-
Notifications
You must be signed in to change notification settings - Fork 417
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Usability] Improve usability for users #177
Comments
None of these points are The problems they had with docker are not our fault. Familiarize yourself with docker. I am not really user friendly, am I? |
Ahahah I think it's just good to point them to the correct documentation |
…container managers, pointing to documentation #177
If there are other usability improvement proposals let's just comment here 👍 |
One suggestion I have for This would be a breaking change to |
so to point out to (for example) ~/.local instead of ~/.local/bin? Could be similar to what @misobarisic did in past, but should be superseded by the fact that now the |
Correct.
Yes, those are sensible defaults. However, the code for
For the record, this is not my actual workflow, as I just run |
@nathanchance makes sense, but maybe it's better to open a separate issue for this as I see it not only is used by AUR, but also the snap and OpenSUSE's packages so maybe this will have to be a more tought and long lasting issue 😃 |
I have a suggestion that I think would improve usability. I think the present behaviour where My suggestion is that instead the user is asked to either define a source location or enter |
|
A more specific shorthand term like |
@s2live choosing fedora-toolbox as default, should be a sensible one as the image is curated for the use on Fedora Silverblue using the official tool if this is not sensible enough, there could be two ways of handling this
|
I agree that fedora-toolbox is the best thing to default to, if there must be a default. What I don't think is the best approach is having a command so flexible that it executes without any arguments. With the GUI app I am making one of my thoughts is "I better make it so the app cannot create default images as some side effect". Maybe I am being over cautious there? Not sure. 😅 |
It's just following the |
They will be prompted if they don't have a local image already. Fair enough, since you mention it, it might be nice to implement a (y/n) prompt for the |
Podman/docker don't ask tor confirmation when removing containers. Why should this? |
I like this 👍 EDIT: added to OP list
Contrary to pure podman, we're talking pet containers here, something you really care about, so it is in fact sensible to ask |
Implemented the |
Great to see this implemented! 😃 I have another suggestion, though there are many reasons for it to be objectionable, it might be out of scope, complex of simply undesired, but see what you think. The current behaviour: By default while the guest cannot view the hosts .desktop application metadata, guest metadata can be viewed by the host in the default folder specified by xdg/freedesktop protocol (I believe this applies to pretty much every Linux DE, pretty much all of them at least semi-conform to xdg/freedesktop). This results in applications installed on containers being displayed in app menu's/finders etc and launched on the host. Viewing and launching applications from the hosts menu is a nice feature however, unless I am mistaken there is presently no action taken to ensure that guest applications don't have conflicting dependencies with the host? Applications could instead be executed in guest containers, even when triggered by action on the host, by modifying the .desktop files This may be something more suitable to my GUI application built on distrobox but I'm gonna be working on it, so I thought I'd mention it as could be useful and desired by some on distrobox too. |
Hi @s2live can you explain what you do mean? By design host and guest dependencies are completely separated
This only applies to a common directory between host and guest, which will be only
Not sure what you do mean with conflicting dependency, right now a desktop file is created only when the user actively uses |
Hi @s2live can you explain what you do mean? By design host and guest dependencies are completely separated
What I mean is an application whose only dependencies are found on the host will be compatible, where-as one with dependencies that are not on the host will be incompatible. So an application that it is possible to run on the host.
right now a desktop file is created only when the user actively uses distrobox export and apps exported this way are marked with a label (i.e. Gnome Photos (on fedora-toolbox-35)) so that you can export the same app from multiple distroboxes (eg. you need an older AND a newer version)
Could there be an option for editing the exported file to open the desktop file so it is executed through a distrobox-enter command? Sorry, I should have investigated more thoroughly before commenting. [TLDR; this behavior is specific to my tinkering.]
