From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on inbox.vuxu.org X-Spam-Level: X-Spam-Status: No, score=-0.0 required=5.0 tests=T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.4 Received: (qmail 8996 invoked from network); 24 Aug 2022 02:48:35 -0000 Received: from 9front.inri.net (168.235.81.73) by inbox.vuxu.org with ESMTPUTF8; 24 Aug 2022 02:48:35 -0000 Received: from mimir.eigenstate.org ([206.124.132.107]) by 9front; Tue Aug 23 22:47:11 -0400 2022 Received: from abbatoir.myfiosgateway.com (pool-74-108-56-137.nycmny.fios.verizon.net [74.108.56.137]) by mimir.eigenstate.org (OpenSMTPD) with ESMTPSA id 24c30cc0 (TLSv1.2:ECDHE-RSA-AES256-SHA:256:NO) for <9front@9front.org>; Tue, 23 Aug 2022 19:46:59 -0700 (PDT) Message-ID: <8ECB371116CD8727E72BFEDF79BC5405@eigenstate.org> To: 9front@9front.org Date: Tue, 23 Aug 2022 22:46:58 -0400 From: ori@eigenstate.org In-Reply-To: <6b1146ca-e2de-88eb-d331-e1c978baf266@posixcafe.org> MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7bit List-ID: <9front.9front.org> List-Help: X-Glyph: ➈ X-Bullshit: injection ActivityPub grid CMS full-stack interface Subject: Re: [9front] [PATCH] programmable menus for rio Reply-To: 9front@9front.org Precedence: bulk Quoth Jacob Moody : > Something I've been playing with is a way of exposing part of the rio > menu to the programs running within it. This is a bit of a simple > approach, but I would like to gauge interest that people have in > something along these lines before continuing. > > This adds a /dev/menu file that can be written to > to add new entries to the button3menu. The file > can be read to get the text string of an added > menu entry when hit by the user. > > Thanks, > moody > It seems like an interesting trick -- but, the programs that might use it would already likely be graphical, no?