diff options
author | Moritz Poldrack <git@moritz.sh> | 2023-03-04 10:56:47 +0100 |
---|---|---|
committer | Robin Jarry <robin@jarry.cc> | 2023-03-07 00:13:03 +0100 |
commit | d3dea73aa53791a94f86c31689a10880fabeb84c (patch) | |
tree | ae815295162ff7431d47fd16a2e74d0cb8465222 /config | |
parent | c6a08b1003a2cb02d86002541ead0f9b38db1beb (diff) | |
download | aerc-d3dea73aa53791a94f86c31689a10880fabeb84c.tar.gz |
ipc: allow triggering internal commands via IPC
In order to make automation easier, it's useful to be able to send
commands to aerc via IPC. This can be done by calling the aerc binary
followed by a colon and the command to run. For example:
aerc :read && aerc :remark && aerc :archive month
Security to ensure no malicious commands are run is deferred to the
user. By default the socket is only writable by the user. This is
considered sufficient as the potential harm an attacker gaining
write-access to a user's session can cause is significantly greater than
"can delete some emails".
To ensure users with an according threat model, it is possible to
disable command IPC. mailto-handling is unaffected even though it works
over IPC as it is absolutely non-destructive.
Signed-off-by: Moritz Poldrack <git@moritz.sh>
Acked-by: Robin Jarry <robin@jarry.cc>
Diffstat (limited to 'config')
-rw-r--r-- | config/general.go | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/config/general.go b/config/general.go index 0968976b..a2c5e765 100644 --- a/config/general.go +++ b/config/general.go @@ -16,6 +16,7 @@ type GeneralConfig struct { UnsafeAccountsConf bool `ini:"unsafe-accounts-conf"` LogFile string `ini:"log-file"` LogLevel log.LogLevel `ini:"log-level" default:"info" parse:"ParseLogLevel"` + DisableIPC bool `ini:"disable-ipc"` } var General = new(GeneralConfig) |