**Describe the bug**
When trying to run a RemoteApp it is unable to parse the `…app` flag
**To Reproduce**
Steps to reproduce the behavior:
1. Install "RemoteApp Tool" on Windows 10 from [this GitHub repository](https://github.com/kimmknight/remoteapptool).
2. Use the RemoteApp Tool to register cmd.exe from %windir%\system32.
3. Attempt to connect from the Linux host with the following command:
flatpak run --command=xfreerdp com.freerdp.FreeRDP /u:xxxxx /p:xxxxx /app:'%windir%\system32\cmd.exe' /v:192.168.178.74
**Expected behavior**
The application to open
**Actual behavior**
Terminal outputs syntax information, with error
`[13:39:18:539] [2:00000002] [ERROR][com.freerdp.client.common.cmdline] - [freerdp_client_settings_parse_command_line_arguments_int]: Command line parsing failed at 'app' value '%windir%\system32\cmd.exe' [-1002]`
**Application details**
* FreeRDP version: 3.7.0
* Command line used: `flatpak run --command=xfreerdp com.freerdp.FreeRDP /u:xxxxx /p:xxxxx /app:'%windir%\system32\cmd.exe' /v:192.168.178.74`
* Output of `xfreerdp /buildconfig`:
```
This is FreeRDP version 3.7.0 (3.7.0)
Build configuration: BUILD_TESTING=OFF WINPR_HAVE_AIO_H=1 WINPR_HAVE_EXECINFO_BACKTRACE=1 WINPR_HAVE_EXECINFO_BACKTRACE_SYMBOLS=1 WINPR_HAVE_EXECINFO_BACKTRACE_SYMBOLS_FD=1 WINPR_HAVE_EXECINFO_HEADER=1 WINPR_HAVE_FCNTL_H=1 WINPR_HAVE_GETLOGIN_R=1 WINPR_HAVE_GETPWUID_R=1 WINPR_HAVE_INTTYPES_H=1 WINPR_HAVE_POLL_H=1 WINPR_HAVE_PTHREAD_MUTEX_TIMEDLOCK_LIB=1 WINPR_HAVE_PTHREAD_MUTEX_TIMEDLOCK_LIBS= WINPR_HAVE_PTHREAD_MUTEX_TIMEDLOCK_SYMBOL=1 WINPR_HAVE_STDBOOL_H=1 WINPR_HAVE_STDINT_H=1 WINPR_HAVE_STRNDUP=1 WINPR_HAVE_SYSLOG_H=1 WINPR_HAVE_SYS_EVENTFD_H=1 WINPR_HAVE_SYS_FILIO_H= WINPR_HAVE_SYS_SELECT_H=1 WINPR_HAVE_SYS_SOCKIO_H= WINPR_HAVE_SYS_TIMERFD_H=1 WINPR_HAVE_TM_GMTOFF=1 WINPR_HAVE_UNISTD_H=1 WINPR_HAVE_UNWIND_H=1 WITH_AAD=ON WITH_ABSOLUTE_PLUGIN_LOAD_PATHS=ON WITH_ADD_PLUGIN_TO_RPATH=OFF WITH_ALSA=ON WITH_BINARY_VERSIONING=OFF WITH_CAIRO=OFF WITH_CCACHE=ON WITH_CHANNELS=ON WITH_CJSON_REQUIRED=OFF WITH_CLANG_FORMAT=ON WITH_CLIENT=ON WITH_CLIENT_AVAILABLE=1 WITH_CLIENT_CHANNELS=ON WITH_CLIENT_CHANNELS_AVAILABLE=1 WITH_CLIENT_COMMON=ON WITH_CLIENT_INTERFACE=OFF WITH_CLIENT_SDL=ON WITH_CLIENT_SDL2=ON WITH_CLIENT_SDL3=OFF WITH_CLIENT_SDL_AVAILABLE=1 WITH_CLIENT_SDL_VERSIONED=OFF WITH_CUPS=ON WITH_DEBUG_ALL=OFF WITH_DEBUG_CAPABILITIES=OFF WITH_DEBUG_CERTIFICATE=OFF WITH_DEBUG_CHANNELS=OFF WITH_DEBUG_CLIPRDR=OFF WITH_DEBUG_CODECS=OFF WITH_DEBUG_DVC=OFF WITH_DEBUG_EVENTS=OFF WITH_DEBUG_KBD=OFF WITH_DEBUG_LICENSE=OFF WITH_DEBUG_MUTEX=OFF WITH_DEBUG_NEGO=OFF WITH_DEBUG_NLA=OFF WITH_DEBUG_NTLM=OFF WITH_DEBUG_RAIL=OFF