Access configuration¶
WirePlumber includes a “client access” policy which defines access control rules for PipeWire clients.
Rules¶
This policy can be configured with rules that can be used to match clients and apply default permissions to them.
Example:
Possible permissions are any combination of:
r
: client is allowed to read objects, i.e. “see” them on the registry and list their propertiesw
: client is allowed to write objects, i.e. call methods that modify their statex
: client is allowed to execute methods on objects; thew
flag must also be present to call methods that modify the objectm
: client is allowed to set metadata on objectsl
: nodes of this client are allowed to link to other nodes that the client can’t “see” (i.e. the client doesn’t haver
permission on them)
The special value all
is also supported and it is synonym for rwxm