Ophestra Umiker
1906853382
In the past Wayland, X and PulseAudio are shared unconditionally. This can unnecessarily increase attack surface as some of these resources might not be needed at all. This commit moves all environment preparation code to the internal app package and selectively call them based on flags. An "enablements" bitfield is introduced tracking all enabled shares. This value is registered after successful child process launch and stored in launcher states. Code responsible for running the child process is isolated to its own app/run file and cleaned up. Launch method selection is also extensively cleaned up. The internal state/track readLaunchers function now takes uid as an argument. Launcher state is now printed using text/tabwriter and argv is only emitted when verbose. Signed-off-by: Ophestra Umiker <cat@ophivana.moe>
40 lines
1013 B
Go
40 lines
1013 B
Go
package app
|
|
|
|
import (
|
|
"fmt"
|
|
"os"
|
|
"path"
|
|
|
|
"git.ophivana.moe/cat/fortify/internal/acl"
|
|
"git.ophivana.moe/cat/fortify/internal/state"
|
|
"git.ophivana.moe/cat/fortify/internal/system"
|
|
)
|
|
|
|
const (
|
|
// https://manpages.debian.org/experimental/libwayland-doc/wl_display_connect.3.en.html
|
|
waylandDisplay = "WAYLAND_DISPLAY"
|
|
)
|
|
|
|
func (a *App) ShareWayland() {
|
|
a.setEnablement(state.EnableWayland)
|
|
|
|
// ensure Wayland socket ACL (e.g. `/run/user/%d/wayland-%d`)
|
|
if w, ok := os.LookupEnv(waylandDisplay); !ok {
|
|
if system.V.Verbose {
|
|
fmt.Println("Wayland: WAYLAND_DISPLAY not set, skipping")
|
|
}
|
|
} else {
|
|
// add environment variable for new process
|
|
wp := path.Join(system.V.Runtime, w)
|
|
a.AppendEnv(waylandDisplay, wp)
|
|
if err := acl.UpdatePerm(wp, a.UID(), acl.Read, acl.Write, acl.Execute); err != nil {
|
|
state.Fatal(fmt.Sprintf("Error preparing Wayland '%s':", w), err)
|
|
} else {
|
|
state.RegisterRevertPath(wp)
|
|
}
|
|
if system.V.Verbose {
|
|
fmt.Printf("Wayland socket '%s' configured\n", w)
|
|
}
|
|
}
|
|
}
|