

Clarify the docs on filters in the file chooser

Make it explicit that patterns are case-sensitive.

Closes https://github.com/flatpak/xdg-desktop-portal/issues/225

Update Swedish translation

po: update slovak translation

Remove unused gunixfdlist.h includes

xdp-utils: Add a g_auto() type to close file descriptors

open-uri: Always set "fd" before calling handle_open_in_thread_func

open-uri: Close fd after opening dir or file

Use new XdpFd type with g_auto to make sure the file descriptor gets closed when the function finishes.

Update Danish translation

Update Simplified Chinese translation

build: drop unneeded fontconfig dependency

It seems to have been removed in https://github.com/flatpak/xdg-desktop-portal/commit/80043fc333847a3a200662d18d8f5a29fe10c5b5.

Merge pull request #538 from jtojnar/patch-1

build: drop unneeded fontconfig dependency

Merge pull request #530 from flatpak/wip/hadess/more-fd-closing

open-uri: Close fd after opening dir or file

Use cgroups to identify snap confined applications rather than AppArmor

The AppArmor based check only worked on platforms that supported AppArmor, and returned only a limited amount of information about the snap.

The new strategy first checks to see if the process appears to be snap confined by checking cgroup membership, then calls out to the "snap" utility to retrieve more detailed information about the snap.

Fix xdp_app_info_has_network implementation for snaps

Make xdp_app_info_load_app_info() load correct desktop file for snaps

tests: add some simple tests for the /proc/$pid/cgroup parsing code

xdp-utils: check if alternate doc portal path matches in path_for_fd()

The document portal uses different inode number when exposing a particular document in different parts of the file system. As sandboxed apps only have a subtree of the document portal file system mounted, the "same file" checks in xdp_app_info_get_path_for_fd() would fail for document portal paths.

To fix this, we check to see whether the corresponding "by-app/$app_id" path matches the stat information of the file descriptor.

Fixes #545

document-portal: add snap support to app_has_file_access()

This calls out to the "snap routine file-access" helper command, which produces output compatible with "flatpak info --file-access".

While this command was only introduced in snapd 2.45, the failure mode with old versions is consistent with the previous behaviour: assume the snap does not have file access.

documents: Add get_real_path_for_doc_path()

Given a document-portal path (e.g. /run/user/1000/doc/10288756/somefile.txt) it returns the real filesystem path.

open-uri: Use real filesystem path for OpenDirectory

Before this change the file manager would open inside the document-portal directory like /run/user/1000/doc/10288756 which is not very user-friendly. With this change it opens in the real filesystem path. Now actions like "Show in Files" can be properly implemented.

Created at 2 weeks ago
pull request opened
Update Swedish translation

This is an update for the Swedish translation.

Sent in as an MR since no new translation platform has been suggested at https://github.com/storaged-project/udisks/issues/719

Created at 3 weeks ago

Update Swedish translation

Created at 3 weeks ago
create branch
haaninjo create branch l10n-sv
Created at 3 weeks ago
Created at 3 weeks ago
pull request opened
Update Swedish translation

This updates the Swedish translation.

Created at 1 month ago

Update Swedish translation

Created at 1 month ago
create branch
haaninjo create branch l10n-sv-main
Created at 1 month ago
delete branch
haaninjo delete branch l10n-sv-main
Created at 1 month ago

flatpak-remote: Fix some minor leaks of some property values

Signed-off-by: Philip Withnall pwithnall@endlessos.org

Update Ukrainian translation

Update Swedish translation

Update Turkish translation

Update Ukrainian translation

tests: Skip test-history.sh without libsystemd

CI: Temporarily build without libsystemd

To fix the CI until this is resolved: https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1979579

try-syscall: Use compiler-predefined macros to detect mips ABI

_MIPS_SIM_ABI32 etc. are defined by Linux <asm/sgidefs.h>, which is included by glibc <sys/syscall.h> (which defers to Linux headers to get syscall numbers), but not by musl <sys/syscall.h>.

_ABIO32 etc. are predefined by the compiler, so they are always available, regardless of libc. References:

https://gcc.gnu.org/git/?p=gcc.git;a=commitdiff;h=27d54b2a6c18ef1ae50f1a5b432d590438445b90 https://gcc.gnu.org/git/?p=gcc.git;a=commitdiff;h=0ea339ea4d9c3e04ae17da6bf389617eb0251e57

Originally containers/bubblewrap#492 in bubblewrap.

Signed-off-by: Simon McVittie smcv@collabora.com

try-syscall: Cope with old glibc without PR_SET_CHILD_SUBREAPER defined

Originally part of containers/bubblewrap#496 in bubblewrap.

Signed-off-by: Simon McVittie smcv@collabora.com

.gitignore: Add tests/runtime-repo.stamp

Revert "CI: Temporarily build without libsystemd"

This reverts commit ea879dc38c40770ad9324c50582a1f0de5478b45.

Folks say the issue is fixed on launchpad: https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1979579

CI: Use CodeQL Action v2, not the deprecated v1

See: https://github.blog/changelog/2022-04-27-code-scanning-deprecation-of-codeql-action-v1/

Increase verbosity of extension missing error messages

Adds arch and branch to the error message to help with locating the required extension arch and branch.

app: Fix inefficiency in pin and mask commands

There's no point reading data from disk on a code path that doesn't do anything with it.

app/flatpak-complete.c: Fix typo

common: Remove erroneous Since: annotations

I think these were accidentally copied from GLib.

doc/flatpak-override: Tweak manpage

selinux: Permit read access to symbolic links in /var/lib/flatpak

Commit 8617ab0ad0243f5a granted read and lock access to /var/lib/flatpak but didn't cover symbolic links. This explicitly permits that to avoid running into SELinux denials.

https://bugzilla.redhat.com/show_bug.cgi?id=2071215

Updated Chinese translation (#4993)

Update ru.po (#4975)

Created at 1 month ago