Ill build it on mido and try it out, thanks!

On Fri, 3 Jan 2020 at 22:45, rinigus <rinigus....@gmail.com> wrote:

> Hi,
>
> I have submitted PR to libhybris allowing to use Flatpak on hybris devices
> with the same version serving its main purpose and inside Flatpak sandbox:
> https://github.com/libhybris/libhybris/pull/433.
>
> As soon as your device has such libhybris, you could
>
> - use https://build.merproject.org/project/show/home:rinigus:flatpak to
> install flatpak, flatpak-runner
> - run flatpak-extension-hybris to generate Flatpah hybris extension at
> user nemo's home (run as nemo)
> - install flatpak apps, see instructions at Flathub on how to do it
> - run them using flatpak-runner
>
> Many things don't work, but would be faster to get it fixed together with
> other devs.
>
> Cheers.
>
> Rinigus
>
> On Fri, Jan 3, 2020 at 12:18 AM rinigus <rinigus....@gmail.com> wrote:
>
>> Hi,
>>
>> just finished the first version of a wrapper for 'flatpak run' command as
>> well, available at https://github.com/rinigus/flatpak-runner . Its based
>> on qxcompositor and it opens new Wayland server before running an
>> application, all explained in README. Device rotation is supported and
>> should be followed.
>>
>> So, as it is:
>>
>> - we have to resolve libhybris linker issue to make it possible to
>> distribute.
>> - keyboard is not supported currently. At present, app has to have
>> qtvirtualkeyboard support added as in
>> https://doc.qt.io/qt-5/qtvirtualkeyboard-deployment-guide.html#creating-inputpanel
>> .
>> - only single-window apps are working well, such as QML developed for
>> mobile
>> - no sound so far
>> - probably many other things are missing, haven't bumped into them.
>>
>> Essentially, we will have access to the latest Qt, but would have to
>> write apps for this use. Fortunately, it all goes along SFOS programming
>> and should be simple to convert later to Silica, when/if it catches up with
>> Qt versions.
>>
>> I guess we can get better integration after it will be simple to install
>> on other devices and start using it by others.
>>
>> Cheers,
>>
>> Rinigus
>>
>> On Wed, Jan 1, 2020 at 5:25 PM rinigus <rinigus....@gmail.com> wrote:
>>
>>> Hi,
>>>
>>> wait a bit, I may have a way to simplify setup. Few days ago, after
>>> discussion on IRC, I found a way around disappearance of the window when
>>> wrapped into qxcomposer. So, that blocker is over now. Which means that we
>>> will be able to craft apps using the latest Qt available in Flatpaks.
>>>
>>> Currently, I am looking into
>>>
>>> - how we can use regular hybris
>>> - making a wrapper similar to qxcomposer for Flatpaks.
>>>
>>> Shouldn't take too long for an update on status.
>>>
>>> Cheers,
>>>
>>> Rinigus
>>>
>>> On Wed, Jan 1, 2020 at 4:55 PM <szo...@gmail.com> wrote:
>>>
>>>> Could you elaborate on:
>>>> > libhybris compiled with specification of default
>>>> hybris-ld-library-path,
>>>> > content of libexec/droid-hybris added with GL extension.
>>>> Is that libhybris build available (and safe to run on main device, or
>>>> should I dig out my j1)?
>>>> Also not sure what added with GL extension means? Having a browser that
>>>> uses up to date webengine would be awesome.
>>>>
>>>> Thanks and happy new year!
>>>> szopin
>>>>
>>>> On Sunday, 29 December 2019, rinigus wrote:
>>>> > Hi,
>>>> >
>>>> > I would have preferred to stay away from discussion on why do we
>>>> need/not
>>>> > need Flatpak on SFOS. But I guess I have to take it as the one
>>>> working on
>>>> > making it possible.
