diff --git a/common/flatpak-context.c b/common/flatpak-context.c index a994c047..17f4d6c5 100644 --- a/common/flatpak-context.c +++ b/common/flatpak-context.c @@ -2361,7 +2361,10 @@ flatpak_context_add_bus_filters (FlatpakContext *context, flatpak_bwrap_add_arg_printf (bwrap, "--own=org.mpris.MediaPlayer2.%s.*", app_id); } else - flatpak_bwrap_add_arg_printf (bwrap, "--own=%s.Sandboxed.*", app_id); + { + flatpak_bwrap_add_arg_printf (bwrap, "--own=%s.Sandboxed.*", app_id); + flatpak_bwrap_add_arg_printf (bwrap, "--own=org.mpris.MediaPlayer2.%s.Sandboxed.*", app_id); + } } if (session_bus) diff --git a/doc/flatpak-run.xml b/doc/flatpak-run.xml index f8d9e5ee..d5360371 100644 --- a/doc/flatpak-run.xml +++ b/doc/flatpak-run.xml @@ -574,9 +574,9 @@ key=v1;v2; Allow filtered access to the session dbus connection. This is the default, except when run with --sandbox. - Isandbox mode, even if you allow access to the session bus the sandbox cannot talk to or own + In sandbox mode, even if you allow access to the session bus the sandbox cannot talk to or own the application ids (org.the.App.*) on the bus (unless explicitly added), only names in the - .Sandbox subset (org.the.App.Sandbox.*). + .Sandboxed subset (org.the.App.Sandboxed.* and org.mpris.MediaPlayer2.org.the.App.Sandboxed.*).