ChanServ changed the topic of #wayland to: https://wayland.freedesktop.org | Discussion about the Wayland protocol and its implementations, plus libinput | register your nick to speak
radu24284303951534727071489559 has joined #wayland
radu24284303951534727071489559 has quit []
smallville7123 has joined #wayland
junaid has quit [Ping timeout: 480 seconds]
rv1sr has quit []
hardening has quit [Ping timeout: 480 seconds]
co1umbarius has joined #wayland
columbarius has quit [Ping timeout: 480 seconds]
julio7359 has joined #wayland
radu24284303951534727071489559 has joined #wayland
radu24284303951534727071489559 has quit []
radu24284303951534727071489559 has joined #wayland
radu24284303951534727071489559 has quit []
molinari has quit [Ping timeout: 480 seconds]
<smallville7123> welp i got a little more stuff to compile
<smallville7123> still gotta fix a ton of errors and warnings ;-;
julio7359 has quit [Ping timeout: 480 seconds]
julio7359 has joined #wayland
cool110 has joined #wayland
cool110_ has quit [Quit: ZNC 1.8.2+deb2build6 - https://znc.in]
<smallville7123> what syscalls does wayland use for signals ?
<smallville7123> hmm apparently it uses the kill syscall (from event-loop-tests.c)
nerdopolis_ has joined #wayland
nerdopolis has quit [Read error: Connection reset by peer]
<smallville7123> it appears that PostgreSQL has ported the signal and shm system to windows o.o
<smallville7123> how well such works i dont know
<smallville7123> tho... does the wayland event loop only ever catch SIGUSR1 or can it catch any other signal that can be caught with sigprogmask?
<smallville7123> ill see how cygwin goes about signals
Company has quit [Read error: Connection reset by peer]
nerdopolis_ has quit [Ping timeout: 480 seconds]
idkrn[m] has joined #wayland
<idkrn[m]> Anyone know if the xhost tool mentioned in https://wiki.gentoo.org/wiki/Simple_sandbox has a Wayland alternative?
radu24284303951534727071489559 has joined #wayland
radu24284303951534727071489559 has quit []
radu24284303951534727071489559 has joined #wayland
agd5f has joined #wayland
danvet has joined #wayland
kts has joined #wayland
junaid has joined #wayland
rv1sr has joined #wayland
smallville7123 has quit [Ping timeout: 480 seconds]
smallville7123 has joined #wayland
yetoo_ has quit [Read error: Connection reset by peer]
julio7359 has quit [Ping timeout: 480 seconds]
yetoo has joined #wayland
yetoo has quit []
junaid has quit [Remote host closed the connection]
Fxzxmic has joined #wayland
junaid has joined #wayland
rasterman has joined #wayland
flokli has quit [Quit: WeeChat 3.7.1]
dcz has joined #wayland
junaid has quit [Ping timeout: 480 seconds]
hardening has joined #wayland
junaid has joined #wayland
junaid has quit [Ping timeout: 480 seconds]
junaid has joined #wayland
flokli has joined #wayland
kts has quit [Quit: Leaving]
junaid has quit [Ping timeout: 480 seconds]
junaid has joined #wayland
junaid has quit [Ping timeout: 480 seconds]
junaid has joined #wayland
nerdopolis has joined #wayland
Fxzxmic has quit [Remote host closed the connection]
radu24284303951534727071489559 has quit []
molinari has joined #wayland
nerdopolis has quit []
nerdopolis has joined #wayland
kts has joined #wayland
Szadek has joined #wayland
floof58 is now known as Guest939
floof58 has joined #wayland
Guest939 has quit [Ping timeout: 480 seconds]
Szadek has quit [Quit: WeeChat 3.7.1]
junaid has quit [Ping timeout: 480 seconds]
immibis has quit [Remote host closed the connection]
immibis has joined #wayland
frytaped is now known as Guest943
<tleydxdy> I think you can just give the user rw access to the wayland socket
Guest943 is now known as go4godvin
Szadek has joined #wayland
frytaped has joined #wayland
frytaped has quit [Quit: WeeChat 3.6]
frytaped has joined #wayland
frytaped has quit []
frytaped has joined #wayland
manuel1985 has joined #wayland
kasper93 has quit [Ping timeout: 480 seconds]
frytaped has quit [Quit: WeeChat 3.6]
Company has joined #wayland
molinari has quit [Ping timeout: 480 seconds]
<idkrn[m]> <tleydxdy> "I think you can just give the..." <- How? I added them to the video group but I'm pretty sure that is useless
manuel1985 has quit [Ping timeout: 480 seconds]
wlb has quit [Quit: Leaving.]
radu24284303951534727071489559 has joined #wayland
ngortheone has quit [Remote host closed the connection]
radu24284303951534727071489559 has quit []
radu24284303951534727071489559 has joined #wayland
agd5f has quit [Remote host closed the connection]
floof58 has quit [Read error: Connection reset by peer]
floof58 has joined #wayland
agd5f has joined #wayland
<i509VCB> From the discussion about a wayland 2.0 adding 64-bit wire types, couldn't compatibility with 1.0 be done by lowering the 2.0 wire types to 1.0 wire types?
