Logo
Explore Help
Sign In
security/hakurei
6
3
Fork 0
You've already forked hakurei
Code Issues 11 Pull Requests Actions Packages Projects Releases 11 Wiki Activity
Determine what to do with existing /.flatpak-info behaviour
#21 opened 2025-11-05 22:35:55 +09:00 by ophestra
Kind
Security
Priority
High
Reviewed
Confirmed
Feasibility of in-process dbus proxy implementation
#12 opened 2025-09-08 03:35:57 +09:00 by ophestra
v0.4
Compat
Breaking
Kind
Enhancement
Priority
Low
Reviewed
Confirmed
Many X clients break when only the pathname socket is available
#10 opened 2025-09-02 20:38:17 +09:00 by ophestra
Priority
Low
Reviewed
Confirmed
Labels Milestones New Issue
11 Open 17 Closed
Label
Use alt + click/enter to exclude labels
All labels No label
Compat
Breaking

Kind
Bug

Kind
Documentation

Kind
Enhancement

Kind
Feature

Kind
Security

Kind
Testing

Priority
Critical

Priority
High

Priority
Low

Priority
Medium

Reviewed
Confirmed

Reviewed
Duplicate

Reviewed
Invalid

Reviewed
Won't Fix

Status
Abandoned

Status
Blocked

Status
Need More Info

Milestone
All milestones No milestones
Open milestones
v0.4
Closed milestones
v0.2 v0.3
Project
All projects No project
Author
All users
Assignee
Assigned to nobody Assigned to anybody
cat maemachinebroke noir ophestra
Sort
Newest Oldest Most recently updated Least recently updated Most commented Least commented Nearest due date Farthest due date
Label
11 Open 17 Closed
Label
Clear labels
Compat
Breaking
Kind
Bug
Kind
Documentation
Kind
Enhancement
Kind
Feature
Kind
Security
Kind
Testing
Priority
Critical
Priority
High
Priority
Low
Priority
Medium
Reviewed
Confirmed
Reviewed
Duplicate
Reviewed
Invalid
Reviewed
Won't Fix
Status
Abandoned
Status
Blocked
Status
Need More Info
Milestone
No milestone
Open milestones
v0.4
Closed milestones
v0.2
v0.3
Projects
Clear projects
Assignee
Clear assignees
No assignee
cat
maemachinebroke
noir
ophestra
Require --insecure flag to access compatibility options
Compat
Breaking
Kind
Enhancement
Priority
High
Reviewed
Confirmed
#30 opened 2025-12-19 03:00:44 +09:00 by ophestra v0.4
PipeWire SecurityContext appears to only restrict access via pipewire-pulse
Kind
Security
Priority
Critical
Reviewed
Confirmed
#29 by ophestra was closed 2025-12-15 20:35:57 +09:00
2
Document that GNOME is not a supported desktop environment
Kind
Documentation
Priority
Medium
Reviewed
Confirmed
#27 opened 2025-11-15 16:21:39 +09:00 by kat
Harden access to PipeWire via pw_security_context
Kind
Security
Priority
Critical
Reviewed
Confirmed
#26 by ophestra was closed 2025-12-09 08:13:38 +09:00
2
Remove ldd.Exec
Compat
Breaking
Kind
Enhancement
Priority
High
Reviewed
Confirmed
#25 opened 2025-11-14 21:53:58 +09:00 by ophestra v0.4
Move some packages internal
Compat
Breaking
Kind
Enhancement
Priority
High
Reviewed
Confirmed
#24 opened 2025-11-12 23:11:53 +09:00 by ophestra v0.4 2 / 2
Outcome of toSystem is not checked against environment changing between runs
Kind
Documentation
Priority
Medium
Reviewed
Confirmed
#23 opened 2025-11-12 00:35:07 +09:00 by ophestra
Use --identifier-fd for state check in vm tests
Kind
Testing
Priority
Low
Reviewed
Confirmed
Status
Blocked
#22 opened 2025-11-10 08:00:47 +09:00 by ophestra
1
Determine what to do with existing /.flatpak-info behaviour
Kind
Security
Priority
High
Reviewed
Confirmed
#21 opened 2025-11-05 22:35:55 +09:00 by ophestra
PulseAudio client sends its pid to the server
Reviewed
Duplicate
#20 by ophestra was closed 2025-11-05 22:36:46 +09:00
1
Store enablement byte separately from instance state
Compat
Breaking
Kind
Enhancement
Priority
High
Reviewed
Confirmed
#19 by ophestra was closed 2025-11-02 05:02:16 +09:00 v0.3
Consider changing uid format and identity bounds
Compat
Breaking
Kind
Enhancement
Priority
Critical
Reviewed
Confirmed
#18 by ophestra was closed 2025-11-04 08:28:08 +09:00 v0.3
2
Track instance state in SharePath
Compat
Breaking
Kind
Enhancement
Priority
High
Reviewed
Confirmed
#17 by ophestra was closed 2025-11-03 02:07:14 +09:00 v0.3
Optionally share TMPDIR and XDG_RUNTIME_DIR between containers of the same identity
Compat
Breaking
Kind
Feature
Priority
Critical
Reviewed
Confirmed
#16 by ophestra was closed 2025-10-19 04:25:22 +09:00 v0.3
Export container/seccomp.NativeRule via hst
Kind
Feature
Priority
Low
Reviewed
Confirmed
Status
Blocked
#15 opened 2025-09-29 06:51:57 +09:00 by ophestra
1
Determine target uid and hsu user id in a single hsu run
Kind
Enhancement
Priority
Low
Reviewed
Confirmed
#14 by ophestra was closed 2025-09-24 21:10:19 +09:00
Tests for internal/outcome error handling
Kind
Testing
Priority
Low
Reviewed
Confirmed
Status
Blocked
#13 opened 2025-09-13 16:31:59 +09:00 by ophestra 3 / 7
Feasibility of in-process dbus proxy implementation
Compat
Breaking
Kind
Enhancement
Priority
Low
Reviewed
Confirmed
#12 opened 2025-09-08 03:35:57 +09:00 by ophestra v0.4
Consider using container.Absolute in system
Compat
Breaking
Kind
Enhancement
Priority
High
Reviewed
Confirmed
#11 by ophestra was closed 2025-10-08 22:42:15 +09:00 v0.3
Many X clients break when only the pathname socket is available
Priority
Low
Reviewed
Confirmed
#10 opened 2025-09-02 20:38:17 +09:00 by ophestra
First Previous 1 2 Next Last
Powered by Gitea Version: 1.25.2 Page: 61ms Template: 11ms
English
Bahasa Indonesia Deutsch English Español Français Gaeilge Italiano Latviešu Magyar nyelv Nederlands Polski Português de Portugal Português do Brasil Suomi Svenska Türkçe Čeština Ελληνικά Български Русский Українська فارسی മലയാളം 日本語 简体中文 繁體中文(台灣) 繁體中文(香港) 한국어
Licenses API