and running sandboxed desktop applications. It was released in 2015 and currently supported by most major Linux distributions. $ sudo zypper in flatpak $ flatpak remote-add --if-not-exists flathub \ https://flathub.org/repo/flathub.flatpakrepo
an isolated environment. By default, the application can only ‘see’ itself and its runtime. Access to user files, network, graphics sockets, subsystems on the bus and devices have to be explicitly granted.
It generally isn’t necessary to be familiar with these in order to use Flatpak, although in some cases it might be useful. They include: • The bubblewrap utility from Project Atomic, which lets unprivileged users set up and run containers, using kernel features such as: - Cgroups - Namespaces - Bind mounts - Seccomp rules • systemd to set up cgroups for sandboxes • The OSTree system for versioning and distributing filesystem trees
It generally isn’t necessary to be familiar with these in order to use Flatpak, although in some cases it might be useful. They include: • The bubblewrap utility from Project Atomic, which lets unprivileged users set up and run containers, using kernel features such as: - Cgroups - Namespaces - Bind mounts - Seccomp rules • systemd to set up cgroups for sandboxes • The OSTree system for versioning and distributing filesystem trees
Name Description Application ID Version Branch Remotes Firefox Mozilla Firefox Web Browser org.mozilla.firefox 82.0 stable flathub $ flatpak install flathub org.mozilla.firefox $ flatpak run org.mozilla.firefox