diff options
-rw-r--r-- | include/asterisk/manager.h | 3 | ||||
-rw-r--r-- | main/http.c | 16 | ||||
-rw-r--r-- | main/manager.c | 21 |
3 files changed, 37 insertions, 3 deletions
diff --git a/include/asterisk/manager.h b/include/asterisk/manager.h index e654b7a58..ecc047829 100644 --- a/include/asterisk/manager.h +++ b/include/asterisk/manager.h @@ -203,6 +203,9 @@ void astman_send_listack(struct mansession *s, const struct message *m, char *ms void __attribute__ ((format (printf, 2, 3))) astman_append(struct mansession *s, const char *fmt, ...); +/*! \brief Determinie if a manager session ident is authenticated */ +int astman_is_authed(uint32_t ident); + /*! \brief Called by Asterisk initialization */ int init_manager(void); diff --git a/main/http.c b/main/http.c index edcbf386f..10eab25c3 100644 --- a/main/http.c +++ b/main/http.c @@ -145,6 +145,18 @@ static const char *ftype2mtype(const char *ftype, char *wkspace, int wkspacelen) return wkspace; } +static uint32_t manid_from_vars(struct ast_variable *sid) { + uint32_t mngid; + + while (sid && strcmp(sid->name, "mansession_id")) + sid = sid->next; + + if (!sid || sscanf(sid->value, "%x", &mngid) != 1) + return 0; + + return mngid; +} + static struct ast_str *static_callback(struct ast_tcptls_session_instance *ser, const char *uri, struct ast_variable *vars, int *status, char **title, int *contentlength) { char *path; @@ -187,6 +199,10 @@ static struct ast_str *static_callback(struct ast_tcptls_session_instance *ser, if (fd < 0) goto out403; + if (strstr(path, "/private/") && !astman_is_authed(manid_from_vars(vars))) { + goto out403; + } + ast_strftime(buf, sizeof(buf), "%a, %d %b %Y %H:%M:%S %Z", ast_localtime(&tv, &tm, "GMT")); fprintf(ser->f, "HTTP/1.1 200 OK\r\n" "Server: Asterisk/%s\r\n" diff --git a/main/manager.c b/main/manager.c index 27bac8634..64be6d226 100644 --- a/main/manager.c +++ b/main/manager.c @@ -3140,7 +3140,7 @@ static char *contenttype[] = { * the value of the mansession_id cookie (0 is not valid and means * a session on the AMI socket). */ -static struct mansession *find_session(uint32_t ident) +static struct mansession *find_session(uint32_t ident, int incinuse) { struct mansession *s; @@ -3151,7 +3151,7 @@ static struct mansession *find_session(uint32_t ident) AST_LIST_TRAVERSE(&sessions, s, list) { ast_mutex_lock(&s->__lock); if (s->managerid == ident && !s->needdestroy) { - ast_atomic_fetchadd_int(&s->inuse, 1); + ast_atomic_fetchadd_int(&s->inuse, incinuse ? 1 : 0); break; } ast_mutex_unlock(&s->__lock); @@ -3161,6 +3161,21 @@ static struct mansession *find_session(uint32_t ident) return s; } +int astman_is_authed(uint32_t ident) +{ + int authed; + struct mansession *s; + + if (!(s = find_session(ident, 0))) + return 0; + + authed = (s->authenticated != 0); + + ast_mutex_unlock(&s->__lock); + + return authed; +} + int astman_verify_session_readpermissions(uint32_t ident, int perm) { int result = 0; @@ -3451,7 +3466,7 @@ static struct ast_str *generic_http_callback(enum output_format format, } } - if (!(s = find_session(ident))) { + if (!(s = find_session(ident, 1))) { /* Create new session. * While it is not in the list we don't need any locking */ |