mpv/input
James Ross-Gowan ef625a78a4 ipc-win: restrict read access to the IPC pipe
The default security descriptor for named pipes in Windows allows the
pipe to be opened for read access by the Everyone group and Anonymous
account, as well as low-integrity processes (like web browser renderer
processes.) This does not allow commands to be ran, but it does allow
events to be received.

I don't think any sensitive data is exposed by events, but that may not
always be the case and Lua plugins might change this, since they can
broadcast their own events with script-message. To be safe, this commit
sets a custom security descriptor on the named pipe which only allows
access from processes running under the same user account with an
integrity level greater than or equal to the one used by mpv.
2016-03-25 21:06:30 +11:00
..
cmd_list.c command: add af-command command 2016-01-22 20:36:54 +01:00
cmd_list.h command: add af-command command 2016-01-22 20:36:54 +01:00
cmd_parse.c input: add key name to script-binding command response 2015-12-23 19:10:48 +01:00
cmd_parse.h
event.c input: accept plain text for drag&drop 2016-03-15 22:43:06 +01:00
event.h input/event.h: add include guard 2016-03-15 22:44:15 +01:00
input.c input: ignore --input-cursor for events injected by input commands 2016-02-04 23:01:15 +01:00
input.h ipc: add Windows implementation with named pipes 2016-03-23 23:15:20 +11:00
ipc-unix.c ipc: add Windows implementation with named pipes 2016-03-23 23:15:20 +11:00
ipc-win.c ipc-win: restrict read access to the IPC pipe 2016-03-25 21:06:30 +11:00
ipc.c ipc: add Windows implementation with named pipes 2016-03-23 23:15:20 +11:00
keycodes.c input: add a catch-all "unmapped" command 2015-12-23 19:13:45 +01:00
keycodes.h input: add a catch-all "unmapped" command 2015-12-23 19:13:45 +01:00
pipe-win32.c