flatpak runflatpakDeveloperAlexanderLarssonalexl@redhat.comflatpak run1flatpak-runRun an application or open a shell in a runtimeflatpak runOPTIONREFARGDescription
If REF names an installed application,
Flatpak runs the application in a sandboxed environment. Extra
arguments are passed on to the application. The current branch and arch of
the application is used unless otherwise specified with
or . See
flatpak-make-current1.
If REF names a runtime, a shell is opened in the
runtime. This is useful for development and testing. If there is ambiguity about
which branch to use, you will be prompted to choose. Use
to avoid this. The primary arch is used unless otherwise specified with
.
By default, Flatpak will look for the application or runtime in the per-user
installation first, then in all system installations. This can be overridden
with the , and
options.
Flatpak creates a sandboxed environment for the application to run in
by mounting the right runtime at /usr and a writable
directory at /var, whose content is preserved between
application runs. The application itself is mounted at /app.
The details of the sandboxed environment are controlled by the application
metadata and various options like and
that are passed to the run command: Access is allowed if it was requested either
in the application metadata file or with an option and the user hasn't overridden it.
The remaining arguments are passed to the command that gets run in the sandboxed
environment. See the option for handling of file
arguments.
Environment variables are generally passed on to the sandboxed application, with
certain exceptions. The application metadata can override environment variables,
as well as the option. Apart from that, Flatpak always
unsets or overrides the following variables, since their session values
are likely to interfere with the functioning of the sandbox:
PATHLD_LIBRARY_PATHXDG_CONFIG_DIRSXDG_DATA_DIRSXDG_RUNTIME_DIRSHELLTEMPTEMPDIRTMPTMPDIRPYTHONPATHPERLLIBPERL5LIBXCURSOR_PATHKRB5CCNAMEXKB_CONFIG_ROOTGIO_EXTRA_MODULESGDK_BACKEND
Also several environment variables with the prefix "GST_" that are used by gstreamer
are unset (since Flatpak 1.12.5).
Flatpak also overrides the XDG environment variables to point sandboxed applications
at their writable filesystem locations below ~/.var/app/$APPID/:
XDG_DATA_HOMEXDG_CONFIG_HOMEXDG_CACHE_HOMEXDG_STATE_HOME (since Flatpak 1.13)
Apps can use the and
options to get a
Flatpak 1.13-compatible ~/.local/state
on older versions of Flatpak.
The host values of these variables are made available inside the sandbox via these
HOST_-prefixed variables:
HOST_XDG_DATA_HOMEHOST_XDG_CONFIG_HOMEHOST_XDG_CACHE_HOMEHOST_XDG_STATE_HOME (since Flatpak 1.13)
Flatpak sets the environment variable FLATPAK_ID to the application
ID of the running app.
Flatpak also bind-mounts as read-only the host's /etc/os-release
(if available, or /usr/lib/os-release as a fallback) to
/run/host/os-release in accordance with the
os-release specification.
If parental controls support is enabled, flatpak will check the
current user’s parental controls settings, and will refuse to
run an app if it is blocklisted for the current user.
OptionsThe following options are understood:
Show help options and exit.
Look for the application and runtime in per-user installations.
Look for the application and runtime in the default system-wide installations.
Look for the application and runtime in the system-wide installation specified
by NAME
among those defined in /etc/flatpak/installations.d/.
Using is equivalent to using
.
Print debug information during command processing.
Print OSTree debug information during command processing.
The architecture to run. See flatpak --supported-arches
for architectures supported by the host.
The command to run instead of the one listed in the application metadata.
The directory to run the command in. Note that this must be a directory
inside the sandbox.
The branch to use.
Use the devel runtime that is specified in the application metadata instead of the regular runtime, and use a seccomp profile that is less likely to break development tools.
Use this runtime instead of the one that is specified in the application metadata.
This is a full tuple, like for example org.freedesktop.Sdk/x86_64/1.2, but
partial tuples are allowed. Any empty or missing parts are filled in with the corresponding
values specified by the app.