WITH_DEBUG_RDP=OFF WITH_DEBUG_RDPDR=OFF WITH_DEBUG_RDPEI=OFF WITH_DEBUG_RDPGFX=OFF WITH_DEBUG_REDIR=OFF WITH_DEBUG_RFX=OFF WITH_DEBUG_RINGBUFFER=OFF WITH_DEBUG_SCARD=OFF WITH_DEBUG_SCHANNEL=OFF WITH_DEBUG_SDL_EVENTS=OFF WITH_DEBUG_SDL_KBD_EVENTS=OFF WITH_DEBUG_SND=OFF WITH_DEBUG_SVC=OFF WITH_DEBUG_SYMBOLS=OFF WITH_DEBUG_THREADS=OFF WITH_DEBUG_TIMEZONE=OFF WITH_DEBUG_TRANSPORT=OFF WITH_DEBUG_TSG=OFF WITH_DEBUG_TSMF=OFF WITH_DEBUG_TSMF_AVAILABLE=0 WITH_DEBUG_URBDRC=OFF WITH_DEBUG_WND=OFF WITH_DEBUG_X11=OFF WITH_DEBUG_X11_LOCAL_MOVESIZE=OFF WITH_DEBUG_XV=OFF WITH_DSP_EXPERIMENTAL=OFF WITH_DSP_FFMPEG=ON WITH_DSP_FFMPEG_AVAILABLE=1 WITH_EVENTFD_READ_WRITE=1 WITH_FAAC=OFF WITH_FAAD2=OFF WITH_FDK_AAC=OFF WITH_FFMPEG=ON WITH_FREERDP_DEPRECATED=OFF WITH_FREERDP_DEPRECATED_COMMANDLINE=OFF WITH_FULL_CONFIG_PATH=OFF WITH_FUSE=OFF WITH_GFX_FRAME_DUMP=OFF WITH_GFX_H264=ON WITH_GPROF=OFF WITH_GSM=OFF WITH_INTERNAL_MD4=OFF WITH_INTERNAL_MD5=OFF WITH_INTERNAL_RC4=OFF WITH_JPEG=OFF WITH_JSONC_REQUIRED=OFF WITH_JSON_DISABLED=OFF WITH_KEYBOARD_LAYOUT_FROM_FILE=OFF WITH_KRB5=ON WITH_KRB5_NO_NTLM_FALLBACK=OFF WITH_LAME=OFF WITH_LIBRARY_VERSIONING=ON WITH_LIBRESSL=OFF WITH_LODEPNG=OFF WITH_MACAUDIO=OFF WITH_MACAUDIO_AVAILABLE=0 WITH_MANPAGES=OFF WITH_MBEDTLS=OFF WITH_NATIVE_SSPI=OFF WITH_NEON=ON WITH_OPENCL=OFF WITH_OPENH264=OFF WITH_OPENSSL=ON WITH_OPUS=OFF WITH_OSS=OFF WITH_PCSC=ON WITH_PKCS11=ON WITH_PLATFORM_SERVER=ON WITH_POLL=ON WITH_PROFILER=OFF WITH_PROXY=ON WITH_PROXY_APP=ON WITH_PROXY_EMULATE_SMARTCARD=OFF WITH_PROXY_MODULES=ON WITH_PULSE=ON WITH_RDTK=ON WITH_SAMPLE=ON WITH_SANITIZE_ADDRESS=OFF WITH_SANITIZE_ADDRESS_AVAILABLE=1 WITH_SANITIZE_MEMORY=OFF WITH_SANITIZE_MEMORY_AVAILABLE=1 WITH_SANITIZE_THREAD=OFF WITH_SANITIZE_THREAD_AVAILABLE=1 WITH_SDL_IMAGE_DIALOGS=ON WITH_SDL_LINK_SHARED=ON WITH_SERVER=ON WITH_SERVER_CHANNELS=ON WITH_SERVER_INTERFACE=ON WITH_SHADOW=ON WITH_SMARTCARD_EMULATE=ON WITH_SMARTCARD_INSPECT=OFF WITH_SMARTCARD_PCSC=ON WITH_SOXR=OFF WITH_SSE2=ON WITH_SWSCALE=ON WITH_SYSTEMD=ON WITH_THIRD_PARTY=OFF WITH_TIMEZONE_COMPILED=ON WITH_TIMEZONE_FROM_FILE=OFF WITH_TIMEZONE_ICU=OFF WITH_UNICODE_BUILTIN=OFF WITH_URIPARSER=ON WITH_VAAPI=OFF WITH_VAAPI_AVAILABLE=1 WITH_VALGRIND_MEMCHECK=OFF WITH_VALGRIND_MEMCHECK_AVAILABLE=1 WITH_VERBOSE_WINPR_ASSERT=ON WITH_VIDEO_FFMPEG=ON WITH_VIDEO_FFMPEG_AVAILABLE=1 WITH_WAYLAND=ON WITH_WEBVIEW=OFF WITH_WINPR_DEPRECATED=OFF WITH_WINPR_JSON=ON WITH_WINPR_TOOLS=ON WITH_WIN_CONSOLE=ON WITH_X11=ON WITH_XCURSOR=ON WITH_XEXT=ON WITH_XFIXES=ON WITH_XI=ON WITH_XINERAMA=ON WITH_XRANDR=ON WITH_XRENDER=ON WITH_XV=ON
Build type: RelWithDebInfo