<i509VCB> Then wayland-scanner or the wayland-rs scanner or etc could expose the 64-bit types in the generated protocol bindings
kts has quit [Quit: Leaving]
<kennylevinsen> if something needs 64-bit it could just be sent as 2 32-bit ints - I think that's the least of the Wayland 2.0 concerns
nerdopolis_ has joined #wayland
nerdopolis has quit [Read error: Connection reset by peer]
radu24284303951534727071489559 has quit [Ping timeout: 480 seconds]
Moprius has joined #wayland
Moprius has quit [Quit: bye]
<daniels> idkrn[m]: socket access is all you need - either set permissions so you can access it, or as Flatpak does, bind-mount the socket into the sandbox
junaid has joined #wayland
dcz has quit [Ping timeout: 480 seconds]
andyrtr has quit [Quit: ZNC 1.8.2 - https://znc.in]
andyrtr has joined #wayland
julio7359 has joined #wayland
rv1sr has quit []
julio7359 has quit [Remote host closed the connection]
julio7359 has joined #wayland
radu24284303951534727071489559 has joined #wayland
junaid has quit [Ping timeout: 480 seconds]
molinari has joined #wayland
radu24284303951534727071489559 has quit [Ping timeout: 480 seconds]
radu24284303951534727071489559 has joined #wayland
radu24284303951534727071489559 has quit []
Brainium has joined #wayland
<idkrn[m]> <daniels> "idkrn: socket access is all..." <- So bubblewrap works for it?
<idkrn[m]> Set the permissions with what? Chmod?
<idkrn[m]> I'm pretty sure you don't mean chmod
<mjt> that's a difficult situation indeed.. if there's no other tool to set permissions, maybe such a tool should be written quickly
<mjt> </sarcasm>
<mjt> it is a socket file. that whole path needs to be accessible
<mjt> usually /run/user/$UID/wayland-0
<daniels> mjt: the sarcasm is pretty unnecessary tbh
<mjt> it's sometimes difficult to resist :)
<idkrn[m]> Yeah but it was a dumb question
<daniels> idkrn[m]: indeed, Wayland itself doesn't enforce any extra checks on clients connecting to the socket. if the socket is accessible to the client (through permissions indeed), then it can speak to the server. if it isn't accessible, then you can make it accessible with permissions or ACLs. if it isn't visible in the path (e.g. chroot), then you can make it visible via a bind mount
<idkrn[m]> daniels: It only needs to be visible?
<daniels> idkrn[m]: visible (by path), and accessible (by permissions). if you have both of those things, then you're in, without anything extra like xhost
<daniels> (bwrap uses bind mounts to do this)
<idkrn[m]> daniels: Ok thanks
<daniels> np :)
<idkrn[m]> daniels: How do I let it use my Wayland socket when it's under a different UID
<mjt> I guess it's easiest to bind-mount it (which might require root)
<daniels> idkrn[m]: same answer - either bind-mount it in, or open the permissions out
<idkrn[m]> daniels: So if I wanted to automate this for multiple applications, bubblewrap would he simplest?
<idkrn[m]> Or just set the perms to 444
<kennylevinsen> setfacl might do the trick
<daniels> yeah, either setfacl to grant to individual UIDs, or if you're trying to start each app in an isolated UID (namespace), then I'd probably just use bwrap to begin with
* mjt just googled for "wayland as different user" -- as usual, the solution suggested is to chmod 0777 /run/user/$UID. Looks like this 777 will never die.. :( (don't do that)
<idkrn[m]> Ok thanks everyone
<daniels> np
<idkrn[m]> <daniels> "mjt: the sarcasm is pretty..." <- Even for mjt :)
<idkrn[m]> mjt: Seems like a bad idea lmao
<daniels> idkrn[m]: we've all asked seemingly-dumb questions at one point in time, it's all good
<idkrn[m]> stat /run/user/$UID/wayland-* gives 755 though
<mjt> it is the directory which is restricted
<idkrn[m]> mjt: Good to know
<mjt> sockets ignore permissions, fwiw
<idkrn[m]> Yes it seems to be 700
<mjt> hmm. I'm not actually sure for sockets anymore, it was system-dependent, don't remember how it is on linux these days...
<mjt> but either way it doesn't matter in this case
<idkrn[m]> idkrn[m]: The directory I mean
<mjt> touch /run/user/$UID2/wayland-0; mount --bind /run/user/$UID/wayland-0 /run/user/$UID2/wayland-0 -- this gives user with UID2 access to wayland socket of user with UID
nerdopolis_ has quit []
nerdopolis has joined #wayland
<idkrn[m]> Hmmm
<idkrn[m]> I can sudo -u … bash
<idkrn[m]> Still can't get my program to work…
<idkrn[m]> I think maybe I could put up a pastebin of what I've done for people that have enough time to help
<mjt> what are you trying to do anyway?
ecs has quit [Remote host closed the connection]
julio7359 has quit [Ping timeout: 480 seconds]
Szadek has quit [Ping timeout: 480 seconds]
Szadek has joined #wayland
Leopold__ has quit [Remote host closed the connection]
Leopold_ has joined #wayland
rasterman has quit [Quit: Gettin' stinky!]
danvet has quit [Ping timeout: 480 seconds]
julio7359 has joined #wayland