diff --git a/docs/sandbox-permissions.rst b/docs/sandbox-permissions.rst index 7e77b9e0..b30d65a5 100644 --- a/docs/sandbox-permissions.rst +++ b/docs/sandbox-permissions.rst @@ -132,8 +132,7 @@ although there can be exceptions. **Talk** -Talk permissions can be freely used, although it is recommended to use the -minimum required. +It is recommended to use the minimum required talk-name permissions. Filesystem access ````````````````` diff --git a/po/de/LC_MESSAGES/sandbox-permissions.po b/po/de/LC_MESSAGES/sandbox-permissions.po index dc01c8e6..78ca69bb 100644 --- a/po/de/LC_MESSAGES/sandbox-permissions.po +++ b/po/de/LC_MESSAGES/sandbox-permissions.po @@ -8,7 +8,7 @@ msgid "" msgstr "" "Project-Id-Version: Flatpak\n" "Report-Msgid-Bugs-To: \n" -"POT-Creation-Date: 2025-02-05 01:10+0530\n" +"POT-Creation-Date: 2025-02-21 08:22+0530\n" "PO-Revision-Date: 2018-05-20 10:36-0400\n" "Last-Translator: Copied by Zanata \n" "Language: de\n" @@ -17,7 +17,7 @@ msgstr "" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=utf-8\n" "Content-Transfer-Encoding: 8bit\n" -"Generated-By: Babel 2.16.0\n" +"Generated-By: Babel 2.17.0\n" #: ../../sandbox-permissions.rst:2 msgid "Sandbox Permissions" @@ -294,286 +294,285 @@ msgid "**Talk**" msgstr "" #: ../../sandbox-permissions.rst:135 -msgid "" -"Talk permissions can be freely used, although it is recommended to use " -"the minimum required." +msgid "It is recommended to use the minimum required talk-name permissions." msgstr "" -#: ../../sandbox-permissions.rst:139 +#: ../../sandbox-permissions.rst:138 msgid "Filesystem access" msgstr "" -#: ../../sandbox-permissions.rst:141 +#: ../../sandbox-permissions.rst:140 msgid "" "As a general rule, static and permanent filesystem access should be " "limited as much as possible. This includes:" msgstr "" -#: ../../sandbox-permissions.rst:144 +#: ../../sandbox-permissions.rst:143 msgid "" "Using portals as an alternative to blanket filesystem access, wherever " "possible." msgstr "" -#: ../../sandbox-permissions.rst:146 +#: ../../sandbox-permissions.rst:145 msgid "Using read-only access wherever possible, using the ``:ro`` option." msgstr "" -#: ../../sandbox-permissions.rst:147 +#: ../../sandbox-permissions.rst:146 msgid "" "Using :ref:`conventions:XDG base directories` to store application's " "cache, config and state. Then no additional filesystem access would be " "required." msgstr "" -#: ../../sandbox-permissions.rst:150 +#: ../../sandbox-permissions.rst:149 msgid "" "Avoiding full home access and instead using XDG directories such as " "``xdg-music`` or ``xdg-download`` etc." msgstr "" -#: ../../sandbox-permissions.rst:153 +#: ../../sandbox-permissions.rst:152 msgid "The following permission options are available:" msgstr "" -#: ../../sandbox-permissions.rst:155 +#: ../../sandbox-permissions.rst:154 msgid "``:ro`` - read-only access" msgstr "" -#: ../../sandbox-permissions.rst:156 +#: ../../sandbox-permissions.rst:155 msgid "" "``:create`` - read/write access, and create the directory if it doesn't " "exist" msgstr "" -#: ../../sandbox-permissions.rst:159 +#: ../../sandbox-permissions.rst:158 msgid "Additionally the following permissions are available:" msgstr "" -#: ../../sandbox-permissions.rst:162 +#: ../../sandbox-permissions.rst:161 msgid "``host``" msgstr "" -#: ../../sandbox-permissions.rst:162 +#: ../../sandbox-permissions.rst:161 msgid "" "Access to ``/home, /media, /opt, /run/media, /srv`` and everything " "provided by ``host-os, host-etc`` mounted in ``/run/host``" msgstr "" -#: ../../sandbox-permissions.rst:162 ../../sandbox-permissions.rst:166 -#: ../../sandbox-permissions.rst:167 +#: ../../sandbox-permissions.rst:161 ../../sandbox-permissions.rst:165 +#: ../../sandbox-permissions.rst:166 msgid "Includes any subpaths" msgstr "" -#: ../../sandbox-permissions.rst:163 +#: ../../sandbox-permissions.rst:162 msgid "``host-etc``" msgstr "" -#: ../../sandbox-permissions.rst:163 +#: ../../sandbox-permissions.rst:162 msgid "Host's ``/etc``" msgstr "" -#: ../../sandbox-permissions.rst:163 +#: ../../sandbox-permissions.rst:162 msgid "Host's ``/etc`` is mounted at ``/run/host/etc``" msgstr "" -#: ../../sandbox-permissions.rst:164 +#: ../../sandbox-permissions.rst:163 msgid "``host-os``" msgstr "" -#: ../../sandbox-permissions.rst:164 +#: ../../sandbox-permissions.rst:163 +#, python-brace-format msgid "" "Host's ``/usr, /bin, /sbin, /lib{32, 64}, /etc/ld.so.cache, " "/etc/alternatives``" msgstr "" -#: ../../sandbox-permissions.rst:164 +#: ../../sandbox-permissions.rst:163 msgid "Mounted at ``/run/host``" msgstr "" -#: ../../sandbox-permissions.rst:165 +#: ../../sandbox-permissions.rst:164 msgid "``home``" msgstr "" -#: ../../sandbox-permissions.rst:165 +#: ../../sandbox-permissions.rst:164 msgid "Access the home directory" msgstr "" -#: ../../sandbox-permissions.rst:165 +#: ../../sandbox-permissions.rst:164 msgid "Except ``~/.var/app``" msgstr "" -#: ../../sandbox-permissions.rst:166 +#: ../../sandbox-permissions.rst:165 msgid "``/some/dir``" msgstr "" -#: ../../sandbox-permissions.rst:166 +#: ../../sandbox-permissions.rst:165 msgid "Access an arbitrary path except any reserved path" msgstr "" -#: ../../sandbox-permissions.rst:167 +#: ../../sandbox-permissions.rst:166 msgid "``~/some/dir``" msgstr "" -#: ../../sandbox-permissions.rst:167 +#: ../../sandbox-permissions.rst:166 msgid "Arbitrary path relative to the home directory" msgstr "" -#: ../../sandbox-permissions.rst:168 +#: ../../sandbox-permissions.rst:167 msgid "``xdg-desktop``" msgstr "" -#: ../../sandbox-permissions.rst:168 +#: ../../sandbox-permissions.rst:167 msgid "Access the XDG desktop directory" msgstr "" -#: ../../sandbox-permissions.rst:168 +#: ../../sandbox-permissions.rst:167 msgid "``$XDG_DESKTOP_DIR`` or ``$HOME/Desktop``" msgstr "" -#: ../../sandbox-permissions.rst:169 +#: ../../sandbox-permissions.rst:168 msgid "``xdg-documents``" msgstr "" -#: ../../sandbox-permissions.rst:169 +#: ../../sandbox-permissions.rst:168 msgid "Access the XDG documents directory" msgstr "" -#: ../../sandbox-permissions.rst:169 +#: ../../sandbox-permissions.rst:168 msgid "``$XDG_DOCUMENTS_DIR`` or ``$HOME/Documents``" msgstr "" -#: ../../sandbox-permissions.rst:170 +#: ../../sandbox-permissions.rst:169 msgid "``xdg-download``" msgstr "" -#: ../../sandbox-permissions.rst:170 +#: ../../sandbox-permissions.rst:169 msgid "Access the XDG download directory" msgstr "" -#: ../../sandbox-permissions.rst:170 +#: ../../sandbox-permissions.rst:169 msgid "``$XDG_DOWNLOAD_DIR`` or ``$HOME/Downloads``" msgstr "" -#: ../../sandbox-permissions.rst:171 +#: ../../sandbox-permissions.rst:170 msgid "``xdg-music``" msgstr "" -#: ../../sandbox-permissions.rst:171 +#: ../../sandbox-permissions.rst:170 msgid "Access the XDG music directory" msgstr "" -#: ../../sandbox-permissions.rst:171 +#: ../../sandbox-permissions.rst:170 msgid "``$XDG_MUSIC_DIR`` or ``$HOME/Music``" msgstr "" -#: ../../sandbox-permissions.rst:172 +#: ../../sandbox-permissions.rst:171 msgid "``xdg-pictures``" msgstr "" -#: ../../sandbox-permissions.rst:172 +#: ../../sandbox-permissions.rst:171 msgid "Access the XDG pictures directory" msgstr "" -#: ../../sandbox-permissions.rst:172 +#: ../../sandbox-permissions.rst:171 msgid "``$XDG_PICTURES_DIR`` or ``$HOME/Pictures``" msgstr "" -#: ../../sandbox-permissions.rst:173 +#: ../../sandbox-permissions.rst:172 msgid "``xdg-public-share``" msgstr "" -#: ../../sandbox-permissions.rst:173 +#: ../../sandbox-permissions.rst:172 msgid "Access the XDG public directory" msgstr "" -#: ../../sandbox-permissions.rst:173 +#: ../../sandbox-permissions.rst:172 msgid "``$XDG_PUBLICSHARE_DIR`` or ``$HOME/Public``" msgstr "" -#: ../../sandbox-permissions.rst:174 +#: ../../sandbox-permissions.rst:173 msgid "``xdg-videos``" msgstr "" -#: ../../sandbox-permissions.rst:174 +#: ../../sandbox-permissions.rst:173 msgid "Access the XDG videos directory" msgstr "" -#: ../../sandbox-permissions.rst:174 +#: ../../sandbox-permissions.rst:173 msgid "``$XDG_VIDEOS_DIR`` or ``$HOME/Videos``" msgstr "" -#: ../../sandbox-permissions.rst:175 +#: ../../sandbox-permissions.rst:174 msgid "``xdg-templates``" msgstr "" -#: ../../sandbox-permissions.rst:175 +#: ../../sandbox-permissions.rst:174 msgid "Access the XDG templates directory" msgstr "" -#: ../../sandbox-permissions.rst:175 +#: ../../sandbox-permissions.rst:174 msgid "``$XDG_TEMPLATES_DIR`` or ``$HOME/Templates``" msgstr "" -#: ../../sandbox-permissions.rst:176 +#: ../../sandbox-permissions.rst:175 msgid "``xdg-config``" msgstr "" -#: ../../sandbox-permissions.rst:176 +#: ../../sandbox-permissions.rst:175 msgid "Access the XDG config directory [#f3]_" msgstr "" -#: ../../sandbox-permissions.rst:176 +#: ../../sandbox-permissions.rst:175 msgid "``$XDG_CONFIG_HOME`` or ``$HOME/.config``" msgstr "" -#: ../../sandbox-permissions.rst:177 +#: ../../sandbox-permissions.rst:176 msgid "``xdg-cache``" msgstr "" -#: ../../sandbox-permissions.rst:177 +#: ../../sandbox-permissions.rst:176 msgid "Access the XDG cache directory [#f3]_" msgstr "" -#: ../../sandbox-permissions.rst:177 +#: ../../sandbox-permissions.rst:176 msgid "``$XDG_CACHE_HOME`` or ``$HOME/.cache``" msgstr "" -#: ../../sandbox-permissions.rst:178 +#: ../../sandbox-permissions.rst:177 msgid "``xdg-data``" msgstr "" -#: ../../sandbox-permissions.rst:178 +#: ../../sandbox-permissions.rst:177 msgid "Access the XDG data directory [#f3]_" msgstr "" -#: ../../sandbox-permissions.rst:178 +#: ../../sandbox-permissions.rst:177 msgid "``$XDG_DATA_HOME`` or ``$HOME/.local/share``" msgstr "" -#: ../../sandbox-permissions.rst:179 +#: ../../sandbox-permissions.rst:178 msgid "``xdg-run/path``" msgstr "" -#: ../../sandbox-permissions.rst:179 +#: ../../sandbox-permissions.rst:178 msgid "Access subdirectories of the XDG runtime directory" msgstr "" -#: ../../sandbox-permissions.rst:179 +#: ../../sandbox-permissions.rst:178 msgid "``$XDG_RUNTIME_DIR/path`` (``/run/user/$UID/path``)" msgstr "" -#: ../../sandbox-permissions.rst:182 +#: ../../sandbox-permissions.rst:181 msgid "" "Except ``host, host-etc, host-os`` paths can be added to all the above " "filesystem options. For example, ``--filesystem=xdg-documents/path``." msgstr "" -#: ../../sandbox-permissions.rst:185 +#: ../../sandbox-permissions.rst:184 msgid "Other filesystem access guidelines include:" msgstr "" -#: ../../sandbox-permissions.rst:187 +#: ../../sandbox-permissions.rst:186 msgid "" "The ``--persist=DIR`` option can be used to map directories from the " "user's home directory into the sandbox filesystem. This only works if the" @@ -581,7 +580,7 @@ msgid "" "includes ``home``." msgstr "" -#: ../../sandbox-permissions.rst:192 +#: ../../sandbox-permissions.rst:191 msgid "" "For example, if an application hardcodes the directory ``~/.foo``, " "without any ``home`` access and no ``--persist`` the directory will be " @@ -592,48 +591,48 @@ msgid "" "``~/.var/app/$FLATPAK_ID/.foo`` which would otherwise be lost." msgstr "" -#: ../../sandbox-permissions.rst:200 +#: ../../sandbox-permissions.rst:199 msgid "A ``--persist=.`` will `persist` all directories." msgstr "" -#: ../../sandbox-permissions.rst:202 +#: ../../sandbox-permissions.rst:201 msgid "" "This does not support ``:create, :ro, :rw`` suffixes or special values " "like ``xdg-documents``. However, the directory will be created by flatpak" " if it doesn't already exist." msgstr "" -#: ../../sandbox-permissions.rst:206 +#: ../../sandbox-permissions.rst:205 msgid "" "This makes it possible to avoid configuring access to the entire home " "directory, and can be useful for applications that hardcode file paths in" " ``~/``." msgstr "" -#: ../../sandbox-permissions.rst:209 +#: ../../sandbox-permissions.rst:208 msgid "" "If an application uses ``$TMPDIR`` to contain lock files you may want to " "add a wrapper script that sets it to ``$XDG_RUNTIME_DIR/app/$FLATPAK_ID``" " (tmpfs) or ``/var/tmp`` (persistent on host)." msgstr "" -#: ../../sandbox-permissions.rst:213 +#: ../../sandbox-permissions.rst:212 msgid "" "Retaining and sharing configuration with non-Flatpak installations is to " "be avoided." msgstr "" -#: ../../sandbox-permissions.rst:217 +#: ../../sandbox-permissions.rst:216 msgid "Reserved Paths" msgstr "" -#: ../../sandbox-permissions.rst:219 +#: ../../sandbox-permissions.rst:218 msgid "" "The following paths and subpaths of them are reserved and asking access " "to them with ``--filesystem`` will have no effect::" msgstr "" -#: ../../sandbox-permissions.rst:224 +#: ../../sandbox-permissions.rst:223 msgid "" "The entire ``/run`` is not allowed and all subpaths of ``/run`` except " "``/run/flatpak, /run/host`` is allowed to be exposed via " @@ -641,44 +640,45 @@ msgid "" "``../run``, exposing it or a subpath of it, is not allowed." msgstr "" -#: ../../sandbox-permissions.rst:229 +#: ../../sandbox-permissions.rst:228 msgid "" "Additionally the following directories from host need to be explicitly " "requested with ``--filesystem`` and are not available with ``home, host, " "host-os, host-etc`` by default:" msgstr "" -#: ../../sandbox-permissions.rst:233 +#: ../../sandbox-permissions.rst:232 msgid "" "``~/.var/app`` - The app can access only its own directory in " "``~/.var/app/$FLATPAK_ID``" msgstr "" -#: ../../sandbox-permissions.rst:234 +#: ../../sandbox-permissions.rst:233 msgid "``$XDG_DATA_HOME/flatpak`` (``~/.local/share/flatpak``)" msgstr "" -#: ../../sandbox-permissions.rst:235 +#: ../../sandbox-permissions.rst:234 msgid "``/boot``" msgstr "" -#: ../../sandbox-permissions.rst:236 +#: ../../sandbox-permissions.rst:235 msgid "``/efi``" msgstr "" -#: ../../sandbox-permissions.rst:237 +#: ../../sandbox-permissions.rst:236 msgid "``/root``" msgstr "" -#: ../../sandbox-permissions.rst:238 +#: ../../sandbox-permissions.rst:237 msgid "``/sys``" msgstr "" -#: ../../sandbox-permissions.rst:239 +#: ../../sandbox-permissions.rst:238 msgid "``/tmp``" msgstr "" -#: ../../sandbox-permissions.rst:240 +#: ../../sandbox-permissions.rst:239 +#, python-brace-format msgid "" "``/var`` - Note that by default ``/var/{cache, config, data, tmp}`` " "inside the sandbox are the same as ``~/.var/app/$FLATPAK_ID/{cache, " @@ -687,96 +687,96 @@ msgid "" "available." msgstr "" -#: ../../sandbox-permissions.rst:244 +#: ../../sandbox-permissions.rst:243 msgid "``/var/lib/flatpak`` - ``/var`` does not give access to this." msgstr "" -#: ../../sandbox-permissions.rst:247 +#: ../../sandbox-permissions.rst:246 msgid "Device access" msgstr "" -#: ../../sandbox-permissions.rst:248 +#: ../../sandbox-permissions.rst:247 msgid "You can provide the following device permissions:" msgstr "" -#: ../../sandbox-permissions.rst:251 +#: ../../sandbox-permissions.rst:250 msgid "``dri``" msgstr "" -#: ../../sandbox-permissions.rst:251 +#: ../../sandbox-permissions.rst:250 msgid "Direct Rendering Interface. Necessary for GL." msgstr "" -#: ../../sandbox-permissions.rst:252 +#: ../../sandbox-permissions.rst:251 msgid "``kvm``" msgstr "" -#: ../../sandbox-permissions.rst:252 +#: ../../sandbox-permissions.rst:251 msgid "Kernel based Virtual Machine ``/dev/kvm``" msgstr "" -#: ../../sandbox-permissions.rst:253 +#: ../../sandbox-permissions.rst:252 msgid "``shm``" msgstr "" -#: ../../sandbox-permissions.rst:253 +#: ../../sandbox-permissions.rst:252 msgid "Shared Memory in ``/dev/shm``." msgstr "" -#: ../../sandbox-permissions.rst:254 +#: ../../sandbox-permissions.rst:253 msgid "``input``" msgstr "" -#: ../../sandbox-permissions.rst:254 +#: ../../sandbox-permissions.rst:253 msgid "" "Input devices as exposed in ``/dev/input``. This includes game " "controllers. Since Flatpak 1.15.6." msgstr "" -#: ../../sandbox-permissions.rst:255 +#: ../../sandbox-permissions.rst:254 msgid "``usb``" msgstr "" -#: ../../sandbox-permissions.rst:255 +#: ../../sandbox-permissions.rst:254 msgid "Raw USB devices as exposed in ``/dev/bus/usb``. Since Flatpak 1.15.11." msgstr "" -#: ../../sandbox-permissions.rst:256 +#: ../../sandbox-permissions.rst:255 msgid "``all``" msgstr "" -#: ../../sandbox-permissions.rst:256 +#: ../../sandbox-permissions.rst:255 msgid "All devices, including all of the above except ``shm``" msgstr "" -#: ../../sandbox-permissions.rst:261 +#: ../../sandbox-permissions.rst:260 msgid "" "Using newer permissions like ``input`` or ``usb`` will have no effect on " "older Flatpak versions and will fail when used through Flatpak " "commandline." msgstr "" -#: ../../sandbox-permissions.rst:265 +#: ../../sandbox-permissions.rst:264 msgid "" "While not ideal, ``--device=all`` can be used to access devices like " "webcams, CD/DVD drives etc." msgstr "" -#: ../../sandbox-permissions.rst:269 +#: ../../sandbox-permissions.rst:268 msgid "USB portal" msgstr "" -#: ../../sandbox-permissions.rst:271 +#: ../../sandbox-permissions.rst:270 msgid "Since 1.5.11." msgstr "" -#: ../../sandbox-permissions.rst:273 +#: ../../sandbox-permissions.rst:272 msgid "" "Sandboxed access to individual USB devices can be controlled by portals. " "Flatpak allows specifying enumerable USB devices to allow access." msgstr "" -#: ../../sandbox-permissions.rst:277 +#: ../../sandbox-permissions.rst:276 msgid "" "Like ``--device=usb``, this is just about accessing the raw USB device, " "that needs libusb (or equivalent). By using the portal, you can restrict " @@ -785,59 +785,59 @@ msgid "" "no reason for USB security devices to be accessible." msgstr "" -#: ../../sandbox-permissions.rst:284 +#: ../../sandbox-permissions.rst:283 msgid "" "A list of valid use cases includes scanners (handled, for example by " "SANE), photo cameras (handled by libgphoto2), flashing devices, etc." msgstr "" -#: ../../sandbox-permissions.rst:287 +#: ../../sandbox-permissions.rst:286 msgid "" "While this is portal dependent and ``xdg-desktop-portal`` is currently " "the only portal implementation, the overall permission flow is as " "follows:" msgstr "" -#: ../../sandbox-permissions.rst:291 +#: ../../sandbox-permissions.rst:290 msgid "" "The Flatpak package specifies the devices it wishes to enumerate through " "``finish-args``." msgstr "" -#: ../../sandbox-permissions.rst:293 +#: ../../sandbox-permissions.rst:292 msgid "" "The application requests the portal to enumerate the available USB " "devices based on that list. If the list is empty it will enumerate all " "USB devices." msgstr "" -#: ../../sandbox-permissions.rst:296 +#: ../../sandbox-permissions.rst:295 msgid "" "When the application wants to access the device, it will make a request " "for the device it wants to access via the portal." msgstr "" -#: ../../sandbox-permissions.rst:298 +#: ../../sandbox-permissions.rst:297 msgid "The portal then requests permission from the user if not already granted." msgstr "" -#: ../../sandbox-permissions.rst:300 +#: ../../sandbox-permissions.rst:299 msgid "" "If the permission was granted, a file descriptor for the device is passed" " back to the application." msgstr "" -#: ../../sandbox-permissions.rst:303 +#: ../../sandbox-permissions.rst:302 msgid "" "The application is then able to open the devices it is supposed to use " "while the others would be hidden." msgstr "" -#: ../../sandbox-permissions.rst:307 +#: ../../sandbox-permissions.rst:306 msgid "Specifying the enumerable devices" msgstr "" -#: ../../sandbox-permissions.rst:309 +#: ../../sandbox-permissions.rst:308 msgid "" "You can specify devices on the ``flatpak`` command line, and by extension" " in the finish arguments for Flatpak Builder. Enumerable devices are " @@ -848,17 +848,17 @@ msgid "" " shall not be enumerated." msgstr "" -#: ../../sandbox-permissions.rst:317 +#: ../../sandbox-permissions.rst:316 msgid "Queries are made out of rules. These rules are composable with ``+``." msgstr "" -#: ../../sandbox-permissions.rst:319 +#: ../../sandbox-permissions.rst:318 msgid "" "The rule ``all`` enumerates every USB device. There is no further rule " "allowed in the query." msgstr "" -#: ../../sandbox-permissions.rst:322 +#: ../../sandbox-permissions.rst:321 msgid "" "The ``vnd`` and ``dev`` rules specify a USB vendor and a USB device ID " "respectively. A vendor can be specified alone, but a device rule always " @@ -868,63 +868,63 @@ msgid "" "repository `_" msgstr "" -#: ../../sandbox-permissions.rst:329 +#: ../../sandbox-permissions.rst:328 msgid "" "``cls`` specifies the device USB class and subclass. Both class and " "subclass are two digit hex numbers separated by a colon ``:``. You can " "use ``*`` to specify any subclass within the class." msgstr "" -#: ../../sandbox-permissions.rst:333 +#: ../../sandbox-permissions.rst:332 msgid "Some examples of the syntax:" msgstr "" -#: ../../sandbox-permissions.rst:335 +#: ../../sandbox-permissions.rst:334 msgid "``vnd:1234``: Devices from vendor ``1234``" msgstr "" -#: ../../sandbox-permissions.rst:336 +#: ../../sandbox-permissions.rst:335 msgid "``vnd:1234+dev:3456``: Only device ``3456`` from vendor ``1234``." msgstr "" -#: ../../sandbox-permissions.rst:337 +#: ../../sandbox-permissions.rst:336 msgid "``vnd:1234+cls:06:*``: All the PTP devices from vendor ``1234``." msgstr "" -#: ../../sandbox-permissions.rst:338 +#: ../../sandbox-permissions.rst:337 msgid "``cls:06:*``: All the PTP devices." msgstr "" -#: ../../sandbox-permissions.rst:340 +#: ../../sandbox-permissions.rst:339 msgid "" "This permission only allows to enumerate devices. To open them, " "permission must be requested from the portal. It is not possible to open " "a device that is not enumerable." msgstr "" -#: ../../sandbox-permissions.rst:346 +#: ../../sandbox-permissions.rst:345 msgid "" "The ``--device=usb`` permission is broader than what the USB portal is " "supposed to provide and allows unfettered access to any USB device on the" " bus." msgstr "" -#: ../../sandbox-permissions.rst:350 +#: ../../sandbox-permissions.rst:349 msgid "In some situations you may need to specify a very long list of devices." msgstr "" -#: ../../sandbox-permissions.rst:352 +#: ../../sandbox-permissions.rst:351 msgid "Device lists can be passed in one single argument, or through a file." msgstr "" -#: ../../sandbox-permissions.rst:354 +#: ../../sandbox-permissions.rst:353 msgid "" "When using ``--usb-list``, the queries are separated by a semi-colon " "``;``, with queries for hidden devices (i.e. those that would be passed " "with ``--nousb``) prefixed with ``!``." msgstr "" -#: ../../sandbox-permissions.rst:358 +#: ../../sandbox-permissions.rst:357 msgid "" "When using ``--usb-list-file``, the filename of the file containing USB " "queries is passed line by line. Like with ``--usb-list`` queries for " @@ -934,24 +934,24 @@ msgid "" "list is persisted internally." msgstr "" -#: ../../sandbox-permissions.rst:366 +#: ../../sandbox-permissions.rst:365 msgid "dconf access" msgstr "" -#: ../../sandbox-permissions.rst:368 +#: ../../sandbox-permissions.rst:367 msgid "" "As of xdg-desktop-portal 1.1.0 and glib 2.60.5 (in the runtime) you do " "not need direct DConf access in most cases." msgstr "" -#: ../../sandbox-permissions.rst:371 +#: ../../sandbox-permissions.rst:370 msgid "" "As of now this glib version is included in " "``org.freedesktop.Platform//19.08`` and ``org.gnome.Platform//3.34`` and " "newer." msgstr "" -#: ../../sandbox-permissions.rst:374 +#: ../../sandbox-permissions.rst:373 msgid "" "If an application existed prior to these runtimes you can tell Flatpak " "(>= 1.3.4) to migrate the DConf settings on the host into the sandbox by " @@ -960,17 +960,17 @@ msgid "" " (case is ignored and ``_`` and ``-`` are treated equal)." msgstr "" -#: ../../sandbox-permissions.rst:381 +#: ../../sandbox-permissions.rst:380 msgid "" "If you are targeting older runtimes or require direct DConf access for " "other reasons you can use these permissions::" msgstr "" -#: ../../sandbox-permissions.rst:389 +#: ../../sandbox-permissions.rst:388 msgid "With those permissions glib will continue using dconf directly." msgstr "" -#: ../../sandbox-permissions.rst:391 +#: ../../sandbox-permissions.rst:390 msgid "" "If you use a newer runtime where dconf is no longer built and still need " "it you will have to build the `dconf " @@ -978,11 +978,11 @@ msgid "" "``--env=GIO_EXTRA_MODULES=/app/lib/gio/modules/``." msgstr "" -#: ../../sandbox-permissions.rst:396 +#: ../../sandbox-permissions.rst:395 msgid "gvfs access" msgstr "" -#: ../../sandbox-permissions.rst:398 +#: ../../sandbox-permissions.rst:397 msgid "" "As of gvfs 1.48, the gvfs daemons and applications use an on-disk socket " "to communicate, rather than an abstract socket so that the gvfs " @@ -990,47 +990,47 @@ msgid "" "application's sandbox." msgstr "" -#: ../../sandbox-permissions.rst:402 +#: ../../sandbox-permissions.rst:401 msgid "" "A number of different options need to be passed depending on the " "application's use of gvfs." msgstr "" -#: ../../sandbox-permissions.rst:405 +#: ../../sandbox-permissions.rst:404 msgid "" "``--talk-name=org.gtk.vfs.