On 6/9/21 1:41 PM, Ulrich Windl wrote:
On 5/31/21 5:12 AM, Sven Semmler wrote:
On 5/30/21 12:37 AM, Adam Mercer wrote:
this opens a dialog asking me to select a target domain

check your /etc/qubes-rpc/policy/qubes.OpenURL

If you want your example to work add this line before all others:

$anyvm browser allow

Does the line
$anyvm  $dispvm allow
mean it'll be allowed for any disposable VM?

No, it means that any VM is allowed to cause a new DisposableVM to be created in which that type of thing (i.e., file or URL, depending on the policy file containing this line) will then be opened.

The first is the source qube ... the one calling qvm-open-in-vm.
The second is the target 'browser' in your example. The third is either 'deny', 'ask' or 'allow'

Andrew David Wong (Axon)
Community Manager, Qubes OS

You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 

Attachment: OpenPGP_signature
Description: OpenPGP digital signature

Reply via email to