
This have many advantages: - prevent XSS (QubesOS/qubes-issues#1462) - use default browser instead of default HTML viewer - better qrexec policy control - easier to control where are opened files vs URLs For now allow only http(s):// and ftp:// addresses (especially prevent file://). But this list can be easily extended. QubesOS/qubes-issues#1462 Fixes QubesOS/qubes-issues#1487
17 lines
192 B
Bash
Executable File
17 lines
192 B
Bash
Executable File
#!/bin/sh
|
|
|
|
read url
|
|
|
|
case "$url" in
|
|
http://*|\
|
|
https://*|\
|
|
ftp://*)
|
|
exec qubes-open "$url"
|
|
;;
|
|
*)
|
|
echo "Invalid URL" >&2
|
|
exit 1
|
|
;;
|
|
esac
|
|
|