*`` is necessary to talk to the gvfs daemons " "over D-Bus and list mounts using the GIO APIs." msgstr "" -#: ../../sandbox-permissions.rst:408 +#: ../../sandbox-permissions.rst:407 msgid "" "``--filesystem=xdg-run/gvfsd`` is necessary to use the GIO APIs to list " "and access non-native files using the GIO APIs, using URLs rather than " "FUSE paths." msgstr "" -#: ../../sandbox-permissions.rst:411 +#: ../../sandbox-permissions.rst:410 msgid "" "``--filesystem=xdg-run/gvfs`` is necessary to give access to the FUSE " "mounts non-GIO and legacy applications can use. This is what will make " "native files appear under ``/run/user/`id -u`/gvfs/``." msgstr "" -#: ../../sandbox-permissions.rst:415 +#: ../../sandbox-permissions.rst:414 msgid "Typical GNOME and GTK applications should use::" msgstr "" -#: ../../sandbox-permissions.rst:420 +#: ../../sandbox-permissions.rst:419 msgid "Typical non-GNOME and non-GTK applications should use::" msgstr "" -#: ../../sandbox-permissions.rst:424 +#: ../../sandbox-permissions.rst:423 msgid "" "No application should be using ``--talk-name=org.gtk.vfs`` in its " "manifest, as there are no D-Bus services named ``org.gtk.vfs``." msgstr "" -#: ../../sandbox-permissions.rst:427 +#: ../../sandbox-permissions.rst:426 msgid "" "These permission grants the app, the ability to communicate with the gvfs" " daemon and backends running on host. Depending on the backends installed" @@ -1046,11 +1046,11 @@ msgid "" "host." msgstr "" -#: ../../sandbox-permissions.rst:441 +#: ../../sandbox-permissions.rst:440 msgid "External drive access" msgstr "" -#: ../../sandbox-permissions.rst:443 +#: ../../sandbox-permissions.rst:442 msgid "" "External drives are mounted by the host system using systemd, udev, udisk" " fstab etc. and each of them can have different defaults. Flatpak has no " @@ -1058,30 +1058,30 @@ msgid "" "permissions should work in most cases::" msgstr "" -#: ../../sandbox-permissions.rst:452 +#: ../../sandbox-permissions.rst:451 msgid "" "If ``--filesystem=host`` is used ``/media, /run/media`` is shared " "automatically if they exist." msgstr "" -#: ../../sandbox-permissions.rst:455 +#: ../../sandbox-permissions.rst:454 msgid "" "Note that these should not have subpaths in them unless the value of the " "subpath can be consistently pre-determined. Block device naming depends " "on the kernel/fstab configuration and cannot be pre-determined." msgstr "" -#: ../../sandbox-permissions.rst:460 +#: ../../sandbox-permissions.rst:459 msgid "Footnotes" msgstr "" -#: ../../sandbox-permissions.rst:461 +#: ../../sandbox-permissions.rst:460 msgid "" "This is not necessarily required, but without it the X11 shared memory " "extension will not work, which is very bad for X11 performance." msgstr "" -#: ../../sandbox-permissions.rst:463 +#: ../../sandbox-permissions.rst:462 msgid "" "Giving network access also grants access to all host services listening " "on abstract Unix sockets (due to how network namespaces work), and these " @@ -1090,7 +1090,8 @@ msgid "" "secure distribution should disable these and just use regular sockets." msgstr "" -#: ../../sandbox-permissions.rst:468 +#: ../../sandbox-permissions.rst:467 +#, python-brace-format msgid "" "``xdg-{cache, config, data}`` bind mounts the paths from host to the per-" "app sandbox directory. Inside the sandbox ``$XDG_CACHE_HOME``, " @@ -1366,3 +1367,9 @@ msgstr "" #~ "the specific D-Bus permissions needed." #~ msgstr "" +#~ msgid "" +#~ "Talk permissions can be freely used, " +#~ "although it is recommended to use " +#~ "the minimum required." +#~ msgstr "" + diff --git a/po/es/LC_MESSAGES/sandbox-permissions.po b/po/es/LC_MESSAGES/sandbox-permissions.po index 29a5c313..2adfc35b 100644 --- a/po/es/LC_MESSAGES/sandbox-permissions.po +++ b/po/es/LC_MESSAGES/sandbox-permissions.po @@ -8,7 +8,7 @@ msgid "" msgstr "" "Project-Id-Version: Flatpak\n" "Report-Msgid-Bugs-To: \n" -"POT-Creation-Date: 2025-02-05 01:10+0530\n" +"POT-Creation-Date: 2025-02-21 08:22+0530\n" "PO-Revision-Date: 2018-05-20 10:37-0400\n" "Last-Translator: Copied by Zanata \n" "Language: es\n" @@ -17,7 +17,7 @@ msgstr "" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=utf-8\n" "Content-Transfer-Encoding: 8bit\n" -"Generated-By: Babel 2.16.0\n" +"Generated-By: Babel 2.17.0\n" #: ../../sandbox-permissions.rst:2 msgid "Sandbox Permissions" @@ -294,286 +294,285 @@ msgid "**Talk**" msgstr "" #: ../../sandbox-permissions.rst:135 -msgid "" -"Talk permissions can be freely used, although it is recommended to use " -"the minimum required." +msgid "It is recommended to use the minimum required talk-name permissions." msgstr "" -#: ../../sandbox-permissions.rst:139 +#: ../../sandbox-permissions.rst:138 msgid "Filesystem access" msgstr "" -#: ../../sandbox-permissions.rst:141 +#: ../../sandbox-permissions.rst:140 msgid "" "As a general rule, static and permanent filesystem access should be " "limited as much as possible. This includes:" msgstr "" -#: ../../sandbox-permissions.rst:144 +#: ../../sandbox-permissions.rst:143 msgid "" "Using portals as an alternative to blanket filesystem access, wherever " "possible." msgstr "" -#: ../../sandbox-permissions.rst:146 +#: ../../sandbox-permissions.rst:145 msgid "Using read-only access wherever possible, using the ``:ro`` option." msgstr "" -#: ../../sandbox-permissions.rst:147 +#: ../../sandbox-permissions.rst:146 msgid "" "Using :ref:`conventions:XDG base directories` to store application's " "cache, config and state. Then no additional filesystem access would be " "required." msgstr "" -#: ../../sandbox-permissions.rst:150 +#: ../../sandbox-permissions.rst:149 msgid "" "Avoiding full home access and instead using XDG directories such as " "``xdg-music`` or ``xdg-download`` etc." msgstr "" -#: ../../sandbox-permissions.rst:153 +#: ../../sandbox-permissions.rst:152 msgid "The following permission options are available:" msgstr "" -#: ../../sandbox-permissions.rst:155 +#: ../../sandbox-permissions.rst:154 msgid "``:ro`` - read-only access" msgstr "" -#: ../../sandbox-permissions.rst:156 +#: ../../sandbox-permissions.rst:155 msgid "" "``:create`` - read/write access, and create the directory if it doesn't " "exist" msgstr "" -#: ../../sandbox-permissions.rst:159 +#: ../../sandbox-permissions.rst:158 msgid "Additionally the following permissions are available:" msgstr "" -#: ../../sandbox-permissions.rst:162 +#: ../../sandbox-permissions.rst:161 msgid "``host``" msgstr "" -#: ../../sandbox-permissions.rst:162 +#: ../../sandbox-permissions.rst:161 msgid "" "Access to ``/home, /media, /opt, /run/media, /srv`` and everything " "provided by ``host-os, host-etc`` mounted in ``/run/host``" msgstr "" -#: ../../sandbox-permissions.rst:162 ../../sandbox-permissions.rst:166 -#: ../../sandbox-permissions.rst:167 +#: ../../sandbox-permissions.rst:161 ../../sandbox-permissions.rst:165 +#: ../../sandbox-permissions.rst:166 msgid "Includes any subpaths" msgstr "" -#: ../../sandbox-permissions.rst:163 +#: ../../sandbox-permissions.rst:162 msgid "``host-etc``" msgstr "" -#: ../../sandbox-permissions.rst:163 +#: ../../sandbox-permissions.rst:162 msgid "Host's ``/etc``" msgstr "" -#: ../../sandbox-permissions.rst:163 +#: ../../sandbox-permissions.rst:162 msgid "Host's ``/etc`` is mounted at ``/run/host/etc``" msgstr "" -#: ../../sandbox-permissions.rst:164 +#: ../../sandbox-permissions.rst:163 msgid "``host-os``" msgstr "" -#: ../../sandbox-permissions.rst:164 +#: ../../sandbox-permissions.rst:163 +#, python-brace-format msgid "" "Host's ``/usr, /bin, /sbin, /lib{32, 64}, /etc/ld.so.cache, " "/etc/alternatives``" msgstr "" -#: ../../sandbox-permissions.rst:164 +#: ../../sandbox-permissions.rst:163 msgid "Mounted at ``/run/host``" msgstr "" -#: ../../sandbox-permissions.rst:165 +#: ../../sandbox-permissions.rst:164 msgid "``home``" msgstr "" -#: ../../sandbox-permissions.rst:165 +#: ../../sandbox-permissions.rst:164 msgid "Access the home directory" msgstr "" -#: ../../sandbox-permissions.rst:165 +#: ../../sandbox-permissions.rst:164 msgid "Except ``~/.var/app``" msgstr "" -#: ../../sandbox-permissions.rst:166 +#: ../../sandbox-permissions.rst:165 msgid "``/some/dir``" msgstr "" -#: ../../sandbox-permissions.rst:166 +#: ../../sandbox-permissions.rst:165 msgid "Access an arbitrary path except any reserved path" msgstr "" -#: ../../sandbox-permissions.rst:167 +#: ../../sandbox-permissions.rst:166 msgid "``~/some/dir``" msgstr "" -#: ../../sandbox-permissions.rst:167 +#: ../../sandbox-permissions.rst:166 msgid "Arbitrary path relative to the home directory" msgstr "" -#: ../../sandbox-permissions.rst:168 +#: ../../sandbox-permissions.rst:167 msgid "``xdg-desktop``" msgstr "" -#: ../../sandbox-permissions.rst:168 +#: ../../sandbox-permissions.rst:167 msgid "Access the XDG desktop directory" msgstr "" -#: ../../sandbox-permissions.rst:168 +#: ../../sandbox-permissions.rst:167 msgid "``$XDG_DESKTOP_DIR`` or ``$HOME/Desktop``" msgstr "" -#: ../../sandbox-permissions.rst:169 +#: ../../sandbox-permissions.rst:168 msgid "``xdg-documents``" msgstr "" -#: ../../sandbox-permissions.rst:169 +#: ../../sandbox-permissions.rst:168 msgid "Access the XDG documents directory" msgstr "" -#: ../../sandbox-permissions.rst:169 +#: ../../sandbox-permissions.rst:168 msgid "``$XDG_DOCUMENTS_DIR`` or ``$HOME/Documents``" msgstr "" -#: ../../sandbox-permissions.rst:170 +#: ../../sandbox-permissions.rst:169 msgid "``xdg-download``" msgstr "" -#: ../../sandbox-permissions.rst:170 +#: ../../sandbox-permissions.rst:169 msgid "Access the XDG download directory" msgstr "" -#: ../../sandbox-permissions.rst:170 +#: ../../sandbox-permissions.rst:169 msgid "``$XDG_DOWNLOAD_DIR`` or ``$HOME/Downloads``" msgstr "" -#: ../../sandbox-permissions.rst:171 +#: ../../sandbox-permissions.rst:170 msgid "``xdg-music``" msgstr "" -#: ../../sandbox-permissions.rst:171 +#: ../../sandbox-permissions.rst:170 msgid "Access the XDG music directory" msgstr "" -#: ../../sandbox-permissions.rst:171 +#: ../../sandbox-permissions.rst:170 msgid "``$XDG_MUSIC_DIR`` or ``$HOME/Music``" msgstr "" -#: ../../sandbox-permissions.rst:172 +#: ../../sandbox-permissions.rst:171 msgid "``xdg-pictures``" msgstr "" -#: ../../sandbox-permissions.rst:172 +#: ../../sandbox-permissions.rst:171 msgid "Access the XDG pictures directory" msgstr "" -#: ../../sandbox-permissions.rst:172 +#: ../../sandbox-permissions.rst:171 msgid "``$XDG_PICTURES_DIR`` or ``$HOME/Pictures``" msgstr "" -#: ../../sandbox-permissions.rst:173 +#: ../../sandbox-permissions.rst:172 msgid "``xdg-public-share``" msgstr "" -#: ../../sandbox-permissions.rst:173 +#: ../../sandbox-permissions.rst:172 msgid "Access the XDG public directory" msgstr "" -#: ../../sandbox-permissions.rst:173 +#: ../../sandbox-permissions.rst:172 msgid "``$XDG_PUBLICSHARE_DIR`` or ``$HOME/Public``" msgstr "" -#: ../../sandbox-permissions.rst:174 +#: ../../sandbox-permissions.rst:173 msgid "``xdg-videos``" msgstr "" -#: ../../sandbox-permissions.rst:174 +#: ../../sandbox-permissions.rst:173 msgid "Access the XDG videos directory" msgstr "" -#: ../../sandbox-permissions.rst:174 +#: ../../sandbox-permissions.rst:173 msgid "``$XDG_VIDEOS_DIR`` or ``$HOME/Videos``" msgstr "" -#: ../../sandbox-permissions.rst:175 +#: ../../sandbox-permissions.rst:174 msgid "``xdg-templates``" msgstr "" -#: ../../sandbox-permissions.rst:175 +#: ../../sandbox-permissions.rst:174 msgid "Access the XDG templates directory" msgstr "" -#: ../../sandbox-permissions.rst:175 +#: ../../sandbox-permissions.rst:174 msgid "``$XDG_TEMPLATES_DIR`` or ``$HOME/Templates``" msgstr "" -#: ../../sandbox-permissions.rst:176 +#: ../../sandbox-permissions.rst:175 msgid "``xdg-config``" msgstr "" -#: ../../sandbox-permissions.rst:176 +#: ../../sandbox-permissions.rst:175 msgid "Access the XDG config directory [#f3]_" msgstr "" -#: ../../sandbox-permissions.rst:176 +#: ../../sandbox-permissions.rst:175 msgid "``$XDG_CONFIG_HOME`` or ``$HOME/.config``" msgstr "" -#: ../../sandbox-permissions.rst:177 +#: ../../sandbox-permissions.rst:176 msgid "``xdg-cache``" msgstr "" -#: ../../sandbox-permissions.rst:177 +#: ../../sandbox-permissions.rst:176 msgid "Access the XDG cache directory [#f3]_" msgstr "" -#: ../../sandbox-permissions.rst:177 +#: ../../sandbox-permissions.rst:176 msgid "``$XDG_CACHE_HOME`` or ``$HOME/.cache``" msgstr "" -#: ../../sandbox-permissions.rst:178 +#: ../../sandbox-permissions.rst:177 msgid "``xdg-data``" msgstr "" -#: ../../sandbox-permissions.rst:178 +#: ../../sandbox-permissions.rst:177 msgid "Access the XDG data directory [#f3]_" msgstr "" -#: ../../sandbox-permissions.rst:178 +#: ../../sandbox-permissions.rst:177 msgid "``$XDG_DATA_HOME`` or ``$HOME/.local/share``" msgstr "" -#: ../../sandbox-permissions.rst:179 +#: ../../sandbox-permissions.rst:178 msgid "``xdg-run/path``" msgstr "" -#: ../../sandbox-permissions.rst:179 +#: ../../sandbox-permissions.rst:178 msgid "Access subdirectories of the XDG runtime directory" msgstr "" -#: ../../sandbox-permissions.rst:179 +#: ../../sandbox-permissions.rst:178 msgid "``$XDG_RUNTIME_DIR/path`` (``/run/user/$UID/path``)" msgstr "" -#: ../../sandbox-permissions.rst:182 +#: ../../sandbox-permissions.rst:181 msgid "" "Except ``host, host-etc, host-os`` paths can be added to all the above " "filesystem options. For example, ``--filesystem=xdg-documents/path``." msgstr "" -#: ../../sandbox-permissions.rst:185 +#: ../../sandbox-permissions.rst:184 msgid "Other filesystem access guidelines include:" msgstr "" -#: ../../sandbox-permissions.rst:187 +#: ../../sandbox-permissions.rst:186 msgid "" "The ``--persist=DIR`` option can be used to map directories from the " "user's home directory into the sandbox filesystem. This only works if the" @@ -581,7 +580,7 @@ msgid "" "includes ``home``." msgstr "" -#: ../../sandbox-permissions.rst:192 +#: ../../sandbox-permissions.rst:191 msgid "" "For example, if an application hardcodes the directory ``~/.foo``, " "without any ``home`` access and no ``--persist`` the directory will be " @@ -592,48 +591,48 @@ msgid "" "``~/.var/app/$FLATPAK_ID/.foo`` which would otherwise be lost." msgstr "" -#: ../../sandbox-permissions.rst:200 +#: ../../sandbox-permissions.rst:199 msgid "A ``--persist=.`` will `persist` all directories." msgstr "" -#: ../../sandbox-permissions.rst:202 +#: ../../sandbox-permissions.rst:201 msgid "" "This does not support ``:create, :ro, :rw`` suffixes or special values " "like ``xdg-documents``. However, the directory will be created by flatpak" " if it doesn't already exist." msgstr "" -#: ../../sandbox-permissions.rst:206 +#: ../../sandbox-permissions.rst:205 msgid "" "This makes it possible to avoid configuring access to the entire home " "directory, and can be useful for applications that hardcode file paths in" " ``~/``." msgstr "" -#: ../../sandbox-permissions.rst:209 +#: ../../sandbox-permissions.rst:208 msgid "" "If an application uses ``$TMPDIR`` to contain lock files you may want to " "add a wrapper script that sets it to ``$XDG_RUNTIME_DIR/app/$FLATPAK_ID``" " (tmpfs) or ``/var/tmp`` (persistent on host)." msgstr "" -#: ../../sandbox-permissions.rst:213 +#: ../../sandbox-permissions.rst:212 msgid "" "Retaining and sharing configuration with non-Flatpak installations is to " "be avoided." msgstr "" -#: ../../sandbox-permissions.rst:217 +#: ../../sandbox-permissions.rst:216 msgid "Reserved Paths" msgstr "" -#: ../../sandbox-permissions.rst:219 +#: ../../sandbox-permissions.rst:218 msgid "" "The following paths and subpaths of them are reserved and asking access " "to them with ``--filesystem`` will have no effect::" msgstr "" -#: ../../sandbox-permissions.rst:224 +#: ../../sandbox-permissions.rst:223 msgid "" "The entire ``/run`` is not allowed and all subpaths of ``/run`` except " "``/run/flatpak, /run/host`` is allowed to be exposed via " @@ -641,44 +640,45 @@ msgid "" "``../run``, exposing it or a subpath of it, is not allowed." msgstr "" -#: ../../sandbox-permissions.rst:229 +#: ../../sandbox-permissions.rst:228 msgid "" "Additionally the following directories from host need to be explicitly " "requested with ``--filesystem`` and are not available with ``home, host, " "host-os, host-etc`` by default:" msgstr "" -#: ../../sandbox-permissions.rst:233 +#: ../../sandbox-permissions.rst:232 msgid "" "``~/.var/app`` - The app can access only its own directory in " "``~/.var/app/$FLATPAK_ID``" msgstr "" -#: ../../sandbox-permissions.rst:234 +#: ../../sandbox-permissions.rst:233 msgid "``$XDG_DATA_HOME/flatpak`` (``~/.local/share/flatpak``)" msgstr "" -#: ../../sandbox-permissions.rst:235 +#: ../../sandbox-permissions.rst:234 msgid "``/boot``" msgstr "" -#: ../../sandbox-permissions.rst:236 +#: ../../sandbox-permissions.rst:235 msgid "``/efi``" msgstr "" -#: ../../sandbox-permissions.rst:237 +#: ../../sandbox-permissions.rst:236 msgid "``/root``" msgstr "" -#: ../../sandbox-permissions.rst:238 +#: ../../sandbox-permissions.rst:237 msgid "``/sys``" msgstr "" -#: ../../sandbox-permissions.rst:239 +#: ../../sandbox-permissions.rst:238 msgid "``/tmp``" msgstr "" -#: ../../sandbox-permissions.rst:240 +#: ../../sandbox-permissions.rst:239 +#, python-brace-format msgid "" "``/var`` - Note that by default ``/var/{cache, config, data, tmp}`` " "inside the sandbox are the same as ``~/.var/app/$FLATPAK_ID/{cache, " @@ -687,96 +687,96 @@ msgid "" "available." msgstr "" -#: ../../sandbox-permissions.rst:244 +#: ../../sandbox-permissions.rst:243 msgid "``/var/lib/flatpak`` - ``/var`` does not give access to this." msgstr "" -#: ../../sandbox-permissions.rst:247 +#: ../../sandbox-permissions.rst:246 msgid "Device access" msgstr "" -#: ../../sandbox-permissions.rst:248 +#: ../../sandbox-permissions.rst:247 msgid "You can provide the following device permissions:" msgstr "" -#: ../../sandbox-permissions.rst:251 +#: ../../sandbox-permissions.rst:250 msgid "``dri``" msgstr "" -#: ../../sandbox-permissions.rst:251 +#: ../../sandbox-permissions.rst:250 msgid "Direct Rendering Interface. Necessary for GL." msgstr "" -#: ../../sandbox-permissions.rst:252 +#: ../../sandbox-permissions.rst:251 msgid "``kvm``" msgstr "" -#: ../../sandbox-permissions.rst:252 +#: ../../sandbox-permissions.rst:251 msgid "Kernel based Virtual Machine ``/dev/kvm``" msgstr "" -#: ../../sandbox-permissions.rst:253 +#: ../../sandbox-permissions.rst:252 msgid "``shm``" msgstr "" -#: ../../sandbox-permissions.rst:253 +#: ../../sandbox-permissions.rst:252 msgid "Shared Memory in ``/dev/shm``." msgstr "" -#: ../../sandbox-permissions.rst:254 +#: ../../sandbox-permissions.rst:253 msgid "``input``" msgstr "" -#: ../../sandbox-permissions.rst:254 +#: ../../sandbox-permissions.rst:253 msgid "" "Input devices as exposed in ``/dev/input``. This includes game " "controllers. Since Flatpak 1.15.6." msgstr "" -#: ../../sandbox-permissions.rst:255 +#: ../../sandbox-permissions.rst:254 msgid "``usb``" msgstr "" -#: ../../sandbox-permissions.rst:255 +#: ../../sandbox-permissions.rst:254 msgid "Raw USB devices as exposed in ``/dev/bus/usb``. Since Flatpak 1.15.11." msgstr "" -#: ../../sandbox-permissions.rst:256 +#: ../../sandbox-permissions.rst:255 msgid "``all``" msgstr "" -#: ../../sandbox-permissions.rst:256 +#: ../../sandbox-permissions.rst:255 msgid "All devices, including all of the above except ``shm``" msgstr "" -#: ../../sandbox-permissions.rst:261 +#: ../../sandbox-permissions.rst:260 msgid "" "Using newer permissions like ``input`` or ``usb`` will have no effect on " "older Flatpak versions and will fail when used through Flatpak " "commandline." msgstr "" -#: ../../sandbox-permissions.rst:265 +#: ../../sandbox-permissions.rst:264 msgid "" "While not ideal, ``--device=all`` can be used to access devices like " "webcams, CD/DVD drives etc." msgstr "" -#: ../../sandbox-permissions.rst:269 +#: ../../sandbox-permissions.rst:268 msgid "USB portal" msgstr "" -#: ../../sandbox-permissions.rst:271 +#: ../../sandbox-permissions.rst:270 msgid "Since 1.5.11." msgstr "" -#: ../../sandbox-permissions.rst:273 +#: ../../sandbox-permissions.rst:272 msgid "" "Sandboxed access to individual USB devices can be controlled by portals. " "Flatpak allows specifying enumerable USB devices to allow access." msgstr "" -#: ../../sandbox-permissions.rst:277 +#: ../../sandbox-permissions.rst:276 msgid "" "Like ``--device=usb``, this is just about accessing the raw USB device, " "that needs libusb (or equivalent). By using the portal, you can restrict " @@ -785,59 +785,59 @@ msgid "" "no reason for USB security devices to be accessible." msgstr "" -#: ../../sandbox-permissions.rst:284 +#: ../../sandbox-permissions.rst:283 msgid "" "A list of valid use cases includes scanners (handled, for example by " "SANE), photo cameras (handled by libgphoto2), flashing devices, etc." msgstr "" -#: ../../sandbox-permissions.rst:287 +#: ../../sandbox-permissions.rst:286 msgid "" "While this is portal dependent and ``xdg-desktop-portal`` is currently " "the only portal implementation, the overall permission flow is as " "follows:" msgstr "" -#: ../../sandbox-permissions.rst:291 +#: ../../sandbox-permissions.rst:290 msgid "" "The Flatpak package specifies the devices it wishes to enumerate through " "``finish-args``." msgstr "" -#: ../../sandbox-permissions.rst:293 +#: ../../sandbox-permissions.rst:292 msgid "" "The application requests the portal to enumerate the available USB " "devices based on that list. If the list is empty it will enumerate all " "USB devices." msgstr "" -#: ../../sandbox-permissions.rst:296 +#: ../../sandbox-permissions.rst:295 msgid "" "When the application wants to access the device, it will make a request " "for the device it wants to access via the portal." msgstr "" -#: ../../sandbox-permissions.rst:298 +#: ../../sandbox-permissions.rst:297 msgid "The portal then requests permission from the user if not already granted." msgstr "" -#: ../../sandbox-permissions.rst:300 +#: ../../sandbox-permissions.rst:299 msgid "" "If the permission was granted, a file descriptor for the device is passed" " back to the application." msgstr "" -#: ../../sandbox-permissions.rst:303 +#: ../../sandbox-permissions.rst:302 msgid "" "The application is then able to open the devices it is supposed to use " "while the others would be hidden." msgstr "" -#: ../../sandbox-permissions.rst:307 +#: ../../sandbox-permissions.rst:306 msgid "Specifying the enumerable devices" msgstr "" -#: ../../sandbox-permissions.rst:309 +#: ../../sandbox-permissions.rst:308 msgid "" "You can specify devices on the ``flatpak`` command line, and by extension" " in the finish arguments for Flatpak Builder. Enumerable devices are " @@ -848,17 +848,17 @@ msgid "" " shall not be enumerated." msgstr "" -#: ../../sandbox-permissions.rst:317 +#: ../../sandbox-permissions.rst:316 msgid "Queries are made out of rules. These rules are composable with ``+``." msgstr "" -#: ../../sandbox-permissions.rst:319 +#: ../../sandbox-permissions.rst:318 msgid "" "The rule ``all`` enumerates every USB device. There is no further rule " "allowed in the query." msgstr "" -#: ../../sandbox-permissions.rst:322 +#: ../../sandbox-permissions.rst:321 msgid "" "The ``vnd`` and ``dev`` rules specify a USB vendor and a USB device ID " "respectively. A vendor can be specified alone, but a device rule always " @@ -868,63 +868,63 @@ msgid "" "repository `_" msgstr "" -#: ../../sandbox-permissions.rst:329 +#: ../../sandbox-permissions.rst:328 msgid "" "``cls`` specifies the device USB class and subclass. Both class and " "subclass are two digit hex numbers separated by a colon ``:``. You can " "use ``*`` to specify any subclass within the class." msgstr "" -#: ../../sandbox-permissions.rst:333 +#: ../../sandbox-permissions.rst:332 msgid "Some examples of the syntax:" msgstr "" -#: ../../sandbox-permissions.rst:335 +#: ../../sandbox-permissions.rst:334 msgid "``vnd:1234``: Devices from vendor ``1234``" msgstr "" -#: ../../sandbox-permissions.rst:336 +#: ../../sandbox-permissions.rst:335 msgid "``vnd:1234+dev:3456``: Only device ``3456`` from vendor ``1234``." msgstr "" -#: ../../sandbox-permissions.rst:337 +#: ../../sandbox-permissions.rst:336 msgid "``vnd:1234+cls:06:*``: All the PTP devices from vendor ``1234``." msgstr "" -#: ../../sandbox-permissions.rst:338 +#: ../../sandbox-permissions.rst:337 msgid "``cls:06:*``: All the PTP devices." msgstr "" -#: ../../sandbox-permissions.rst:340 +#: ../../sandbox-permissions.rst:339 msgid "" "This permission only allows to enumerate devices. To open them, " "permission must be requested from the portal. It is not possible to open " "a device that is not enumerable." msgstr "" -#: ../../sandbox-permissions.rst:346 +#: ../../sandbox-permissions.rst:345 msgid "" "The ``--device=usb`` permission is broader than what the USB portal is " "supposed to provide and allows unfettered access to any USB device on the" " bus." msgstr "" -#: ../../sandbox-permissions.rst:350 +#: ../../sandbox-permissions.rst:349 msgid "In some situations you may need to specify a very long list of devices." msgstr "" -#: ../../sandbox-permissions.rst:352 +#: ../../sandbox-permissions.rst:351 msgid "Device lists can be passed in one single argument, or through a file." msgstr "" -#: ../../sandbox-permissions.rst:354 +#: ../../sandbox-permissions.rst:353 msgid "" "When using ``--usb-list``, the queries are separated by a semi-colon " "``;``, with queries for hidden devices (i.e. those that would be passed " "with ``--nousb``) prefixed with ``!