diff options
author | nicm <nicm> | 2022-05-30 12:48:57 +0000 |
---|---|---|
committer | nicm <nicm> | 2022-05-30 12:48:57 +0000 |
commit | cd692b5a68be0eb95252380db97fbbec587d6350 (patch) | |
tree | 6135b8c3512fc0d882e990907cc98f88d63716a4 /cmd-attach-session.c | |
parent | d4423dca19d6d5cbaa97336a744ec760841c3816 (diff) | |
download | rtmux-cd692b5a68be0eb95252380db97fbbec587d6350.tar.gz rtmux-cd692b5a68be0eb95252380db97fbbec587d6350.tar.bz2 rtmux-cd692b5a68be0eb95252380db97fbbec587d6350.zip |
Add an ACL list for users connecting to the tmux socket. Users may be
forbidden from attaching, forced to attach read-only, or allowed to
attach read-write. A new command, server-access, configures the list.
tmux gets the user using getpeereid(3) of the client socket. Users must
still configure file system permissions manually. From Dallas Lyons and
others.
Diffstat (limited to 'cmd-attach-session.c')
-rw-r--r-- | cmd-attach-session.c | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/cmd-attach-session.c b/cmd-attach-session.c index cc795b22..b92a7f2b 100644 --- a/cmd-attach-session.c +++ b/cmd-attach-session.c @@ -43,7 +43,7 @@ const struct cmd_entry cmd_attach_session_entry = { /* -t is special */ - .flags = CMD_STARTSERVER, + .flags = CMD_STARTSERVER|CMD_READONLY, .exec = cmd_attach_session_exec }; @@ -69,6 +69,7 @@ cmd_attach_session(struct cmdq_item *item, const char *tflag, int dflag, if (c == NULL) return (CMD_RETURN_NORMAL); + if (server_client_check_nested(c)) { cmdq_error(item, "sessions should be nested with care, " "unset $TMUX to force"); |