CFLAGS: -O2 -pipe -g -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fexceptions -fstack-protector-strong -grecord-gcc-switches -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fno-omit-frame-pointer -Wall -Wpedantic -Wno-padded -Wno-cast-align -Wno-declaration-after-statement -fPIC -Wall -fvisibility=hidden -Wimplicit-function-declaration -Wredundant-decls -g -fno-omit-frame-pointer
Compiler: GNU, 13.2.0
Target architecture: x64
```
* OS version connecting to (server side):
```
OS Name Microsoft Windows 11 Pro
Version 10.0.22631 Build 22631
```
* If available the log output from a run with `/log-level:trace 2>&1 | tee log.txt`:
```
[13:43:59:743] [2:00000002] [ERROR][com.freerdp.client.common.cmdline] - [freerdp_client_settings_parse_command_line_arguments_int]: Command line parsing failed at 'app' value '%windir%system32cmd.exe' [-1002]
FreeRDP - A Free Remote Desktop Protocol Implementation
See www.freerdp.com for more information
Usage: xfreerdp [file] [options] [/v:<server>[:port]]
Syntax:
/flag (enables flag)
/option:<value> (specifies option with value)
+toggle -toggle (enables or disables toggle, where '/' is a synonym of '+')
/a: <addin>[,<options>] Addin
/action-script: <file-name> Action script
+admin Admin (or console) session
+aero Enable desktop composition
/app: program:[<path>|<||alias>],cmd:<command>,file:<filename>,guid:<guid>,
icon:<filename>,name:<name>,workdir:<directory>,hidef:[on|off]
Remote application program
/args-from: <file>|stdin|fd:<number>|env:<name>
Read command line from a file, stdin or
file descriptor. This argument can not be
combined with any other. Provide one
argument per line.
/assistance: <password> Remote assistance password
+async-channels Enable Asynchronous channels
(experimental)
+async-update Enable Asynchronous update
/audio-mode: <mode> Audio output mode
+auth-only Enable Authenticate only
/auth-pkg-list: <!ntlm,kerberos> Authentication package filter
(comma-separated list, use '!' to
exclude)
-authentication Disable Authentication (experimental)
+auto-reconnect Enable Automatic reconnection
/auto-reconnect-max-retries: <retries>
Automatic reconnection maximum retries, 0
for unlimited [0,1000]
+auto-request-control Automatically request remote assistance
input control
/bpp: <depth> Session bpp (color depth)
+buildconfig Print the build configuration
/cache: [bitmap[:on|off],codec[:rfx|nsc],glyph[:on|off],offscreen[:on|off],
persist,persist-file:<filename>]
/cert: [deny,ignore,name:<name>,tofu,fingerprint:<hash>:<hash as hex>[,
fingerprint:<hash>:<another hash>]]
Certificate accept options. Use with
care!
* deny ... Automatically abort
connection if the certificate does not
match, no user interaction.