``." msgstr "" -#: ../../sandbox-permissions.rst:358 +#: ../../sandbox-permissions.rst:357 msgid "" "When using ``--usb-list-file``, the filename of the file containing USB " "queries is passed line by line. Like with ``--usb-list`` queries for " @@ -934,24 +934,24 @@ msgid "" "list is persisted internally." msgstr "" -#: ../../sandbox-permissions.rst:366 +#: ../../sandbox-permissions.rst:365 msgid "dconf access" msgstr "" -#: ../../sandbox-permissions.rst:368 +#: ../../sandbox-permissions.rst:367 msgid "" "As of xdg-desktop-portal 1.1.0 and glib 2.60.5 (in the runtime) you do " "not need direct DConf access in most cases." msgstr "" -#: ../../sandbox-permissions.rst:371 +#: ../../sandbox-permissions.rst:370 msgid "" "As of now this glib version is included in " "``org.freedesktop.Platform//19.08`` and ``org.gnome.Platform//3.34`` and " "newer." msgstr "" -#: ../../sandbox-permissions.rst:374 +#: ../../sandbox-permissions.rst:373 msgid "" "If an application existed prior to these runtimes you can tell Flatpak " "(>= 1.3.4) to migrate the DConf settings on the host into the sandbox by " @@ -960,17 +960,17 @@ msgid "" " (case is ignored and ``_`` and ``-`` are treated equal)." msgstr "" -#: ../../sandbox-permissions.rst:381 +#: ../../sandbox-permissions.rst:380 msgid "" "If you are targeting older runtimes or require direct DConf access for " "other reasons you can use these permissions::" msgstr "" -#: ../../sandbox-permissions.rst:389 +#: ../../sandbox-permissions.rst:388 msgid "With those permissions glib will continue using dconf directly." msgstr "" -#: ../../sandbox-permissions.rst:391 +#: ../../sandbox-permissions.rst:390 msgid "" "If you use a newer runtime where dconf is no longer built and still need " "it you will have to build the `dconf " @@ -978,11 +978,11 @@ msgid "" "``--env=GIO_EXTRA_MODULES=/app/lib/gio/modules/``." msgstr "" -#: ../../sandbox-permissions.rst:396 +#: ../../sandbox-permissions.rst:395 msgid "gvfs access" msgstr "" -#: ../../sandbox-permissions.rst:398 +#: ../../sandbox-permissions.rst:397 msgid "" "As of gvfs 1.48, the gvfs daemons and applications use an on-disk socket " "to communicate, rather than an abstract socket so that the gvfs " @@ -990,47 +990,47 @@ msgid "" "application's sandbox." msgstr "" -#: ../../sandbox-permissions.rst:402 +#: ../../sandbox-permissions.rst:401 msgid "" "A number of different options need to be passed depending on the " "application's use of gvfs." msgstr "" -#: ../../sandbox-permissions.rst:405 +#: ../../sandbox-permissions.rst:404 msgid "" "``--talk-name=org.gtk.vfs.*`` is necessary to talk to the gvfs daemons " "over D-Bus and list mounts using the GIO APIs." msgstr "" -#: ../../sandbox-permissions.rst:408 +#: ../../sandbox-permissions.rst:407 msgid "" "``--filesystem=xdg-run/gvfsd`` is necessary to use the GIO APIs to list " "and access non-native files using the GIO APIs, using URLs rather than " "FUSE paths." msgstr "" -#: ../../sandbox-permissions.rst:411 +#: ../../sandbox-permissions.rst:410 msgid "" "``--filesystem=xdg-run/gvfs`` is necessary to give access to the FUSE " "mounts non-GIO and legacy applications can use. This is what will make " "native files appear under ``/run/user/`id -u`/gvfs/``." msgstr "" -#: ../../sandbox-permissions.rst:415 +#: ../../sandbox-permissions.rst:414 msgid "Typical GNOME and GTK applications should use::" msgstr "" -#: ../../sandbox-permissions.rst:420 +#: ../../sandbox-permissions.rst:419 msgid "Typical non-GNOME and non-GTK applications should use::" msgstr "" -#: ../../sandbox-permissions.rst:424 +#: ../../sandbox-permissions.rst:423 msgid "" "No application should be using ``--talk-name=org.gtk.vfs`` in its " "manifest, as there are no D-Bus services named ``org.gtk.vfs``." msgstr "" -#: ../../sandbox-permissions.rst:427 +#: ../../sandbox-permissions.rst:426 msgid "" "These permission grants the app, the ability to communicate with the gvfs" " daemon and backends running on host. Depending on the backends installed" @@ -1046,11 +1046,11 @@ msgid "" "host." msgstr "" -#: ../../sandbox-permissions.rst:441 +#: ../../sandbox-permissions.rst:440 msgid "External drive access" msgstr "" -#: ../../sandbox-permissions.rst:443 +#: ../../sandbox-permissions.rst:442 msgid "" "External drives are mounted by the host system using systemd, udev, udisk" " fstab etc. and each of them can have different defaults. Flatpak has no " @@ -1058,30 +1058,30 @@ msgid "" "permissions should work in most cases::" msgstr "" -#: ../../sandbox-permissions.rst:452 +#: ../../sandbox-permissions.rst:451 msgid "" "If ``--filesystem=host`` is used ``/media, /run/media`` is shared " "automatically if they exist." msgstr "" -#: ../../sandbox-permissions.rst:455 +#: ../../sandbox-permissions.rst:454 msgid "" "Note that these should not have subpaths in them unless the value of the " "subpath can be consistently pre-determined. Block device naming depends " "on the kernel/fstab configuration and cannot be pre-determined." msgstr "" -#: ../../sandbox-permissions.rst:460 +#: ../../sandbox-permissions.rst:459 msgid "Footnotes" msgstr "" -#: ../../sandbox-permissions.rst:461 +#: ../../sandbox-permissions.rst:460 msgid "" "This is not necessarily required, but without it the X11 shared memory " "extension will not work, which is very bad for X11 performance." msgstr "" -#: ../../sandbox-permissions.rst:463 +#: ../../sandbox-permissions.rst:462 msgid "" "Giving network access also grants access to all host services listening " "on abstract Unix sockets (due to how network namespaces work), and these " @@ -1090,7 +1090,8 @@ msgid "" "secure distribution should disable these and just use regular sockets." msgstr "" -#: ../../sandbox-permissions.rst:468 +#: ../../sandbox-permissions.rst:467 +#, python-brace-format msgid "" "``xdg-{cache, config, data}`` bind mounts the paths from host to the per-" "app sandbox directory. Inside the sandbox ``$XDG_CACHE_HOME``, " @@ -1366,3 +1367,9 @@ msgstr "" #~ "the specific D-Bus permissions needed." #~ msgstr "" +#~ msgid "" +#~ "Talk permissions can be freely used, " +#~ "although it is recommended to use " +#~ "the minimum required." +#~ msgstr "" + diff --git a/po/fr/LC_MESSAGES/sandbox-permissions.po b/po/fr/LC_MESSAGES/sandbox-permissions.po index 0902a183..79d27ccc 100644 --- a/po/fr/LC_MESSAGES/sandbox-permissions.po +++ b/po/fr/LC_MESSAGES/sandbox-permissions.po @@ -8,7 +8,7 @@ msgid "" msgstr "" "Project-Id-Version: Flatpak\n" "Report-Msgid-Bugs-To: \n" -"POT-Creation-Date: 2025-02-05 01:10+0530\n" +"POT-Creation-Date: 2025-02-21 08:22+0530\n" "PO-Revision-Date: 2018-05-20 10:37-0400\n" "Last-Translator: Copied by Zanata \n" "Language: fr\n" @@ -17,7 +17,7 @@ msgstr "" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=utf-8\n" "Content-Transfer-Encoding: 8bit\n" -"Generated-By: Babel 2.16.0\n" +"Generated-By: Babel 2.17.0\n" #: ../../sandbox-permissions.rst:2 msgid "Sandbox Permissions" @@ -294,286 +294,285 @@ msgid "**Talk**" msgstr "" #: ../../sandbox-permissions.rst:135 -msgid "" -"Talk permissions can be freely used, although it is recommended to use " -"the minimum required." +msgid "It is recommended to use the minimum required talk-name permissions." msgstr "" -#: ../../sandbox-permissions.rst:139 +#: ../../sandbox-permissions.rst:138 msgid "Filesystem access" msgstr "" -#: ../../sandbox-permissions.rst:141 +#: ../../sandbox-permissions.rst:140 msgid "" "As a general rule, static and permanent filesystem access should be " "limited as much as possible. This includes:" msgstr "" -#: ../../sandbox-permissions.rst:144 +#: ../../sandbox-permissions.rst:143 msgid "" "Using portals as an alternative to blanket filesystem access, wherever " "possible." msgstr "" -#: ../../sandbox-permissions.rst:146 +#: ../../sandbox-permissions.rst:145 msgid "Using read-only access wherever possible, using the ``:ro`` option." msgstr "" -#: ../../sandbox-permissions.rst:147 +#: ../../sandbox-permissions.rst:146 msgid "" "Using :ref:`conventions:XDG base directories` to store application's " "cache, config and state. Then no additional filesystem access would be " "required." msgstr "" -#: ../../sandbox-permissions.rst:150 +#: ../../sandbox-permissions.rst:149 msgid "" "Avoiding full home access and instead using XDG directories such as " "``xdg-music`` or ``xdg-download`` etc." msgstr "" -#: ../../sandbox-permissions.rst:153 +#: ../../sandbox-permissions.rst:152 msgid "The following permission options are available:" msgstr "" -#: ../../sandbox-permissions.rst:155 +#: ../../sandbox-permissions.rst:154 msgid "``:ro`` - read-only access" msgstr "" -#: ../../sandbox-permissions.rst:156 +#: ../../sandbox-permissions.rst:155 msgid "" "``:create`` - read/write access, and create the directory if it doesn't " "exist" msgstr "" -#: ../../sandbox-permissions.rst:159 +#: ../../sandbox-permissions.rst:158 msgid "Additionally the following permissions are available:" msgstr "" -#: ../../sandbox-permissions.rst:162 +#: ../../sandbox-permissions.rst:161 msgid "``host``" msgstr "" -#: ../../sandbox-permissions.rst:162 +#: ../../sandbox-permissions.rst:161 msgid "" "Access to ``/home, /media, /opt, /run/media, /srv`` and everything " "provided by ``host-os, host-etc`` mounted in ``/run/host``" msgstr "" -#: ../../sandbox-permissions.rst:162 ../../sandbox-permissions.rst:166 -#: ../../sandbox-permissions.rst:167 +#: ../../sandbox-permissions.rst:161 ../../sandbox-permissions.rst:165 +#: ../../sandbox-permissions.rst:166 msgid "Includes any subpaths" msgstr "" -#: ../../sandbox-permissions.rst:163 +#: ../../sandbox-permissions.rst:162 msgid "``host-etc``" msgstr "" -#: ../../sandbox-permissions.rst:163 +#: ../../sandbox-permissions.rst:162 msgid "Host's ``/etc``" msgstr "" -#: ../../sandbox-permissions.rst:163 +#: ../../sandbox-permissions.rst:162 msgid "Host's ``/etc`` is mounted at ``/run/host/etc``" msgstr "" -#: ../../sandbox-permissions.rst:164 +#: ../../sandbox-permissions.rst:163 msgid "``host-os``" msgstr "" -#: ../../sandbox-permissions.rst:164 +#: ../../sandbox-permissions.rst:163 +#, python-brace-format msgid "" "Host's ``/usr, /bin, /sbin, /lib{32, 64}, /etc/ld.so.cache, " "/etc/alternatives``" msgstr "" -#: ../../sandbox-permissions.rst:164 +#: ../../sandbox-permissions.rst:163 msgid "Mounted at ``/run/host``" msgstr "" -#: ../../sandbox-permissions.rst:165 +#: ../../sandbox-permissions.rst:164 msgid "``home``" msgstr "" -#: ../../sandbox-permissions.rst:165 +#: ../../sandbox-permissions.rst:164 msgid "Access the home directory" msgstr "" -#: ../../sandbox-permissions.rst:165 +#: ../../sandbox-permissions.rst:164 msgid "Except ``~/.var/app``" msgstr "" -#: ../../sandbox-permissions.rst:166 +#: ../../sandbox-permissions.rst:165 msgid "``/some/dir``" msgstr "" -#: ../../sandbox-permissions.rst:166 +#: ../../sandbox-permissions.rst:165 msgid "Access an arbitrary path except any reserved path" msgstr "" -#: ../../sandbox-permissions.rst:167 +#: ../../sandbox-permissions.rst:166 msgid "``~/some/dir``" msgstr "" -#: ../../sandbox-permissions.rst:167 +#: ../../sandbox-permissions.rst:166 msgid "Arbitrary path relative to the home directory" msgstr "" -#: ../../sandbox-permissions.rst:168 +#: ../../sandbox-permissions.rst:167 msgid "``xdg-desktop``" msgstr "" -#: ../../sandbox-permissions.rst:168 +#: ../../sandbox-permissions.rst:167 msgid "Access the XDG desktop directory" msgstr "" -#: ../../sandbox-permissions.rst:168 +#: ../../sandbox-permissions.rst:167 msgid "``$XDG_DESKTOP_DIR`` or ``$HOME/Desktop``" msgstr "" -#: ../../sandbox-permissions.rst:169 +#: ../../sandbox-permissions.rst:168 msgid "``xdg-documents``" msgstr "" -#: ../../sandbox-permissions.rst:169 +#: ../../sandbox-permissions.rst:168 msgid "Access the XDG documents directory" msgstr "" -#: ../../sandbox-permissions.rst:169 +#: ../../sandbox-permissions.rst:168 msgid "``$XDG_DOCUMENTS_DIR`` or ``$HOME/Documents``" msgstr "" -#: ../../sandbox-permissions.rst:170 +#: ../../sandbox-permissions.rst:169 msgid "``xdg-download``" msgstr "" -#: ../../sandbox-permissions.rst:170 +#: ../../sandbox-permissions.rst:169 msgid "Access the XDG download directory" msgstr "" -#: ../../sandbox-permissions.rst:170 +#: ../../sandbox-permissions.rst:169 msgid "``$XDG_DOWNLOAD_DIR`` or ``$HOME/Downloads``" msgstr "" -#: ../../sandbox-permissions.rst:171 +#: ../../sandbox-permissions.rst:170 msgid "``xdg-music``" msgstr "" -#: ../../sandbox-permissions.rst:171 +#: ../../sandbox-permissions.rst:170 msgid "Access the XDG music directory" msgstr "" -#: ../../sandbox-permissions.rst:171 +#: ../../sandbox-permissions.rst:170 msgid "``$XDG_MUSIC_DIR`` or ``$HOME/Music``" msgstr "" -#: ../../sandbox-permissions.rst:172 +#: ../../sandbox-permissions.rst:171 msgid "``xdg-pictures``" msgstr "" -#: ../../sandbox-permissions.rst:172 +#: ../../sandbox-permissions.rst:171 msgid "Access the XDG pictures directory" msgstr "" -#: ../../sandbox-permissions.rst:172 +#: ../../sandbox-permissions.rst:171 msgid "``$XDG_PICTURES_DIR`` or ``$HOME/Pictures``" msgstr "" -#: ../../sandbox-permissions.rst:173 +#: ../../sandbox-permissions.rst:172 msgid "``xdg-public-share``" msgstr "" -#: ../../sandbox-permissions.rst:173 +#: ../../sandbox-permissions.rst:172 msgid "Access the XDG public directory" msgstr "" -#: ../../sandbox-permissions.rst:173 +#: ../../sandbox-permissions.rst:172 msgid "``$XDG_PUBLICSHARE_DIR`` or ``$HOME/Public``" msgstr "" -#: ../../sandbox-permissions.rst:174 +#: ../../sandbox-permissions.rst:173 msgid "``xdg-videos``" msgstr "" -#: ../../sandbox-permissions.rst:174 +#: ../../sandbox-permissions.rst:173 msgid "Access the XDG videos directory" msgstr "" -#: ../../sandbox-permissions.rst:174 +#: ../../sandbox-permissions.rst:173 msgid "``$XDG_VIDEOS_DIR`` or ``$HOME/Videos``" msgstr "" -#: ../../sandbox-permissions.rst:175 +#: ../../sandbox-permissions.rst:174 msgid "``xdg-templates``" msgstr "" -#: ../../sandbox-permissions.rst:175 +#: ../../sandbox-permissions.rst:174 msgid "Access the XDG templates directory" msgstr "" -#: ../../sandbox-permissions.rst:175 +#: ../../sandbox-permissions.rst:174 msgid "``$XDG_TEMPLATES_DIR`` or ``$HOME/Templates``" msgstr "" -#: ../../sandbox-permissions.rst:176 +#: ../../sandbox-permissions.rst:175 msgid "``xdg-config``" msgstr "" -#: ../../sandbox-permissions.rst:176 +#: ../../sandbox-permissions.rst:175 msgid "Access the XDG config directory [#f3]_" msgstr "" -#: ../../sandbox-permissions.rst:176 +#: ../../sandbox-permissions.rst:175 msgid "``$XDG_CONFIG_HOME`` or ``$HOME/.config``" msgstr "" -#: ../../sandbox-permissions.rst:177 +#: ../../sandbox-permissions.rst:176 msgid "``xdg-cache``" msgstr "" -#: ../../sandbox-permissions.rst:177 +#: ../../sandbox-permissions.rst:176 msgid "Access the XDG cache directory [#f3]_" msgstr "" -#: ../../sandbox-permissions.rst:177 +#: ../../sandbox-permissions.rst:176 msgid "``$XDG_CACHE_HOME`` or ``$HOME/.cache``" msgstr "" -#: ../../sandbox-permissions.rst:178 +#: ../../sandbox-permissions.rst:177 msgid "``xdg-data``" msgstr "" -#: ../../sandbox-permissions.rst:178 +#: ../../sandbox-permissions.rst:177 msgid "Access the XDG data directory [#f3]_" msgstr "" -#: ../../sandbox-permissions.rst:178 +#: ../../sandbox-permissions.rst:177 msgid "``$XDG_DATA_HOME`` or ``$HOME/.local/share``" msgstr "" -#: ../../sandbox-permissions.rst:179 +#: ../../sandbox-permissions.rst:178 msgid "``xdg-run/path``" msgstr "" -#: ../../sandbox-permissions.rst:179 +#: ../../sandbox-permissions.rst:178 msgid "Access subdirectories of the XDG runtime directory" msgstr "" -#: ../../sandbox-permissions.rst:179 +#: ../../sandbox-permissions.rst:178 msgid "``$XDG_RUNTIME_DIR/path`` (``/run/user/$UID/path``)" msgstr "" -#: ../../sandbox-permissions.rst:182 +#: ../../sandbox-permissions.rst:181 msgid "" "Except ``host, host-etc, host-os`` paths can be added to all the above " "filesystem options. For example, ``--filesystem=xdg-documents/path``." msgstr "" -#: ../../sandbox-permissions.rst:185 +#: ../../sandbox-permissions.rst:184 msgid "Other filesystem access guidelines include:" msgstr "" -#: ../../sandbox-permissions.rst:187 +#: ../../sandbox-permissions.rst:186 msgid "" "The ``--persist=DIR`` option can be used to map directories from the " "user's home directory into the sandbox filesystem. This only works if the" @@ -581,7 +580,7 @@ msgid "" "includes ``home``." msgstr "" -#: ../../sandbox-permissions.rst:192 +#: ../../sandbox-permissions.rst:191 msgid "" "For example, if an application hardcodes the directory ``~/.foo``, " "without any ``home`` access and no ``--persist`` the directory will be " @@ -592,48 +591,48 @@ msgid "" "``~/.var/app/$FLATPAK_ID/.foo`` which would otherwise be lost." msgstr "" -#: ../../sandbox-permissions.rst:200 +#: ../../sandbox-permissions.rst:199 msgid "A ``--persist=.`` will `persist` all directories." msgstr "" -#: ../../sandbox-permissions.rst:202 +#: ../../sandbox-permissions.rst:201 msgid "" "This does not support ``:create, :ro, :rw`` suffixes or special values " "like ``xdg-documents``. However, the directory will be created by flatpak" " if it doesn't already exist." msgstr "" -#: ../../sandbox-permissions.rst:206 +#: ../../sandbox-permissions.rst:205 msgid "" "This makes it possible to avoid configuring access to the entire home " "directory, and can be useful for applications that hardcode file paths in" " ``~/``." msgstr "" -#: ../../sandbox-permissions.rst:209 +#: ../../sandbox-permissions.rst:208 msgid "" "If an application uses ``$TMPDIR`` to contain lock files you may want to " "add a wrapper script that sets it to ``$XDG_RUNTIME_DIR/app/$FLATPAK_ID``" " (tmpfs) or ``/var/tmp`` (persistent on host)." msgstr "" -#: ../../sandbox-permissions.rst:213 +#: ../../sandbox-permissions.rst:212 msgid "" "Retaining and sharing configuration with non-Flatpak installations is to " "be avoided." msgstr "" -#: ../../sandbox-permissions.rst:217 +#: ../../sandbox-permissions.rst:216 msgid "Reserved Paths" msgstr "" -#: ../../sandbox-permissions.rst:219 +#: ../../sandbox-permissions.rst:218 msgid "" "The following paths and subpaths of them are reserved and asking access " "to them with ``--filesystem`` will have no effect::" msgstr "" -#: ../../sandbox-permissions.rst:224 +#: ../../sandbox-permissions.rst:223 msgid "" "The entire ``/run`` is not allowed and all subpaths of ``/run`` except " "``/run/flatpak, /run/host`` is allowed to be exposed via " @@ -641,44 +640,45 @@ msgid "" "``../run``, exposing it or a subpath of it, is not allowed." msgstr "" -#: ../../sandbox-permissions.rst:229 +#: ../../sandbox-permissions.rst:228 msgid "" "Additionally the following directories from host need to be explicitly " "requested with ``--filesystem`` and are not available with ``home, host, " "host-os, host-etc`` by default:" msgstr "" -#: ../../sandbox-permissions.rst:233 +#: ../../sandbox-permissions.rst:232 msgid "" "``~/.var/app`` - The app can access only its own directory in " "``~/.var/app/$FLATPAK_ID``" msgstr "" -#: ../../sandbox-permissions.rst:234 +#: ../../sandbox-permissions.rst:233 msgid "``$XDG_DATA_HOME/flatpak`` (``~/.local/share/flatpak``)" msgstr "" -#: ../../sandbox-permissions.rst:235 +#: ../../sandbox-permissions.rst:234 msgid "``/boot``" msgstr "" -#: ../../sandbox-permissions.rst:236 +#: ../../sandbox-permissions.rst:235 msgid "``/efi``" msgstr "" -#: ../../sandbox-permissions.rst:237 +#: ../../sandbox-permissions.rst:236 msgid "``/root``" msgstr "" -#: ../../sandbox-permissions.rst:238 +#: ../../sandbox-permissions.rst:237 msgid "``/sys``" msgstr "" -#: ../../sandbox-permissions.rst:239 +#: ../../sandbox-permissions.rst:238 msgid "``/tmp``" msgstr "" -#: ../../sandbox-permissions.rst:240 +#: ../../sandbox-permissions.rst:239 +#, python-brace-format msgid "" "``/var`` - Note that by default ``/var/{cache, config, data, tmp}`` " "inside the sandbox are the same as ``~/.var/app/$FLATPAK_ID/{cache, " @@ -687,96 +687,96 @@ msgid "" "available." msgstr "" -#: ../../sandbox-permissions.rst:244 +#: ../../sandbox-permissions.rst:243 msgid "``/var/lib/flatpak`` - ``/var`` does not give access to this." msgstr "" -#: ../../sandbox-permissions.rst:247 +#: ../../sandbox-permissions.rst:246 msgid "Device access" msgstr "" -#: ../../sandbox-permissions.rst:248 +#: ../../sandbox-permissions.rst:247 msgid "You can provide the following device permissions:" msgstr "" -#: ../../sandbox-permissions.rst:251 +#: ../../sandbox-permissions.rst:250 msgid "``dri``" msgstr "" -#: ../../sandbox-permissions.rst:251 +#: ../../sandbox-permissions.rst:250 msgid "Direct Rendering Interface. Necessary for GL." msgstr "" -#: ../../sandbox-permissions.rst:252 +#: ../../sandbox-permissions.rst:251 msgid "``kvm``" msgstr "" -#: ../../sandbox-permissions.rst:252 +#: ../../sandbox-permissions.rst:251 msgid "Kernel based Virtual Machine ``/dev/kvm``" msgstr "" -#: ../../sandbox-permissions.rst:253 +#: ../../sandbox-permissions.rst:252 msgid "``shm``" msgstr "" -#: ../../sandbox-permissions.rst:253 +#: ../../sandbox-permissions.rst:252 msgid "Shared Memory in ``/dev/shm``." msgstr "" -#: ../../sandbox-permissions.rst:254 +#: ../../sandbox-permissions.rst:253 msgid "``input``" msgstr "" -#: ../../sandbox-permissions.rst:254 +#: ../../sandbox-permissions.rst:253 msgid "" "Input devices as exposed in ``/dev/input``. This includes game " "controllers. Since Flatpak 1.15.6." msgstr "" -#: ../../sandbox-permissions.rst:255 +#: ../../sandbox-permissions.rst:254 msgid "``usb``" msgstr "" -#: ../../sandbox-permissions.rst:255 +#: ../../sandbox-permissions.rst:254 msgid "Raw USB devices as exposed in ``/dev/bus/usb``. Since Flatpak 1.15.11." msgstr "" -#: ../../sandbox-permissions.rst:256 +#: ../../sandbox-permissions.rst:255 msgid "``all``" msgstr "" -#: ../../sandbox-permissions.rst:256 +#: ../../sandbox-permissions.rst:255 msgid "All devices, including all of the above except ``shm``" msgstr "" -#: ../../sandbox-permissions.rst:261 +#: ../../sandbox-permissions.rst:260 msgid "" "Using newer permissions like ``input`` or ``usb`` will have no effect on " "older Flatpak versions and will fail when used through Flatpak " "commandline." msgstr "" -#: ../../sandbox-permissions.rst:265 +#: ../../sandbox-permissions.rst:264 msgid "" "While not ideal, ``--device=all`` can be used to access devices like " "webcams, CD/DVD drives etc." msgstr "" -#: ../../sandbox-permissions.rst:269 +#: ../../sandbox-permissions.rst:268 msgid "USB portal" msgstr "" -#: ../../sandbox-permissions.rst:271 +#: ../../sandbox-permissions.rst:270 msgid "Since 1.5.11." msgstr "" -#: ../../sandbox-permissions.rst:273 +#: ../../sandbox-permissions.rst:272 msgid "" "Sandboxed access to individual USB devices can be controlled by portals. " "Flatpak allows specifying enumerable USB devices to allow access." msgstr "" -#: ../../sandbox-permissions.rst:277 +#: ../../sandbox-permissions.rst:276 msgid "" "Like ``--device=usb``, this is just about accessing the raw USB device, " "that needs libusb (or equivalent). By using the portal, you can restrict " @@ -785,59 +785,59 @@ msgid "" "no reason for USB security devices to be accessible." msgstr "" -#: ../../sandbox-permissions.rst:284 +#: ../../sandbox-permissions.rst:283 msgid "" "A list of valid use cases includes scanners (handled, for example by " "SANE), photo cameras (handled by libgphoto2), flashing devices, etc." msgstr "" -#: ../../sandbox-permissions.rst:287 +#: ../../sandbox-permissions.rst:286 msgid "" "While this is portal dependent and ``xdg-desktop-portal`` is currently " "the only portal implementation, the overall permission flow is as " "follows:" msgstr "" -#: ../../sandbox-permissions.rst:291 +#: ../../sandbox-permissions.rst:290 msgid "" "The Flatpak package specifies the devices it wishes to enumerate through " "``finish-args``." msgstr "" -#: ../../sandbox-permissions.rst:293 +#: ../../sandbox-permissions.rst:292 msgid "" "The application requests the portal to enumerate the available USB " "devices based on that list. If the list is empty it will enumerate all " "USB devices." msgstr "" -#: ../../sandbox-permissions.rst:296 +#: ../../sandbox-permissions.rst:295 msgid "" "When the application wants to access the device, it will make a request " "for the device it wants to access via the portal." msgstr "" -#: ../../sandbox-permissions.rst:298 +#: ../../sandbox-permissions.rst:297 msgid "The portal then requests permission from the user if not already granted." msgstr "" -#: ../../sandbox-permissions.rst:300 +#: ../../sandbox-permissions.rst:299 msgid "" "If the permission was granted, a file descriptor for the device is passed" " back to the application." msgstr "" -#: ../../sandbox-permissions.rst:303 +#: ../../sandbox-permissions.rst:302 msgid "" "The application is then able to open the devices it is supposed to use " "while the others would be hidden." msgstr "" -#: ../../sandbox-permissions.rst:307 +#: ../../sandbox-permissions.rst:306 msgid "Specifying the enumerable devices" msgstr "" -#: ../../sandbox-permissions.rst:309 +#: ../../sandbox-permissions.rst:308 msgid "" "You can specify devices on the ``flatpak`` command line, and by extension" " in the finish arguments for Flatpak Builder. Enumerable devices are " @@ -848,17 +848,17 @@ msgid "" " shall not be enumerated." msgstr "" -#: ../../sandbox-permissions.rst:317 +#: ../../sandbox-permissions.rst:316 msgid "Queries are made out of rules. These rules are composable with ``+``." msgstr "" -#: ../../sandbox-permissions.rst:319 +#: ../../sandbox-permissions.rst:318 msgid "" "The rule ``all`` enumerates every USB device. There is no further rule " "allowed in the query." msgstr "" -#: ../../sandbox-permissions.rst:322 +#: ../../sandbox-permissions.rst:321 msgid "" "The ``vnd`` and ``dev`` rules specify a USB vendor and a USB device ID " "respectively. A vendor can be specified alone, but a device rule always " @@ -868,63 +868,63 @@ msgid "" "repository `_" msgstr "" -#: ../../sandbox-permissions.rst:329 +#: ../../sandbox-permissions.rst:328 msgid "" "``cls`` specifies the device USB class and subclass. Both class and " "subclass are two digit hex numbers separated by a colon ``:``. You can " "use ``*`` to specify any subclass within the class." msgstr "" -#: ../../sandbox-permissions.rst:333 +#: ../../sandbox-permissions.rst:332 msgid "Some examples of the syntax:" msgstr "" -#: ../../sandbox-permissions.rst:335 +#: ../../sandbox-permissions.rst:334 msgid "``vnd:1234``: Devices from vendor ``1234``" msgstr "" -#: ../../sandbox-permissions.rst:336 +#: ../../sandbox-permissions.rst:335 msgid "``vnd:1234+dev:3456``: Only device ``3456`` from vendor ``1234``." msgstr "" -#: ../../sandbox-permissions.rst:337 +#: ../../sandbox-permissions.rst:336 msgid "``vnd:1234+cls:06:*``: All the PTP devices from vendor ``1234``." msgstr "" -#: ../../sandbox-permissions.rst:338 +#: ../../sandbox-permissions.rst:337 msgid "``cls:06:*``: All the PTP devices." msgstr "" -#: ../../sandbox-permissions.rst:340 +#: ../../sandbox-permissions.rst:339 msgid "" "This permission only allows to enumerate devices. To open them, " "permission must be requested from the portal. It is not possible to open " "a device that is not enumerable." msgstr "" -#: ../../sandbox-permissions.rst:346 +#: ../../sandbox-permissions.rst:345 msgid "" "The ``--device=usb`` permission is broader than what the USB portal is " "supposed to provide and allows unfettered access to any USB device on the" " bus." msgstr "" -#: ../../sandbox-permissions.rst:350 +#: ../../sandbox-permissions.rst:349 msgid "In some situations you may need to specify a very long list of devices." msgstr "" -#: ../../sandbox-permissions.rst:352 +#: ../../sandbox-permissions.rst:351 msgid "Device lists can be passed in one single argument, or through a file." msgstr "" -#: ../../sandbox-permissions.rst:354 +#: ../../sandbox-permissions.rst:353 msgid "" "When using ``--usb-list``, the queries are separated by a semi-colon " "``;``, with queries for hidden devices (i.e. those that would be passed " "with ``--nousb``) prefixed with ``!