On 6/9/21 1:41 PM, Ulrich Windl wrote:
On 5/31/21 5:12 AM, Sven Semmler wrote:On 5/30/21 12:37 AM, Adam Mercer wrote:this opens a dialog asking me to select a target domaincheck your /etc/qubes-rpc/policy/qubes.OpenURL If you want your example to work add this line before all others: $anyvm browser allowCurious: Does the line $anyvm $dispvm allow mean it'll be allowed for any disposable VM?
No, it means that any VM is allowed to cause a new DisposableVM to be created in which that type of thing (i.e., file or URL, depending on the policy file containing this line) will then be opened.
The first is the source qube ... the one calling qvm-open-in-vm.The second is the target 'browser' in your example. The third is either 'deny', 'ask' or 'allow'
-- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8d6d1884-de95-7f21-b046-cb529474d072%40qubes-os.org.
OpenPGP_signature
Description: OpenPGP digital signature