mirror of
https://github.com/EpochModTeam/DayZ-Epoch.git
synced 2025-12-14 20:13:13 +03:00
64 lines
2.3 KiB
Plaintext
64 lines
2.3 KiB
Plaintext
// (c) facoptere@gmail.com, licensed to DayZMod for the community
|
|
|
|
#include "REsec.hpp"
|
|
waitUntil{!isNil "BIS_MPF_InitDone"};
|
|
|
|
private["_ofn","_nfn"];
|
|
{
|
|
_ofn=format["r%1code",_x];
|
|
_nfn=format["r%1code%2",_x,round(random(100000))];
|
|
if(_x=="execVM")then{
|
|
call compile format["%1=%2;%2={if((count _this>=3)AND{(!((_this select 2)IN%3))})then{diag_log(""WARNING RE %2 with illegal args:""+str(_this));}else{_this call %1}};",_nfn,_ofn,Stringify(WHITELISTED_EXECVM)];
|
|
}else{
|
|
#ifdef RESEC_VERBOSE
|
|
call compile format ["%1=%2;%2={diag_log(""RE %2 args:""+str(_this));_this call %1};",_nfn,_ofn];
|
|
#endif
|
|
};
|
|
}foreach TRACED_LIB;
|
|
{
|
|
_ofn=format["r%1code",_x];
|
|
_nfn=format["r%1code%2",_x,round(random(100000))];
|
|
//rSpawn is needed on clients only if one of these death message types is enabled
|
|
if (_x == "spawn" && {!isDedicated} && {DZE_DeathMsgDynamicText or (toLower DZE_DeathMsgChat != "none")}) then {
|
|
// treat as traced on clients
|
|
call compile format["%1=%2;%2={diag_log(""Allowed RE on clients for death message %2 args:""+str(_this));_this call %1};",_nfn,_ofn];
|
|
} else {
|
|
call compile format["%1={diag_log(""WARNING illegal RE %1 with args:""+str(_this));};",_ofn];
|
|
};
|
|
}foreach REMOVED_LIB;
|
|
|
|
#ifndef SKIP_REMOTEEXECUTIONSERVER
|
|
[]spawn{
|
|
while{(1 == 1)}do{
|
|
private["_nfn"];
|
|
waitUntil{BIS_PathMPscriptCommandsCustom=="\ca\Modules\MP\data\scriptCommandsCustom\"};
|
|
_nfn="BIS_MPF_remoteExecutionServer"+str(round(random(100000)));
|
|
call compile(_nfn+"=BIS_MPF_remoteExecutionServer;BIS_MPF_remoteExecutionServer={private[""_fa"",""_co""];
|
|
_fa=_this select 1;
|
|
if(count _fa>=3)then{
|
|
_co=_fa select 2;
|
|
if(typeName _co==""STRING"")then{
|
|
_co=toLower _co;
|
|
if(_co IN[""loc"",""locper"",""perloc"",""per""])then{
|
|
if(count _fa>=4)then{
|
|
_co=_fa select 3;
|
|
};
|
|
};
|
|
};
|
|
if(typeName _co==""STRING"")then{
|
|
{
|
|
if(!((_x>=65&&_x<=90)OR(_x>=97&&_x<=122))) exitWith {diag_log(""WARNING possible code injection args:""+str(_this)); _this=[];};
|
|
}forEach toArray _co;
|
|
};
|
|
};
|
|
_this call "+_nfn+"};"
|
|
);
|
|
"remExField" addPublicVariableEventHandler{_this call BIS_MPF_remoteExecutionServer};
|
|
"remExFP" addPublicVariableEventHandler{_this call BIS_MPF_remoteExecutionServer};
|
|
BIS_PathMPscriptCommandsCustom="";
|
|
diag_log(__FILE__+":Monitoring Remote Exe...");
|
|
uiSleep 1;
|
|
};
|
|
};
|
|
#endif
|