Package: ratpoison
Version: 1.4.9-1+b1
Severity: wishlist

Dear Maintainer,

When using ":tmpwm openbox", and subsequently quitting Openbox again,
some root window X properties set by openbox remain:

| $ xprop -root ; ratpoison -c 'tmpwm openbox' & sleep 2 ; killall openbox ; fg 
; xprop -root
| _NET_WM_NAME(UTF8_STRING) = "ratpoison"
| _NET_SUPPORTED(ATOM) = _NET_WM_PID
| XFree86_DDC_EDID1_RAWDATA(INTEGER) = [...snip...]
| RESOURCE_MANAGER(STRING) = [...snip...]
| _XKB_RULES_NAMES(STRING) = "evdev", "pc105", "de", "nodeadkeys", 
"terminate:ctrl_alt_bksp,compose:menu,numpad:mac,terminate:ctrl_alt_bksp"
| XFree86_has_VT(INTEGER) = 1
| XFree86_VT(INTEGER) = 2
| [1] 26304
| ratpoison -c 'tmpwm openbox'
| _NET_WM_NAME(UTF8_STRING) = "ratpoison"
| _NET_SUPPORTED(ATOM) = _NET_WM_PID
| _NET_CLIENT_LIST(WINDOW): window id #
| _NET_CURRENT_DESKTOP(CARDINAL) = 0
| _NET_DESKTOP_NAMES(UTF8_STRING) = "desktop 1", "desktop 2", "desktop 3", 
"desktop 4"
| _NET_WORKAREA(CARDINAL) = 0, 0, 1920, 1080, 0, 0, 1920, 1080, 0, 0, 1920, 
1080, 0, 0, 1920, 1080
| _NET_DESKTOP_VIEWPORT(CARDINAL) = 0, 0, 0, 0, 0, 0, 0, 0
| _NET_NUMBER_OF_DESKTOPS(CARDINAL) = 4
| _NET_DESKTOP_GEOMETRY(CARDINAL) = 1920, 1080
| _NET_CLIENT_LIST_STACKING(WINDOW): window id # 0x800001
| _OB_THEME(UTF8_STRING) = "Clearlooks"
| _OB_VERSION(UTF8_STRING) = "3.6.1"
| _NET_SUPPORTING_WM_CHECK(WINDOW): window id # 0xc0020b
| XFree86_DDC_EDID1_RAWDATA(INTEGER) = [...snip...]
| RESOURCE_MANAGER(STRING) = [...snip...]
| _XKB_RULES_NAMES(STRING) = "evdev", "pc105", "de", "nodeadkeys", 
"terminate:ctrl_alt_bksp,compose:menu,numpad:mac,terminate:ctrl_alt_bksp"
| XFree86_has_VT(INTEGER) = 1
| XFree86_VT(INTEGER) = 2
| $ 

(One or more of) these xprops reproducibly cause Firefox to crash,
unless I manually remove them or restart X. I'm tempted to forgive
Firefox in this case, because presumably they're announcing some Window
Manager capability that ratpoison doesn't provide.

Of course, it would be nice if $TMPWM cleaned up after itself, but I'm
not sure if that's a realistic ask: most WMs probably expect the X
session to die when they quit, so why would they? And if they crash,
they can't.

Thus I think ratpoison cleaning up after the tmpwm exits is the best
place to do it, hence filing as wishlist here. Feel free to
reassign/clone as you see fit.

I can of course script ratpoison to do the cleaning up, but this feels
like a function that should be default.
And/or maybe ratpoison should grow a hookable event when :tmpwm returns,
so people can easily drop a cleanup hook in there?

Thank you for maintaining ratpoison!
Regards,
    Jan

-- System Information:
Debian Release: bullseye/sid
  APT prefers testing
  APT policy: (990, 'testing'), (650, 'testing-debug'), (550, 
'unstable-debug'), (550, 'unstable'), (10, 'experimental-debug'), (10, 
'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.7.0-2-amd64 (SMP w/4 CPU threads)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=C.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)

Versions of packages ratpoison depends on:
ii  libc6       2.31-3
ii  libx11-6    2:1.6.10-3
ii  libxft2     2.3.2-2
ii  libxrandr2  2:1.5.1-1
ii  libxtst6    2:1.2.3-1

Versions of packages ratpoison recommends:
pn  9menu                               <none>
pn  menu                                <none>
ii  mlterm [x-terminal-emulator]        3.9.0-1
ii  rxvt-unicode [x-terminal-emulator]  9.22-8

Versions of packages ratpoison suggests:
pn  xbindkeys  <none>
pn  xclip      <none>

-- no debconf information

Attachment: signature.asc
Description: PGP signature

Reply via email to