* ignore ... Ignore the
certificate checks altogether (overrules
all other options)
* name ... Use the alternate
<name> instead of the certificate subject
to match locally stored certificates
* tofu ... Accept certificate
unconditionally on first connect and deny
on subsequent connections if the
certificate does not match
* fingerprints ... A list of certificate
hashes that are accepted unconditionally
for a connection
/client-build-number: <number> Client Build Number sent to server
(influences smartcard behaviour, see
[MS-RDPESC])
/client-hostname: <name> Client Hostname to send to server
[-|/]clipboard[: [[use-selection:<atom>],[direction-to:[
all|local|remote|off]],[files-to[:all|local|remote|off]]]]
Disable Redirect clipboard:
* use-selection:<atom> ... (X11)
Specify which X selection to access.
Default is CLIPBOARD. PRIMARY is the
X-style middle-click selection.
* direction-to:[all|local|remote|off]
control enabled clipboard direction
* files-to:[all|local|remote|off]
control enabled file clipboard direction
-compression Disable compression
/compression-level: <level> Compression level (0,1,2)
+credentials-delegation Enable credentials delegation
/d: <domain> Domain
-decorations Disable Window decorations
+disable-output Deactivate all graphics decoding in the
client session. Useful for load tests
with many simultaneous connections
+disp Display control
/drive: <name>,<path> Redirect directory <path> as named share
<name>. Hotplug support is enabled with
/drive:hotplug,*. This argument provides
the same function as "Drives that I plug
in later" option in MSTSC.
+drives Enable Redirect all mount points as
shares
/dump: <record|replay>,file:<file>[,nodelay]
record or replay dump
/dvc: <channel>[,<options>] Dynamic virtual channel
+dynamic-resolution Send resolution updates when the window
is resized
+echo Echo channel
-encryption Disable Encryption (experimental)
/encryption-methods: [40,][56,][128,][FIPS]
RDP standard security encryption methods
+f Fullscreen mode (<Ctrl>+<Alt>+<Enter>
toggles fullscreen)
+fipsmode Enable FIPS mode
/floatbar[: sticky:[on|off],default:[visible|hidden],show:[
always|fullscreen|window]]
floatbar is disabled by default (when
enabled defaults to sticky in fullscreen
mode)
-fonts Disable smooth fonts (ClearType)
+force-console-callbacks Enable Use default callbacks (console)
for certificate/credential/...
/frame-ack: <number> Number of frame acknowledgement
/from-stdin[: force] Read credentials from stdin. With <force>
the prompt is done before connection,
otherwise on server request.
/gateway: g:<gateway>[:<port>],u:<user>,d:<domain>,p:<password>,
usage-method:[direct|detect],access-token:<token>,type:[rpc|http[,
no-websockets][,extauth-sspi-ntlm]|auto[,no-websockets][,
extauth-sspi-ntlm]]|arm,url:<wss://url>,
bearer:<oauth2-bearer-token>
Gateway Hostname
/gdi: sw|hw GDI rendering
+geometry Geometry tracking channel
+gestures Enable Consume multitouch input locally
/gfx[: [[progressive[:on|off]|RFX[:on|off]|AVC420[:on|off]AVC444[:on|off]],
mask:<value>,small-cache[:on|off],thin-client[:on|off],progressive[
:on|off],frame-ack[:on|off]]]
RDP8 graphics pipeline
-grab-keyboard Disable Grab keyboard
-grab-mouse Disable Grab mouse
/h: <height> Height
-heartbeat Disable Support heartbeat PDUs
+help Print help
+home-drive Enable Redirect user home as share
/ipv4[: [:force]] Prefer IPv4 A record over IPv6 AAAA
record
/ipv6[: [:force]] Prefer IPv6 AAAA record over IPv4 A
record
/kbd: [layout:[0x<id>|<name>],lang:<0x<id>>,fn-key:<value>,type:<value>,
subtype:<value>,unicode[:on|off],remap:<key1>=<value1>,
remap:<key2>=<value2>,pipe:<filename>]
Keyboard related options:
* layout: set the keybouard layout
announced to the server
* lang: set the keyboard language
identifier sent to the server
* fn-key: Function key value
* pipe: Name of a named pipe that can be
used to type text into the RDP session
/kerberos: [kdc-url:<url>,lifetime:<time>,start-time:<time>,
renewable-lifetime:<time>,cache:<path>,armor:<path>,
pkinit-anchors:<path>,pkcs11-module:<name>]
Kerberos options
/list: [kbd|kbd-scancode|kbd-lang[:<value>]|smartcard[:[
pkinit-anchors:<path>][,pkcs11-module:<name>]]
|monitor|tune|timezones] List available options for subcommand
/load-balance-info: <info-string> Load balance info
/log-filters: <tag>:<level>[,<tag>:<level>[,...]]