Use this version of the runtime instead of the one that is specified in the application metadata.
This overrides any version specified with the --runtime option.
Share a subsystem with the host session. This overrides
the Context section from the application metadata.
SUBSYSTEM must be one of: network, ipc.
This option can be used multiple times.
Don't share a subsystem with the host session. This overrides
the Context section from the application metadata.
SUBSYSTEM must be one of: network, ipc.
This option can be used multiple times.
Expose a well known socket to the application. This overrides to
the Context section from the application metadata.
SOCKET must be one of: x11, wayland, fallback-x11, pulseaudio, system-bus, session-bus,
ssh-auth, pcsc, cups, gpg-agent.
This option can be used multiple times.
Don't expose a well known socket to the application. This overrides to
the Context section from the application metadata.
SOCKET must be one of: x11, wayland, fallback-x11, pulseaudio, system-bus, session-bus,
ssh-auth, pcsc, cups, gpg-agent.
This option can be used multiple times.
Expose a device to the application. This overrides to
the Context section from the application metadata.
DEVICE must be one of: dri, kvm, shm, all.
This option can be used multiple times.
Don't expose a device to the application. This overrides to
the Context section from the application metadata.
DEVICE must be one of: dri, kvm, shm, all.
This option can be used multiple times.
Allow access to a specific feature. This overrides to
the Context section from the application metadata.
FEATURE must be one of: devel, multiarch, bluetooth.
This option can be used multiple times.
See flatpak-build-finish1
for the meaning of the various features.
Disallow access to a specific feature. This overrides to
the Context section from the application metadata.
FEATURE must be one of: devel, multiarch, bluetooth.
This option can be used multiple times.
Allow the application access to a subset of the filesystem.
This overrides to the Context section from the application metadata.
FILESYSTEM can be one of: home, host, host-os, host-etc, xdg-desktop, xdg-documents, xdg-download,
xdg-music, xdg-pictures, xdg-public-share, xdg-templates, xdg-videos,
xdg-run, xdg-config, xdg-cache, xdg-data,
an absolute path, or a homedir-relative path like ~/dir or paths
relative to the xdg dirs, like xdg-download/subdir.
The optional :ro suffix indicates that the location will be read-only.
The optional :create suffix indicates that the location will be read-write and created if it doesn't exist.
This option can be used multiple times.
See the "[Context] filesystems" list in
flatpak-metadata5
for details of the meanings of these filesystems.
Undo the effect of a previous
FILESYSTEM
in the app's manifest and/or the overrides set up with
flatpak-override1.
This overrides the Context section of the
application metadata.
FILESYSTEM can take the same
values as for , but the
:ro and
:create suffixes are not
used here.
This option can be used multiple times.
This option does not prevent access to a more
narrowly-scoped .
For example, if an application has the equivalent of
in
its manifest or as a system-wide override, and
flatpak override --user --nofilesystem=home
as a per-user override, then it will be prevented from
accessing most of the home directory, but it will still
be allowed to access
$XDG_CONFIG_HOME/MyApp.
As a special case,
will ignore all
permissions inherited from the app manifest or
flatpak-override1,
in addition to having the behaviour of
.
Add generic policy option. For example, "--add-policy=subsystem.key=v1 --add-policy=subsystem.key=v2" would map to this metadata:
[Policy subsystem]
key=v1;v2;
This option can be used multiple times.
Remove generic policy option. This option can be used multiple times.
Set an environment variable in the application.
This overrides to the Context section from the application metadata.
This option can be used multiple times.
Unset an environment variable in the application.
This overrides the unset-environment entry in the [Context]
group of the metadata, and the [Environment] group.
This option can be used multiple times.
Read environment variables from the file descriptor
FD, and set them as if
via . This can be used to avoid
environment variables and their values becoming visible
to other users.
Each environment variable is in the form
VAR=VALUE
followed by a zero byte. This is the same format used by
env -0 and
/proc/*/environ.
Allow the application to own the well known name NAME on the session bus.
