mirror of
https://github.com/asterisk/asterisk.git
synced 2025-10-22 20:56:39 +00:00
Add the ability to blacklist certain commands from being executed using the Command AMI action. (issue #9240 reported by junky)
git-svn-id: https://origsvn.digium.com/svn/asterisk/branches/1.4@65902 65c4cc65-6c06-0410-ace0-fbb531ad65f3
This commit is contained in:
@@ -129,6 +129,11 @@ static struct permalias {
|
||||
{ 0, "none" },
|
||||
};
|
||||
|
||||
static const char *command_blacklist[] = {
|
||||
"module load",
|
||||
"module unload",
|
||||
};
|
||||
|
||||
struct mansession {
|
||||
/*! Execution thread */
|
||||
pthread_t t;
|
||||
@@ -1620,9 +1625,16 @@ static int action_command(struct mansession *s, const struct message *m)
|
||||
const char *id = astman_get_header(m, "ActionID");
|
||||
char *buf, *final_buf;
|
||||
char template[] = "/tmp/ast-ami-XXXXXX"; /* template for temporary file */
|
||||
int fd = mkstemp(template);
|
||||
int fd = mkstemp(template), i = 0;
|
||||
off_t l;
|
||||
|
||||
for (i = 0; i < sizeof(command_blacklist) / sizeof(command_blacklist[0]); i++) {
|
||||
if (!strncmp(cmd, command_blacklist[i], strlen(command_blacklist[i]))) {
|
||||
astman_send_error(s, m, "Command blacklisted");
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
|
||||
astman_append(s, "Response: Follows\r\nPrivilege: Command\r\n");
|
||||
if (!ast_strlen_zero(id))
|
||||
astman_append(s, "ActionID: %s\r\n", id);
|
||||
|
Reference in New Issue
Block a user