Erick555
Erick555
@alexlarsson Situation after `xdg-document-portal` is started through systemd: ``` $ sudo lsns -t mnt --list --output-all NS TYPE PATH NPROCS PID PPID COMMAND UID USER NETNSID NSFS 4026531840 mnt /proc/1/ns/mnt...
Ubuntu is going to [fix this in df](https://git.launchpad.net/ubuntu/+source/coreutils/commit/?id=6cba9c1011aa2010aadc46c2b288e9fd8ba781c5), you may ask your distro to do the same. Even better report this to [coreutils](https://www.gnu.org/software/coreutils/) project.
> And whenever a manifest fullfills these conditions, it is confirmed as sandboxed while otherwise there would be a warning message saying that it is not sandboxed. AFAIK this is...
> However this is hardly what I am suggesting since it does block things like wayland and therefore isn't really useable for most flatpak apps. Additional permissions are added only...
> So in my research, the XDG specification is currently sufficient for what @alexlarsson calls "per-application data". Flatpak, in this scenario, would fulfill for what XDG calls "user specific data"...
This was answered before: https://github.com/flatpak/flatpak/issues/1651#issuecomment-386896758
@Arxcis what you are looking for is `~/.var/app/com.google.Chrome/config/chrome-flags.conf` not flatpak overrides.
If you read answers from actual developers you may conclude implementing this is unlikely to happen. You may edit desktop file or make a shell script the same way you...
It was explained before this functionality may be too complicated to implement. It also doesn't exist outside flatpak so it's nice but not crucial feature.
Doesn't pipewire re-use pulseaudio socket?