``." msgstr "" -#: ../../sandbox-permissions.rst:358 +#: ../../sandbox-permissions.rst:357 msgid "" "When using ``--usb-list-file``, the filename of the file containing USB " "queries is passed line by line. Like with ``--usb-list`` queries for " @@ -934,24 +934,24 @@ msgid "" "list is persisted internally." msgstr "" -#: ../../sandbox-permissions.rst:366 +#: ../../sandbox-permissions.rst:365 msgid "dconf access" msgstr "" -#: ../../sandbox-permissions.rst:368 +#: ../../sandbox-permissions.rst:367 msgid "" "As of xdg-desktop-portal 1.1.0 and glib 2.60.5 (in the runtime) you do " "not need direct DConf access in most cases." msgstr "" -#: ../../sandbox-permissions.rst:371 +#: ../../sandbox-permissions.rst:370 msgid "" "As of now this glib version is included in " "``org.freedesktop.Platform//19.08`` and ``org.gnome.Platform//3.34`` and " "newer." msgstr "" -#: ../../sandbox-permissions.rst:374 +#: ../../sandbox-permissions.rst:373 msgid "" "If an application existed prior to these runtimes you can tell Flatpak " "(>= 1.3.4) to migrate the DConf settings on the host into the sandbox by " @@ -960,17 +960,17 @@ msgid "" " (case is ignored and ``_`` and ``-`` are treated equal)." msgstr "" -#: ../../sandbox-permissions.rst:381 +#: ../../sandbox-permissions.rst:380 msgid "" "If you are targeting older runtimes or require direct DConf access for " "other reasons you can use these permissions::" msgstr "" -#: ../../sandbox-permissions.rst:389 +#: ../../sandbox-permissions.rst:388 msgid "With those permissions glib will continue using dconf directly." msgstr "" -#: ../../sandbox-permissions.rst:391 +#: ../../sandbox-permissions.rst:390 msgid "" "If you use a newer runtime where dconf is no longer built and still need " "it you will have to build the `dconf " @@ -978,11 +978,11 @@ msgid "" "``--env=GIO_EXTRA_MODULES=/app/lib/gio/modules/``." msgstr "" -#: ../../sandbox-permissions.rst:396 +#: ../../sandbox-permissions.rst:395 msgid "gvfs access" msgstr "" -#: ../../sandbox-permissions.rst:398 +#: ../../sandbox-permissions.rst:397 msgid "" "As of gvfs 1.48, the gvfs daemons and applications use an on-disk socket " "to communicate, rather than an abstract socket so that the gvfs " @@ -990,47 +990,47 @@ msgid "" "application's sandbox." msgstr "" -#: ../../sandbox-permissions.rst:402 +#: ../../sandbox-permissions.rst:401 msgid "" "A number of different options need to be passed depending on the " "application's use of gvfs." msgstr "" -#: ../../sandbox-permissions.rst:405 +#: ../../sandbox-permissions.rst:404 msgid "" "``--talk-name=org.gtk.vfs.*`` is necessary to talk to the gvfs daemons " "over D-Bus and list mounts using the GIO APIs." msgstr "" -#: ../../sandbox-permissions.rst:408 +#: ../../sandbox-permissions.rst:407 msgid "" "``--filesystem=xdg-run/gvfsd`` is necessary to use the GIO APIs to list " "and access non-native files using the GIO APIs, using URLs rather than " "FUSE paths." msgstr "" -#: ../../sandbox-permissions.rst:411 +#: ../../sandbox-permissions.rst:410 msgid "" "``--filesystem=xdg-run/gvfs`` is necessary to give access to the FUSE " "mounts non-GIO and legacy applications can use. This is what will make " "native files appear under ``/run/user/`id -u`/gvfs/``." msgstr "" -#: ../../sandbox-permissions.rst:415 +#: ../../sandbox-permissions.rst:414 msgid "Typical GNOME and GTK applications should use::" msgstr "" -#: ../../sandbox-permissions.rst:420 +#: ../../sandbox-permissions.rst:419 msgid "Typical non-GNOME and non-GTK applications should use::" msgstr "" -#: ../../sandbox-permissions.rst:424 +#: ../../sandbox-permissions.rst:423 msgid "" "No application should be using ``--talk-name=org.gtk.vfs`` in its " "manifest, as there are no D-Bus services named ``org.gtk.vfs``." msgstr "" -#: ../../sandbox-permissions.rst:427 +#: ../../sandbox-permissions.rst:426 msgid "" "These permission grants the app, the ability to communicate with the gvfs" " daemon and backends running on host. Depending on the backends installed" @@ -1046,11 +1046,11 @@ msgid "" "host." msgstr "" -#: ../../sandbox-permissions.rst:441 +#: ../../sandbox-permissions.rst:440 msgid "External drive access" msgstr "" -#: ../../sandbox-permissions.rst:443 +#: ../../sandbox-permissions.rst:442 msgid "" "External drives are mounted by the host system using systemd, udev, udisk" " fstab etc. and each of them can have different defaults. Flatpak has no " @@ -1058,30 +1058,30 @@ msgid "" "permissions should work in most cases::" msgstr "" -#: ../../sandbox-permissions.rst:452 +#: ../../sandbox-permissions.rst:451 msgid "" "If ``--filesystem=host`` is used ``/media, /run/media`` is shared " "automatically if they exist." msgstr "" -#: ../../sandbox-permissions.rst:455 +#: ../../sandbox-permissions.rst:454 msgid "" "Note that these should not have subpaths in them unless the value of the " "subpath can be consistently pre-determined. Block device naming depends " "on the kernel/fstab configuration and cannot be pre-determined." msgstr "" -#: ../../sandbox-permissions.rst:460 +#: ../../sandbox-permissions.rst:459 msgid "Footnotes" msgstr "" -#: ../../sandbox-permissions.rst:461 +#: ../../sandbox-permissions.rst:460 msgid "" "This is not necessarily required, but without it the X11 shared memory " "extension will not work, which is very bad for X11 performance." msgstr "" -#: ../../sandbox-permissions.rst:463 +#: ../../sandbox-permissions.rst:462 msgid "" "Giving network access also grants access to all host services listening " "on abstract Unix sockets (due to how network namespaces work), and these " @@ -1090,7 +1090,8 @@ msgid "" "secure distribution should disable these and just use regular sockets." msgstr "" -#: ../../sandbox-permissions.rst:468 +#: ../../sandbox-permissions.rst:467 +#, python-brace-format msgid "" "``xdg-{cache, config, data}`` bind mounts the paths from host to the per-" "app sandbox directory. Inside the sandbox ``$XDG_CACHE_HOME``, " @@ -1366,3 +1367,9 @@ msgstr "" #~ "the specific D-Bus permissions needed." #~ msgstr "" +#~ msgid "" +#~ "Talk permissions can be freely used, " +#~ "although it is recommended to use " +#~ "the minimum required." +#~ msgstr "" + diff --git a/po/ko/LC_MESSAGES/sandbox-permissions.po b/po/ko/LC_MESSAGES/sandbox-permissions.po index 28728e24..b5ad91c3 100644 --- a/po/ko/LC_MESSAGES/sandbox-permissions.po +++ b/po/ko/LC_MESSAGES/sandbox-permissions.po @@ -8,7 +8,7 @@ msgid "" msgstr "" "Project-Id-Version: Flatpak\n" "Report-Msgid-Bugs-To: \n" -"POT-Creation-Date: 2025-02-05 01:10+0530\n" +"POT-Creation-Date: 2025-02-21 08:22+0530\n" "PO-Revision-Date: 2018-05-20 10:37-0400\n" "Last-Translator: Copied by Zanata \n" "Language: ko\n" @@ -17,7 +17,7 @@ msgstr "" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=utf-8\n" "Content-Transfer-Encoding: 8bit\n" -"Generated-By: Babel 2.16.0\n" +"Generated-By: Babel 2.17.0\n" #: ../../sandbox-permissions.rst:2 msgid "Sandbox Permissions" @@ -300,287 +300,286 @@ msgid "**Talk**" msgstr "" #: ../../sandbox-permissions.rst:135 -msgid "" -"Talk permissions can be freely used, although it is recommended to use " -"the minimum required." +msgid "It is recommended to use the minimum required talk-name permissions." msgstr "" -#: ../../sandbox-permissions.rst:139 +#: ../../sandbox-permissions.rst:138 msgid "Filesystem access" msgstr "" -#: ../../sandbox-permissions.rst:141 +#: ../../sandbox-permissions.rst:140 msgid "" "As a general rule, static and permanent filesystem access should be " "limited as much as possible. This includes:" msgstr "" -#: ../../sandbox-permissions.rst:144 +#: ../../sandbox-permissions.rst:143 msgid "" "Using portals as an alternative to blanket filesystem access, wherever " "possible." msgstr "" -#: ../../sandbox-permissions.rst:146 +#: ../../sandbox-permissions.rst:145 msgid "Using read-only access wherever possible, using the ``:ro`` option." msgstr "" -#: ../../sandbox-permissions.rst:147 +#: ../../sandbox-permissions.rst:146 msgid "" "Using :ref:`conventions:XDG base directories` to store application's " "cache, config and state. Then no additional filesystem access would be " "required." msgstr "" -#: ../../sandbox-permissions.rst:150 +#: ../../sandbox-permissions.rst:149 msgid "" "Avoiding full home access and instead using XDG directories such as " "``xdg-music`` or ``xdg-download`` etc." msgstr "" -#: ../../sandbox-permissions.rst:153 +#: ../../sandbox-permissions.rst:152 msgid "The following permission options are available:" msgstr "" -#: ../../sandbox-permissions.rst:155 +#: ../../sandbox-permissions.rst:154 msgid "``:ro`` - read-only access" msgstr "" -#: ../../sandbox-permissions.rst:156 +#: ../../sandbox-permissions.rst:155 msgid "" "``:create`` - read/write access, and create the directory if it doesn't " "exist" msgstr "" -#: ../../sandbox-permissions.rst:159 +#: ../../sandbox-permissions.rst:158 msgid "Additionally the following permissions are available:" msgstr "" -#: ../../sandbox-permissions.rst:162 +#: ../../sandbox-permissions.rst:161 msgid "``host``" msgstr "" -#: ../../sandbox-permissions.rst:162 +#: ../../sandbox-permissions.rst:161 msgid "" "Access to ``/home, /media, /opt, /run/media, /srv`` and everything " "provided by ``host-os, host-etc`` mounted in ``/run/host``" msgstr "" -#: ../../sandbox-permissions.rst:162 ../../sandbox-permissions.rst:166 -#: ../../sandbox-permissions.rst:167 +#: ../../sandbox-permissions.rst:161 ../../sandbox-permissions.rst:165 +#: ../../sandbox-permissions.rst:166 msgid "Includes any subpaths" msgstr "" -#: ../../sandbox-permissions.rst:163 +#: ../../sandbox-permissions.rst:162 msgid "``host-etc``" msgstr "" -#: ../../sandbox-permissions.rst:163 +#: ../../sandbox-permissions.rst:162 msgid "Host's ``/etc``" msgstr "" -#: ../../sandbox-permissions.rst:163 +#: ../../sandbox-permissions.rst:162 msgid "Host's ``/etc`` is mounted at ``/run/host/etc``" msgstr "" -#: ../../sandbox-permissions.rst:164 +#: ../../sandbox-permissions.rst:163 msgid "``host-os``" msgstr "" -#: ../../sandbox-permissions.rst:164 +#: ../../sandbox-permissions.rst:163 +#, python-brace-format msgid "" "Host's ``/usr, /bin, /sbin, /lib{32, 64}, /etc/ld.so.cache, " "/etc/alternatives``" msgstr "" -#: ../../sandbox-permissions.rst:164 +#: ../../sandbox-permissions.rst:163 msgid "Mounted at ``/run/host``" msgstr "" -#: ../../sandbox-permissions.rst:165 +#: ../../sandbox-permissions.rst:164 msgid "``home``" msgstr "" -#: ../../sandbox-permissions.rst:165 +#: ../../sandbox-permissions.rst:164 #, fuzzy msgid "Access the home directory" msgstr "네트워크 [#f2]_ 접근" -#: ../../sandbox-permissions.rst:165 +#: ../../sandbox-permissions.rst:164 msgid "Except ``~/.var/app``" msgstr "" -#: ../../sandbox-permissions.rst:166 +#: ../../sandbox-permissions.rst:165 msgid "``/some/dir``" msgstr "" -#: ../../sandbox-permissions.rst:166 +#: ../../sandbox-permissions.rst:165 msgid "Access an arbitrary path except any reserved path" msgstr "" -#: ../../sandbox-permissions.rst:167 +#: ../../sandbox-permissions.rst:166 msgid "``~/some/dir``" msgstr "" -#: ../../sandbox-permissions.rst:167 +#: ../../sandbox-permissions.rst:166 msgid "Arbitrary path relative to the home directory" msgstr "" -#: ../../sandbox-permissions.rst:168 +#: ../../sandbox-permissions.rst:167 msgid "``xdg-desktop``" msgstr "" -#: ../../sandbox-permissions.rst:168 +#: ../../sandbox-permissions.rst:167 msgid "Access the XDG desktop directory" msgstr "" -#: ../../sandbox-permissions.rst:168 +#: ../../sandbox-permissions.rst:167 msgid "``$XDG_DESKTOP_DIR`` or ``$HOME/Desktop``" msgstr "" -#: ../../sandbox-permissions.rst:169 +#: ../../sandbox-permissions.rst:168 msgid "``xdg-documents``" msgstr "" -#: ../../sandbox-permissions.rst:169 +#: ../../sandbox-permissions.rst:168 msgid "Access the XDG documents directory" msgstr "" -#: ../../sandbox-permissions.rst:169 +#: ../../sandbox-permissions.rst:168 msgid "``$XDG_DOCUMENTS_DIR`` or ``$HOME/Documents``" msgstr "" -#: ../../sandbox-permissions.rst:170 +#: ../../sandbox-permissions.rst:169 msgid "``xdg-download``" msgstr "" -#: ../../sandbox-permissions.rst:170 +#: ../../sandbox-permissions.rst:169 msgid "Access the XDG download directory" msgstr "" -#: ../../sandbox-permissions.rst:170 +#: ../../sandbox-permissions.rst:169 msgid "``$XDG_DOWNLOAD_DIR`` or ``$HOME/Downloads``" msgstr "" -#: ../../sandbox-permissions.rst:171 +#: ../../sandbox-permissions.rst:170 msgid "``xdg-music``" msgstr "" -#: ../../sandbox-permissions.rst:171 +#: ../../sandbox-permissions.rst:170 msgid "Access the XDG music directory" msgstr "" -#: ../../sandbox-permissions.rst:171 +#: ../../sandbox-permissions.rst:170 msgid "``$XDG_MUSIC_DIR`` or ``$HOME/Music``" msgstr "" -#: ../../sandbox-permissions.rst:172 +#: ../../sandbox-permissions.rst:171 msgid "``xdg-pictures``" msgstr "" -#: ../../sandbox-permissions.rst:172 +#: ../../sandbox-permissions.rst:171 msgid "Access the XDG pictures directory" msgstr "" -#: ../../sandbox-permissions.rst:172 +#: ../../sandbox-permissions.rst:171 msgid "``$XDG_PICTURES_DIR`` or ``$HOME/Pictures``" msgstr "" -#: ../../sandbox-permissions.rst:173 +#: ../../sandbox-permissions.rst:172 msgid "``xdg-public-share``" msgstr "" -#: ../../sandbox-permissions.rst:173 +#: ../../sandbox-permissions.rst:172 msgid "Access the XDG public directory" msgstr "" -#: ../../sandbox-permissions.rst:173 +#: ../../sandbox-permissions.rst:172 msgid "``$XDG_PUBLICSHARE_DIR`` or ``$HOME/Public``" msgstr "" -#: ../../sandbox-permissions.rst:174 +#: ../../sandbox-permissions.rst:173 msgid "``xdg-videos``" msgstr "" -#: ../../sandbox-permissions.rst:174 +#: ../../sandbox-permissions.rst:173 msgid "Access the XDG videos directory" msgstr "" -#: ../../sandbox-permissions.rst:174 +#: ../../sandbox-permissions.rst:173 msgid "``$XDG_VIDEOS_DIR`` or ``$HOME/Videos``" msgstr "" -#: ../../sandbox-permissions.rst:175 +#: ../../sandbox-permissions.rst:174 msgid "``xdg-templates``" msgstr "" -#: ../../sandbox-permissions.rst:175 +#: ../../sandbox-permissions.rst:174 msgid "Access the XDG templates directory" msgstr "" -#: ../../sandbox-permissions.rst:175 +#: ../../sandbox-permissions.rst:174 msgid "``$XDG_TEMPLATES_DIR`` or ``$HOME/Templates``" msgstr "" -#: ../../sandbox-permissions.rst:176 +#: ../../sandbox-permissions.rst:175 msgid "``xdg-config``" msgstr "" -#: ../../sandbox-permissions.rst:176 +#: ../../sandbox-permissions.rst:175 msgid "Access the XDG config directory [#f3]_" msgstr "" -#: ../../sandbox-permissions.rst:176 +#: ../../sandbox-permissions.rst:175 msgid "``$XDG_CONFIG_HOME`` or ``$HOME/.config``" msgstr "" -#: ../../sandbox-permissions.rst:177 +#: ../../sandbox-permissions.rst:176 msgid "``xdg-cache``" msgstr "" -#: ../../sandbox-permissions.rst:177 +#: ../../sandbox-permissions.rst:176 msgid "Access the XDG cache directory [#f3]_" msgstr "" -#: ../../sandbox-permissions.rst:177 +#: ../../sandbox-permissions.rst:176 msgid "``$XDG_CACHE_HOME`` or ``$HOME/.cache``" msgstr "" -#: ../../sandbox-permissions.rst:178 +#: ../../sandbox-permissions.rst:177 msgid "``xdg-data``" msgstr "" -#: ../../sandbox-permissions.rst:178 +#: ../../sandbox-permissions.rst:177 msgid "Access the XDG data directory [#f3]_" msgstr "" -#: ../../sandbox-permissions.rst:178 +#: ../../sandbox-permissions.rst:177 msgid "``$XDG_DATA_HOME`` or ``$HOME/.local/share``" msgstr "" -#: ../../sandbox-permissions.rst:179 +#: ../../sandbox-permissions.rst:178 msgid "``xdg-run/path``" msgstr "" -#: ../../sandbox-permissions.rst:179 +#: ../../sandbox-permissions.rst:178 msgid "Access subdirectories of the XDG runtime directory" msgstr "" -#: ../../sandbox-permissions.rst:179 +#: ../../sandbox-permissions.rst:178 msgid "``$XDG_RUNTIME_DIR/path`` (``/run/user/$UID/path``)" msgstr "" -#: ../../sandbox-permissions.rst:182 +#: ../../sandbox-permissions.rst:181 msgid "" "Except ``host, host-etc, host-os`` paths can be added to all the above " "filesystem options. For example, ``--filesystem=xdg-documents/path``." msgstr "" -#: ../../sandbox-permissions.rst:185 +#: ../../sandbox-permissions.rst:184 msgid "Other filesystem access guidelines include:" msgstr "" -#: ../../sandbox-permissions.rst:187 +#: ../../sandbox-permissions.rst:186 msgid "" "The ``--persist=DIR`` option can be used to map directories from the " "user's home directory into the sandbox filesystem. This only works if the" @@ -588,7 +587,7 @@ msgid "" "includes ``home``." msgstr "" -#: ../../sandbox-permissions.rst:192 +#: ../../sandbox-permissions.rst:191 msgid "" "For example, if an application hardcodes the directory ``~/.foo``, " "without any ``home`` access and no ``--persist`` the directory will be " @@ -599,48 +598,48 @@ msgid "" "``~/.var/app/$FLATPAK_ID/.foo`` which would otherwise be lost." msgstr "" -#: ../../sandbox-permissions.rst:200 +#: ../../sandbox-permissions.rst:199 msgid "A ``--persist=.`` will `persist` all directories." msgstr "" -#: ../../sandbox-permissions.rst:202 +#: ../../sandbox-permissions.rst:201 msgid "" "This does not support ``:create, :ro, :rw`` suffixes or special values " "like ``xdg-documents``. However, the directory will be created by flatpak" " if it doesn't already exist." msgstr "" -#: ../../sandbox-permissions.rst:206 +#: ../../sandbox-permissions.rst:205 msgid "" "This makes it possible to avoid configuring access to the entire home " "directory, and can be useful for applications that hardcode file paths in" " ``~/``." msgstr "" -#: ../../sandbox-permissions.rst:209 +#: ../../sandbox-permissions.rst:208 msgid "" "If an application uses ``$TMPDIR`` to contain lock files you may want to " "add a wrapper script that sets it to ``$XDG_RUNTIME_DIR/app/$FLATPAK_ID``" " (tmpfs) or ``/var/tmp`` (persistent on host)." msgstr "" -#: ../../sandbox-permissions.rst:213 +#: ../../sandbox-permissions.rst:212 msgid "" "Retaining and sharing configuration with non-Flatpak installations is to " "be avoided." msgstr "" -#: ../../sandbox-permissions.rst:217 +#: ../../sandbox-permissions.rst:216 msgid "Reserved Paths" msgstr "" -#: ../../sandbox-permissions.rst:219 +#: ../../sandbox-permissions.rst:218 msgid "" "The following paths and subpaths of them are reserved and asking access " "to them with ``--filesystem`` will have no effect::" msgstr "" -#: ../../sandbox-permissions.rst:224 +#: ../../sandbox-permissions.rst:223 msgid "" "The entire ``/run`` is not allowed and all subpaths of ``/run`` except " "``/run/flatpak, /run/host`` is allowed to be exposed via " @@ -648,44 +647,45 @@ msgid "" "``../run``, exposing it or a subpath of it, is not allowed." msgstr "" -#: ../../sandbox-permissions.rst:229 +#: ../../sandbox-permissions.rst:228 msgid "" "Additionally the following directories from host need to be explicitly " "requested with ``--filesystem`` and are not available with ``home, host, " "host-os, host-etc`` by default:" msgstr "" -#: ../../sandbox-permissions.rst:233 +#: ../../sandbox-permissions.rst:232 msgid "" "``~/.var/app`` - The app can access only its own directory in " "``~/.var/app/$FLATPAK_ID``" msgstr "" -#: ../../sandbox-permissions.rst:234 +#: ../../sandbox-permissions.rst:233 msgid "``$XDG_DATA_HOME/flatpak`` (``~/.local/share/flatpak``)" msgstr "" -#: ../../sandbox-permissions.rst:235 +#: ../../sandbox-permissions.rst:234 msgid "``/boot``" msgstr "" -#: ../../sandbox-permissions.rst:236 +#: ../../sandbox-permissions.rst:235 msgid "``/efi``" msgstr "" -#: ../../sandbox-permissions.rst:237 +#: ../../sandbox-permissions.rst:236 msgid "``/root``" msgstr "" -#: ../../sandbox-permissions.rst:238 +#: ../../sandbox-permissions.rst:237 msgid "``/sys``" msgstr "" -#: ../../sandbox-permissions.rst:239 +#: ../../sandbox-permissions.rst:238 msgid "``/tmp``" msgstr "" -#: ../../sandbox-permissions.rst:240 +#: ../../sandbox-permissions.rst:239 +#, python-brace-format msgid "" "``/var`` - Note that by default ``/var/{cache, config, data, tmp}`` " "inside the sandbox are the same as ``~/.var/app/$FLATPAK_ID/{cache, " @@ -694,96 +694,96 @@ msgid "" "available." msgstr "" -#: ../../sandbox-permissions.rst:244 +#: ../../sandbox-permissions.rst:243 msgid "``/var/lib/flatpak`` - ``/var`` does not give access to this." msgstr "" -#: ../../sandbox-permissions.rst:247 +#: ../../sandbox-permissions.rst:246 msgid "Device access" msgstr "" -#: ../../sandbox-permissions.rst:248 +#: ../../sandbox-permissions.rst:247 msgid "You can provide the following device permissions:" msgstr "" -#: ../../sandbox-permissions.rst:251 +#: ../../sandbox-permissions.rst:250 msgid "``dri``" msgstr "" -#: ../../sandbox-permissions.rst:251 +#: ../../sandbox-permissions.rst:250 msgid "Direct Rendering Interface. Necessary for GL." msgstr "" -#: ../../sandbox-permissions.rst:252 +#: ../../sandbox-permissions.rst:251 msgid "``kvm``" msgstr "" -#: ../../sandbox-permissions.rst:252 +#: ../../sandbox-permissions.rst:251 msgid "Kernel based Virtual Machine ``/dev/kvm``" msgstr "" -#: ../../sandbox-permissions.rst:253 +#: ../../sandbox-permissions.rst:252 msgid "``shm``" msgstr "" -#: ../../sandbox-permissions.rst:253 +#: ../../sandbox-permissions.rst:252 msgid "Shared Memory in ``/dev/shm``." msgstr "" -#: ../../sandbox-permissions.rst:254 +#: ../../sandbox-permissions.rst:253 msgid "``input``" msgstr "" -#: ../../sandbox-permissions.rst:254 +#: ../../sandbox-permissions.rst:253 msgid "" "Input devices as exposed in ``/dev/input``. This includes game " "controllers. Since Flatpak 1.15.6." msgstr "" -#: ../../sandbox-permissions.rst:255 +#: ../../sandbox-permissions.rst:254 msgid "``usb``" msgstr "" -#: ../../sandbox-permissions.rst:255 +#: ../../sandbox-permissions.rst:254 msgid "Raw USB devices as exposed in ``/dev/bus/usb``. Since Flatpak 1.15.11." msgstr "" -#: ../../sandbox-permissions.rst:256 +#: ../../sandbox-permissions.rst:255 msgid "``all``" msgstr "" -#: ../../sandbox-permissions.rst:256 +#: ../../sandbox-permissions.rst:255 msgid "All devices, including all of the above except ``shm``" msgstr "" -#: ../../sandbox-permissions.rst:261 +#: ../../sandbox-permissions.rst:260 msgid "" "Using newer permissions like ``input`` or ``usb`` will have no effect on " "older Flatpak versions and will fail when used through Flatpak " "commandline." msgstr "" -#: ../../sandbox-permissions.rst:265 +#: ../../sandbox-permissions.rst:264 msgid "" "While not ideal, ``--device=all`` can be used to access devices like " "webcams, CD/DVD drives etc." msgstr "" -#: ../../sandbox-permissions.rst:269 +#: ../../sandbox-permissions.rst:268 msgid "USB portal" msgstr "" -#: ../../sandbox-permissions.rst:271 +#: ../../sandbox-permissions.rst:270 msgid "Since 1.5.11." msgstr "" -#: ../../sandbox-permissions.rst:273 +#: ../../sandbox-permissions.rst:272 msgid "" "Sandboxed access to individual USB devices can be controlled by portals. " "Flatpak allows specifying enumerable USB devices to allow access." msgstr "" -#: ../../sandbox-permissions.rst:277 +#: ../../sandbox-permissions.rst:276 msgid "" "Like ``--device=usb``, this is just about accessing the raw USB device, " "that needs libusb (or equivalent). By using the portal, you can restrict " @@ -792,59 +792,59 @@ msgid "" "no reason for USB security devices to be accessible." msgstr "" -#: ../../sandbox-permissions.rst:284 +#: ../../sandbox-permissions.rst:283 msgid "" "A list of valid use cases includes scanners (handled, for example by " "SANE), photo cameras (handled by libgphoto2), flashing devices, etc." msgstr "" -#: ../../sandbox-permissions.rst:287 +#: ../../sandbox-permissions.rst:286 msgid "" "While this is portal dependent and ``xdg-desktop-portal`` is currently " "the only portal implementation, the overall permission flow is as " "follows:" msgstr "" -#: ../../sandbox-permissions.rst:291 +#: ../../sandbox-permissions.rst:290 msgid "" "The Flatpak package specifies the devices it wishes to enumerate through " "``finish-args``." msgstr "" -#: ../../sandbox-permissions.rst:293 +#: ../../sandbox-permissions.rst:292 msgid "" "The application requests the portal to enumerate the available USB " "devices based on that list. If the list is empty it will enumerate all " "USB devices." msgstr "" -#: ../../sandbox-permissions.rst:296 +#: ../../sandbox-permissions.rst:295 msgid "" "When the application wants to access the device, it will make a request " "for the device it wants to access via the portal." msgstr "" -#: ../../sandbox-permissions.rst:298 +#: ../../sandbox-permissions.rst:297 msgid "The portal then requests permission from the user if not already granted." msgstr "" -#: ../../sandbox-permissions.rst:300 +#: ../../sandbox-permissions.rst:299 msgid "" "If the permission was granted, a file descriptor for the device is passed" " back to the application." msgstr "" -#: ../../sandbox-permissions.rst:303 +#: ../../sandbox-permissions.rst:302 msgid "" "The application is then able to open the devices it is supposed to use " "while the others would be hidden." msgstr "" -#: ../../sandbox-permissions.rst:307 +#: ../../sandbox-permissions.rst:306 msgid "Specifying the enumerable devices" msgstr "" -#: ../../sandbox-permissions.rst:309 +#: ../../sandbox-permissions.rst:308 msgid "" "You can specify devices on the ``flatpak`` command line, and by extension" " in the finish arguments for Flatpak Builder. Enumerable devices are " @@ -855,17 +855,17 @@ msgid "" " shall not be enumerated." msgstr "" -#: ../../sandbox-permissions.rst:317 +#: ../../sandbox-permissions.rst:316 msgid "Queries are made out of rules. These rules are composable with ``+``." msgstr "" -#: ../../sandbox-permissions.rst:319 +#: ../../sandbox-permissions.rst:318 msgid "" "The rule ``all`` enumerates every USB device. There is no further rule " "allowed in the query." msgstr "" -#: ../../sandbox-permissions.rst:322 +#: ../../sandbox-permissions.rst:321 msgid "" "The ``vnd`` and ``dev`` rules specify a USB vendor and a USB device ID " "respectively. A vendor can be specified alone, but a device rule always " @@ -875,63 +875,63 @@ msgid "" "repository `_" msgstr "" -#: ../../sandbox-permissions.rst:329 +#: ../../sandbox-permissions.rst:328 msgid "" "``cls`` specifies the device USB class and subclass. Both class and " "subclass are two digit hex numbers separated by a colon ``:``. You can " "use ``*`` to specify any subclass within the class." msgstr "" -#: ../../sandbox-permissions.rst:333 +#: ../../sandbox-permissions.rst:332 msgid "Some examples of the syntax:" msgstr "" -#: ../../sandbox-permissions.rst:335 +#: ../../sandbox-permissions.rst:334 msgid "``vnd:1234``: Devices from vendor ``1234``" msgstr "" -#: ../../sandbox-permissions.rst:336 +#: ../../sandbox-permissions.rst:335 msgid "``vnd:1234+dev:3456``: Only device ``3456`` from vendor ``1234``." msgstr "" -#: ../../sandbox-permissions.rst:337 +#: ../../sandbox-permissions.rst:336 msgid "``vnd:1234+cls:06:*``: All the PTP devices from vendor ``1234``." msgstr "" -#: ../../sandbox-permissions.rst:338 +#: ../../sandbox-permissions.rst:337 msgid "``cls:06:*``: All the PTP devices." msgstr "" -#: ../../sandbox-permissions.rst:340 +#: ../../sandbox-permissions.rst:339 msgid "" "This permission only allows to enumerate devices. To open them, " "permission must be requested from the portal. It is not possible to open " "a device that is not enumerable." msgstr "" -#: ../../sandbox-permissions.rst:346 +#: ../../sandbox-permissions.rst:345 msgid "" "The ``--device=usb`` permission is broader than what the USB portal is " "supposed to provide and allows unfettered access to any USB device on the" " bus." msgstr "" -#: ../../sandbox-permissions.rst:350 +#: ../../sandbox-permissions.rst:349 msgid "In some situations you may need to specify a very long list of devices." msgstr "" -#: ../../sandbox-permissions.rst:352 +#: ../../sandbox-permissions.rst:351 msgid "Device lists can be passed in one single argument, or through a file." msgstr "" -#: ../../sandbox-permissions.rst:354 +#: ../../sandbox-permissions.rst:353 msgid "" "When using ``--usb-list``, the queries are separated by a semi-colon " "``;``, with queries for hidden devices (i.e. those that would be passed " "with ``--nousb``) prefixed with ``!``." msgstr "" -#: ../../sandbox-permissions.rst:358 +#: ../../sandbox-permissions.rst:357 msgid "" "When using ``--usb-list-file``, the filename of the file containing USB " "queries is passed line by line. Like with ``--usb-list`` queries for " @@ -941,24 +941,24 @@ msgid "" "list is persisted internally." msgstr "" -#: ../../sandbox-permissions.rst:366 +#: ../../sandbox-permissions.rst:365 msgid "dconf access" msgstr "" -#: ../../sandbox-permissions.rst:368 +#: ../../sandbox-permissions.rst:367 msgid "" "As of xdg-desktop-portal 1.1.0 and glib 2.60.5 (in the runtime) you do " "not need direct DConf access in most cases." msgstr "" -#: ../../sandbox-permissions.rst:371 +#: ../../sandbox-permissions.rst:370 msgid "" "As of now this glib version is included in " "``org.freedesktop.Platform//19.08`` and ``org.gnome.Platform//3.34`` and " "newer." msgstr "" -#: ../../sandbox-permissions.rst:374 +#: ../../sandbox-permissions.rst:373 msgid "" "If an application existed prior to these runtimes you can tell Flatpak " "(>= 1.3.4) to migrate the DConf settings on the host into the sandbox by " @@ -967,17 +967,17 @@ msgid "" " (case is ignored and ``_`` and ``-`` are treated equal)." msgstr "" -#: ../../sandbox-permissions.rst:381 +#: ../../sandbox-permissions.rst:380 msgid "" "If you are targeting older runtimes or require direct DConf access for " "other reasons you can use these permissions::" msgstr "" -#: ../../sandbox-permissions.rst:389 +#: ../../sandbox-permissions.rst:388 msgid "With those permissions glib will continue using dconf directly." msgstr "" -#: ../../sandbox-permissions.rst:391 +#: ../../sandbox-permissions.rst:390 msgid "" "If you use a newer runtime where dconf is no longer built and still need " "it you will have to build the `dconf " @@ -985,11 +985,11 @@ msgid "" "``--env=GIO_EXTRA_MODULES=/app/lib/gio/modules/``." msgstr "" -#: ../../sandbox-permissions.rst:396 +#: ../../sandbox-permissions.rst:395 msgid "gvfs access" msgstr "" -#: ../../sandbox-permissions.rst:398 +#: ../../sandbox-permissions.rst:397 msgid "" "As of gvfs 1.48, the gvfs daemons and applications use an on-disk socket " "to communicate, rather than an abstract socket so that the gvfs " @@ -997,47 +997,47 @@ msgid "" "application's sandbox." msgstr "" -#: ../../sandbox-permissions.rst:402 +#: ../../sandbox-permissions.rst:401 msgid "" "A number of different options need to be passed depending on the " "application's use of gvfs." msgstr "" -#: ../../sandbox-permissions.rst:405 +#: ../../sandbox-permissions.rst:404 msgid "" "``--talk-name=org.gtk.vfs.*`` is necessary to talk to the gvfs daemons " "over D-Bus and list mounts using the GIO APIs." msgstr "" -#: ../../sandbox-permissions.rst:408 +#: ../../sandbox-permissions.rst:407 msgid "" "``--filesystem=xdg-run/gvfsd`` is necessary to use the GIO APIs to list " "and access non-native files using the GIO APIs, using URLs rather than " "FUSE paths." msgstr "" -#: ../../sandbox-permissions.rst:411 +#: ../../sandbox-permissions.rst:410 msgid "" "``--filesystem=xdg-run/gvfs`` is necessary to give access to the FUSE " "mounts non-GIO and legacy applications can use. This is what will make " "native files appear under ``/run/user/`id -u`/gvfs/``." msgstr "" -#: ../../sandbox-permissions.rst:415 +#: ../../sandbox-permissions.rst:414 msgid "Typical GNOME and GTK applications should use::" msgstr "" -#: ../../sandbox-permissions.rst:420 +#: ../../sandbox-permissions.rst:419 msgid "Typical non-GNOME and non-GTK applications should use::" msgstr "" -#: ../../sandbox-permissions.rst:424 +#: ../../sandbox-permissions.rst:423 msgid "" "No application should be using ``--talk-name=org.gtk.vfs`` in its " "manifest, as there are no D-Bus services named ``org.gtk.vfs``." msgstr "" -#: ../../sandbox-permissions.rst:427 +#: ../../sandbox-permissions.rst:426 msgid "" "These permission grants the app, the ability to communicate with the gvfs" " daemon and backends running on host. Depending on the backends installed" @@ -1053,11 +1053,11 @@ msgid "" "host." msgstr "" -#: ../../sandbox-permissions.rst:441 +#: ../../sandbox-permissions.rst:440 msgid "External drive access" msgstr "" -#: ../../sandbox-permissions.rst:443 +#: ../../sandbox-permissions.rst:442 msgid "" "External drives are mounted by the host system using systemd, udev, udisk" " fstab etc. and each of them can have different defaults. Flatpak has no " @@ -1065,30 +1065,30 @@ msgid "" "permissions should work in most cases::" msgstr "" -#: ../../sandbox-permissions.rst:452 +#: ../../sandbox-permissions.rst:451 msgid "" "If ``--filesystem=host`` is used ``/media, /run/media`` is shared " "automatically if they exist." msgstr "" -#: ../../sandbox-permissions.rst:455 +#: ../../sandbox-permissions.rst:454 msgid "" "Note that these should not have subpaths in them unless the value of the " "subpath can be consistently pre-determined. Block device naming depends " "on the kernel/fstab configuration and cannot be pre-determined." msgstr "" -#: ../../sandbox-permissions.rst:460 +#: ../../sandbox-permissions.rst:459 msgid "Footnotes" msgstr "" -#: ../../sandbox-permissions.rst:461 +#: ../../sandbox-permissions.rst:460 msgid "" "This is not necessarily required, but without it the X11 shared memory " "extension will not work, which is very bad for X11 performance." msgstr "" -#: ../../sandbox-permissions.rst:463 +#: ../../sandbox-permissions.rst:462 msgid "" "Giving network access also grants access to all host services listening " "on abstract Unix sockets (due to how network namespaces work), and these " @@ -1097,7 +1097,8 @@ msgid "" "secure distribution should disable these and just use regular sockets." msgstr "" -#: ../../sandbox-permissions.rst:468 +#: ../../sandbox-permissions.rst:467 +#, python-brace-format msgid "" "``xdg-{cache, config, data}`` bind mounts the paths from host to the per-" "app sandbox directory. Inside the sandbox ``$XDG_CACHE_HOME``, " @@ -1370,3 +1371,9 @@ msgstr "" #~ "the specific D-Bus permissions needed." #~ msgstr "" +#~ msgid "" +#~ "Talk permissions can be freely used, " +#~ "although it is recommended to use " +#~ "the minimum required." +#~ msgstr "" + diff --git a/po/pt_BR/LC_MESSAGES/sandbox-permissions.po b/po/pt_BR/LC_MESSAGES/sandbox-permissions.po index 86b114e9..83ce36c1 100644 --- a/po/pt_BR/LC_MESSAGES/sandbox-permissions.po +++ b/po/pt_BR/LC_MESSAGES/sandbox-permissions.po @@ -8,7 +8,7 @@ msgid "" msgstr "" "Project-Id-Version: Flatpak \n" "Report-Msgid-Bugs-To: https://github.com/flatpak/flatpak-docs/issues\n" -"POT-Creation-Date: 2025-02-05 01:10+0530\n" +"POT-Creation-Date: 2025-02-21 08:22+0530\n" "PO-Revision-Date: 2023-05-31 14:38-0300\n" "Last-Translator: Rafael Fontenelle \n" "Language: pt_BR\n" @@ -17,7 +17,7 @@ msgstr "" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=utf-8\n" "Content-Transfer-Encoding: 8bit\n" -"Generated-By: Babel 2.16.0\n" +"Generated-By: Babel 2.17.0\n" #: ../../sandbox-permissions.rst:2 msgid "Sandbox Permissions" @@ -359,18 +359,14 @@ msgid "**Talk**" msgstr "**Conversa**" #: ../../sandbox-permissions.rst:135 -msgid "" -"Talk permissions can be freely used, although it is recommended to use " -"the minimum required." +msgid "It is recommended to use the minimum required talk-name permissions." msgstr "" -"As permissões de conversa podem ser usadas livremente, embora seja " -"recomendável usar o mínimo necessário." -#: ../../sandbox-permissions.rst:139 +#: ../../sandbox-permissions.rst:138 msgid "Filesystem access" msgstr "Acesso ao sistema de arquivos" -#: ../../sandbox-permissions.rst:141 +#: ../../sandbox-permissions.rst:140 #, fuzzy msgid "" "As a general rule, static and permanent filesystem access should be " @@ -379,7 +375,7 @@ msgstr "" "Como regra geral, o acesso ao sistema de arquivos deve ser limitado o " "máximo possível. Isso inclui o uso de:" -#: ../../sandbox-permissions.rst:144 +#: ../../sandbox-permissions.rst:143 msgid "" "Using portals as an alternative to blanket filesystem access, wherever " "possible." @@ -387,266 +383,267 @@ msgstr "" "Usar portais como uma alternativa ao acesso geral ao sistema de arquivos," " sempre que possível" -#: ../../sandbox-permissions.rst:146 +#: ../../sandbox-permissions.rst:145 msgid "Using read-only access wherever possible, using the ``:ro`` option." msgstr "Usar acesso somente leitura sempre que possível, usando a opção ``:ro``." -#: ../../sandbox-permissions.rst:147 +#: ../../sandbox-permissions.rst:146 msgid "" "Using :ref:`conventions:XDG base directories` to store application's " "cache, config and state. Then no additional filesystem access would be " "required." msgstr "" -#: ../../sandbox-permissions.rst:150 +#: ../../sandbox-permissions.rst:149 msgid "" "Avoiding full home access and instead using XDG directories such as " "``xdg-music`` or ``xdg-download`` etc." msgstr "" -#: ../../sandbox-permissions.rst:153 +#: ../../sandbox-permissions.rst:152 msgid "The following permission options are available:" msgstr "" -#: ../../sandbox-permissions.rst:155 +#: ../../sandbox-permissions.rst:154 msgid "``:ro`` - read-only access" msgstr "" -#: ../../sandbox-permissions.rst:156 +#: ../../sandbox-permissions.rst:155 msgid "" "``:create`` - read/write access, and create the directory if it doesn't " "exist" msgstr "" -#: ../../sandbox-permissions.rst:159 +#: ../../sandbox-permissions.rst:158 msgid "Additionally the following permissions are available:" msgstr "" -#: ../../sandbox-permissions.rst:162 +#: ../../sandbox-permissions.rst:161 msgid "``host``" msgstr "" -#: ../../sandbox-permissions.rst:162 +#: ../../sandbox-permissions.rst:161 msgid "" "Access to ``/home, /media, /opt, /run/media, /srv`` and everything " "provided by ``host-os, host-etc`` mounted in ``/run/host``" msgstr "" -#: ../../sandbox-permissions.rst:162 ../../sandbox-permissions.rst:166 -#: ../../sandbox-permissions.rst:167 +#: ../../sandbox-permissions.rst:161 ../../sandbox-permissions.rst:165 +#: ../../sandbox-permissions.rst:166 msgid "Includes any subpaths" msgstr "" -#: ../../sandbox-permissions.rst:163 +#: ../../sandbox-permissions.rst:162 msgid "``host-etc``" msgstr "" -#: ../../sandbox-permissions.rst:163 +#: ../../sandbox-permissions.rst:162 msgid "Host's ``/etc``" msgstr "" -#: ../../sandbox-permissions.rst:163 +#: ../../sandbox-permissions.rst:162 msgid "Host's ``/etc`` is mounted at ``/run/host/etc``" msgstr "" -#: ../../sandbox-permissions.rst:164 +#: ../../sandbox-permissions.rst:163 msgid "``host-os``" msgstr "" -#: ../../sandbox-permissions.rst:164 +#: ../../sandbox-permissions.rst:163 +#, python-brace-format msgid "" "Host's ``/usr, /bin, /sbin, /lib{32, 64}, /etc/ld.so.cache, " "/etc/alternatives``" msgstr "" -#: ../../sandbox-permissions.rst:164 +#: ../../sandbox-permissions.rst:163 msgid "Mounted at ``/run/host``" msgstr "" -#: ../../sandbox-permissions.rst:165 +#: ../../sandbox-permissions.rst:164 msgid "``home``" msgstr "" -#: ../../sandbox-permissions.rst:165 +#: ../../sandbox-permissions.rst:164 #, fuzzy msgid "Access the home directory" msgstr "``--filesystem=home`` – acessa a pasta pessoal (home) do usuário" -#: ../../sandbox-permissions.rst:165 +#: ../../sandbox-permissions.rst:164 msgid "Except ``~/.var/app``" msgstr "" -#: ../../sandbox-permissions.rst:166 +#: ../../sandbox-permissions.rst:165 msgid "``/some/dir``" msgstr "" -#: ../../sandbox-permissions.rst:166 +#: ../../sandbox-permissions.rst:165 msgid "Access an arbitrary path except any reserved path" msgstr "" -#: ../../sandbox-permissions.rst:167 +#: ../../sandbox-permissions.rst:166 msgid "``~/some/dir``" msgstr "" -#: ../../sandbox-permissions.rst:167 +#: ../../sandbox-permissions.rst:166 msgid "Arbitrary path relative to the home directory" msgstr "" -#: ../../sandbox-permissions.rst:168 +#: ../../sandbox-permissions.rst:167 msgid "``xdg-desktop``" msgstr "" -#: ../../sandbox-permissions.rst:168 +#: ../../sandbox-permissions.rst:167 msgid "Access the XDG desktop directory" msgstr "" -#: ../../sandbox-permissions.rst:168 +#: ../../sandbox-permissions.rst:167 msgid "``$XDG_DESKTOP_DIR`` or ``$HOME/Desktop``" msgstr "" -#: ../../sandbox-permissions.rst:169 +#: ../../sandbox-permissions.rst:168 msgid "``xdg-documents``" msgstr "" -#: ../../sandbox-permissions.rst:169 +#: ../../sandbox-permissions.rst:168 msgid "Access the XDG documents directory" msgstr "" -#: ../../sandbox-permissions.rst:169 +#: ../../sandbox-permissions.rst:168 msgid "``$XDG_DOCUMENTS_DIR`` or ``$HOME/Documents``" msgstr "" -#: ../../sandbox-permissions.rst:170 +#: ../../sandbox-permissions.rst:169 msgid "``xdg-download``" msgstr "" -#: ../../sandbox-permissions.rst:170 +#: ../../sandbox-permissions.rst:169 msgid "Access the XDG download directory" msgstr "" -#: ../../sandbox-permissions.rst:170 +#: ../../sandbox-permissions.rst:169 msgid "``$XDG_DOWNLOAD_DIR`` or ``$HOME/Downloads``" msgstr "" -#: ../../sandbox-permissions.rst:171 +#: ../../sandbox-permissions.rst:170 msgid "``xdg-music``" msgstr "" -#: ../../sandbox-permissions.rst:171 +#: ../../sandbox-permissions.rst:170 msgid "Access the XDG music directory" msgstr "" -#: ../../sandbox-permissions.rst:171 +#: ../../sandbox-permissions.rst:170 msgid "``$XDG_MUSIC_DIR`` or ``$HOME/Music``" msgstr "" -#: ../../sandbox-permissions.rst:172 +#: ../../sandbox-permissions.rst:171 msgid "``xdg-pictures``" msgstr "" -#: ../../sandbox-permissions.rst:172 +#: ../../sandbox-permissions.rst:171 msgid "Access the XDG pictures directory" msgstr "" -#: ../../sandbox-permissions.rst:172 +#: ../../sandbox-permissions.rst:171 msgid "``$XDG_PICTURES_DIR`` or ``$HOME/Pictures``" msgstr "" -#: ../../sandbox-permissions.rst:173 +#: ../../sandbox-permissions.rst:172 msgid "``xdg-public-share``" msgstr "" -#: ../../sandbox-permissions.rst:173 +#: ../../sandbox-permissions.rst:172 msgid "Access the XDG public directory" msgstr "" -#: ../../sandbox-permissions.rst:173 +#: ../../sandbox-permissions.rst:172 msgid "``$XDG_PUBLICSHARE_DIR`` or ``$HOME/Public``" msgstr "" -#: ../../sandbox-permissions.rst:174 +#: ../../sandbox-permissions.rst:173 msgid "``xdg-videos``" msgstr "" -#: ../../sandbox-permissions.rst:174 +#: ../../sandbox-permissions.rst:173 msgid "Access the XDG videos directory" msgstr "" -#: ../../sandbox-permissions.rst:174 +#: ../../sandbox-permissions.rst:173 msgid "``$XDG_VIDEOS_DIR`` or ``$HOME/Videos``" msgstr "" -#: ../../sandbox-permissions.rst:175 +#: ../../sandbox-permissions.rst:174 msgid "``xdg-templates``" msgstr "" -#: ../../sandbox-permissions.rst:175 +#: ../../sandbox-permissions.rst:174 msgid "Access the XDG templates directory" msgstr "" -#: ../../sandbox-permissions.rst:175 +#: ../../sandbox-permissions.rst:174 msgid "``$XDG_TEMPLATES_DIR`` or ``$HOME/Templates``" msgstr "" -#: ../../sandbox-permissions.rst:176 +#: ../../sandbox-permissions.rst:175 msgid "``xdg-config``" msgstr "" -#: ../../sandbox-permissions.rst:176 +#: ../../sandbox-permissions.rst:175 msgid "Access the XDG config directory [#f3]_" msgstr "" -#: ../../sandbox-permissions.rst:176 +#: ../../sandbox-permissions.rst:175 msgid "``$XDG_CONFIG_HOME`` or ``$HOME/.config``" msgstr "" -#: ../../sandbox-permissions.rst:177 +#: ../../sandbox-permissions.rst:176 msgid "``xdg-cache``" msgstr "" -#: ../../sandbox-permissions.rst:177 +#: ../../sandbox-permissions.rst:176 msgid "Access the XDG cache directory [#f3]_" msgstr "" -#: ../../sandbox-permissions.rst:177 +#: ../../sandbox-permissions.rst:176 msgid "``$XDG_CACHE_HOME`` or ``$HOME/.cache``" msgstr "" -#: ../../sandbox-permissions.rst:178 +#: ../../sandbox-permissions.rst:177 msgid "``xdg-data``" msgstr "" -#: ../../sandbox-permissions.rst:178 +#: ../../sandbox-permissions.rst:177 msgid "Access the XDG data directory [#f3]_" msgstr "" -#: ../../sandbox-permissions.rst:178 +#: ../../sandbox-permissions.rst:177 msgid "``$XDG_DATA_HOME`` or ``$HOME/.local/share``" msgstr "" -#: ../../sandbox-permissions.rst:179 +#: ../../sandbox-permissions.rst:178 msgid "``xdg-run/path``" msgstr "" -#: ../../sandbox-permissions.rst:179 +#: ../../sandbox-permissions.rst:178 msgid "Access subdirectories of the XDG runtime directory" msgstr "" -#: ../../sandbox-permissions.rst:179 +#: ../../sandbox-permissions.rst:178 msgid "``$XDG_RUNTIME_DIR/path`` (``/run/user/$UID/path``)" msgstr "" -#: ../../sandbox-permissions.rst:182 +#: ../../sandbox-permissions.rst:181 msgid "" "Except ``host, host-etc, host-os`` paths can be added to all the above " "filesystem options. For example, ``--filesystem=xdg-documents/path``." msgstr "" -#: ../../sandbox-permissions.rst:185 +#: ../../sandbox-permissions.rst:184 msgid "Other filesystem access guidelines include:" msgstr "" -#: ../../sandbox-permissions.rst:187 +#: ../../sandbox-permissions.rst:186 #, fuzzy msgid "" "The ``--persist=DIR`` option can be used to map directories from the " @@ -660,7 +657,7 @@ msgstr "" " e pode ser útil para aplicativos que codificam os caminhos do arquivo em" " ``~/``." -#: ../../sandbox-permissions.rst:192 +#: ../../sandbox-permissions.rst:191 msgid "" "For example, if an application hardcodes the directory ``~/.foo``, " "without any ``home`` access and no ``--persist`` the directory will be " @@ -671,18 +668,18 @@ msgid "" "``~/.var/app/$FLATPAK_ID/.foo`` which would otherwise be lost." msgstr "" -#: ../../sandbox-permissions.rst:200 +#: ../../sandbox-permissions.rst:199 msgid "A ``--persist=.