URL Patterns
Implicit Detection
ori-term automatically detects common URL-like patterns in terminal output:
- HTTP/HTTPS URLs
- File paths
- Git commit hashes
- IP addresses
- Email addresses
Hover over a detected URL with Ctrl held to see it underlined. Ctrl+Click to open it in your default browser.
OSC 8 Hyperlinks
Applications can emit explicit hyperlinks using the OSC 8 escape sequence. These render as clickable links without regex detection. Many modern CLI tools support this:
ls --hyperlink— File linksgcc/clang— Error location linksripgrep— Match location links
Custom Patterns
Define regex patterns in your config.toml to match project-specific identifiers:
[[url_patterns]]
regex = "PROJ-\\d+"
url = "https://jira.example.com/browse/$0"
action = "open" The regex field defines what to match. The url field defines the URL template with capture group substitution ($0 for full match, $1, $2... for groups).
Actions
Each pattern specifies what happens on Ctrl+Click:
| Action | Behavior |
|---|---|
open | Open the URL in default browser |
copy | Copy the matched text to clipboard |
select | Select the matched text |
Examples
# GitHub issue references
[[url_patterns]]
regex = "(\\w+)/(\\w+)#(\\d+)"
url = "https://github.com/$1/$2/issues/$3"
action = "open"
# Stack trace file paths
[[url_patterns]]
regex = "(/[\\w/.-]+):(\\d+)"
action = "open"
# SHA commit hashes
[[url_patterns]]
regex = "\\b[0-9a-f]40\\b"
action = "copy"