>>>> >
>>>> > Native apps rely on the libs allowed in the Store and bundle the rest
>>>> of
>>>> > them. I presume OSM Scout Server and Pure Maps are exceptions, but
>>>> they are
>>>> > built around almost 20 libs bundled with the application and compiled
>>>> with
>>>> > newer gcc than the one on the platform. If I would have continued to
>>>> > provide OSM Scout Server via the official Store, I'd have to bundle
>>>> > libsystemd as well - something that I found was crossing a line for
>>>> me. So,
>>>> > any security issue in those bundled libs would be propagated the same
>>>> way
>>>> > as with the Flatpak. I admit that its way less libs than distributed
>>>> via
>>>> > Flatpak. However, in the case of Flatpak, apps are provided on the
>>>> top of
>>>> > "runtimes" with the app including everything which is extending the
>>>> runtime
>>>> > to make it work. So, in case of OSM Scout Server and Pure Maps, their
>>>> > Flatpaks do include some libs as well. Those runtimes are updated.
>>>> Now, I
>>>> > am not in position to say whether its security updates are as fast as
>>>> of
>>>> > distros and have no idea how it compares to SFOS.
>>>> >
>>>> > However, I see mainly portability and up-to-date toolbox aspect of
>>>> Flatpak,
>>>> > not that much security in terms of sandbox. These are my preferences
>>>> and
>>>> > they could differ from yours.
>>>> >
>>>> > Looking at the speed of upcoming Qt update, I was considering whether
>>>> to
>>>> > make qt5.12 (or later) in /opt (/home/opt) and use it from there to
>>>> allow
>>>> > us to work on newer browser engine or make Flatpak available. The both
>>>> > solutions would break look-and-feel of SFOS, but allow us to use
>>>> current
>>>> > libs, something that we have been missing for too long. And, in many
>>>> > aspects, we, as developers, waste lot of time to fight against. I
>>>> swayed
>>>> > towards Flatpaks as it has well developed tools around it, provides
>>>> > portability (you can run it on desktop), and will make sense to have
>>>> when
>>>> > other mobile Linux distros will start going as a way to use the same
>>>> app at
>>>> > all of them.
>>>> >
>>>> > Note that is we develop apps immediately with the reservation that we
>>>> could
>>>> > switch to a native version as soon as it is ready to receive it (in
>>>> terms
>>>> > of Qt version, for example), we can start working on things that are
>>>> > impossible right now on SFOS but may become available later (Qt
>>>> 5.12?). I
>>>> > would expect that this much better than using Android browser on SFOS.
>>>> >
>>>> > Please note that it is not to criticize Jolla regarding the update
>>>> speed of
>>>> > Qt. Its probably a complex process and, as we have all built around
>>>> it, may
>>>> > break few things to put it mildly. But a large part of my work as a
>>>> > developer on SFOS is around incompatibilities imposed by old libs and
>>>> gcc.
>>>> > So, from developer POV, its important to prioritize Qt update as much
>>>> as
>>>> > possible. Not sure how much we can help with it, but that's probably
>>>> > separate discussion (please start it if you wish).
>>>> >
>>>> > Sorry for long post, please see my previous ones on technical issues
>>>> that
>>>> > we currently face.
>>>> >
>>>> > As for latest state:
>>>> >
>>>> > Test browser that I can run is executed with:
>>>> >
>>>> > QT_WAYLAND_FORCE_DPI=physical flatpak run --filesystem=host
>>>> --device=all
>>>> >
>>>> --env=HYBRIS_EGLPLATFORM_DIR=/usr/lib/arm-linux-gnueabihf/GL/default/lib/libhybris
>>>> >
>>>> --env=HYBRIS_LINKER_DIR=/usr/lib/arm-linux-gnueabihf/GL/default/lib/libhybris/linker
>>>> > org.qutebrowser.qutebrowser together.jolla.com
>>>> >
>>>> > libhybris compiled with specification of default
>>>> hybris-ld-library-path,
>>>> > content of libexec/droid-hybris added with GL extension.