`` will `persist` all directories." msgstr "" -#: ../../sandbox-permissions.rst:202 +#: ../../sandbox-permissions.rst:201 msgid "" "This does not support ``:create, :ro, :rw`` suffixes or special values " "like ``xdg-documents``. However, the directory will be created by flatpak" " if it doesn't already exist." msgstr "" -#: ../../sandbox-permissions.rst:206 +#: ../../sandbox-permissions.rst:205 #, fuzzy msgid "" "This makes it possible to avoid configuring access to the entire home " @@ -695,7 +692,7 @@ msgstr "" " e pode ser útil para aplicativos que codificam os caminhos do arquivo em" " ``~/``." -#: ../../sandbox-permissions.rst:209 +#: ../../sandbox-permissions.rst:208 #, fuzzy msgid "" "If an application uses ``$TMPDIR`` to contain lock files you may want to " @@ -706,7 +703,7 @@ msgstr "" " querer adicionar um script wrapper que o defina como " "``$XDG_RUNTIME_DIR/app/$FLATPAK_ID``." -#: ../../sandbox-permissions.rst:213 +#: ../../sandbox-permissions.rst:212 msgid "" "Retaining and sharing configuration with non-Flatpak installations is to " "be avoided." @@ -714,17 +711,17 @@ msgstr "" "Reter e compartilhar a configuração com instalações que não sejam do " "Flatpak deve ser evitado." -#: ../../sandbox-permissions.rst:217 +#: ../../sandbox-permissions.rst:216 msgid "Reserved Paths" msgstr "" -#: ../../sandbox-permissions.rst:219 +#: ../../sandbox-permissions.rst:218 msgid "" "The following paths and subpaths of them are reserved and asking access " "to them with ``--filesystem`` will have no effect::" msgstr "" -#: ../../sandbox-permissions.rst:224 +#: ../../sandbox-permissions.rst:223 msgid "" "The entire ``/run`` is not allowed and all subpaths of ``/run`` except " "``/run/flatpak, /run/host`` is allowed to be exposed via " @@ -732,44 +729,45 @@ msgid "" "``../run``, exposing it or a subpath of it, is not allowed." msgstr "" -#: ../../sandbox-permissions.rst:229 +#: ../../sandbox-permissions.rst:228 msgid "" "Additionally the following directories from host need to be explicitly " "requested with ``--filesystem`` and are not available with ``home, host, " "host-os, host-etc`` by default:" msgstr "" -#: ../../sandbox-permissions.rst:233 +#: ../../sandbox-permissions.rst:232 msgid "" "``~/.var/app`` - The app can access only its own directory in " "``~/.var/app/$FLATPAK_ID``" msgstr "" -#: ../../sandbox-permissions.rst:234 +#: ../../sandbox-permissions.rst:233 msgid "``$XDG_DATA_HOME/flatpak`` (``~/.local/share/flatpak``)" msgstr "" -#: ../../sandbox-permissions.rst:235 +#: ../../sandbox-permissions.rst:234 msgid "``/boot``" msgstr "" -#: ../../sandbox-permissions.rst:236 +#: ../../sandbox-permissions.rst:235 msgid "``/efi``" msgstr "" -#: ../../sandbox-permissions.rst:237 +#: ../../sandbox-permissions.rst:236 msgid "``/root``" msgstr "" -#: ../../sandbox-permissions.rst:238 +#: ../../sandbox-permissions.rst:237 msgid "``/sys``" msgstr "" -#: ../../sandbox-permissions.rst:239 +#: ../../sandbox-permissions.rst:238 msgid "``/tmp``" msgstr "" -#: ../../sandbox-permissions.rst:240 +#: ../../sandbox-permissions.rst:239 +#, python-brace-format msgid "" "``/var`` - Note that by default ``/var/{cache, config, data, tmp}`` " "inside the sandbox are the same as ``~/.var/app/$FLATPAK_ID/{cache, " @@ -778,76 +776,76 @@ msgid "" "available." msgstr "" -#: ../../sandbox-permissions.rst:244 +#: ../../sandbox-permissions.rst:243 msgid "``/var/lib/flatpak`` - ``/var`` does not give access to this." msgstr "" -#: ../../sandbox-permissions.rst:247 +#: ../../sandbox-permissions.rst:246 msgid "Device access" msgstr "Acesso a dispositivo" -#: ../../sandbox-permissions.rst:248 +#: ../../sandbox-permissions.rst:247 msgid "You can provide the following device permissions:" msgstr "" -#: ../../sandbox-permissions.rst:251 +#: ../../sandbox-permissions.rst:250 msgid "``dri``" msgstr "" -#: ../../sandbox-permissions.rst:251 +#: ../../sandbox-permissions.rst:250 msgid "Direct Rendering Interface. Necessary for GL." msgstr "" -#: ../../sandbox-permissions.rst:252 +#: ../../sandbox-permissions.rst:251 msgid "``kvm``" msgstr "" -#: ../../sandbox-permissions.rst:252 +#: ../../sandbox-permissions.rst:251 msgid "Kernel based Virtual Machine ``/dev/kvm``" msgstr "" -#: ../../sandbox-permissions.rst:253 +#: ../../sandbox-permissions.rst:252 msgid "``shm``" msgstr "" -#: ../../sandbox-permissions.rst:253 +#: ../../sandbox-permissions.rst:252 msgid "Shared Memory in ``/dev/shm``." msgstr "" -#: ../../sandbox-permissions.rst:254 +#: ../../sandbox-permissions.rst:253 msgid "``input``" msgstr "" -#: ../../sandbox-permissions.rst:254 +#: ../../sandbox-permissions.rst:253 msgid "" "Input devices as exposed in ``/dev/input``. This includes game " "controllers. Since Flatpak 1.15.6." msgstr "" -#: ../../sandbox-permissions.rst:255 +#: ../../sandbox-permissions.rst:254 msgid "``usb``" msgstr "" -#: ../../sandbox-permissions.rst:255 +#: ../../sandbox-permissions.rst:254 msgid "Raw USB devices as exposed in ``/dev/bus/usb``. Since Flatpak 1.15.11." msgstr "" -#: ../../sandbox-permissions.rst:256 +#: ../../sandbox-permissions.rst:255 msgid "``all``" msgstr "" -#: ../../sandbox-permissions.rst:256 +#: ../../sandbox-permissions.rst:255 msgid "All devices, including all of the above except ``shm``" msgstr "" -#: ../../sandbox-permissions.rst:261 +#: ../../sandbox-permissions.rst:260 msgid "" "Using newer permissions like ``input`` or ``usb`` will have no effect on " "older Flatpak versions and will fail when used through Flatpak " "commandline." msgstr "" -#: ../../sandbox-permissions.rst:265 +#: ../../sandbox-permissions.rst:264 #, fuzzy msgid "" "While not ideal, ``--device=all`` can be used to access devices like " @@ -856,22 +854,22 @@ msgstr "" "Embora não seja o ideal, ``--device=all`` pode ser usado para acessar " "dispositivos como controladores ou webcams." -#: ../../sandbox-permissions.rst:269 +#: ../../sandbox-permissions.rst:268 #, fuzzy msgid "USB portal" msgstr "Portais" -#: ../../sandbox-permissions.rst:271 +#: ../../sandbox-permissions.rst:270 msgid "Since 1.5.11." msgstr "" -#: ../../sandbox-permissions.rst:273 +#: ../../sandbox-permissions.rst:272 msgid "" "Sandboxed access to individual USB devices can be controlled by portals. " "Flatpak allows specifying enumerable USB devices to allow access." msgstr "" -#: ../../sandbox-permissions.rst:277 +#: ../../sandbox-permissions.rst:276 msgid "" "Like ``--device=usb``, this is just about accessing the raw USB device, " "that needs libusb (or equivalent). By using the portal, you can restrict " @@ -880,59 +878,59 @@ msgid "" "no reason for USB security devices to be accessible." msgstr "" -#: ../../sandbox-permissions.rst:284 +#: ../../sandbox-permissions.rst:283 msgid "" "A list of valid use cases includes scanners (handled, for example by " "SANE), photo cameras (handled by libgphoto2), flashing devices, etc." msgstr "" -#: ../../sandbox-permissions.rst:287 +#: ../../sandbox-permissions.rst:286 msgid "" "While this is portal dependent and ``xdg-desktop-portal`` is currently " "the only portal implementation, the overall permission flow is as " "follows:" msgstr "" -#: ../../sandbox-permissions.rst:291 +#: ../../sandbox-permissions.rst:290 msgid "" "The Flatpak package specifies the devices it wishes to enumerate through " "``finish-args``." msgstr "" -#: ../../sandbox-permissions.rst:293 +#: ../../sandbox-permissions.rst:292 msgid "" "The application requests the portal to enumerate the available USB " "devices based on that list. If the list is empty it will enumerate all " "USB devices." msgstr "" -#: ../../sandbox-permissions.rst:296 +#: ../../sandbox-permissions.rst:295 msgid "" "When the application wants to access the device, it will make a request " "for the device it wants to access via the portal." msgstr "" -#: ../../sandbox-permissions.rst:298 +#: ../../sandbox-permissions.rst:297 msgid "The portal then requests permission from the user if not already granted." msgstr "" -#: ../../sandbox-permissions.rst:300 +#: ../../sandbox-permissions.rst:299 msgid "" "If the permission was granted, a file descriptor for the device is passed" " back to the application." msgstr "" -#: ../../sandbox-permissions.rst:303 +#: ../../sandbox-permissions.rst:302 msgid "" "The application is then able to open the devices it is supposed to use " "while the others would be hidden." msgstr "" -#: ../../sandbox-permissions.rst:307 +#: ../../sandbox-permissions.rst:306 msgid "Specifying the enumerable devices" msgstr "" -#: ../../sandbox-permissions.rst:309 +#: ../../sandbox-permissions.rst:308 msgid "" "You can specify devices on the ``flatpak`` command line, and by extension" " in the finish arguments for Flatpak Builder. Enumerable devices are " @@ -943,17 +941,17 @@ msgid "" " shall not be enumerated." msgstr "" -#: ../../sandbox-permissions.rst:317 +#: ../../sandbox-permissions.rst:316 msgid "Queries are made out of rules. These rules are composable with ``+``." msgstr "" -#: ../../sandbox-permissions.rst:319 +#: ../../sandbox-permissions.rst:318 msgid "" "The rule ``all`` enumerates every USB device. There is no further rule " "allowed in the query." msgstr "" -#: ../../sandbox-permissions.rst:322 +#: ../../sandbox-permissions.rst:321 msgid "" "The ``vnd`` and ``dev`` rules specify a USB vendor and a USB device ID " "respectively. A vendor can be specified alone, but a device rule always " @@ -963,63 +961,63 @@ msgid "" "repository `_" msgstr "" -#: ../../sandbox-permissions.rst:329 +#: ../../sandbox-permissions.rst:328 msgid "" "``cls`` specifies the device USB class and subclass. Both class and " "subclass are two digit hex numbers separated by a colon ``:``. You can " "use ``*`` to specify any subclass within the class." msgstr "" -#: ../../sandbox-permissions.rst:333 +#: ../../sandbox-permissions.rst:332 msgid "Some examples of the syntax:" msgstr "" -#: ../../sandbox-permissions.rst:335 +#: ../../sandbox-permissions.rst:334 msgid "``vnd:1234``: Devices from vendor ``1234``" msgstr "" -#: ../../sandbox-permissions.rst:336 +#: ../../sandbox-permissions.rst:335 msgid "``vnd:1234+dev:3456``: Only device ``3456`` from vendor ``1234``." msgstr "" -#: ../../sandbox-permissions.rst:337 +#: ../../sandbox-permissions.rst:336 msgid "``vnd:1234+cls:06:*``: All the PTP devices from vendor ``1234``." msgstr "" -#: ../../sandbox-permissions.rst:338 +#: ../../sandbox-permissions.rst:337 msgid "``cls:06:*``: All the PTP devices." msgstr "" -#: ../../sandbox-permissions.rst:340 +#: ../../sandbox-permissions.rst:339 msgid "" "This permission only allows to enumerate devices. To open them, " "permission must be requested from the portal. It is not possible to open " "a device that is not enumerable." msgstr "" -#: ../../sandbox-permissions.rst:346 +#: ../../sandbox-permissions.rst:345 msgid "" "The ``--device=usb`` permission is broader than what the USB portal is " "supposed to provide and allows unfettered access to any USB device on the" " bus." msgstr "" -#: ../../sandbox-permissions.rst:350 +#: ../../sandbox-permissions.rst:349 msgid "In some situations you may need to specify a very long list of devices." msgstr "" -#: ../../sandbox-permissions.rst:352 +#: ../../sandbox-permissions.rst:351 msgid "Device lists can be passed in one single argument, or through a file." msgstr "" -#: ../../sandbox-permissions.rst:354 +#: ../../sandbox-permissions.rst:353 msgid "" "When using ``--usb-list``, the queries are separated by a semi-colon " "``;``, with queries for hidden devices (i.e. those that would be passed " "with ``--nousb``) prefixed with ``!``." msgstr "" -#: ../../sandbox-permissions.rst:358 +#: ../../sandbox-permissions.rst:357 msgid "" "When using ``--usb-list-file``, the filename of the file containing USB " "queries is passed line by line. Like with ``--usb-list`` queries for " @@ -1029,11 +1027,11 @@ msgid "" "list is persisted internally." msgstr "" -#: ../../sandbox-permissions.rst:366 +#: ../../sandbox-permissions.rst:365 msgid "dconf access" msgstr "Acesso a dconf" -#: ../../sandbox-permissions.rst:368 +#: ../../sandbox-permissions.rst:367 msgid "" "As of xdg-desktop-portal 1.1.0 and glib 2.60.5 (in the runtime) you do " "not need direct DConf access in most cases." @@ -1041,7 +1039,7 @@ msgstr "" "No xdg-desktop-portal 1.1.0 e glib 2.60.5 (no runtime), você não precisa " "de acesso direto ao DConf na maioria dos casos." -#: ../../sandbox-permissions.rst:371 +#: ../../sandbox-permissions.rst:370 msgid "" "As of now this glib version is included in " "``org.freedesktop.Platform//19.08`` and ``org.gnome.Platform//3.34`` and " @@ -1051,7 +1049,7 @@ msgstr "" "``org.freedesktop.Platform//19.08`` e ``org.gnome.Platform//3.34`` e mais" " novos." -#: ../../sandbox-permissions.rst:374 +#: ../../sandbox-permissions.rst:373 msgid "" "If an application existed prior to these runtimes you can tell Flatpak " "(>= 1.3.4) to migrate the DConf settings on the host into the sandbox by " @@ -1066,7 +1064,7 @@ msgstr "" "semelhante ao seu ID de aplicativo ou não será permitido (não diferencia " "maiúsculo de minúsculo, e ``_`` e `` -`` são tratados da mesma forma)." -#: ../../sandbox-permissions.rst:381 +#: ../../sandbox-permissions.rst:380 msgid "" "If you are targeting older runtimes or require direct DConf access for " "other reasons you can use these permissions::" @@ -1074,11 +1072,11 @@ msgstr "" "Se você estiver direcionando runtimes mais antigos ou precisar de acesso " "direto ao DConf por outros motivos, poderá usar estas permissões::" -#: ../../sandbox-permissions.rst:389 +#: ../../sandbox-permissions.rst:388 msgid "With those permissions glib will continue using dconf directly." msgstr "Com essas permissões, o glib continuará usando o dconf diretamente." -#: ../../sandbox-permissions.rst:391 +#: ../../sandbox-permissions.rst:390 msgid "" "If you use a newer runtime where dconf is no longer built and still need " "it you will have to build the `dconf " @@ -1086,11 +1084,11 @@ msgid "" "``--env=GIO_EXTRA_MODULES=/app/lib/gio/modules/``." msgstr "" -#: ../../sandbox-permissions.rst:396 +#: ../../sandbox-permissions.rst:395 msgid "gvfs access" msgstr "Acesso a gvfs" -#: ../../sandbox-permissions.rst:398 +#: ../../sandbox-permissions.rst:397 msgid "" "As of gvfs 1.48, the gvfs daemons and applications use an on-disk socket " "to communicate, rather than an abstract socket so that the gvfs " @@ -1102,7 +1100,7 @@ msgstr "" "infraestrutura do gvfs ainda funcione quando o suporte à rede estiver " "desabilitado no isolamento do aplicativo." -#: ../../sandbox-permissions.rst:402 +#: ../../sandbox-permissions.rst:401 msgid "" "A number of different options need to be passed depending on the " "application's use of gvfs." @@ -1110,7 +1108,7 @@ msgstr "" "Várias opções diferentes precisam ser passadas dependendo do uso de gvfs " "do aplicativo." -#: ../../sandbox-permissions.rst:405 +#: ../../sandbox-permissions.rst:404 msgid "" "``--talk-name=org.gtk.vfs.*`` is necessary to talk to the gvfs daemons " "over D-Bus and list mounts using the GIO APIs." @@ -1118,7 +1116,7 @@ msgstr "" "``--talk-name=org.gtk.vfs.*`` é necessário para falar com os daemons do " "gvfs sobre D-Bus e listar montagens usando as APIs do GIO." -#: ../../sandbox-permissions.rst:408 +#: ../../sandbox-permissions.rst:407 msgid "" "``--filesystem=xdg-run/gvfsd`` is necessary to use the GIO APIs to list " "and access non-native files using the GIO APIs, using URLs rather than " @@ -1128,7 +1126,7 @@ msgstr "" "listar e acessar arquivos não nativos usando as APIs do GIO, usando URLs " "em vez de caminhos FUSE." -#: ../../sandbox-permissions.rst:411 +#: ../../sandbox-permissions.rst:410 msgid "" "``--filesystem=xdg-run/gvfs`` is necessary to give access to the FUSE " "mounts non-GIO and legacy applications can use. This is what will make " @@ -1138,15 +1136,15 @@ msgstr "" "FUSE não-GIO e aplicativos legados podem usar. Isto é o que fará com que " "os arquivos nativos apareçam em ``/run/user/`id -u`/gvfs/``." -#: ../../sandbox-permissions.rst:415 +#: ../../sandbox-permissions.rst:414 msgid "Typical GNOME and GTK applications should use::" msgstr "Os aplicativos GNOME e GTK típicos devem usar::" -#: ../../sandbox-permissions.rst:420 +#: ../../sandbox-permissions.rst:419 msgid "Typical non-GNOME and non-GTK applications should use::" msgstr "Os aplicativos não-GNOME e não-GTK típicos devem usar::" -#: ../../sandbox-permissions.rst:424 +#: ../../sandbox-permissions.rst:423 msgid "" "No application should be using ``--talk-name=org.gtk.vfs`` in its " "manifest, as there are no D-Bus services named ``org.gtk.vfs``." @@ -1154,7 +1152,7 @@ msgstr "" "Nenhum aplicativo deve usar ``--talk-name=org.gtk.vfs`` em seu manifesto," " pois não há serviços D-Bus chamados ``org.gtk.vfs``." -#: ../../sandbox-permissions.rst:427 +#: ../../sandbox-permissions.rst:426 msgid "" "These permission grants the app, the ability to communicate with the gvfs" " daemon and backends running on host. Depending on the backends installed" @@ -1170,11 +1168,11 @@ msgid "" "host." msgstr "" -#: ../../sandbox-permissions.rst:441 +#: ../../sandbox-permissions.rst:440 msgid "External drive access" msgstr "" -#: ../../sandbox-permissions.rst:443 +#: ../../sandbox-permissions.rst:442 msgid "" "External drives are mounted by the host system using systemd, udev, udisk" " fstab etc. and each of them can have different defaults. Flatpak has no " @@ -1182,30 +1180,30 @@ msgid "" "permissions should work in most cases::" msgstr "" -#: ../../sandbox-permissions.rst:452 +#: ../../sandbox-permissions.rst:451 msgid "" "If ``--filesystem=host`` is used ``/media, /run/media`` is shared " "automatically if they exist." msgstr "" -#: ../../sandbox-permissions.rst:455 +#: ../../sandbox-permissions.rst:454 msgid "" "Note that these should not have subpaths in them unless the value of the " "subpath can be consistently pre-determined. Block device naming depends " "on the kernel/fstab configuration and cannot be pre-determined." msgstr "" -#: ../../sandbox-permissions.rst:460 +#: ../../sandbox-permissions.rst:459 msgid "Footnotes" msgstr "" -#: ../../sandbox-permissions.rst:461 +#: ../../sandbox-permissions.rst:460 msgid "" "This is not necessarily required, but without it the X11 shared memory " "extension will not work, which is very bad for X11 performance." msgstr "" -#: ../../sandbox-permissions.rst:463 +#: ../../sandbox-permissions.rst:462 msgid "" "Giving network access also grants access to all host services listening " "on abstract Unix sockets (due to how network namespaces work), and these " @@ -1214,7 +1212,8 @@ msgid "" "secure distribution should disable these and just use regular sockets." msgstr "" -#: ../../sandbox-permissions.rst:468 +#: ../../sandbox-permissions.rst:467 +#, python-brace-format msgid "" "``xdg-{cache, config, data}`` bind mounts the paths from host to the per-" "app sandbox directory. Inside the sandbox ``$XDG_CACHE_HOME``, " @@ -1395,3 +1394,12 @@ msgstr "" #~ "the specific D-Bus permissions needed." #~ msgstr "" +#~ msgid "" +#~ "Talk permissions can be freely used, " +#~ "although it is recommended to use " +#~ "the minimum required." +#~ msgstr "" +#~ "As permissões de conversa podem ser " +#~ "usadas livremente, embora seja recomendável" +#~ " usar o mínimo necessário." + diff --git a/po/ru/LC_MESSAGES/sandbox-permissions.po b/po/ru/LC_MESSAGES/sandbox-permissions.po index cae5bed0..6688ecf6 100644 --- a/po/ru/LC_MESSAGES/sandbox-permissions.po +++ b/po/ru/LC_MESSAGES/sandbox-permissions.po @@ -8,7 +8,7 @@ msgid "" msgstr "" "Project-Id-Version: Flatpak\n" "Report-Msgid-Bugs-To: https://github.com/flatpak/flatpak-docs/issues\n" -"POT-Creation-Date: 2025-02-05 01:10+0530\n" +"POT-Creation-Date: 2025-02-21 08:22+0530\n" "PO-Revision-Date: 2023-11-06 23:55+0700\n" "Last-Translator: Dmitry \n" "Language: ru\n" @@ -18,7 +18,7 @@ msgstr "" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=utf-8\n" "Content-Transfer-Encoding: 8bit\n" -"Generated-By: Babel 2.16.0\n" +"Generated-By: Babel 2.17.0\n" #: ../../sandbox-permissions.rst:2 msgid "Sandbox Permissions" @@ -361,18 +361,14 @@ msgid "**Talk**" msgstr "**Разговор**" #: ../../sandbox-permissions.rst:135 -msgid "" -"Talk permissions can be freely used, although it is recommended to use " -"the minimum required." +msgid "It is recommended to use the minimum required talk-name permissions." msgstr "" -"Разрешения на разговоры можно использовать свободно, хотя им " -"рекомендуется пользоваться минимально." -#: ../../sandbox-permissions.rst:139 +#: ../../sandbox-permissions.rst:138 msgid "Filesystem access" msgstr "Доступ к файловой системе" -#: ../../sandbox-permissions.rst:141 +#: ../../sandbox-permissions.rst:140 #, fuzzy msgid "" "As a general rule, static and permanent filesystem access should be " @@ -381,7 +377,7 @@ msgstr "" "Как правило, доступ к файловой системе должен быть максимально ограничен." " Это включает:" -#: ../../sandbox-permissions.rst:144 +#: ../../sandbox-permissions.rst:143 msgid "" "Using portals as an alternative to blanket filesystem access, wherever " "possible." @@ -389,268 +385,269 @@ msgstr "" "Использование порталов в качестве альтернативы общему доступу к файловой " "системе везде, где это возможно." -#: ../../sandbox-permissions.rst:146 +#: ../../sandbox-permissions.rst:145 msgid "Using read-only access wherever possible, using the ``:ro`` option." msgstr "" "Использование доступа только для чтения везде, где это возможно, с " "использованием параметра ``:ro``." -#: ../../sandbox-permissions.rst:147 +#: ../../sandbox-permissions.rst:146 msgid "" "Using :ref:`conventions:XDG base directories` to store application's " "cache, config and state. Then no additional filesystem access would be " "required." msgstr "" -#: ../../sandbox-permissions.rst:150 +#: ../../sandbox-permissions.rst:149 msgid "" "Avoiding full home access and instead using XDG directories such as " "``xdg-music`` or ``xdg-download`` etc." msgstr "" -#: ../../sandbox-permissions.rst:153 +#: ../../sandbox-permissions.rst:152 msgid "The following permission options are available:" msgstr "" -#: ../../sandbox-permissions.rst:155 +#: ../../sandbox-permissions.rst:154 msgid "``:ro`` - read-only access" msgstr "" -#: ../../sandbox-permissions.rst:156 +#: ../../sandbox-permissions.rst:155 msgid "" "``:create`` - read/write access, and create the directory if it doesn't " "exist" msgstr "" -#: ../../sandbox-permissions.rst:159 +#: ../../sandbox-permissions.rst:158 msgid "Additionally the following permissions are available:" msgstr "" -#: ../../sandbox-permissions.rst:162 +#: ../../sandbox-permissions.rst:161 msgid "``host``" msgstr "" -#: ../../sandbox-permissions.rst:162 +#: ../../sandbox-permissions.rst:161 msgid "" "Access to ``/home, /media, /opt, /run/media, /srv`` and everything " "provided by ``host-os, host-etc`` mounted in ``/run/host``" msgstr "" -#: ../../sandbox-permissions.rst:162 ../../sandbox-permissions.rst:166 -#: ../../sandbox-permissions.rst:167 +#: ../../sandbox-permissions.rst:161 ../../sandbox-permissions.rst:165 +#: ../../sandbox-permissions.rst:166 msgid "Includes any subpaths" msgstr "" -#: ../../sandbox-permissions.rst:163 +#: ../../sandbox-permissions.rst:162 msgid "``host-etc``" msgstr "" -#: ../../sandbox-permissions.rst:163 +#: ../../sandbox-permissions.rst:162 msgid "Host's ``/etc``" msgstr "" -#: ../../sandbox-permissions.rst:163 +#: ../../sandbox-permissions.rst:162 msgid "Host's ``/etc`` is mounted at ``/run/host/etc``" msgstr "" -#: ../../sandbox-permissions.rst:164 +#: ../../sandbox-permissions.rst:163 msgid "``host-os``" msgstr "" -#: ../../sandbox-permissions.rst:164 +#: ../../sandbox-permissions.rst:163 +#, python-brace-format msgid "" "Host's ``/usr, /bin, /sbin, /lib{32, 64}, /etc/ld.so.cache, " "/etc/alternatives``" msgstr "" -#: ../../sandbox-permissions.rst:164 +#: ../../sandbox-permissions.rst:163 msgid "Mounted at ``/run/host``" msgstr "" -#: ../../sandbox-permissions.rst:165 +#: ../../sandbox-permissions.rst:164 msgid "``home``" msgstr "" -#: ../../sandbox-permissions.rst:165 +#: ../../sandbox-permissions.rst:164 #, fuzzy msgid "Access the home directory" msgstr "``--filesystem=home`` - доступ к домашнему каталогу пользователя" -#: ../../sandbox-permissions.rst:165 +#: ../../sandbox-permissions.rst:164 msgid "Except ``~/.var/app``" msgstr "" -#: ../../sandbox-permissions.rst:166 +#: ../../sandbox-permissions.rst:165 msgid "``/some/dir``" msgstr "" -#: ../../sandbox-permissions.rst:166 +#: ../../sandbox-permissions.rst:165 msgid "Access an arbitrary path except any reserved path" msgstr "" -#: ../../sandbox-permissions.rst:167 +#: ../../sandbox-permissions.rst:166 msgid "``~/some/dir``" msgstr "" -#: ../../sandbox-permissions.rst:167 +#: ../../sandbox-permissions.rst:166 msgid "Arbitrary path relative to the home directory" msgstr "" -#: ../../sandbox-permissions.rst:168 +#: ../../sandbox-permissions.rst:167 msgid "``xdg-desktop``" msgstr "" -#: ../../sandbox-permissions.rst:168 +#: ../../sandbox-permissions.rst:167 msgid "Access the XDG desktop directory" msgstr "" -#: ../../sandbox-permissions.rst:168 +#: ../../sandbox-permissions.rst:167 msgid "``$XDG_DESKTOP_DIR`` or ``$HOME/Desktop``" msgstr "" -#: ../../sandbox-permissions.rst:169 +#: ../../sandbox-permissions.rst:168 msgid "``xdg-documents``" msgstr "" -#: ../../sandbox-permissions.rst:169 +#: ../../sandbox-permissions.rst:168 msgid "Access the XDG documents directory" msgstr "" -#: ../../sandbox-permissions.rst:169 +#: ../../sandbox-permissions.rst:168 msgid "``$XDG_DOCUMENTS_DIR`` or ``$HOME/Documents``" msgstr "" -#: ../../sandbox-permissions.rst:170 +#: ../../sandbox-permissions.rst:169 msgid "``xdg-download``" msgstr "" -#: ../../sandbox-permissions.rst:170 +#: ../../sandbox-permissions.rst:169 msgid "Access the XDG download directory" msgstr "" -#: ../../sandbox-permissions.rst:170 +#: ../../sandbox-permissions.rst:169 msgid "``$XDG_DOWNLOAD_DIR`` or ``$HOME/Downloads``" msgstr "" -#: ../../sandbox-permissions.rst:171 +#: ../../sandbox-permissions.rst:170 msgid "``xdg-music``" msgstr "" -#: ../../sandbox-permissions.rst:171 +#: ../../sandbox-permissions.rst:170 msgid "Access the XDG music directory" msgstr "" -#: ../../sandbox-permissions.rst:171 +#: ../../sandbox-permissions.rst:170 msgid "``$XDG_MUSIC_DIR`` or ``$HOME/Music``" msgstr "" -#: ../../sandbox-permissions.rst:172 +#: ../../sandbox-permissions.rst:171 msgid "``xdg-pictures``" msgstr "" -#: ../../sandbox-permissions.rst:172 +#: ../../sandbox-permissions.rst:171 msgid "Access the XDG pictures directory" msgstr "" -#: ../../sandbox-permissions.rst:172 +#: ../../sandbox-permissions.rst:171 msgid "``$XDG_PICTURES_DIR`` or ``$HOME/Pictures``" msgstr "" -#: ../../sandbox-permissions.rst:173 +#: ../../sandbox-permissions.rst:172 msgid "``xdg-public-share``" msgstr "" -#: ../../sandbox-permissions.rst:173 +#: ../../sandbox-permissions.rst:172 msgid "Access the XDG public directory" msgstr "" -#: ../../sandbox-permissions.rst:173 +#: ../../sandbox-permissions.rst:172 msgid "``$XDG_PUBLICSHARE_DIR`` or ``$HOME/Public``" msgstr "" -#: ../../sandbox-permissions.rst:174 +#: ../../sandbox-permissions.rst:173 msgid "``xdg-videos``" msgstr "" -#: ../../sandbox-permissions.rst:174 +#: ../../sandbox-permissions.rst:173 msgid "Access the XDG videos directory" msgstr "" -#: ../../sandbox-permissions.rst:174 +#: ../../sandbox-permissions.rst:173 msgid "``$XDG_VIDEOS_DIR`` or ``$HOME/Videos``" msgstr "" -#: ../../sandbox-permissions.rst:175 +#: ../../sandbox-permissions.rst:174 msgid "``xdg-templates``" msgstr "" -#: ../../sandbox-permissions.rst:175 +#: ../../sandbox-permissions.rst:174 msgid "Access the XDG templates directory" msgstr "" -#: ../../sandbox-permissions.rst:175 +#: ../../sandbox-permissions.rst:174 msgid "``$XDG_TEMPLATES_DIR`` or ``$HOME/Templates``" msgstr "" -#: ../../sandbox-permissions.rst:176 +#: ../../sandbox-permissions.rst:175 msgid "``xdg-config``" msgstr "" -#: ../../sandbox-permissions.rst:176 +#: ../../sandbox-permissions.rst:175 msgid "Access the XDG config directory [#f3]_" msgstr "" -#: ../../sandbox-permissions.rst:176 +#: ../../sandbox-permissions.rst:175 msgid "``$XDG_CONFIG_HOME`` or ``$HOME/.config``" msgstr "" -#: ../../sandbox-permissions.rst:177 +#: ../../sandbox-permissions.rst:176 msgid "``xdg-cache``" msgstr "" -#: ../../sandbox-permissions.rst:177 +#: ../../sandbox-permissions.rst:176 msgid "Access the XDG cache directory [#f3]_" msgstr "" -#: ../../sandbox-permissions.rst:177 +#: ../../sandbox-permissions.rst:176 msgid "``$XDG_CACHE_HOME`` or ``$HOME/.cache``" msgstr "" -#: ../../sandbox-permissions.rst:178 +#: ../../sandbox-permissions.rst:177 msgid "``xdg-data``" msgstr "" -#: ../../sandbox-permissions.rst:178 +#: ../../sandbox-permissions.rst:177 msgid "Access the XDG data directory [#f3]_" msgstr "" -#: ../../sandbox-permissions.rst:178 +#: ../../sandbox-permissions.rst:177 msgid "``$XDG_DATA_HOME`` or ``$HOME/.local/share``" msgstr "" -#: ../../sandbox-permissions.rst:179 +#: ../../sandbox-permissions.rst:178 msgid "``xdg-run/path``" msgstr "" -#: ../../sandbox-permissions.rst:179 +#: ../../sandbox-permissions.rst:178 msgid "Access subdirectories of the XDG runtime directory" msgstr "" -#: ../../sandbox-permissions.rst:179 +#: ../../sandbox-permissions.rst:178 msgid "``$XDG_RUNTIME_DIR/path`` (``/run/user/$UID/path``)" msgstr "" -#: ../../sandbox-permissions.rst:182 +#: ../../sandbox-permissions.rst:181 msgid "" "Except ``host, host-etc, host-os`` paths can be added to all the above " "filesystem options. For example, ``--filesystem=xdg-documents/path``." msgstr "" -#: ../../sandbox-permissions.rst:185 +#: ../../sandbox-permissions.rst:184 msgid "Other filesystem access guidelines include:" msgstr "" -#: ../../sandbox-permissions.rst:187 +#: ../../sandbox-permissions.rst:186 #, fuzzy msgid "" "The ``--persist=DIR`` option can be used to map directories from the " @@ -664,7 +661,7 @@ msgstr "" "быть полезно для приложений, которые жестко шифруют пути к файлам в " "``~/``." -#: ../../sandbox-permissions.rst:192 +#: ../../sandbox-permissions.rst:191 msgid "" "For example, if an application hardcodes the directory ``~/.foo``, " "without any ``home`` access and no ``--persist`` the directory will be " @@ -675,18 +672,18 @@ msgid "" "``~/.var/app/$FLATPAK_ID/.foo`` which would otherwise be lost." msgstr "" -#: ../../sandbox-permissions.rst:200 +#: ../../sandbox-permissions.rst:199 msgid "A ``--persist=.