summaryrefslogtreecommitdiffstats
path: root/cmd-attach-session.c
diff options
context:
space:
mode:
authornicm <nicm>2022-05-30 12:48:57 +0000
committernicm <nicm>2022-05-30 12:48:57 +0000
commitcd692b5a68be0eb95252380db97fbbec587d6350 (patch)
tree6135b8c3512fc0d882e990907cc98f88d63716a4 /cmd-attach-session.c
parentd4423dca19d6d5cbaa97336a744ec760841c3816 (diff)
Add an ACL list for users connecting to the tmux socket. Users may be
forbidden from attaching, forced to attach read-only, or allowed to attach read-write. A new command, server-access, configures the list. tmux gets the user using getpeereid(3) of the client socket. Users must still configure file system permissions manually. From Dallas Lyons and others.
Diffstat (limited to 'cmd-attach-session.c')
-rw-r--r--cmd-attach-session.c3
1 files changed, 2 insertions, 1 deletions
diff --git a/cmd-attach-session.c b/cmd-attach-session.c
index cc795b22..b92a7f2b 100644
--- a/cmd-attach-session.c
+++ b/cmd-attach-session.c
@@ -43,7 +43,7 @@ const struct cmd_entry cmd_attach_session_entry = {
/* -t is special */
- .flags = CMD_STARTSERVER,
+ .flags = CMD_STARTSERVER|CMD_READONLY,
.exec = cmd_attach_session_exec
};
@@ -69,6 +69,7 @@ cmd_attach_session(struct cmdq_item *item, const char *tflag, int dflag,
if (c == NULL)
return (CMD_RETURN_NORMAL);
+
if (server_client_check_nested(c)) {
cmdq_error(item, "sessions should be nested with care, "
"unset $TMUX to force");