>>>> >
>>>> > Cheers,
>>>> >
>>>> > Rinigus
>>>> >
>>>> >
>>>> >
>>>> > On Sun, Dec 29, 2019 at 9:26 PM E.S. Rosenberg <
>>>> > es.rosenberg+sailfishos....@gmail.com> wrote:
>>>> >
>>>> > > Native apps rely on the libs shipped with the OS, thus they don't
>>>> ship
>>>> > > with unsecure libs unless Jolla is shipping them and they become
>>>> secure the
>>>> > > moment Jolla updated the libs (and should the update break binary
>>>> > > compatibility will require a new release compiled against the new
>>>> libs).
>>>> > > Flatpacks and snaps are security nightmares, instead of getting
>>>> them lets
>>>> > > work on moving the SFOS platform along.
>>>> > >
>>>> > > Op zo 29 dec. 2019 om 20:41 schreef rinigus <rinigus....@gmail.com
>>>> >:
>>>> > >
>>>> > >> Hi,
>>>> > >>
>>>> > >> If you refer to http://flatkill.org/ , it does have lot of good
>>>> points.
>>>> > >> In this respect, its similar to what we have with the native apps,
>>>> as soon
>>>> > >> as some security flaws are used. At the moment, I would prefer to
>>>> get
>>>> > >> access to the latest Qt and other recent software. But users are
>>>> still
>>>> > >> responsible for thinking before installing, as they are now. Note
>>>> that in
>>>> > >> many aspects our current packaging together with bundled libs is
>>>> similar to
>>>> > >> flatpak already. So, why not to make it with the recent libs as
>>>> well?
>>>> > >>
>>>> > >> Cheers,
>>>> > >>
>>>> > >> Rinigus
>>>> > >>
>>>> > >>
>>>> > >> On Sun, Dec 29, 2019 at 8:26 PM E.S. Rosenberg <
>>>> > >> es.rosenberg+sailfishos....@gmail.com> wrote:
>>>> > >>
>>>> > >>> No one is bothered by the serious (bad) security implications of
>>>> running
>>>> > >>> flatpacks?
>>>> > >>> Though I guess we are all tolerating the claim to "security" on
>>>> ancient
>>>> > >>> kernels so we have no right to blab about security now 🤔
>>>> > >>>
>>>> > >>> Op za 28 dec. 2019 om 12:04 schreef rinigus <
>>>> rinigus....@gmail.com>:
>>>> > >>>
>>>> > >>>> Hi,
>>>> > >>>>
>>>> > >>>> I am not 100% sure whether xdg-shell availability is the
>>>> blocker. There
>>>> > >>>> is something going on which I cannot explain yet - its as if
>>>> Wayland
>>>> > >>>> rendering disappears even when I use qxcomposer.
>>>> > >>>>
>>>> > >>>> qxcomposer does allow me to minimize and then restore. However,
>>>> when
>>>> > >>>> keeping app minimized and switching to other apps, I do get (with
>>>> > >>>> WAYLAND_DEBUG=1)
>>>> > >>>>
>>>> > >>>> [2294832.935] wl_pointer@8.motion(207667, 0.000000, 0.000000)
>>>> > >>>> [2299966.213] qt_extended_surface@29.onscreen_visibility(1)
>>>> > >>>> [2303645.301] qt_extended_surface@29.onscreen_visibility(0)
>>>> > >>>> [2303647.486]  -> wl_surface@26.destroy()
>>>> > >>>> [2303648.296]  -> wl_buffer@4278190080.destroy()
>>>> > >>>> [2303648.395]  -> wl_buffer@4278190082.destroy()
>>>> > >>>> [2303648.448]  -> wl_buffer@4278190081.destroy()
>>>> > >>>>
>>>> > >>>> and the app window disappears from qxcomposer.
>>>> > >>>>
>>>> > >>>> Same happens when running directly using SFOS composer:
>>>> > >>>>
>>>> > >>>> [2614530.331] qt_extended_surface@29.onscreen_visibility(0)
>>>> > >>>> [2614552.802]  -> wl_surface@26.destroy()
>>>> > >>>> [2614555.653]  -> wl_buffer@4278190080.destroy()
>>>> > >>>> [2614556.795]  -> wl_buffer@4278190082.destroy()
>>>> > >>>> [2614557.099]  -> wl_buffer@4278190081.destroy()
>>>> > >>>>
>>>> > >>>> So, looks like the surface gets destroyed, but nothing really
>>>> restores
>>>> > >>>> it.
