-
-
Notifications
You must be signed in to change notification settings - Fork 41
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Handle HTTP & HTTPS URLs in dom0 & GUIVMs #226
base: main
Are you sure you want to change the base?
Conversation
a81f5b2
to
bc0a902
Compare
5b0a009
to
7dd090a
Compare
PipelineRetryFailed |
@marmarta pylint and unittests for this one are green. Builds fail. I could not fully understand the logs. Advise is highly appreciated. |
xdg-settings is not installed in the environment, so the build process fails: the package containing it must be added to the spec / control files. |
0a25e21
to
dd980e9
Compare
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #226 +/- ##
==========================================
- Coverage 93.43% 93.19% -0.24%
==========================================
Files 57 57
Lines 10999 11083 +84
==========================================
+ Hits 10277 10329 +52
- Misses 722 754 +32 ☔ View full report in Codecov by Sentry. 🚨 Try these New Features:
|
The CI/CD tests are finally green. I will proceed with unittests. But overall this should be ready for testing |
It got few conflicts now... can you rebase? |
Sure. Will do it this afternoon after writing the weekly newsletter. |
This one will be a big one, major devices API change got merged finally, more context at QubesOS/qubes-issues#9325 |
Yes. I saw that when rebasing the |
A new `qubes-virtual-browser` tool is made to handle URLs within dom0 and/or GUIVMs. It could safely open URLs via DisposableVMs, copy them to global clipboard or discard them. resolves: QubesOS/qubes-issues#8171
dd980e9
to
0a165a1
Compare
Ok. This got finally rebased and conflicts are solved. I got busy recently and it took some time. There are few pending minor issues.
|
Looking at this, what do you think about unifying it a bit with AppVM URL opening script? We already have a possibility (much simpler) to open URLs in another VM, and it's already configurable in the global config tool. That one won't work directly in dom0 as qrexec calls from dom0 are different. But maybe this tool can be unified to reuse more of that? I mean it both ways:
What do you think? |
It should be doable. I can work on it. I appreciate if I could have some advise on the priority of this one vs the pending clipboard PRs (timeout feature and multi-paste feature). For which ones should I spend more time? |
I'd say clipboard timeout feature should come first |
A new
qubes-virtual-browser
tool is made to handle URLs within dom0 and/or GUIVMs. It could safely open URLs via DisposableVMs, copy them to global clipboard or discard them.resolves: QubesOS/qubes-issues#8171