Set logger filters, see wLog(7) for
details
/log-level: [OFF|FATAL|ERROR|WARN|INFO|DEBUG|TRACE]
Set the default log level, see wLog(7)
for details
/max-fast-path-size: <size> Specify maximum fast-path update size
/max-loop-time: <time> Specify maximum time in milliseconds
spend treating packets
+menu-anims Enable menu animations
/microphone[: [sys:<sys>,][dev:<dev>,][format:<format>,][rate:<rate>,][
channel:<channel>]] Audio input (microphone)
/monitors: <id>[,<id>[,...]] Select monitors to use
/mouse: [relative:[on|off],grab:[on|off]]
Mouse related options:
* relative: send relative mouse
movements if supported by server
* grab: grab the mouse if within
the window
-mouse-motion Disable Send mouse motion
+mouse-relative Enable Send mouse motion with relative
addressing
/multimon[: force] Use multiple monitors
+multitouch Enable Redirect multitouch input
-multitransport Disable Support multitransport protocol
-nego Disable protocol security negotiation
/network: [invalid|modem|broadband|broadband-low|broadband-high|wan|lan|auto]
Network connection type
+nsc NSCodec support
+old-license Enable Use the old license workflow (no
CAL and hwId set to 0)
/orientation: [0|90|180|270] Orientation of display in degrees
/p: <password> Password
/parallel[: <name>[,<path>]] Redirect parallel device
/parent-window: <window-id> Parent window id
/pcb: <blob> Preconnection Blob
/pcid: <id> Preconnection Id
/pheight: <height> Physical height of display (in
millimeters)
/play-rfx: <pcap-file> Replay rfx pcap file
/port: <number> Server port
/prevent-session-lock[: <time in sec>]
Prevent session locking by injecting fake
mouse motion events to the server when
the connection is idle (default interval:
180 seconds)
+print-reconnect-cookie Enable Print base64 reconnect cookie
after connecting
/printer[: <name>[,<driver>]] Redirect printer device
/proxy: [<proto>://][<user>:<password>@]<host>[:<port>]
Proxy settings: override env. var (see
also environment variable below).
Protocol "socks5" should be given
explicitly where "http" is default.
/pth: <password-hash> Pass the hash (restricted admin mode)
/pwidth: <width> Physical width of display (in
millimeters)
/rdp2tcp: <executable path[:arg...]>
TCP redirection
/reconnect-cookie: <base64-cookie> Pass base64 reconnect cookie to the
connection
/redirect-prefer: <FQDN|IP|NETBIOS>,[...]
Override the preferred redirection order
+relax-order-checks Do not check if a RDP order was announced
during capability exchange, only use when
connecting to a buggy server
+restricted-admin Restricted admin mode
+rfx RemoteFX
/rfx-mode: [image|video] RemoteFX mode
/scale: [100|140|180] Scaling factor of the display
/scale-desktop: <percentage> Scaling factor for desktop applications
(value between 100 and 500)
/scale-device: 100|140|180 Scaling factor for app store applications
/sec: [rdp[:[on|off]]|tls[:[on|off]]|nla[:[on|off]]|ext[:[on|off]]|aad[:[
on|off]]] Force specific protocol security. e.g.
/sec:nla enables NLA and disables all
others, while /sec:nla:[on|off] just
toggles NLA
/serial[: <name>[,<path>[,<driver>[,permissive]]]]
Redirect serial device
/server-name: <name> User-specified server name to use for
validation (TLS, Kerberos)
/shell: <shell> Alternate shell
/shell-dir: <dir> Shell working directory
/size: <width>x<height> or <percent>%[wh]
Screen size
/smart-sizing[: <width>x<height>] Scale remote desktop to window size
/smartcard[: <str>[,<str>...]] Redirect the smartcard devices containing
any of the <str> in their names.
/smartcard-logon[: [cert:<path>,key:<key>,pin:<pin>,csp:<csp name>,
reader:<reader>,card:<card>]]
Activates Smartcard (optional
certificate) Logon authentication.