`` will `persist` all directories." msgstr "" -#: ../../sandbox-permissions.rst:202 +#: ../../sandbox-permissions.rst:201 msgid "" "This does not support ``:create, :ro, :rw`` suffixes or special values " "like ``xdg-documents``. However, the directory will be created by flatpak" " if it doesn't already exist." msgstr "" -#: ../../sandbox-permissions.rst:206 +#: ../../sandbox-permissions.rst:205 #, fuzzy msgid "" "This makes it possible to avoid configuring access to the entire home " @@ -699,7 +696,7 @@ msgstr "" "быть полезно для приложений, которые жестко шифруют пути к файлам в " "``~/``." -#: ../../sandbox-permissions.rst:209 +#: ../../sandbox-permissions.rst:208 #, fuzzy msgid "" "If an application uses ``$TMPDIR`` to contain lock files you may want to " @@ -710,7 +707,7 @@ msgstr "" "блокировки, вы можете добавить скрипт обертки, который устанавливает его " "на ``$XDG_RUNTIME_DIR/app/$FLATPAK_ID``." -#: ../../sandbox-permissions.rst:213 +#: ../../sandbox-permissions.rst:212 msgid "" "Retaining and sharing configuration with non-Flatpak installations is to " "be avoided." @@ -718,17 +715,17 @@ msgstr "" "Сохранение и совместное использование конфигурация с установкой отличной " "от Flatpak следует избегать." -#: ../../sandbox-permissions.rst:217 +#: ../../sandbox-permissions.rst:216 msgid "Reserved Paths" msgstr "" -#: ../../sandbox-permissions.rst:219 +#: ../../sandbox-permissions.rst:218 msgid "" "The following paths and subpaths of them are reserved and asking access " "to them with ``--filesystem`` will have no effect::" msgstr "" -#: ../../sandbox-permissions.rst:224 +#: ../../sandbox-permissions.rst:223 msgid "" "The entire ``/run`` is not allowed and all subpaths of ``/run`` except " "``/run/flatpak, /run/host`` is allowed to be exposed via " @@ -736,44 +733,45 @@ msgid "" "``../run``, exposing it or a subpath of it, is not allowed." msgstr "" -#: ../../sandbox-permissions.rst:229 +#: ../../sandbox-permissions.rst:228 msgid "" "Additionally the following directories from host need to be explicitly " "requested with ``--filesystem`` and are not available with ``home, host, " "host-os, host-etc`` by default:" msgstr "" -#: ../../sandbox-permissions.rst:233 +#: ../../sandbox-permissions.rst:232 msgid "" "``~/.var/app`` - The app can access only its own directory in " "``~/.var/app/$FLATPAK_ID``" msgstr "" -#: ../../sandbox-permissions.rst:234 +#: ../../sandbox-permissions.rst:233 msgid "``$XDG_DATA_HOME/flatpak`` (``~/.local/share/flatpak``)" msgstr "" -#: ../../sandbox-permissions.rst:235 +#: ../../sandbox-permissions.rst:234 msgid "``/boot``" msgstr "" -#: ../../sandbox-permissions.rst:236 +#: ../../sandbox-permissions.rst:235 msgid "``/efi``" msgstr "" -#: ../../sandbox-permissions.rst:237 +#: ../../sandbox-permissions.rst:236 msgid "``/root``" msgstr "" -#: ../../sandbox-permissions.rst:238 +#: ../../sandbox-permissions.rst:237 msgid "``/sys``" msgstr "" -#: ../../sandbox-permissions.rst:239 +#: ../../sandbox-permissions.rst:238 msgid "``/tmp``" msgstr "" -#: ../../sandbox-permissions.rst:240 +#: ../../sandbox-permissions.rst:239 +#, python-brace-format msgid "" "``/var`` - Note that by default ``/var/{cache, config, data, tmp}`` " "inside the sandbox are the same as ``~/.var/app/$FLATPAK_ID/{cache, " @@ -782,76 +780,76 @@ msgid "" "available." msgstr "" -#: ../../sandbox-permissions.rst:244 +#: ../../sandbox-permissions.rst:243 msgid "``/var/lib/flatpak`` - ``/var`` does not give access to this." msgstr "" -#: ../../sandbox-permissions.rst:247 +#: ../../sandbox-permissions.rst:246 msgid "Device access" msgstr "Доступ к устройству" -#: ../../sandbox-permissions.rst:248 +#: ../../sandbox-permissions.rst:247 msgid "You can provide the following device permissions:" msgstr "" -#: ../../sandbox-permissions.rst:251 +#: ../../sandbox-permissions.rst:250 msgid "``dri``" msgstr "" -#: ../../sandbox-permissions.rst:251 +#: ../../sandbox-permissions.rst:250 msgid "Direct Rendering Interface. Necessary for GL." msgstr "" -#: ../../sandbox-permissions.rst:252 +#: ../../sandbox-permissions.rst:251 msgid "``kvm``" msgstr "" -#: ../../sandbox-permissions.rst:252 +#: ../../sandbox-permissions.rst:251 msgid "Kernel based Virtual Machine ``/dev/kvm``" msgstr "" -#: ../../sandbox-permissions.rst:253 +#: ../../sandbox-permissions.rst:252 msgid "``shm``" msgstr "" -#: ../../sandbox-permissions.rst:253 +#: ../../sandbox-permissions.rst:252 msgid "Shared Memory in ``/dev/shm``." msgstr "" -#: ../../sandbox-permissions.rst:254 +#: ../../sandbox-permissions.rst:253 msgid "``input``" msgstr "" -#: ../../sandbox-permissions.rst:254 +#: ../../sandbox-permissions.rst:253 msgid "" "Input devices as exposed in ``/dev/input``. This includes game " "controllers. Since Flatpak 1.15.6." msgstr "" -#: ../../sandbox-permissions.rst:255 +#: ../../sandbox-permissions.rst:254 msgid "``usb``" msgstr "" -#: ../../sandbox-permissions.rst:255 +#: ../../sandbox-permissions.rst:254 msgid "Raw USB devices as exposed in ``/dev/bus/usb``. Since Flatpak 1.15.11." msgstr "" -#: ../../sandbox-permissions.rst:256 +#: ../../sandbox-permissions.rst:255 msgid "``all``" msgstr "" -#: ../../sandbox-permissions.rst:256 +#: ../../sandbox-permissions.rst:255 msgid "All devices, including all of the above except ``shm``" msgstr "" -#: ../../sandbox-permissions.rst:261 +#: ../../sandbox-permissions.rst:260 msgid "" "Using newer permissions like ``input`` or ``usb`` will have no effect on " "older Flatpak versions and will fail when used through Flatpak " "commandline." msgstr "" -#: ../../sandbox-permissions.rst:265 +#: ../../sandbox-permissions.rst:264 #, fuzzy msgid "" "While not ideal, ``--device=all`` can be used to access devices like " @@ -860,22 +858,22 @@ msgstr "" "Хотя это и не совсем хорошо, ``--device=all`` можно использовать для " "доступа к таким устройствам, как контроллеры или веб-камеры." -#: ../../sandbox-permissions.rst:269 +#: ../../sandbox-permissions.rst:268 #, fuzzy msgid "USB portal" msgstr "Порталы" -#: ../../sandbox-permissions.rst:271 +#: ../../sandbox-permissions.rst:270 msgid "Since 1.5.11." msgstr "" -#: ../../sandbox-permissions.rst:273 +#: ../../sandbox-permissions.rst:272 msgid "" "Sandboxed access to individual USB devices can be controlled by portals. " "Flatpak allows specifying enumerable USB devices to allow access." msgstr "" -#: ../../sandbox-permissions.rst:277 +#: ../../sandbox-permissions.rst:276 msgid "" "Like ``--device=usb``, this is just about accessing the raw USB device, " "that needs libusb (or equivalent). By using the portal, you can restrict " @@ -884,59 +882,59 @@ msgid "" "no reason for USB security devices to be accessible." msgstr "" -#: ../../sandbox-permissions.rst:284 +#: ../../sandbox-permissions.rst:283 msgid "" "A list of valid use cases includes scanners (handled, for example by " "SANE), photo cameras (handled by libgphoto2), flashing devices, etc." msgstr "" -#: ../../sandbox-permissions.rst:287 +#: ../../sandbox-permissions.rst:286 msgid "" "While this is portal dependent and ``xdg-desktop-portal`` is currently " "the only portal implementation, the overall permission flow is as " "follows:" msgstr "" -#: ../../sandbox-permissions.rst:291 +#: ../../sandbox-permissions.rst:290 msgid "" "The Flatpak package specifies the devices it wishes to enumerate through " "``finish-args``." msgstr "" -#: ../../sandbox-permissions.rst:293 +#: ../../sandbox-permissions.rst:292 msgid "" "The application requests the portal to enumerate the available USB " "devices based on that list. If the list is empty it will enumerate all " "USB devices." msgstr "" -#: ../../sandbox-permissions.rst:296 +#: ../../sandbox-permissions.rst:295 msgid "" "When the application wants to access the device, it will make a request " "for the device it wants to access via the portal." msgstr "" -#: ../../sandbox-permissions.rst:298 +#: ../../sandbox-permissions.rst:297 msgid "The portal then requests permission from the user if not already granted." msgstr "" -#: ../../sandbox-permissions.rst:300 +#: ../../sandbox-permissions.rst:299 msgid "" "If the permission was granted, a file descriptor for the device is passed" " back to the application." msgstr "" -#: ../../sandbox-permissions.rst:303 +#: ../../sandbox-permissions.rst:302 msgid "" "The application is then able to open the devices it is supposed to use " "while the others would be hidden." msgstr "" -#: ../../sandbox-permissions.rst:307 +#: ../../sandbox-permissions.rst:306 msgid "Specifying the enumerable devices" msgstr "" -#: ../../sandbox-permissions.rst:309 +#: ../../sandbox-permissions.rst:308 msgid "" "You can specify devices on the ``flatpak`` command line, and by extension" " in the finish arguments for Flatpak Builder. Enumerable devices are " @@ -947,17 +945,17 @@ msgid "" " shall not be enumerated." msgstr "" -#: ../../sandbox-permissions.rst:317 +#: ../../sandbox-permissions.rst:316 msgid "Queries are made out of rules. These rules are composable with ``+``." msgstr "" -#: ../../sandbox-permissions.rst:319 +#: ../../sandbox-permissions.rst:318 msgid "" "The rule ``all`` enumerates every USB device. There is no further rule " "allowed in the query." msgstr "" -#: ../../sandbox-permissions.rst:322 +#: ../../sandbox-permissions.rst:321 msgid "" "The ``vnd`` and ``dev`` rules specify a USB vendor and a USB device ID " "respectively. A vendor can be specified alone, but a device rule always " @@ -967,63 +965,63 @@ msgid "" "repository `_" msgstr "" -#: ../../sandbox-permissions.rst:329 +#: ../../sandbox-permissions.rst:328 msgid "" "``cls`` specifies the device USB class and subclass. Both class and " "subclass are two digit hex numbers separated by a colon ``:``. You can " "use ``*`` to specify any subclass within the class." msgstr "" -#: ../../sandbox-permissions.rst:333 +#: ../../sandbox-permissions.rst:332 msgid "Some examples of the syntax:" msgstr "" -#: ../../sandbox-permissions.rst:335 +#: ../../sandbox-permissions.rst:334 msgid "``vnd:1234``: Devices from vendor ``1234``" msgstr "" -#: ../../sandbox-permissions.rst:336 +#: ../../sandbox-permissions.rst:335 msgid "``vnd:1234+dev:3456``: Only device ``3456`` from vendor ``1234``." msgstr "" -#: ../../sandbox-permissions.rst:337 +#: ../../sandbox-permissions.rst:336 msgid "``vnd:1234+cls:06:*``: All the PTP devices from vendor ``1234``." msgstr "" -#: ../../sandbox-permissions.rst:338 +#: ../../sandbox-permissions.rst:337 msgid "``cls:06:*``: All the PTP devices." msgstr "" -#: ../../sandbox-permissions.rst:340 +#: ../../sandbox-permissions.rst:339 msgid "" "This permission only allows to enumerate devices. To open them, " "permission must be requested from the portal. It is not possible to open " "a device that is not enumerable." msgstr "" -#: ../../sandbox-permissions.rst:346 +#: ../../sandbox-permissions.rst:345 msgid "" "The ``--device=usb`` permission is broader than what the USB portal is " "supposed to provide and allows unfettered access to any USB device on the" " bus." msgstr "" -#: ../../sandbox-permissions.rst:350 +#: ../../sandbox-permissions.rst:349 msgid "In some situations you may need to specify a very long list of devices." msgstr "" -#: ../../sandbox-permissions.rst:352 +#: ../../sandbox-permissions.rst:351 msgid "Device lists can be passed in one single argument, or through a file." msgstr "" -#: ../../sandbox-permissions.rst:354 +#: ../../sandbox-permissions.rst:353 msgid "" "When using ``--usb-list``, the queries are separated by a semi-colon " "``;``, with queries for hidden devices (i.e. those that would be passed " "with ``--nousb``) prefixed with ``!``." msgstr "" -#: ../../sandbox-permissions.rst:358 +#: ../../sandbox-permissions.rst:357 msgid "" "When using ``--usb-list-file``, the filename of the file containing USB " "queries is passed line by line. Like with ``--usb-list`` queries for " @@ -1033,11 +1031,11 @@ msgid "" "list is persisted internally." msgstr "" -#: ../../sandbox-permissions.rst:366 +#: ../../sandbox-permissions.rst:365 msgid "dconf access" msgstr "доступ к dconf" -#: ../../sandbox-permissions.rst:368 +#: ../../sandbox-permissions.rst:367 msgid "" "As of xdg-desktop-portal 1.1.0 and glib 2.60.5 (in the runtime) you do " "not need direct DConf access in most cases." @@ -1045,7 +1043,7 @@ msgstr "" "По состоянию на xdg-desktop-portal 1.1.0 и glib 2.60.5 (во время " "выполнения) вам не нужен прямой доступ DConf в большинстве случаев." -#: ../../sandbox-permissions.rst:371 +#: ../../sandbox-permissions.rst:370 msgid "" "As of now this glib version is included in " "``org.freedesktop.Platform//19.08`` and ``org.gnome.Platform//3.34`` and " @@ -1055,7 +1053,7 @@ msgstr "" "``org.freedesktop.Platform//19.08`` and ``org.gnome.Platform//3.34`` и " "новее." -#: ../../sandbox-permissions.rst:374 +#: ../../sandbox-permissions.rst:373 msgid "" "If an application existed prior to these runtimes you can tell Flatpak " "(>= 1.3.4) to migrate the DConf settings on the host into the sandbox by " @@ -1069,7 +1067,7 @@ msgstr "" "args``. Путь должен быть похож на ваше ID приложения или его не допущено" " (случай игнорируется и ``_`` и ``-`` , обработанные одинаково)." -#: ../../sandbox-permissions.rst:381 +#: ../../sandbox-permissions.rst:380 msgid "" "If you are targeting older runtimes or require direct DConf access for " "other reasons you can use these permissions::" @@ -1077,11 +1075,11 @@ msgstr "" "Если вы нацеливаете более старые runtimes или требуют прямых доступа " "DConf по другим причинам, вы можете использовать эти разрешения::" -#: ../../sandbox-permissions.rst:389 +#: ../../sandbox-permissions.rst:388 msgid "With those permissions glib will continue using dconf directly." msgstr "С этими разрешениями glib продолжит использовать dconf напрямую." -#: ../../sandbox-permissions.rst:391 +#: ../../sandbox-permissions.rst:390 msgid "" "If you use a newer runtime where dconf is no longer built and still need " "it you will have to build the `dconf " @@ -1089,11 +1087,11 @@ msgid "" "``--env=GIO_EXTRA_MODULES=/app/lib/gio/modules/``." msgstr "" -#: ../../sandbox-permissions.rst:396 +#: ../../sandbox-permissions.rst:395 msgid "gvfs access" msgstr "gvfs-доступ" -#: ../../sandbox-permissions.rst:398 +#: ../../sandbox-permissions.rst:397 msgid "" "As of gvfs 1.48, the gvfs daemons and applications use an on-disk socket " "to communicate, rather than an abstract socket so that the gvfs " @@ -1105,7 +1103,7 @@ msgstr "" "работать, когда поддержка сети отключена в изолированной программной " "среде приложения." -#: ../../sandbox-permissions.rst:402 +#: ../../sandbox-permissions.rst:401 msgid "" "A number of different options need to be passed depending on the " "application's use of gvfs." @@ -1113,7 +1111,7 @@ msgstr "" "В зависимости от того, как приложение использует gvfs, необходимо " "передать ряд различных параметров." -#: ../../sandbox-permissions.rst:405 +#: ../../sandbox-permissions.rst:404 msgid "" "``--talk-name=org.gtk.vfs.*`` is necessary to talk to the gvfs daemons " "over D-Bus and list mounts using the GIO APIs." @@ -1121,7 +1119,7 @@ msgstr "" "``--talk-name=org.gtk.vfs.*`` необходим для связи с демонами gvfs через " "D-Bus и составления списка подключений с использованием GIO APIs." -#: ../../sandbox-permissions.rst:408 +#: ../../sandbox-permissions.rst:407 msgid "" "``--filesystem=xdg-run/gvfsd`` is necessary to use the GIO APIs to list " "and access non-native files using the GIO APIs, using URLs rather than " @@ -1131,7 +1129,7 @@ msgstr "" " для просмотра и доступа к неродным файлам с использованием " "API-интерфейсов GIO, используя URL-адреса, а не пути FUSE." -#: ../../sandbox-permissions.rst:411 +#: ../../sandbox-permissions.rst:410 msgid "" "``--filesystem=xdg-run/gvfs`` is necessary to give access to the FUSE " "mounts non-GIO and legacy applications can use. This is what will make " @@ -1142,15 +1140,15 @@ msgstr "" "приложения. Это то, что заставит родные файлы появиться в ``/run/user/`id" " -u`/gvfs/``." -#: ../../sandbox-permissions.rst:415 +#: ../../sandbox-permissions.rst:414 msgid "Typical GNOME and GTK applications should use::" msgstr "Типичные приложения GNOME и GTK должны использовать::" -#: ../../sandbox-permissions.rst:420 +#: ../../sandbox-permissions.rst:419 msgid "Typical non-GNOME and non-GTK applications should use::" msgstr "Типичные приложения, отличные от GNOME и GTK, должны использовать::" -#: ../../sandbox-permissions.rst:424 +#: ../../sandbox-permissions.rst:423 msgid "" "No application should be using ``--talk-name=org.gtk.vfs`` in its " "manifest, as there are no D-Bus services named ``org.gtk.vfs``." @@ -1158,7 +1156,7 @@ msgstr "" "Ни одно приложение не должно использовать ``--talk-name=org.gtk.vfs`` в " "своем манифесте, так как нет сервисов D-Bus с именем ``org.gtk.vfs``." -#: ../../sandbox-permissions.rst:427 +#: ../../sandbox-permissions.rst:426 msgid "" "These permission grants the app, the ability to communicate with the gvfs" " daemon and backends running on host. Depending on the backends installed" @@ -1174,11 +1172,11 @@ msgid "" "host." msgstr "" -#: ../../sandbox-permissions.rst:441 +#: ../../sandbox-permissions.rst:440 msgid "External drive access" msgstr "" -#: ../../sandbox-permissions.rst:443 +#: ../../sandbox-permissions.rst:442 msgid "" "External drives are mounted by the host system using systemd, udev, udisk" " fstab etc. and each of them can have different defaults. Flatpak has no " @@ -1186,30 +1184,30 @@ msgid "" "permissions should work in most cases::" msgstr "" -#: ../../sandbox-permissions.rst:452 +#: ../../sandbox-permissions.rst:451 msgid "" "If ``--filesystem=host`` is used ``/media, /run/media`` is shared " "automatically if they exist." msgstr "" -#: ../../sandbox-permissions.rst:455 +#: ../../sandbox-permissions.rst:454 msgid "" "Note that these should not have subpaths in them unless the value of the " "subpath can be consistently pre-determined. Block device naming depends " "on the kernel/fstab configuration and cannot be pre-determined." msgstr "" -#: ../../sandbox-permissions.rst:460 +#: ../../sandbox-permissions.rst:459 msgid "Footnotes" msgstr "" -#: ../../sandbox-permissions.rst:461 +#: ../../sandbox-permissions.rst:460 msgid "" "This is not necessarily required, but without it the X11 shared memory " "extension will not work, which is very bad for X11 performance." msgstr "" -#: ../../sandbox-permissions.rst:463 +#: ../../sandbox-permissions.rst:462 msgid "" "Giving network access also grants access to all host services listening " "on abstract Unix sockets (due to how network namespaces work), and these " @@ -1218,7 +1216,8 @@ msgid "" "secure distribution should disable these and just use regular sockets." msgstr "" -#: ../../sandbox-permissions.rst:468 +#: ../../sandbox-permissions.rst:467 +#, python-brace-format msgid "" "``xdg-{cache, config, data}`` bind mounts the paths from host to the per-" "app sandbox directory. Inside the sandbox ``$XDG_CACHE_HOME``, " @@ -1416,3 +1415,12 @@ msgstr "" #~ "the specific D-Bus permissions needed." #~ msgstr "" +#~ msgid "" +#~ "Talk permissions can be freely used, " +#~ "although it is recommended to use " +#~ "the minimum required." +#~ msgstr "" +#~ "Разрешения на разговоры можно использовать " +#~ "свободно, хотя им рекомендуется пользоваться" +#~ " минимально." + diff --git a/po/zh_CN/LC_MESSAGES/sandbox-permissions.po b/po/zh_CN/LC_MESSAGES/sandbox-permissions.po index dab4c4ea..4061385f 100644 --- a/po/zh_CN/LC_MESSAGES/sandbox-permissions.po +++ b/po/zh_CN/LC_MESSAGES/sandbox-permissions.po @@ -4,7 +4,7 @@ msgid "" msgstr "" "Project-Id-Version: Flatpak\n" "Report-Msgid-Bugs-To: \n" -"POT-Creation-Date: 2025-02-05 01:10+0530\n" +"POT-Creation-Date: 2025-02-21 08:22+0530\n" "PO-Revision-Date: 2018-11-03 02:03-0400\n" "Last-Translator: PikachuHy \n" "Language: zh_Hans_CN\n" @@ -13,7 +13,7 @@ msgstr "" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=utf-8\n" "Content-Transfer-Encoding: 8bit\n" -"Generated-By: Babel 2.16.0\n" +"Generated-By: Babel 2.17.0\n" #: ../../sandbox-permissions.rst:2 msgid "Sandbox Permissions" @@ -309,289 +309,287 @@ msgid "**Talk**" msgstr "**Talk**" #: ../../sandbox-permissions.rst:135 -#, fuzzy -msgid "" -"Talk permissions can be freely used, although it is recommended to use " -"the minimum required." -msgstr "Talk权限可以自由使用,尽管如此还是推荐使用应用所需的最小权限。" +msgid "It is recommended to use the minimum required talk-name permissions." +msgstr "" -#: ../../sandbox-permissions.rst:139 +#: ../../sandbox-permissions.rst:138 msgid "Filesystem access" msgstr "文件系统访问" -#: ../../sandbox-permissions.rst:141 +#: ../../sandbox-permissions.rst:140 #, fuzzy msgid "" "As a general rule, static and permanent filesystem access should be " "limited as much as possible. This includes:" msgstr "作为一个通用规则,对文件系统的访问应该尽可能地进行限制。