summaryrefslogtreecommitdiff
path: root/usr.bin/tmux/client.c
diff options
context:
space:
mode:
authorNicholas Marriott <nicm@cvs.openbsd.org>2022-05-30 12:48:58 +0000
committerNicholas Marriott <nicm@cvs.openbsd.org>2022-05-30 12:48:58 +0000
commitd714f410e25754dc460ad0b3d872eba69e01ea80 (patch)
tree5c898a472ef1025b53e233820ba674f15ba25a8f /usr.bin/tmux/client.c
parent143de875fecef90446759e5350b46b9bffdd263d (diff)
Add an ACL list for users connecting to the tmux socket. Users may be
forbidden from attaching, forced to attach read-only, or allowed to attach read-write. A new command, server-access, configures the list. tmux gets the user using getpeereid(3) of the client socket. Users must still configure file system permissions manually. From Dallas Lyons and others.
Diffstat (limited to 'usr.bin/tmux/client.c')
-rw-r--r--usr.bin/tmux/client.c3
1 files changed, 2 insertions, 1 deletions
diff --git a/usr.bin/tmux/client.c b/usr.bin/tmux/client.c
index 31218d6a825..509476b6378 100644
--- a/usr.bin/tmux/client.c
+++ b/usr.bin/tmux/client.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: client.c,v 1.157 2022/02/28 09:34:57 nicm Exp $ */
+/* $OpenBSD: client.c,v 1.158 2022/05/30 12:48:57 nicm Exp $ */
/*
* Copyright (c) 2007 Nicholas Marriott <nicholas.marriott@gmail.com>
@@ -360,6 +360,7 @@ client_main(struct event_base *base, int argc, char **argv, uint64_t flags,
/* Send identify messages. */
client_send_identify(ttynam, termname, caps, ncaps, cwd, feat);
tty_term_free_list(caps, ncaps);
+ proc_flush_peer(client_peer);
/* Send first command. */
if (msg == MSG_COMMAND) {