If NAME ends with .*, it allows the application to own all matching names.
This overrides to the Context section from the application metadata.
This option can be used multiple times.
Allow the application to talk to the well known name NAME on the session bus.
If NAME ends with .*, it allows the application to talk to all matching names.
This overrides to the Context section from the application metadata.
This option can be used multiple times.
Don't allow the application to talk to the well known name NAME on the session bus.
If NAME ends with .*, it allows the application to talk to all matching names.
This overrides to the Context section from the application metadata.
This option can be used multiple times.
Allow the application to own the well known name NAME on the system bus.
If NAME ends with .*, it allows the application to own all matching names.
This overrides to the Context section from the application metadata.
This option can be used multiple times.
Allow the application to talk to the well known name NAME on the system bus.
If NAME ends with .*, it allows the application to talk to all matching names.
This overrides to the Context section from the application metadata.
This option can be used multiple times.
Don't allow the application to talk to the well known name NAME on the system bus.
If NAME ends with .*, it allows the application to talk to all matching names.
This overrides to the Context section from the application metadata.
This option can be used multiple times.
If the application doesn't have access to the real homedir, make the (homedir-relative) path
FILENAME a bind mount to the corresponding path in the per-application directory,
allowing that location to be used for persistent data.
This overrides to the Context section from the application metadata.
This option can be used multiple times.
Run this instance without the filtered access to the session dbus connection. Note, this is the default when run with --sandbox.
Allow filtered access to the session dbus connection. This is the default, except when run with --sandbox.
In sandbox mode, even if you allow access to the session bus the sandbox cannot talk to or own
the application ids (org.the.App.*) on the bus (unless explicitly added), only names in the
.Sandboxed subset (org.the.App.Sandboxed.* and org.mpris.MediaPlayer2.org.the.App.Sandboxed.*).
Run this instance without the access to the accessibility bus. Note, this is the default when run with --sandbox.
Allow access to the accessibility bus. This is the default, except when run with --sandbox.
Run the application in sandboxed mode, which means dropping all the extra permissions it would otherwise have, as
well as access to the session/system/a11y busses and document portal.
Log session bus traffic. This can be useful to see what access you need to allow in
your D-Bus policy.
Log system bus traffic. This can be useful to see what access you need to allow in
your D-Bus policy.
Kill the entire sandbox when the launching process dies.
Specifies the pid of the "parent" flatpak, used by
--parent-expose-pids and --parent-share-pids.
Make the processes of the new sandbox visible in the sandbox of the parent flatpak, as defined
by --parent-pid.
Use the same process ID namespace for the processes of
the new sandbox and the sandbox of the parent flatpak, as
defined by --parent-pid. Implies --parent-expose-pids.
Write the instance ID string to the given file descriptor.
If this option is specified, the remaining arguments are scanned, and all arguments
that are enclosed between a pair of '@@' arguments are interpreted as file paths,
exported in the document store, and passed to the command in the form of the
resulting document path. Arguments between '@@u' and '@@' are considered uris,
and any file: uris are exported. The exports are non-persistent and with read and write
permissions for the application.
Instead of mounting the app's content on
/app in the sandbox, mount
PATH on /app,
and the app's content on
/run/parent/app.
If the app has extensions, they will also be redirected
into /run/parent/app, and will not
be included in the LD_LIBRARY_PATH inside
the sandbox.
As a special case,
(with an empty PATH)
results in an empty directory being mounted on
/app.
Instead of mounting the runtime's files on
/usr in the sandbox, mount
PATH on
/usr,
and the runtime's normal files on
/run/parent/usr.
If the runtime has extensions, they will also be redirected
into /run/parent/usr, and will not
be included in the LD_LIBRARY_PATH inside
the sandbox.
This option will usually only be useful if it is
combined with and
.
Examples$ flatpak run org.gnome.gedit$ flatpak run --devel --command=bash org.gnome.Builder$ flatpak run --command=bash org.gnome.SdkSee alsoflatpak1,
flatpak-override1,
flatpak-enter1