>>>> > >>>>
>>>> > >>>> As such, some kind of wrapper, similar to qxcomposer, around
>>>> Flatpak
>>>> > >>>> programs maybe handy. It could take few tasks, such as
>>>> > >>>>
>>>> > >>>> - follow orientation of the screen
>>>> > >>>> - restore app after wl_buffer.destroy()
>>>> > >>>> - provide keyboard support
>>>> > >>>>
>>>> > >>>> I don't know enough about Wayland to be efficient in working on
>>>> it. So,
>>>> > >>>> I wonder if someone would like to step in and help with this
>>>> part. If there
>>>> > >>>> is interest, I will work on packaging libhybris extension and
>>>> provide an
>>>> > >>>> example at OBS for Xperia Tama devices.
>>>> > >>>>
>>>> > >>>> Cheers,
>>>> > >>>>
>>>> > >>>> Rinigus
>>>> > >>>>
>>>> > >>>> On Sat, Dec 28, 2019 at 12:54 AM Damien Caliste <
>>>> dcali...@free.fr>
>>>> > >>>> wrote:
>>>> > >>>>
>>>> > >>>>> Thank you Rinigus for all of this. Indeed, the current main
>>>> blocker
>>>> > >>>>> seems to be the fact that xdg-shell is not available in
>>>> Lipstick. This is
>>>> > >>>>> linked to the ancient version of QtWayland, even not 5.6, but
>>>> still 5.4 !
>>>> > >>>>> They already have a 5.9 branch in SailfishOS git (
>>>> > >>>>> https://git.sailfishos.org/mer-core/qtwayland/tree/mer-5.9),
>>>> but we
>>>> > >>>>> need to wait for Jolla to make the Qt switch. I don't think
>>>> it's something
>>>> > >>>>> community can change on device... I hope I can be proven wrong
>>>> though.
>>>> > >>>>>
>>>> > >>>>> Damien.
>>>> > >>>>> _______________________________________________
>>>> > >>>>> SailfishOS.org Devel mailing list
>>>> > >>>>> To unsubscribe, please send a mail to
>>>> > >>>>> devel-unsubscr...@lists.sailfishos.org
>>>> > >>>>
>>>> > >>>> _______________________________________________
>>>> > >>>> SailfishOS.org Devel mailing list
>>>> > >>>> To unsubscribe, please send a mail to
>>>> > >>>> devel-unsubscr...@lists.sailfishos.org
>>>> > >>>
>>>> > >>> _______________________________________________
>>>> > >>> SailfishOS.org Devel mailing list
>>>> > >>> To unsubscribe, please send a mail to
>>>> > >>> devel-unsubscr...@lists.sailfishos.org
>>>> > >>
>>>> > >> _______________________________________________
>>>> > >> SailfishOS.org Devel mailing list
>>>> > >> To unsubscribe, please send a mail to
>>>> > >> devel-unsubscr...@lists.sailfishos.org
>>>> > >
>>>> > > _______________________________________________
>>>> > > SailfishOS.org Devel mailing list
>>>> > > To unsubscribe, please send a mail to
>>>> > > devel-unsubscr...@lists.sailfishos.org
>>>> >
>>>>
>>>> --
>>>> Sent from my Jolla
>>>> _______________________________________________
>>>> SailfishOS.org Devel mailing list
>>>> To unsubscribe, please send a mail to
>>>> devel-unsubscr...@lists.sailfishos.org
>>>
>>> _______________________________________________
> SailfishOS.org Devel mailing list
> To unsubscribe, please send a mail to
> devel-unsubscr...@lists.sailfishos.org
_______________________________________________
SailfishOS.org Devel mailing list
To unsubscribe, please send a mail to devel-unsubscr...@lists.sailfishos.org

Reply via email to