Thanks!
I was already hacking my own version when i received your message,
but some ideas (the -xterm, -html etc features) were too nice to ignore :-)
I have now a new (prototype - comments welcome!) version of the script,
it looks for a BASE href passed in its input.
(it tries to be paranoia about the commands it is given to run, pointers
are welcome if someone has something similar - i remember seeing
something about a secure tcl interpreter ):
http://utis179.cs.utwente.nl:8001/export/x_exec
and a server that does the necessary mapping (it includes the BASE href)
(in principle there is only need for one 'gateway' in the Web that does
the URL-to-MIME-document mapping):
http://utis179.cs.utwente.nl:8001/x-exec/
I think this can make the x-exec: URL scheme functionality available
to those who don't want/can hack the Mosaic client - all you need is the
x_exec script (or something similar), and in your ~/.mailcap a line:
application/x-exec; x_exec %s
and then it should be (more or less?) 'plug compatible' with the x-exec:
scripts (the xprog script does contains some additonal tests that
are moved to the x_exec script) (my version of the xprog script:
http://utis179.cs.utwente.nl:8001/export/xprog
to test, try
(after putting the x_exec and xprog scripts somewhere where they will
be found, and adding the ~/.mailcap line mentioned above):
http://utis179.cs.utwente.nl:8001/x-exec/xprog
Please note: the x_exec script is experimental, just to test the idea...
Regards,
Axel.
<Axel.Belinfante@cs.utwente.nl> tel. +31 53 893774 fax. +31 53 333815
University of Twente, Tele-Informatics & Open Systems Group
P.O. Box 217 NL-7500 AE Enschede The Netherlands
"ili ne sciis ke estas neebla do ili simple faris" -- Loesje