/sound[: [sys:<sys>,][dev:<dev>,][format:<format>,][rate:<rate>,][
channel:<channel>,][latency:<latency>,][quality:<quality>]]
Audio output (sound)
+span Span screen over multiple monitors
/spn-class: <service-class> SPN authentication service class
+ssh-agent SSH Agent forwarding channel
/sspi-module: <SSPI module path> SSPI shared library module file path
-suppress-output Disable suppress output when minimized
/t: <title> Window title
-themes Disable themes
/timeout: <time in ms> Advanced setting for high latency links:
Adjust connection timeout, use if you
encounter timeout failures with your
connection
/timezone: <windows timezone> Use supplied windows timezone for
connection (requires server support), see
/list:timezones for allowed values
/tls: [ciphers|seclevel|secrets-file|enforce]
TLS configuration options: *
ciphers:[netmon|ma|<cipher names>]
* seclevel:<level>, default: 1, range:
[0-5] Override the default TLS security
level, might be required for older target
servers
* secrets-file:<filename>
* enforce[:[ssl3|1.0|1.1|1.2|1.3]] Force
use of SSL/TLS version for a connection.
Some servers have a buggy TLS version
negotiation and might fail without this.
Defaults to TLS 1.2 if no argument is
supplied. Use 1.0 for windows 7
-toggle-fullscreen Disable Alt+Ctrl+Enter to toggle
fullscreen
/tune: <setting:value>,<setting:value>
[experimental] directly manipulate
freerdp settings, use with extreme
caution!
/u: [[<domain>\]<user>|<user>[@<domain>]]
Username
+unmap-buttons Enable Let server see real physical
pointer button
/usb: [dbg,][id:<vid>:<pid>#...,][addr:<bus>:<addr>#...,][auto]
Redirect USB device
/v: <server>[:port] Server hostname
/vc: <channel>[,<options>] Static virtual channel
+version Print version
+video Video optimized remoting channel
/vmconnect[: <vmid>] Hyper-V console (use port 2179, disable
negotiation)
/w: <width> Width
-wallpaper Disable wallpaper
+window-drag Enable full window drag
/window-position: <xpos>x<ypos> window position
/winscard-module: <WinSCard module path>
WinSCard shared library module file path
/wm-class: <class-name> Set the WM_CLASS hint for the window
instance
+workarea Use available work area
Examples:
xfreerdp connection.rdp /p:Pwd123! /f
xfreerdp /u:CONTOSO\JohnDoe /p:Pwd123! /v:rdp.contoso.com
xfreerdp /u:JohnDoe /p:Pwd123! /w:1366 /h:768 /v:192.168.1.100:4489
xfreerdp /u:JohnDoe /p:Pwd123! /vmconnect:C824F53E-95D2-46C6-9A18-23A5BB403532 /v:192.168.1.100
xfreerdp /u:\AzureAD\[email protected] /p:pwd /v:host
Clipboard Redirection: +clipboard
Drive Redirection: /drive:home,/home/user
Smartcard Redirection: /smartcard:<device>
Smartcard logon with Kerberos authentication: /smartcard-logon /sec:nla
Serial Port Redirection: /serial:<name>,<device>,[SerCx2|SerCx|Serial],[permissive]
Serial Port Redirection: /serial:COM1,/dev/ttyS0
Parallel Port Redirection: /parallel:<name>,<device>
Printer Redirection: /printer:<device>,<driver>,[default]
TCP redirection: /rdp2tcp:/usr/bin/rdp2tcp
Audio Output Redirection: /sound:sys:oss,dev:1,format:1
Audio Output Redirection: /sound:sys:alsa
Audio Input Redirection: /microphone:sys:oss,dev:1,format:1
Audio Input Redirection: /microphone:sys:alsa
Multimedia Redirection: /video
USB Device Redirection: /usb:id:054c:0268#4669:6e6b,addr:04:0c
For Gateways, the https_proxy environment variable is respected:
export https_proxy=http://proxy.contoso.com:3128/
xfreerdp /g:rdp.contoso.com ...
More documentation is coming, in the meantime consult source files
Keyboard Shortcuts:
<Right CTRL>
releases keyboard and mouse grab
<CTRL>+<ALT>+<Return>
toggles fullscreen state of the application
<CTRL>+<ALT>+c
toggles remote control in a remote assistance session
Action Script
Executes a predefined script on key press.
Should the script not exist it is ignored.
Scripts can be provided at the default location ~/.config/freerdp/action.sh or as command line argument /action:script:<path>
The script will receive the current key combination as argument.
The output of the script is parsed for 'key-local' which tells that the script used the key combination, otherwise the combination is forwarded to the remote.
```
**Environment (please complete the following information):**
- OS: Linux
- Version/Distribution: Pop!_OS 22.04 LTS x86_64
- Architecture: x86_64