From ff695b2e5107d2de03411714e8c6005e8eae0caa Mon Sep 17 00:00:00 2001 From: awokd <34515595+awokd@users.noreply.github.com> Date: Fri, 24 Jan 2020 17:15:26 +0000 Subject: [PATCH] Add `\policy` to RPC directories --- docs/common-tasks/opening-urls-in-vms.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/docs/common-tasks/opening-urls-in-vms.md b/docs/common-tasks/opening-urls-in-vms.md index d3c9956..ade3fc5 100644 --- a/docs/common-tasks/opening-urls-in-vms.md +++ b/docs/common-tasks/opening-urls-in-vms.md @@ -40,7 +40,7 @@ If an `allow` policy is configured with a destination other than `$dispvm` it is In the following example, opening URLs in specific VMs is explicitely forbidden to prevent mistakenly selecting such VM, opening URLs in regular dispVMs is always allowed (see notes below), and the default policy is to have the selection dialog pop up for everything else with the "dispBrowser" VM preselected. -`/etc/qubes-rpc/qubes.OpenURL`: +`/etc/qubes-rpc/policy/qubes.OpenURL`: ~~~ @anyvm vault deny @@ -50,7 +50,7 @@ In the following example, opening URLs in specific VMs is explicitely forbidden @anyvm @anyvm ask,default_target=dispBrowser ~~~ -`/etc/qubes-rpc/qubes.OpenInVM`: +`/etc/qubes-rpc/policy/qubes.OpenInVM`: ~~~ @anyvm @anyvm ask