This have many advantages: - prevent XSS (QubesOS/qubes-issues#1462) - use default browser instead of default HTML viewer - better qrexec policy control - easier to control where are opened files vs URLs For now allow only http(s):// and ftp:// addresses (especially prevent file://). But this list can be easily extended. QubesOS/qubes-issues#1462 Fixes QubesOS/qubes-issues#1487
		
			
				
	
	
		
			17 lines
		
	
	
		
			192 B
		
	
	
	
		
			Bash
		
	
	
		
			Executable File
		
	
	
	
	
			
		
		
	
	
			17 lines
		
	
	
		
			192 B
		
	
	
	
		
			Bash
		
	
	
		
			Executable File
		
	
	
	
	
#!/bin/sh
 | 
						|
 | 
						|
read url
 | 
						|
 | 
						|
case "$url" in
 | 
						|
    http://*|\
 | 
						|
    https://*|\
 | 
						|
    ftp://*)
 | 
						|
        exec qubes-open "$url"
 | 
						|
        ;;
 | 
						|
    *)
 | 
						|
        echo "Invalid URL" >&2
 | 
						|
        exit 1
 | 
						|
        ;;
 | 
						|
esac
 | 
						|
 |