这包括:" -#: ../../sandbox-permissions.rst:144 +#: ../../sandbox-permissions.rst:143 msgid "" "Using portals as an alternative to blanket filesystem access, wherever " "possible." msgstr "尽量使用门户来代替文件系统访问。" -#: ../../sandbox-permissions.rst:146 +#: ../../sandbox-permissions.rst:145 msgid "Using read-only access wherever possible, using the ``:ro`` option." msgstr "尽量使用读取权限来访问,使用 ``:ro`` 选项。" -#: ../../sandbox-permissions.rst:147 +#: ../../sandbox-permissions.rst:146 msgid "" "Using :ref:`conventions:XDG base directories` to store application's " "cache, config and state. Then no additional filesystem access would be " "required." msgstr "" -#: ../../sandbox-permissions.rst:150 +#: ../../sandbox-permissions.rst:149 msgid "" "Avoiding full home access and instead using XDG directories such as " "``xdg-music`` or ``xdg-download`` etc." msgstr "" -#: ../../sandbox-permissions.rst:153 +#: ../../sandbox-permissions.rst:152 msgid "The following permission options are available:" msgstr "" -#: ../../sandbox-permissions.rst:155 +#: ../../sandbox-permissions.rst:154 msgid "``:ro`` - read-only access" msgstr "" -#: ../../sandbox-permissions.rst:156 +#: ../../sandbox-permissions.rst:155 msgid "" "``:create`` - read/write access, and create the directory if it doesn't " "exist" msgstr "" -#: ../../sandbox-permissions.rst:159 +#: ../../sandbox-permissions.rst:158 msgid "Additionally the following permissions are available:" msgstr "" -#: ../../sandbox-permissions.rst:162 +#: ../../sandbox-permissions.rst:161 msgid "``host``" msgstr "" -#: ../../sandbox-permissions.rst:162 +#: ../../sandbox-permissions.rst:161 msgid "" "Access to ``/home, /media, /opt, /run/media, /srv`` and everything " "provided by ``host-os, host-etc`` mounted in ``/run/host``" msgstr "" -#: ../../sandbox-permissions.rst:162 ../../sandbox-permissions.rst:166 -#: ../../sandbox-permissions.rst:167 +#: ../../sandbox-permissions.rst:161 ../../sandbox-permissions.rst:165 +#: ../../sandbox-permissions.rst:166 msgid "Includes any subpaths" msgstr "" -#: ../../sandbox-permissions.rst:163 +#: ../../sandbox-permissions.rst:162 msgid "``host-etc``" msgstr "" -#: ../../sandbox-permissions.rst:163 +#: ../../sandbox-permissions.rst:162 msgid "Host's ``/etc``" msgstr "" -#: ../../sandbox-permissions.rst:163 +#: ../../sandbox-permissions.rst:162 msgid "Host's ``/etc`` is mounted at ``/run/host/etc``" msgstr "" -#: ../../sandbox-permissions.rst:164 +#: ../../sandbox-permissions.rst:163 msgid "``host-os``" msgstr "" -#: ../../sandbox-permissions.rst:164 +#: ../../sandbox-permissions.rst:163 +#, python-brace-format msgid "" "Host's ``/usr, /bin, /sbin, /lib{32, 64}, /etc/ld.so.cache, " "/etc/alternatives``" msgstr "" -#: ../../sandbox-permissions.rst:164 +#: ../../sandbox-permissions.rst:163 msgid "Mounted at ``/run/host``" msgstr "" -#: ../../sandbox-permissions.rst:165 +#: ../../sandbox-permissions.rst:164 msgid "``home``" msgstr "" -#: ../../sandbox-permissions.rst:165 +#: ../../sandbox-permissions.rst:164 #, fuzzy msgid "Access the home directory" msgstr "``--filesystem=home`` - 访问用户home目录" -#: ../../sandbox-permissions.rst:165 +#: ../../sandbox-permissions.rst:164 msgid "Except ``~/.var/app``" msgstr "" -#: ../../sandbox-permissions.rst:166 +#: ../../sandbox-permissions.rst:165 msgid "``/some/dir``" msgstr "" -#: ../../sandbox-permissions.rst:166 +#: ../../sandbox-permissions.rst:165 msgid "Access an arbitrary path except any reserved path" msgstr "" -#: ../../sandbox-permissions.rst:167 +#: ../../sandbox-permissions.rst:166 msgid "``~/some/dir``" msgstr "" -#: ../../sandbox-permissions.rst:167 +#: ../../sandbox-permissions.rst:166 msgid "Arbitrary path relative to the home directory" msgstr "" -#: ../../sandbox-permissions.rst:168 +#: ../../sandbox-permissions.rst:167 msgid "``xdg-desktop``" msgstr "" -#: ../../sandbox-permissions.rst:168 +#: ../../sandbox-permissions.rst:167 msgid "Access the XDG desktop directory" msgstr "" -#: ../../sandbox-permissions.rst:168 +#: ../../sandbox-permissions.rst:167 msgid "``$XDG_DESKTOP_DIR`` or ``$HOME/Desktop``" msgstr "" -#: ../../sandbox-permissions.rst:169 +#: ../../sandbox-permissions.rst:168 msgid "``xdg-documents``" msgstr "" -#: ../../sandbox-permissions.rst:169 +#: ../../sandbox-permissions.rst:168 msgid "Access the XDG documents directory" msgstr "" -#: ../../sandbox-permissions.rst:169 +#: ../../sandbox-permissions.rst:168 msgid "``$XDG_DOCUMENTS_DIR`` or ``$HOME/Documents``" msgstr "" -#: ../../sandbox-permissions.rst:170 +#: ../../sandbox-permissions.rst:169 msgid "``xdg-download``" msgstr "" -#: ../../sandbox-permissions.rst:170 +#: ../../sandbox-permissions.rst:169 msgid "Access the XDG download directory" msgstr "" -#: ../../sandbox-permissions.rst:170 +#: ../../sandbox-permissions.rst:169 msgid "``$XDG_DOWNLOAD_DIR`` or ``$HOME/Downloads``" msgstr "" -#: ../../sandbox-permissions.rst:171 +#: ../../sandbox-permissions.rst:170 msgid "``xdg-music``" msgstr "" -#: ../../sandbox-permissions.rst:171 +#: ../../sandbox-permissions.rst:170 msgid "Access the XDG music directory" msgstr "" -#: ../../sandbox-permissions.rst:171 +#: ../../sandbox-permissions.rst:170 msgid "``$XDG_MUSIC_DIR`` or ``$HOME/Music``" msgstr "" -#: ../../sandbox-permissions.rst:172 +#: ../../sandbox-permissions.rst:171 msgid "``xdg-pictures``" msgstr "" -#: ../../sandbox-permissions.rst:172 +#: ../../sandbox-permissions.rst:171 msgid "Access the XDG pictures directory" msgstr "" -#: ../../sandbox-permissions.rst:172 +#: ../../sandbox-permissions.rst:171 msgid "``$XDG_PICTURES_DIR`` or ``$HOME/Pictures``" msgstr "" -#: ../../sandbox-permissions.rst:173 +#: ../../sandbox-permissions.rst:172 msgid "``xdg-public-share``" msgstr "" -#: ../../sandbox-permissions.rst:173 +#: ../../sandbox-permissions.rst:172 msgid "Access the XDG public directory" msgstr "" -#: ../../sandbox-permissions.rst:173 +#: ../../sandbox-permissions.rst:172 msgid "``$XDG_PUBLICSHARE_DIR`` or ``$HOME/Public``" msgstr "" -#: ../../sandbox-permissions.rst:174 +#: ../../sandbox-permissions.rst:173 msgid "``xdg-videos``" msgstr "" -#: ../../sandbox-permissions.rst:174 +#: ../../sandbox-permissions.rst:173 msgid "Access the XDG videos directory" msgstr "" -#: ../../sandbox-permissions.rst:174 +#: ../../sandbox-permissions.rst:173 msgid "``$XDG_VIDEOS_DIR`` or ``$HOME/Videos``" msgstr "" -#: ../../sandbox-permissions.rst:175 +#: ../../sandbox-permissions.rst:174 msgid "``xdg-templates``" msgstr "" -#: ../../sandbox-permissions.rst:175 +#: ../../sandbox-permissions.rst:174 msgid "Access the XDG templates directory" msgstr "" -#: ../../sandbox-permissions.rst:175 +#: ../../sandbox-permissions.rst:174 msgid "``$XDG_TEMPLATES_DIR`` or ``$HOME/Templates``" msgstr "" -#: ../../sandbox-permissions.rst:176 +#: ../../sandbox-permissions.rst:175 msgid "``xdg-config``" msgstr "" -#: ../../sandbox-permissions.rst:176 +#: ../../sandbox-permissions.rst:175 msgid "Access the XDG config directory [#f3]_" msgstr "" -#: ../../sandbox-permissions.rst:176 +#: ../../sandbox-permissions.rst:175 msgid "``$XDG_CONFIG_HOME`` or ``$HOME/.config``" msgstr "" -#: ../../sandbox-permissions.rst:177 +#: ../../sandbox-permissions.rst:176 msgid "``xdg-cache``" msgstr "" -#: ../../sandbox-permissions.rst:177 +#: ../../sandbox-permissions.rst:176 msgid "Access the XDG cache directory [#f3]_" msgstr "" -#: ../../sandbox-permissions.rst:177 +#: ../../sandbox-permissions.rst:176 msgid "``$XDG_CACHE_HOME`` or ``$HOME/.cache``" msgstr "" -#: ../../sandbox-permissions.rst:178 +#: ../../sandbox-permissions.rst:177 msgid "``xdg-data``" msgstr "" -#: ../../sandbox-permissions.rst:178 +#: ../../sandbox-permissions.rst:177 msgid "Access the XDG data directory [#f3]_" msgstr "" -#: ../../sandbox-permissions.rst:178 +#: ../../sandbox-permissions.rst:177 msgid "``$XDG_DATA_HOME`` or ``$HOME/.local/share``" msgstr "" -#: ../../sandbox-permissions.rst:179 +#: ../../sandbox-permissions.rst:178 msgid "``xdg-run/path``" msgstr "" -#: ../../sandbox-permissions.rst:179 +#: ../../sandbox-permissions.rst:178 msgid "Access subdirectories of the XDG runtime directory" msgstr "" -#: ../../sandbox-permissions.rst:179 +#: ../../sandbox-permissions.rst:178 msgid "``$XDG_RUNTIME_DIR/path`` (``/run/user/$UID/path``)" msgstr "" -#: ../../sandbox-permissions.rst:182 +#: ../../sandbox-permissions.rst:181 msgid "" "Except ``host, host-etc, host-os`` paths can be added to all the above " "filesystem options. For example, ``--filesystem=xdg-documents/path``." msgstr "" -#: ../../sandbox-permissions.rst:185 +#: ../../sandbox-permissions.rst:184 msgid "Other filesystem access guidelines include:" msgstr "" -#: ../../sandbox-permissions.rst:187 +#: ../../sandbox-permissions.rst:186 #, fuzzy msgid "" "The ``--persist=DIR`` option can be used to map directories from the " @@ -602,7 +600,7 @@ msgstr "" "``--persist=path`` 选项可以用来将用户目录映射到沙箱的文件系统。这可以避免配置整个home目录访问权限。并且对于在硬编码使用 " "``~/`` 文件路径的应用程序非常有用。" -#: ../../sandbox-permissions.rst:192 +#: ../../sandbox-permissions.rst:191 msgid "" "For example, if an application hardcodes the directory ``~/.foo``, " "without any ``home`` access and no ``--persist`` the directory will be " @@ -613,18 +611,18 @@ msgid "" "``~/.var/app/$FLATPAK_ID/.foo`` which would otherwise be lost." msgstr "" -#: ../../sandbox-permissions.rst:200 +#: ../../sandbox-permissions.rst:199 msgid "A ``--persist=.`` will `persist` all directories." msgstr "" -#: ../../sandbox-permissions.rst:202 +#: ../../sandbox-permissions.rst:201 msgid "" "This does not support ``:create, :ro, :rw`` suffixes or special values " "like ``xdg-documents``. However, the directory will be created by flatpak" " if it doesn't already exist." msgstr "" -#: ../../sandbox-permissions.rst:206 +#: ../../sandbox-permissions.rst:205 #, fuzzy msgid "" "This makes it possible to avoid configuring access to the entire home " @@ -634,30 +632,30 @@ msgstr "" "``--persist=path`` 选项可以用来将用户目录映射到沙箱的文件系统。这可以避免配置整个home目录访问权限。并且对于在硬编码使用 " "``~/`` 文件路径的应用程序非常有用。" -#: ../../sandbox-permissions.rst:209 +#: ../../sandbox-permissions.rst:208 msgid "" "If an application uses ``$TMPDIR`` to contain lock files you may want to " "add a wrapper script that sets it to ``$XDG_RUNTIME_DIR/app/$FLATPAK_ID``" " (tmpfs) or ``/var/tmp`` (persistent on host)." msgstr "" -#: ../../sandbox-permissions.rst:213 +#: ../../sandbox-permissions.rst:212 msgid "" "Retaining and sharing configuration with non-Flatpak installations is to " "be avoided." msgstr "应该避免与非flatpak安装的应用共享配置。" -#: ../../sandbox-permissions.rst:217 +#: ../../sandbox-permissions.rst:216 msgid "Reserved Paths" msgstr "" -#: ../../sandbox-permissions.rst:219 +#: ../../sandbox-permissions.rst:218 msgid "" "The following paths and subpaths of them are reserved and asking access " "to them with ``--filesystem`` will have no effect::" msgstr "" -#: ../../sandbox-permissions.rst:224 +#: ../../sandbox-permissions.rst:223 msgid "" "The entire ``/run`` is not allowed and all subpaths of ``/run`` except " "``/run/flatpak, /run/host`` is allowed to be exposed via " @@ -665,44 +663,45 @@ msgid "" "``../run``, exposing it or a subpath of it, is not allowed." msgstr "" -#: ../../sandbox-permissions.rst:229 +#: ../../sandbox-permissions.rst:228 msgid "" "Additionally the following directories from host need to be explicitly " "requested with ``--filesystem`` and are not available with ``home, host, " "host-os, host-etc`` by default:" msgstr "" -#: ../../sandbox-permissions.rst:233 +#: ../../sandbox-permissions.rst:232 msgid "" "``~/.var/app`` - The app can access only its own directory in " "``~/.var/app/$FLATPAK_ID``" msgstr "" -#: ../../sandbox-permissions.rst:234 +#: ../../sandbox-permissions.rst:233 msgid "``$XDG_DATA_HOME/flatpak`` (``~/.local/share/flatpak``)" msgstr "" -#: ../../sandbox-permissions.rst:235 +#: ../../sandbox-permissions.rst:234 msgid "``/boot``" msgstr "" -#: ../../sandbox-permissions.rst:236 +#: ../../sandbox-permissions.rst:235 msgid "``/efi``" msgstr "" -#: ../../sandbox-permissions.rst:237 +#: ../../sandbox-permissions.rst:236 msgid "``/root``" msgstr "" -#: ../../sandbox-permissions.rst:238 +#: ../../sandbox-permissions.rst:237 msgid "``/sys``" msgstr "" -#: ../../sandbox-permissions.rst:239 +#: ../../sandbox-permissions.rst:238 msgid "``/tmp``" msgstr "" -#: ../../sandbox-permissions.rst:240 +#: ../../sandbox-permissions.rst:239 +#, python-brace-format msgid "" "``/var`` - Note that by default ``/var/{cache, config, data, tmp}`` " "inside the sandbox are the same as ``~/.var/app/$FLATPAK_ID/{cache, " @@ -711,98 +710,98 @@ msgid "" "available." msgstr "" -#: ../../sandbox-permissions.rst:244 +#: ../../sandbox-permissions.rst:243 msgid "``/var/lib/flatpak`` - ``/var`` does not give access to this." msgstr "" -#: ../../sandbox-permissions.rst:247 +#: ../../sandbox-permissions.rst:246 msgid "Device access" msgstr "设备访问" -#: ../../sandbox-permissions.rst:248 +#: ../../sandbox-permissions.rst:247 msgid "You can provide the following device permissions:" msgstr "" -#: ../../sandbox-permissions.rst:251 +#: ../../sandbox-permissions.rst:250 msgid "``dri``" msgstr "" -#: ../../sandbox-permissions.rst:251 +#: ../../sandbox-permissions.rst:250 msgid "Direct Rendering Interface. Necessary for GL." msgstr "" -#: ../../sandbox-permissions.rst:252 +#: ../../sandbox-permissions.rst:251 msgid "``kvm``" msgstr "" -#: ../../sandbox-permissions.rst:252 +#: ../../sandbox-permissions.rst:251 msgid "Kernel based Virtual Machine ``/dev/kvm``" msgstr "" -#: ../../sandbox-permissions.rst:253 +#: ../../sandbox-permissions.rst:252 msgid "``shm``" msgstr "" -#: ../../sandbox-permissions.rst:253 +#: ../../sandbox-permissions.rst:252 msgid "Shared Memory in ``/dev/shm``." msgstr "" -#: ../../sandbox-permissions.rst:254 +#: ../../sandbox-permissions.rst:253 msgid "``input``" msgstr "" -#: ../../sandbox-permissions.rst:254 +#: ../../sandbox-permissions.rst:253 msgid "" "Input devices as exposed in ``/dev/input``. This includes game " "controllers. Since Flatpak 1.15.6." msgstr "" -#: ../../sandbox-permissions.rst:255 +#: ../../sandbox-permissions.rst:254 msgid "``usb``" msgstr "" -#: ../../sandbox-permissions.rst:255 +#: ../../sandbox-permissions.rst:254 msgid "Raw USB devices as exposed in ``/dev/bus/usb``. Since Flatpak 1.15.11." msgstr "" -#: ../../sandbox-permissions.rst:256 +#: ../../sandbox-permissions.rst:255 msgid "``all``" msgstr "" -#: ../../sandbox-permissions.rst:256 +#: ../../sandbox-permissions.rst:255 msgid "All devices, including all of the above except ``shm``" msgstr "" -#: ../../sandbox-permissions.rst:261 +#: ../../sandbox-permissions.rst:260 msgid "" "Using newer permissions like ``input`` or ``usb`` will have no effect on " "older Flatpak versions and will fail when used through Flatpak " "commandline." msgstr "" -#: ../../sandbox-permissions.rst:265 +#: ../../sandbox-permissions.rst:264 #, fuzzy msgid "" "While not ideal, ``--device=all`` can be used to access devices like " "webcams, CD/DVD drives etc." msgstr "尽管不理想, ``--device=all`` 可以用来访问控制器和网络摄像头之类的设备。" -#: ../../sandbox-permissions.rst:269 +#: ../../sandbox-permissions.rst:268 #, fuzzy msgid "USB portal" msgstr "门户(译者注:英文portals)" -#: ../../sandbox-permissions.rst:271 +#: ../../sandbox-permissions.rst:270 msgid "Since 1.5.11." msgstr "" -#: ../../sandbox-permissions.rst:273 +#: ../../sandbox-permissions.rst:272 msgid "" "Sandboxed access to individual USB devices can be controlled by portals. " "Flatpak allows specifying enumerable USB devices to allow access." msgstr "" -#: ../../sandbox-permissions.rst:277 +#: ../../sandbox-permissions.rst:276 msgid "" "Like ``--device=usb``, this is just about accessing the raw USB device, " "that needs libusb (or equivalent). By using the portal, you can restrict " @@ -811,59 +810,59 @@ msgid "" "no reason for USB security devices to be accessible." msgstr "" -#: ../../sandbox-permissions.rst:284 +#: ../../sandbox-permissions.rst:283 msgid "" "A list of valid use cases includes scanners (handled, for example by " "SANE), photo cameras (handled by libgphoto2), flashing devices, etc." msgstr "" -#: ../../sandbox-permissions.rst:287 +#: ../../sandbox-permissions.rst:286 msgid "" "While this is portal dependent and ``xdg-desktop-portal`` is currently " "the only portal implementation, the overall permission flow is as " "follows:" msgstr "" -#: ../../sandbox-permissions.rst:291 +#: ../../sandbox-permissions.rst:290 msgid "" "The Flatpak package specifies the devices it wishes to enumerate through " "``finish-args``." msgstr "" -#: ../../sandbox-permissions.rst:293 +#: ../../sandbox-permissions.rst:292 msgid "" "The application requests the portal to enumerate the available USB " "devices based on that list. If the list is empty it will enumerate all " "USB devices." msgstr "" -#: ../../sandbox-permissions.rst:296 +#: ../../sandbox-permissions.rst:295 msgid "" "When the application wants to access the device, it will make a request " "for the device it wants to access via the portal." msgstr "" -#: ../../sandbox-permissions.rst:298 +#: ../../sandbox-permissions.rst:297 msgid "The portal then requests permission from the user if not already granted." msgstr "" -#: ../../sandbox-permissions.rst:300 +#: ../../sandbox-permissions.rst:299 msgid "" "If the permission was granted, a file descriptor for the device is passed" " back to the application." msgstr "" -#: ../../sandbox-permissions.rst:303 +#: ../../sandbox-permissions.rst:302 msgid "" "The application is then able to open the devices it is supposed to use " "while the others would be hidden." msgstr "" -#: ../../sandbox-permissions.rst:307 +#: ../../sandbox-permissions.rst:306 msgid "Specifying the enumerable devices" msgstr "" -#: ../../sandbox-permissions.rst:309 +#: ../../sandbox-permissions.rst:308 msgid "" "You can specify devices on the ``flatpak`` command line, and by extension" " in the finish arguments for Flatpak Builder. Enumerable devices are " @@ -874,17 +873,17 @@ msgid "" " shall not be enumerated." msgstr "" -#: ../../sandbox-permissions.rst:317 +#: ../../sandbox-permissions.rst:316 msgid "Queries are made out of rules. These rules are composable with ``+``." msgstr "" -#: ../../sandbox-permissions.rst:319 +#: ../../sandbox-permissions.rst:318 msgid "" "The rule ``all`` enumerates every USB device. There is no further rule " "allowed in the query." msgstr "" -#: ../../sandbox-permissions.rst:322 +#: ../../sandbox-permissions.rst:321 msgid "" "The ``vnd`` and ``dev`` rules specify a USB vendor and a USB device ID " "respectively. A vendor can be specified alone, but a device rule always " @@ -894,63 +893,63 @@ msgid "" "repository `_" msgstr "" -#: ../../sandbox-permissions.rst:329 +#: ../../sandbox-permissions.rst:328 msgid "" "``cls`` specifies the device USB class and subclass. Both class and " "subclass are two digit hex numbers separated by a colon ``:``. You can " "use ``*`` to specify any subclass within the class." msgstr "" -#: ../../sandbox-permissions.rst:333 +#: ../../sandbox-permissions.rst:332 msgid "Some examples of the syntax:" msgstr "" -#: ../../sandbox-permissions.rst:335 +#: ../../sandbox-permissions.rst:334 msgid "``vnd:1234``: Devices from vendor ``1234``" msgstr "" -#: ../../sandbox-permissions.rst:336 +#: ../../sandbox-permissions.rst:335 msgid "``vnd:1234+dev:3456``: Only device ``3456`` from vendor ``1234``." msgstr "" -#: ../../sandbox-permissions.rst:337 +#: ../../sandbox-permissions.rst:336 msgid "``vnd:1234+cls:06:*``: All the PTP devices from vendor ``1234``." msgstr "" -#: ../../sandbox-permissions.rst:338 +#: ../../sandbox-permissions.rst:337 msgid "``cls:06:*``: All the PTP devices." msgstr "" -#: ../../sandbox-permissions.rst:340 +#: ../../sandbox-permissions.rst:339 msgid "" "This permission only allows to enumerate devices. To open them, " "permission must be requested from the portal. It is not possible to open " "a device that is not enumerable." msgstr "" -#: ../../sandbox-permissions.rst:346 +#: ../../sandbox-permissions.rst:345 msgid "" "The ``--device=usb`` permission is broader than what the USB portal is " "supposed to provide and allows unfettered access to any USB device on the" " bus." msgstr "" -#: ../../sandbox-permissions.rst:350 +#: ../../sandbox-permissions.rst:349 msgid "In some situations you may need to specify a very long list of devices." msgstr "" -#: ../../sandbox-permissions.rst:352 +#: ../../sandbox-permissions.rst:351 msgid "Device lists can be passed in one single argument, or through a file." msgstr "" -#: ../../sandbox-permissions.rst:354 +#: ../../sandbox-permissions.rst:353 msgid "" "When using ``--usb-list``, the queries are separated by a semi-colon " "``;``, with queries for hidden devices (i.e. those that would be passed " "with ``--nousb``) prefixed with ``!``." msgstr "" -#: ../../sandbox-permissions.rst:358 +#: ../../sandbox-permissions.rst:357 msgid "" "When using ``--usb-list-file``, the filename of the file containing USB " "queries is passed line by line. Like with ``--usb-list`` queries for " @@ -960,24 +959,24 @@ msgid "" "list is persisted internally." msgstr "" -#: ../../sandbox-permissions.rst:366 +#: ../../sandbox-permissions.rst:365 msgid "dconf access" msgstr "dconf访问" -#: ../../sandbox-permissions.rst:368 +#: ../../sandbox-permissions.rst:367 msgid "" "As of xdg-desktop-portal 1.1.0 and glib 2.60.5 (in the runtime) you do " "not need direct DConf access in most cases." msgstr "" -#: ../../sandbox-permissions.rst:371 +#: ../../sandbox-permissions.rst:370 msgid "" "As of now this glib version is included in " "``org.freedesktop.Platform//19.08`` and ``org.gnome.Platform//3.34`` and " "newer." msgstr "" -#: ../../sandbox-permissions.rst:374 +#: ../../sandbox-permissions.rst:373 msgid "" "If an application existed prior to these runtimes you can tell Flatpak " "(>= 1.3.4) to migrate the DConf settings on the host into the sandbox by " @@ -986,17 +985,17 @@ msgid "" " (case is ignored and ``_`` and ``-`` are treated equal)." msgstr "" -#: ../../sandbox-permissions.rst:381 +#: ../../sandbox-permissions.rst:380 msgid "" "If you are targeting older runtimes or require direct DConf access for " "other reasons you can use these permissions::" msgstr "" -#: ../../sandbox-permissions.rst:389 +#: ../../sandbox-permissions.rst:388 msgid "With those permissions glib will continue using dconf directly." msgstr "" -#: ../../sandbox-permissions.rst:391 +#: ../../sandbox-permissions.rst:390 msgid "" "If you use a newer runtime where dconf is no longer built and still need " "it you will have to build the `dconf " @@ -1004,12 +1003,12 @@ msgid "" "``--env=GIO_EXTRA_MODULES=/app/lib/gio/modules/``." msgstr "" -#: ../../sandbox-permissions.rst:396 +#: ../../sandbox-permissions.rst:395 #, fuzzy msgid "gvfs access" msgstr "dconf访问" -#: ../../sandbox-permissions.rst:398 +#: ../../sandbox-permissions.rst:397 msgid "" "As of gvfs 1.48, the gvfs daemons and applications use an on-disk socket " "to communicate, rather than an abstract socket so that the gvfs " @@ -1017,47 +1016,47 @@ msgid "" "application's sandbox." msgstr "" -#: ../../sandbox-permissions.rst:402 +#: ../../sandbox-permissions.rst:401 msgid "" "A number of different options need to be passed depending on the " "application's use of gvfs." msgstr "" -#: ../../sandbox-permissions.rst:405 +#: ../../sandbox-permissions.rst:404 msgid "" "``--talk-name=org.gtk.vfs.*`` is necessary to talk to the gvfs daemons " "over D-Bus and list mounts using the GIO APIs." msgstr "" -#: ../../sandbox-permissions.rst:408 +#: ../../sandbox-permissions.rst:407 msgid "" "``--filesystem=xdg-run/gvfsd`` is necessary to use the GIO APIs to list " "and access non-native files using the GIO APIs, using URLs rather than " "FUSE paths." msgstr "" -#: ../../sandbox-permissions.rst:411 +#: ../../sandbox-permissions.rst:410 msgid "" "``--filesystem=xdg-run/gvfs`` is necessary to give access to the FUSE " "mounts non-GIO and legacy applications can use. This is what will make " "native files appear under ``/run/user/`id -u`/gvfs/``." msgstr "" -#: ../../sandbox-permissions.rst:415 +#: ../../sandbox-permissions.rst:414 msgid "Typical GNOME and GTK applications should use::" msgstr "" -#: ../../sandbox-permissions.rst:420 +#: ../../sandbox-permissions.rst:419 msgid "Typical non-GNOME and non-GTK applications should use::" msgstr "" -#: ../../sandbox-permissions.rst:424 +#: ../../sandbox-permissions.rst:423 msgid "" "No application should be using ``--talk-name=org.gtk.vfs`` in its " "manifest, as there are no D-Bus services named ``org.gtk.vfs``." msgstr "" -#: ../../sandbox-permissions.rst:427 +#: ../../sandbox-permissions.rst:426 msgid "" "These permission grants the app, the ability to communicate with the gvfs" " daemon and backends running on host. Depending on the backends installed" @@ -1073,11 +1072,11 @@ msgid "" "host." msgstr "" -#: ../../sandbox-permissions.rst:441 +#: ../../sandbox-permissions.rst:440 msgid "External drive access" msgstr "" -#: ../../sandbox-permissions.rst:443 +#: ../../sandbox-permissions.rst:442 msgid "" "External drives are mounted by the host system using systemd, udev, udisk" " fstab etc. and each of them can have different defaults. Flatpak has no " @@ -1085,30 +1084,30 @@ msgid "" "permissions should work in most cases::" msgstr "" -#: ../../sandbox-permissions.rst:452 +#: ../../sandbox-permissions.rst:451 msgid "" "If ``--filesystem=host`` is used ``/media, /run/media`` is shared " "automatically if they exist." msgstr "" -#: ../../sandbox-permissions.rst:455 +#: ../../sandbox-permissions.rst:454 msgid "" "Note that these should not have subpaths in them unless the value of the " "subpath can be consistently pre-determined. Block device naming depends " "on the kernel/fstab configuration and cannot be pre-determined." msgstr "" -#: ../../sandbox-permissions.rst:460 +#: ../../sandbox-permissions.rst:459 msgid "Footnotes" msgstr "" -#: ../../sandbox-permissions.rst:461 +#: ../../sandbox-permissions.rst:460 msgid "" "This is not necessarily required, but without it the X11 shared memory " "extension will not work, which is very bad for X11 performance." msgstr "" -#: ../../sandbox-permissions.rst:463 +#: ../../sandbox-permissions.rst:462 msgid "" "Giving network access also grants access to all host services listening " "on abstract Unix sockets (due to how network namespaces work), and these " @@ -1117,7 +1116,8 @@ msgid "" "secure distribution should disable these and just use regular sockets." msgstr "" -#: ../../sandbox-permissions.rst:468 +#: ../../sandbox-permissions.rst:467 +#, python-brace-format msgid "" "``xdg-{cache, config, data}`` bind mounts the paths from host to the per-" "app sandbox directory. Inside the sandbox ``$XDG_CACHE_HOME``, " @@ -1261,3 +1261,9 @@ msgstr "" #~ "the specific D-Bus permissions needed." #~ msgstr "" +#~ msgid "" +#~ "Talk permissions can be freely used, " +#~ "although it is recommended to use " +#~ "the minimum required." +#~ msgstr "Talk权限可以自由使用,尽管如此还是推荐使用应用所需的最小权限。" +