summaryrefslogtreecommitdiffstats
path: root/sway/sway-security.7.txt
diff options
context:
space:
mode:
Diffstat (limited to 'sway/sway-security.7.txt')
-rw-r--r--sway/sway-security.7.txt34
1 files changed, 19 insertions, 15 deletions
diff --git a/sway/sway-security.7.txt b/sway/sway-security.7.txt
index 7d8aa4ad..fb47ffcf 100644
--- a/sway/sway-security.7.txt
+++ b/sway/sway-security.7.txt
@@ -19,8 +19,13 @@ usually best suited to a distro maintainer who wants to ship a secure sway
19environment in their distro. Sway provides a number of means of securing it but 19environment in their distro. Sway provides a number of means of securing it but
20you must make a few changes external to sway first. 20you must make a few changes external to sway first.
21 21
22Security-related configuration is only valid in /etc/sway/config (or whatever path 22Configuration of security features is limited to files in the security directory
23is appropriate for your system). 23(this is likely /etc/sway/security.d/*, but depends on your installation prefix).
24Files in this directory must be owned by root:root and chmod 644. The default
25security configuration is installed to /etc/sway/security.d/00-defaults, and
26should not be modified - it will be updated with the latest recommended security
27defaults between releases. To override the defaults, you should add more files to
28this directory.
24 29
25Environment security 30Environment security
26-------------------- 31--------------------
@@ -160,22 +165,20 @@ Setting a command policy overwrites any previous policy that was in place.
160IPC policies 165IPC policies
161------------ 166------------
162 167
163You may whitelist IPC access like so: 168Disabling IPC access via swaymsg is encouraged if you intend to secure the IPC
169socket, because any program that can execute swaymsg could circumvent its own
170security policy by simply invoking swaymsg.
164 171
165 permit /usr/bin/swaybar ipc 172You can configure which features of IPC are available for particular clients:
166 permit /usr/bin/swaygrab ipc
167 # etc
168 173
169Note that it's suggested you do not enable swaymsg to access IPC if you intend to 174 ipc <executable> {
170secure your IPC socket, because any program could just run swaymsg itself instead
171of connecting to IPC directly.
172
173You can also configure which features of IPC are available with an IPC block:
174
175 ipc {
176 ... 175 ...
177 } 176 }
178 177
178You may use * for <executable> to configure the default policy for all clients.
179Configuring IPC policies for specific executables is not supported on FreeBSD, and
180the default policy will be applied to all IPC connections.
181
179The following commands are available within this block: 182The following commands are available within this block:
180 183
181**bar-config** <enabled|disabled>:: 184**bar-config** <enabled|disabled>::
@@ -201,7 +204,7 @@ The following commands are available within this block:
201 204
202You can also control which IPC events can be raised with an events block: 205You can also control which IPC events can be raised with an events block:
203 206
204 ipc { 207 ipc <executable> {
205 events { 208 events {
206 ... 209 ...
207 } 210 }
@@ -227,7 +230,8 @@ The following commands are vaild within an ipc events block:
227**workspace** <enabled|disabled>:: 230**workspace** <enabled|disabled>::
228 Controls workspace notifications. 231 Controls workspace notifications.
229 232
230Disabling some of these may cause swaybar to behave incorrectly. 233In each of these blocks, you may use * (as in "* enabled" or "* disabled") to
234control access to every feature at once.
231 235
232Authors 236Authors
233------- 237-------