diff options
author | nicm <nicm> | 2022-05-30 12:48:57 +0000 |
---|---|---|
committer | nicm <nicm> | 2022-05-30 12:48:57 +0000 |
commit | cd692b5a68be0eb95252380db97fbbec587d6350 (patch) | |
tree | 6135b8c3512fc0d882e990907cc98f88d63716a4 /cmd.c | |
parent | d4423dca19d6d5cbaa97336a744ec760841c3816 (diff) | |
download | rtmux-cd692b5a68be0eb95252380db97fbbec587d6350.tar.gz rtmux-cd692b5a68be0eb95252380db97fbbec587d6350.tar.bz2 rtmux-cd692b5a68be0eb95252380db97fbbec587d6350.zip |
Add an ACL list for users connecting to the tmux socket. Users may be
forbidden from attaching, forced to attach read-only, or allowed to
attach read-write. A new command, server-access, configures the list.
tmux gets the user using getpeereid(3) of the client socket. Users must
still configure file system permissions manually. From Dallas Lyons and
others.
Diffstat (limited to 'cmd.c')
-rw-r--r-- | cmd.c | 2 |
1 files changed, 2 insertions, 0 deletions
@@ -96,6 +96,7 @@ extern const struct cmd_entry cmd_select_pane_entry; extern const struct cmd_entry cmd_select_window_entry; extern const struct cmd_entry cmd_send_keys_entry; extern const struct cmd_entry cmd_send_prefix_entry; +extern const struct cmd_entry cmd_server_access_entry; extern const struct cmd_entry cmd_set_buffer_entry; extern const struct cmd_entry cmd_set_environment_entry; extern const struct cmd_entry cmd_set_hook_entry; @@ -188,6 +189,7 @@ const struct cmd_entry *cmd_table[] = { &cmd_select_window_entry, &cmd_send_keys_entry, &cmd_send_prefix_entry, + &cmd_server_access_entry, &cmd_set_buffer_entry, &cmd_set_environment_entry, &cmd_set_hook_entry, |