Hmm, yeah it looks like the behaviour I am observing is due to the way I have configured gnome-software and packagekit on the host and guest. I aught have guessed as it wasn't the behaviour one would expect to see. There were issues running packagekit on the guest, it seems that packagekit defaults to calling certain host services which cause confusion and render it and g-s unable to find repos or install files. However with packagekit on the host and not on the guest at least repo's are at least discoverable and installable and g-s identifies the files as RPM's when launched from a fedora guest, etc. It looks like things are actually worse than I thought as the .desktop files appear to only be installed upon the host, it's almost certain that the same is happening for all other files added when installed. 😬 I'm now thinking that unless I can implement a means to sandbox packagekit and g-s within a container completely separating them from the host my current approach is not going to work.
|
Right now the
Probably some socket in /run/user? if you can pinpoint which socket packagekit and g-s uses we can create a |
OK thanks so much for suggesting that solution Luca, I have made a specific thread here! |
Executing commands on the host, while inside of a container, can be done either with flatpak-spawn, of playing tricks with chroot. Let's provide a new script, which will be available inside of the container, that does exactly that. This tries to improve (although maybe not completely fix): 89luca89#177 Signed-off-by: Dario Faggioli <dfaggioli@suse.com>
Executing commands on the host, while inside of a container, can be done either with flatpak-spawn, of playing tricks with chroot. Let's provide a new script, which will be available inside of the container, that does exactly that. This tries to improve (although maybe not completely fix): 89luca89#177 Signed-off-by: Dario Faggioli <dfaggioli@suse.com>
Executing commands on the host, while inside of a container, can be done either with flatpak-spawn, of playing tricks with chroot. Let's provide a new script, which will be available inside of the container, that does exactly that. This tries to improve (although maybe not completely fix): 89luca89#177 Signed-off-by: Dario Faggioli <dfaggioli@suse.com>
Executing commands on the host, while inside of a container, can be done either with flatpak-spawn, of playing tricks with chroot. Let's provide a new script, which will be available inside of the container, that does exactly that. This tries to improve (although maybe not completely fix): 89luca89#177 Signed-off-by: Dario Faggioli <dfaggioli@suse.com>
Executing commands on the host, while inside of a container, can be done either with flatpak-spawn, of playing tricks with chroot. Let's provide a new script, which will be available inside of the container, that does exactly that. This tries to improve (although maybe not completely fix): 89luca89#177 Signed-off-by: Dario Faggioli <dfaggioli@suse.com>
Executing commands on the host, while inside of a container, can be done either with flatpak-spawn, of playing tricks with chroot. Let's provide a new script, which will be available inside of the container, that does exactly that. This tries to improve (although maybe not completely fix): 89luca89#177 Signed-off-by: Dario Faggioli <dfaggioli@suse.com>
Executing commands on the host, while inside of a container, can be done either with flatpak-spawn, of playing tricks with chroot. Let's provide a new script, which will be available inside of the container, that does exactly that. This tries to improve (although maybe not completely fix): 89luca89#177 Signed-off-by: Dario Faggioli <dfaggioli@suse.com>
Executing commands on the host, while inside of a container, can be done either with flatpak-spawn, of playing tricks with chroot. Let's provide a new script, which will be available inside of the container, that does exactly that. This tries to improve (although maybe not completely fix): 89luca89#177 Signed-off-by: Dario Faggioli <dfaggioli@suse.com>
Executing commands on the host, while inside of a container, can be done either with flatpak-spawn, of playing tricks with chroot. Let's provide a new script, which will be available inside of the container, that does exactly that. This tries to improve (although maybe not completely fix): 89luca89#177 Signed-off-by: Dario Faggioli <dfaggioli@suse.com>
As stated out in this review: https://distrowatch.com/weekly.php?issue=20220221#distrobox
There are areas in which Distrobox can improve a lot in documentation, usability and discoverablity.
dest_path
if not existsdest_path
to their $PATHcontainer_manager
and point out to the docs in case of missing onedistrobox rm
when container is running, suggesting the podman/docker command to run to stop itdistrobox-rm
, together with a--yes
optiondistrobox stop
to the list of commandshost-exec
in the container?The text was updated successfully, but these errors were encountered: