Commit e30f05c2 authored by Harald Sitter's avatar Harald Sitter 🏳️‍🌈
Browse files

do not show silly mounts in sandboxed envs

inside sandboxes we get all sorts of silly mounts that have no real
value. since the list of potential mounts is fairly long I've opted to
skip over all readonly mounts as well as all of /var and a special
app-specific var variant. inside flatpak that covers everything of no
value pretty much

BUG: 450835
parent 0e59c4cd
Pipeline #156396 passed with stage
in 2 minutes and 9 seconds
......@@ -155,6 +155,17 @@ DiskList::DiskList()
// /var and friends are not useful paths. /var has some stuff mounted that isn't useful either
static const bool inSandbox =
!(QStandardPaths::locate(QStandardPaths::RuntimeLocation, QLatin1String("flatpak-info")).isEmpty() ||
const QString flatpakAppVar = QDir::homePath() + QLatin1String("/.var/app/");
if ((inSandbox && (storage.isReadOnly())) || storage.rootPath().startsWith(QLatin1String("/var/")) ||
storage.rootPath().startsWith(flatpakAppVar)) {
Disk disk;
disk.mount = storage.rootPath(); =;
Supports Markdown
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment