Project

General

Profile

Download (27.3 KB) Statistics
| Branch: | Tag: | Revision:
1
<?php
2
/*
3
 * xmlrpc.php
4
 *
5
 * part of pfSense (https://www.pfsense.org)
6
 * Copyright (c) 2004-2013 BSD Perimeter
7
 * Copyright (c) 2013-2016 Electric Sheep Fencing
8
 * Copyright (c) 2014-2021 Rubicon Communications, LLC (Netgate)
9
 * Copyright (c) 2005 Colin Smith
10
 * All rights reserved.
11
 *
12
 * Licensed under the Apache License, Version 2.0 (the "License");
13
 * you may not use this file except in compliance with the License.
14
 * You may obtain a copy of the License at
15
 *
16
 * http://www.apache.org/licenses/LICENSE-2.0
17
 *
18
 * Unless required by applicable law or agreed to in writing, software
19
 * distributed under the License is distributed on an "AS IS" BASIS,
20
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
21
 * See the License for the specific language governing permissions and
22
 * limitations under the License.
23
 */
24

    
25
##|+PRIV
26
##|*IDENT=page-xmlrpclibrary
27
##|*NAME=XMLRPC Library
28
##|*DESCR=Allow access to the 'XMLRPC Library' page.
29
##|*MATCH=xmlrpc.php*
30
##|-PRIV
31

    
32
require_once("config.inc");
33
require_once("functions.inc");
34
require_once("auth.inc");
35
require_once("filter.inc");
36
require_once("ipsec.inc");
37
require_once("vpn.inc");
38
require_once("openvpn.inc");
39
require_once("captiveportal.inc");
40
require_once("shaper.inc");
41
require_once("XML/RPC2/Server.php");
42

    
43
class pfsense_xmlrpc_server {
44

    
45
	private $loop_detected = false;
46
	private $remote_addr;
47

    
48
	private function auth() {
49
		global $config, $userindex;
50
		$userindex = index_users();
51

    
52
		$username = $_SERVER['PHP_AUTH_USER'];
53
		$password = $_SERVER['PHP_AUTH_PW'];
54

    
55
		$login_ok = false;
56
		if (!empty($username) && !empty($password)) {
57
			$attributes = array();
58
			$authcfg = auth_get_authserver(
59
			    $config['system']['webgui']['authmode']);
60

    
61
			if (authenticate_user($username, $password,
62
			    $authcfg, $attributes) ||
63
			    authenticate_user($username, $password)) {
64
				$login_ok = true;
65
			}
66
		}
67

    
68
		if (!$login_ok) {
69
			log_auth(sprintf(gettext("webConfigurator authentication error for user '%1\$s' from: %2\$s"),
70
			    $username,
71
			    $this->remote_addr));
72

    
73
			require_once("XML/RPC2/Exception.php");
74
			throw new XML_RPC2_FaultException(gettext(
75
			    'Authentication failed: Invalid username or password'),
76
			    -1);
77
		}
78

    
79
		$user_entry = getUserEntry($username);
80
		/*
81
		 * admin (uid = 0) is allowed
82
		 * or regular user with necessary privilege
83
		 */
84
		if (isset($user_entry['uid']) && $user_entry['uid'] != '0' &&
85
		    !userHasPrivilege($user_entry, 'system-xmlrpc-ha-sync')) {
86
			log_auth("webConfigurator authentication error for '" .
87
			    $username . "' from " . $this->remote_addr .
88
			    " not enough privileges");
89

    
90
			require_once("XML/RPC2/Exception.php");
91
			throw new XML_RPC2_FaultException(gettext(
92
			    'Authentication failed: not enough privileges'),
93
			    -2);
94
		}
95

    
96
		return;
97
	}
98

    
99
	private function array_overlay($a1, $a2) {
100
		foreach ($a1 as $k => $v) {
101
			if (!array_key_exists($k, $a2)) {
102
				continue;
103
			}
104
			if (is_array($v) && is_array($a2[$k])) {
105
				$a1[$k] = $this->array_overlay($v, $a2[$k]);
106
			} else {
107
				$a1[$k] = $a2[$k];
108
			}
109
		}
110

    
111
		return $a1;
112
	}
113

    
114
	public function __construct() {
115
		global $config;
116

    
117
		$this->remote_addr = $_SERVER['REMOTE_ADDR'];
118

    
119
		/* grab sync to ip if enabled */
120
		if (isset($config['hasync']['synchronizetoip']) &&
121
		    $config['hasync']['synchronizetoip'] == $this->remote_addr) {
122
			$this->loop_detected = true;
123
		}
124
	}
125

    
126
	/**
127
	 * Get host version information
128
	 *
129
	 * @return array
130
	 */
131
	public function host_firmware_version($dummy = 1, $timeout) {
132
		ini_set('default_socket_timeout', $timeout);
133
		$this->auth();
134
		return host_firmware_version();
135
	}
136

    
137
	/**
138
	 * Executes a PHP block of code
139
	 *
140
	 * @param string $code
141
	 *
142
	 * @return bool
143
	 */
144
	public function exec_php($code) {
145
		$this->auth();
146

    
147
		eval($code);
148
		if ($toreturn) {
149
			return $toreturn;
150
		}
151

    
152
		return true;
153
	}
154

    
155
	/**
156
	 * Executes shell commands
157
	 *
158
	 * @param string $code
159
	 *
160
	 * @return bool
161
	 */
162
	public function exec_shell($code) {
163
		$this->auth();
164

    
165
		mwexec($code);
166
		return true;
167
	}
168

    
169
	/**
170
	 * Backup chosen config sections
171
	 *
172
	 * @param array $section
173
	 *
174
	 * @return array
175
	 */
176
	public function backup_config_section($section) {
177
		$this->auth();
178

    
179
		global $config;
180

    
181
		return array_intersect_key($config, array_flip($section));
182
	}
183

    
184
	/**
185
	 * Restore defined config section into local config
186
	 *
187
	 * @param array $sections
188
	 *
189
	 * @return bool
190
	 */
191
	public function restore_config_section($sections, $timeout) {
192
		ini_set('default_socket_timeout', $timeout);
193
		$this->auth();
194

    
195
		global $config, $cpzone, $cpzoneid, $old_config;
196

    
197
		$old_config = $config;
198

    
199
		if ($this->loop_detected) {
200
			log_error("Disallowing CARP sync loop");
201
			return true;
202
		}
203

    
204
		/*
205
		 * Some sections should just be copied and not merged or we end
206
		 * up unable to sync the deletion of the last item in a section
207
		 */
208
		$sync_full_sections = array(
209
			'aliases',
210
			'ca',
211
			'cert',
212
			'crl',
213
			'dhcpd',
214
			'dhcrelay',
215
			'dhcrelay6',
216
			'dnshaper',
217
			'dnsmasq',
218
			'filter',
219
			'ipsec',
220
			'nat',
221
			'openvpn',
222
			'schedules',
223
			'shaper',
224
			'unbound',
225
			'wol',
226
		);
227

    
228
		$syncd_full_sections = array();
229

    
230
		foreach ($sync_full_sections as $section) {
231
			if (!isset($sections[$section])) {
232
				continue;
233
			}
234

    
235
			$config[$section] = $sections[$section];
236
			unset($sections[$section]);
237
			$syncd_full_sections[] = $section;
238
		}
239

    
240
		/* If captive portal sync is enabled on primary node, remove local CP on the secondary */
241
		if (is_array($config['captiveportal']) && is_array($sections['captiveportal'])) {
242
			foreach ($config['captiveportal'] as $zone => $item) {
243
				if (!isset($sections['captiveportal'][$zone])) {
244
					$cpzone = $zone;
245
					unset($config['captiveportal'][$cpzone]['enable']);
246
					captiveportal_configure_zone($config['captiveportal'][$cpzone]);
247
					unset($config['captiveportal'][$cpzone]);
248
					if (isset($config['voucher'][$cpzone])) {
249
						unset($config['voucher'][$cpzone]);
250
					}
251
					unlink_if_exists("/var/db/captiveportal{$cpzone}.db");
252
					unlink_if_exists("/var/db/captiveportal_usedmacs_{$cpzone}.db");
253
					unlink_if_exists("/var/db/voucher_{$cpzone}_*.db");
254
				}
255
			}
256
		}
257

    
258
		/* Only touch users if users are set to synchronize from the primary node
259
		 * See https://redmine.pfsense.org/issues/8450
260
		 */
261
		if ($sections['system']['user'] && $sections['system']['group']) {
262
			$g2add = array();
263
			$g2del = array();
264
			$g2del_idx = array();
265
			$g2keep = array();
266
			if (is_array($sections['system']['group'])) {
267
				$local_groups = isset($config['system']['group'])
268
				    ? $config['system']['group']
269
				    : array();
270

    
271
				foreach ($sections['system']['group'] as $group) {
272
					$idx = array_search($group['name'],
273
					    array_column($local_groups, 'name'));
274

    
275
					if ($idx === false) {
276
						$g2add[] = $group;
277
					} else if ($group['gid'] < 1999) {
278
						$g2keep[] = $idx;
279
					} else if ($group != $local_groups[$idx]) {
280
						$g2add[] = $group;
281
						$g2del[] = $group;
282
						$g2del_idx[] = $idx;
283
					} else {
284
						$g2keep[] = $idx;
285
					}
286
				}
287
			}
288
			if (is_array($config['system']['group'])) {
289
				foreach ($config['system']['group'] as $idx => $group) {
290
					if (array_search($idx, $g2keep) === false &&
291
					    array_search($idx, $g2del_idx) === false) {
292
						$g2del[] = $group;
293
						$g2del_idx[] = $idx;
294
					}
295
				}
296
			}
297
			unset($sections['system']['group'], $g2keep, $g2del_idx);
298

    
299
			$u2add = array();
300
			$u2del = array();
301
			$u2del_idx = array();
302
			$u2keep = array();
303
			if (is_array($sections['system']['user'])) {
304
				$local_users = isset($config['system']['user'])
305
				    ? $config['system']['user']
306
				    : array();
307

    
308
				foreach ($sections['system']['user'] as $user) {
309
					$idx = array_search($user['name'],
310
					    array_column($local_users, 'name'));
311

    
312
					if ($idx === false) {
313
						$u2add[] = $user;
314
					} else if (($user['uid'] < 2000) && ($sections['hasync']['adminsync'] != 'on')) {
315
						$u2keep[] = $idx;
316
					} else if ($user != $local_users[$idx]) {
317
						$u2add[] = $user;
318
						$u2del[] = $user;
319
						$u2del_idx[] = $idx;
320
					} else {
321
						$u2keep[] = $idx;
322
					}
323
				}
324
			}
325
			if (is_array($config['system']['user'])) {
326
				foreach ($config['system']['user'] as $idx => $user) {
327
					if (array_search($idx, $u2keep) === false &&
328
					    array_search($idx, $u2del_idx) === false) {
329
						$u2del[] = $user;
330
						$u2del_idx[] = $idx;
331
					}
332
				}
333
			}
334
			unset($sections['system']['user'], $u2keep, $u2del_idx);
335
		}
336

    
337
		$voucher = array();
338
		if (is_array($sections['voucher'])) {
339
			/* Save voucher rolls to process after merge */
340
			$voucher = $sections['voucher'];
341

    
342
			foreach($sections['voucher'] as $zone => $item) {
343
				unset($sections['voucher'][$zone]['roll']);
344
				// Note : This code can be safely deleted once #97 fix has been applied and deployed to pfSense stable release.
345
				// Please do not delete this code before
346
				if (isset($config['voucher'][$zone]['vouchersyncdbip'])) {
347
					$sections['voucher'][$zone]['vouchersyncdbip'] =
348
					    $config['voucher'][$zone]['vouchersyncdbip'];
349
				} else {
350
					unset($sections['voucher'][$zone]['vouchersyncdbip']);
351
				}
352
				if (isset($config['voucher'][$zone]['vouchersyncusername'])) {
353
					$sections['voucher'][$zone]['vouchersyncusername'] =
354
					    $config['voucher'][$zone]['vouchersyncusername'];
355
				} else {
356
					unset($sections['voucher'][$zone]['vouchersyncusername']);
357
				}
358
				if (isset($config['voucher'][$zone]['vouchersyncpass'])) {
359
					$sections['voucher'][$zone]['vouchersyncpass'] =
360
					    $config['voucher'][$zone]['vouchersyncpass'];
361
				} else {
362
					unset($sections['voucher'][$zone]['vouchersyncpass']);
363
				}
364
				// End note.
365
			}
366
		}
367

    
368
		if (is_array($sections['captiveportal'])) {
369
			// Captiveportal : Backward HA settings should remain local.
370
			foreach ($sections['captiveportal'] as $zone => $cp) {
371
				if (isset($config['captiveportal'][$zone]['enablebackwardsync'])) {
372
					$sections['captiveportal'][$zone]['enablebackwardsync'] = $config['captiveportal'][$zone]['enablebackwardsync'];
373
				} else {
374
					unset($sections['captiveportal'][$zone]['enablebackwardsync']);
375
				}
376
				if (isset($config['captiveportal'][$zone]['backwardsyncip'])) {
377
					$sections['captiveportal'][$zone]['backwardsyncip'] = $config['captiveportal'][$zone]['backwardsyncip'];
378
				} else {
379
					unset($sections['captiveportal'][$zone]['backwardsyncip']);
380
				}
381
				if (isset($config['captiveportal'][$zone]['backwardsyncuser'])) {
382
					$sections['captiveportal'][$zone]['backwardsyncuser'] = $config['captiveportal'][$zone]['backwardsyncuser'];
383
				} else {
384
					unset($sections['captiveportal'][$zone]['backwardsyncuser']);
385
				}
386
				if (isset($config['captiveportal'][$zone]['backwardsyncpassword'])) {
387
					$sections['captiveportal'][$zone]['backwardsyncpassword'] = $config['captiveportal'][$zone]['backwardsyncpassword'];
388
				} else {
389
					unset($sections['captiveportal'][$zone]['vouchersyncpass']);
390
				}
391
			}
392
			$config['captiveportal'] = $sections['captiveportal'];
393
			unset($sections['captiveportal']);
394
		}
395

    
396
		$vipbackup = array();
397
		$oldvips = array();
398
		if (isset($sections['virtualip']) &&
399
		    is_array($config['virtualip']['vip'])) {
400
			foreach ($config['virtualip']['vip'] as $vip) {
401
				if ($vip['mode'] == "carp") {
402
					$key = $vip['interface'] .
403
					    "_vip" . $vip['vhid'];
404

    
405
					$oldvips[$key]['content'] =
406
					    $vip['password'] .
407
					    $vip['advskew'] .
408
					    $vip['subnet'] .
409
					    $vip['subnet_bits'] .
410
					    $vip['advbase'];
411
					$oldvips[$key]['interface'] =
412
					    $vip['interface'];
413
					$oldvips[$key]['subnet'] =
414
					    $vip['subnet'];
415
				} else if ($vip['mode'] == "ipalias" &&
416
				    (substr($vip['interface'], 0, 4) == '_vip'
417
				    || strstr($vip['interface'], "lo0"))) {
418
					$oldvips[$vip['subnet']]['content'] =
419
					    $vip['interface'] .
420
					    $vip['subnet'] .
421
					    $vip['subnet_bits'];
422
					$oldvips[$vip['subnet']]['interface'] =
423
					    $vip['interface'];
424
					$oldvips[$vip['subnet']]['subnet'] =
425
					    $vip['subnet'];
426
				} else if (($vip['mode'] == "ipalias" ||
427
				    $vip['mode'] == 'proxyarp') &&
428
				    !(substr($vip['interface'], 0, 4) == '_vip')
429
				    || strstr($vip['interface'], "lo0")) {
430
					$vipbackup[] = $vip;
431
				}
432
			}
433
		}
434

    
435
		/* For vip section, first keep items sent from the master */
436
		$config = array_merge_recursive_unique($config, $sections);
437

    
438

    
439
		/* Remove locally items removed remote */
440
		foreach ($voucher as $zone => $item) {
441
			/* No rolls on master, delete local ones */
442
			if (!is_array($item['roll'])) {
443
				unset($config['voucher'][$zone]['roll']);
444
			}
445
		}
446

    
447
		$l_rolls = array();
448
		if (is_array($config['voucher'])) {
449
			foreach ($config['voucher'] as $zone => $item) {
450
				if (!is_array($item['roll'])) {
451
					continue;
452
				}
453
				foreach ($item['roll'] as $idx => $roll) {
454
					/* Make it easy to find roll by # */
455
					$l_rolls[$zone][$roll['number']] = $idx;
456
				}
457
			}
458
		}
459

    
460
		/*
461
		 * Process vouchers sent by primary node and:
462
		 * - Add new items
463
		 * - Update existing items based on 'lastsync' field
464
		 */
465
		foreach ($voucher as $zone => $item) {
466
			if (!is_array($item['roll'])) {
467
				continue;
468
			}
469
			foreach ($item['roll'] as $idx => $roll) {
470
				if (!isset($l_rolls[$zone][$roll['number']])) {
471
					$config['voucher'][$zone]['roll'][] =
472
					    $roll;
473
					continue;
474
				}
475
				$l_roll_idx = $l_rolls[$zone][$roll['number']];
476
				init_config_arr(array('voucher', $zone));
477
				$l_vouchers = &$config['voucher'][$zone];
478
				$l_roll = $l_vouchers['roll'][$l_roll_idx];
479
				if (!isset($l_roll['lastsync'])) {
480
					$l_roll['lastsync'] = 0;
481
				}
482

    
483
				if (isset($roll['lastsync']) &&
484
				    $roll['lastsync'] != $l_roll['lastsync']) {
485
					$l_vouchers['roll'][$l_roll_idx] =
486
					    $roll;
487
					unset($l_rolls[$zone][$roll['number']]);
488
				}
489
			}
490
		}
491

    
492
		/*
493
		 * At this point $l_rolls contains only items that are not
494
		 * present on primary node. They must be removed
495
		 */
496
		foreach ($l_rolls as $zone => $item) {
497
			foreach ($item as $number => $idx) {
498
				unset($config['voucher'][$zone][$idx]);
499
			}
500
		}
501

    
502
		/*
503
		 * Then add ipalias and proxyarp types already defined
504
		 * on the backup
505
		 */
506
		if (is_array($vipbackup) && !empty($vipbackup)) {
507
			if (!is_array($config['virtualip'])) {
508
				$config['virtualip'] = array();
509
			}
510
			if (!is_array($config['virtualip']['vip'])) {
511
				$config['virtualip']['vip'] = array();
512
			}
513
			foreach ($vipbackup as $vip) {
514
				array_unshift($config['virtualip']['vip'], $vip);
515
			}
516
		}
517

    
518
		/* Log what happened */
519
		$mergedkeys = implode(", ", array_merge(array_keys($sections),
520
		    $syncd_full_sections));
521
		write_config(sprintf(gettext(
522
		    "Merged in config (%s sections) from XMLRPC client."),
523
		    $mergedkeys));
524

    
525
		/*
526
		 * The real work on handling the vips specially
527
		 * This is a copy of interfaces_vips_configure with addition of
528
		 * not reloading existing/not changed carps
529
		 */
530
		$force_filterconfigure = false;
531
		if (isset($sections['virtualip']) &&
532
		    is_array($config['virtualip']) &&
533
		    is_array($config['virtualip']['vip'])) {
534
			$carp_setuped = false;
535
			$anyproxyarp = false;
536

    
537
			foreach ($config['virtualip']['vip'] as $vip) {
538
				$key = "{$vip['interface']}_vip{$vip['vhid']}";
539

    
540
				if ($vip['mode'] == "carp" &&
541
				    isset($oldvips[$key])) {
542
					if ($oldvips[$key]['content'] ==
543
					    $vip['password'] .
544
					    $vip['advskew'] .
545
					    $vip['subnet'] .
546
					    $vip['subnet_bits'] .
547
					    $vip['advbase'] &&
548
					    does_vip_exist($vip)) {
549
						unset($oldvips[$key]);
550
						/*
551
						 * Skip reconfiguring this vips
552
						 * since nothing has changed.
553
						 */
554
						continue;
555
					}
556

    
557
				} elseif ($vip['mode'] == "ipalias" &&
558
				    (substr($vip['interface'], 0, 4) == '_vip'
559
				    || strstr($vip['interface'], "lo0")) &&
560
				    isset($oldvips[$vip['subnet']])) {
561
					$key = $vip['subnet'];
562
					if ($oldvips[$key]['content'] ==
563
					    $vip['interface'] .
564
					    $vip['subnet'] .
565
					    $vip['subnet_bits'] &&
566
					    does_vip_exist($vip)) {
567
						unset($oldvips[$key]);
568
						/*
569
						 * Skip reconfiguring this vips
570
						 * since nothing has changed.
571
						 */
572
						continue;
573
					}
574
					unset($oldvips[$key]);
575
				}
576

    
577
				switch ($vip['mode']) {
578
				case "proxyarp":
579
					$anyproxyarp = true;
580
					break;
581
				case "ipalias":
582
					interface_ipalias_configure($vip);
583
					break;
584
				case "carp":
585
					$carp_setuped = true;
586
					interface_carp_configure($vip);
587
					break;
588
				}
589
				$force_filterconfigure = true;
590
			}
591

    
592
			/* Cleanup remaining old carps */
593
			foreach ($oldvips as $oldvipar) {
594
				$oldvipif = get_real_interface(
595
				    $oldvipar['interface']);
596

    
597
				if (empty($oldvipif)) {
598
					continue;
599
				}
600

    
601
				if (is_ipaddrv6($oldvipar['subnet'])) {
602
					 mwexec("/sbin/ifconfig " .
603
					     escapeshellarg($oldvipif) .
604
					     " inet6 " .
605
					     escapeshellarg($oldvipar['subnet']) .
606
					     " delete");
607
				} else {
608
					pfSense_interface_deladdress($oldvipif,
609
					    $oldvipar['subnet']);
610
				}
611
			}
612
			if ($carp_setuped == true) {
613
				interfaces_sync_setup();
614
			}
615
			if ($anyproxyarp == true) {
616
				interface_proxyarp_configure();
617
			}
618
		}
619

    
620
		local_sync_accounts($u2add, $u2del, $g2add, $g2del);
621
		$this->filter_configure(false, $force_filterconfigure);
622
		unset($old_config);
623

    
624
		return true;
625
	}
626

    
627
	/**
628
	 * Merge items into installedpackages config section
629
	 *
630
	 * @param array $section
631
	 *
632
	 * @return bool
633
	 */
634
	public function merge_installedpackages_section($section, $timeout) {
635
		ini_set('default_socket_timeout', $timeout);
636
		$this->auth();
637

    
638
		global $config;
639

    
640
		if ($this->loop_detected) {
641
			log_error("Disallowing CARP sync loop");
642
			return true;
643
		}
644

    
645
		$config['installedpackages'] = array_merge(
646
		    $config['installedpackages'], $section);
647
		$mergedkeys = implode(", ", array_keys($section));
648
		write_config(sprintf(gettext(
649
		    "Merged in config (%s sections) from XMLRPC client."),
650
		    $mergedkeys));
651

    
652
		return true;
653
	}
654

    
655
	/**
656
	 * Merge items into config
657
	 *
658
	 * @param array $section
659
	 *
660
	 * @return bool
661
	 */
662
	public function merge_config_section($section, $timeout) {
663
		ini_set('default_socket_timeout', $timeout);
664
		$this->auth();
665

    
666
		global $config;
667

    
668
		if ($this->loop_detected) {
669
			log_error("Disallowing CARP sync loop");
670
			return true;
671
		}
672

    
673
		$config_new = $this->array_overlay($config, $section);
674
		$config = $config_new;
675
		$mergedkeys = implode(", ", array_keys($section));
676
		write_config(sprintf(gettext(
677
		    "Merged in config (%s sections) from XMLRPC client."),
678
		    $mergedkeys));
679

    
680
		return true;
681
	}
682

    
683
	/**
684
	 * Wrapper for filter_configure()
685
	 *
686
	 * @return bool
687
	 */
688
	private function filter_configure($reset_accounts = true, $force = false) {
689
		global $g, $config, $old_config;
690

    
691
		filter_configure();
692
		system_routing_configure();
693
		setup_gateways_monitor();
694

    
695
		/* do not restart unchanged services on XMLRPC sync,
696
		 * see https://redmine.pfsense.org/issues/11082 
697
		 */
698
		if (is_array($config['openvpn']) || is_array($old_config['openvpn'])) {
699
			foreach (array("server", "client") as $type) {
700
				$remove_id = array();
701
				if (is_array($old_config['openvpn']["openvpn-{$type}"])) {
702
					foreach ($old_config['openvpn']["openvpn-{$type}"] as & $old_settings) {
703
						$remove_id[] = $old_settings['vpnid'];
704
					}
705
				}
706
				if (!is_array($config['openvpn']["openvpn-{$type}"])) {
707
					continue;
708
				}
709
				foreach ($config['openvpn']["openvpn-{$type}"] as & $settings) {
710
					$new_instance = true;
711
					if (in_array($settings['vpnid'], $remove_id)) {
712
						$remove_id = array_diff($remove_id, array($settings['vpnid']));
713
					}
714
					if (is_array($old_config['openvpn']["openvpn-{$type}"])) {
715
						foreach ($old_config['openvpn']["openvpn-{$type}"] as & $old_settings) {
716
							if ($settings['vpnid'] == $old_settings['vpnid']) {
717
								$new_instance = false;
718
								if (($settings != $old_settings) || $force) {
719
									/* restart changed openvpn instance */
720
									openvpn_resync($type, $settings);
721
									break;
722
								}
723
							}
724
						}
725
					}
726
					if ($new_instance) {
727
						/* start new openvpn instance */
728
						openvpn_resync($type, $settings);
729
					}
730
				}
731
				if (!empty($remove_id)) {
732
					foreach ($remove_id as $id) {
733
						/* stop/delete removed openvpn instances */
734
						openvpn_delete($type, array('vpnid' => $id));
735
					}
736
				}
737
			}
738
			/* no service restart required */
739
			openvpn_resync_csc_all();
740
		}
741

    
742
		/* run ipsec_configure() on any IPsec change, see https://redmine.pfsense.org/issues/12075 */
743
		if (((is_array($config['ipsec']) || is_array($old_config['ipsec'])) &&
744
		    ($config['ipsec'] != $old_config['ipsec'])) ||
745
		    $force) {
746
			ipsec_configure();
747
		}
748

    
749
		/*
750
		 * The DNS Resolver and the DNS Forwarder may both be active so
751
		 * long as * they are running on different ports.
752
		 * See ticket #5882
753
		 */
754
		if (((is_array($config['dnsmasq']) || is_array($old_config['dnsmasq'])) &&
755
		    ($config['dnsmasq'] != $old_config['dnsmasq'])) ||
756
		    $force) {
757
			if (isset($config['dnsmasq']['enable'])) {
758
				/* Configure dnsmasq but tell it NOT to restart DHCP */
759
				services_dnsmasq_configure(false);
760
			} else {
761
				/* kill any running dnsmasq instance */
762
				if (isvalidpid("{$g['varrun_path']}/dnsmasq.pid")) {
763
					sigkillbypid("{$g['varrun_path']}/dnsmasq.pid",
764
					    "TERM");
765
				}
766
			}
767
		}
768
		if (((is_array($config['unbound']) || is_array($old_config['unbound'])) &&
769
		    ($config['unbound'] != $old_config['unbound'])) ||
770
		    $force) {
771
			if (isset($config['unbound']['enable'])) {
772
				/* Configure unbound but tell it NOT to restart DHCP */
773
				services_unbound_configure(false);
774
			} else {
775
				/* kill any running Unbound instance */
776
				if (isvalidpid("{$g['varrun_path']}/unbound.pid")) {
777
					sigkillbypid("{$g['varrun_path']}/unbound.pid",
778
					    "TERM");
779
				}
780
			}
781
		}
782

    
783
		/*
784
		 * Call this separately since the above are manually set to
785
		 * skip the DHCP restart they normally perform.
786
		 * This avoids restarting dhcpd twice as described on
787
		 * ticket #3797
788
		 */
789
		if (((is_array($config['dhcpd']) || is_array($old_config['dhcpd'])) &&
790
		    ($config['dhcpd'] != $old_config['dhcpd'])) ||
791
		    $force) {
792
			services_dhcpd_configure();
793
		}
794

    
795
		if (((is_array($config['dhcrelay']) || is_array($old_config['dhcrelay'])) &&
796
		    ($config['dhcrelay'] != $old_config['dhcrelay'])) ||
797
		    $force) {
798
			services_dhcrelay_configure();
799
		}
800

    
801
		if (((is_array($config['dhcrelay6']) || is_array($old_config['dhcrelay6'])) &&
802
		    ($config['dhcrelay6'] != $old_config['dhcrelay6'])) ||
803
		    $force) {
804
			services_dhcrelay6_configure();
805
		}
806

    
807
		if ($reset_accounts) {
808
			local_reset_accounts();
809
		}
810

    
811
		if ((is_array($config['captiveportal']) || is_array($old_config['captiveportal']) &&
812
		    ($config['captiveportal'] != $old_config['captiveportal'])) ||
813
		    $force) {
814
			captiveportal_configure();
815
		}
816
		if ((is_array($config['voucher']) || is_array($old_config['voucher']) &&
817
		    ($config['voucher'] != $old_config['voucher'])) ||
818
		    $force) {
819
			voucher_configure();
820
		}
821

    
822
		return true;
823
	}
824

    
825
	/**
826
	 * Wrapper for captiveportal connected users and
827
	 * active/expired vouchers synchronization
828
	 *
829
	 * @param array $arguments
830
	 *
831
	 * @return array
832
	 */
833
	public function captive_portal_sync($arguments, $timeout) {
834
		ini_set('default_socket_timeout', $timeout);
835
		$this->auth();
836
		// Note : no protection against CARP loop is done here, and this is in purpose.
837
		// This function is used for bi-directionnal sync, which is precisely what CARP loop protection is supposed to prevent.
838
		// CARP loop has to be managed within functions using captive_portal_sync()
839
		global $g, $config, $cpzone;
840

    
841
		if (empty($arguments['op']) || empty($arguments['zone']) || empty($config['captiveportal'][$arguments['zone']])) {
842
			return false;
843
		}
844
		$cpzone = $arguments['zone'];
845

    
846
		if ($arguments['op'] === 'get_databases') {
847
			$active_vouchers = array();
848
			$expired_vouchers = array();
849
			$usedmacs = '';
850

    
851
			if (is_array($config['voucher'][$cpzone]['roll'])) {
852
				foreach($config['voucher'][$cpzone]['roll'] as $id => $roll) {
853
					$expired_vouchers[$roll['number']] = base64_encode(voucher_read_used_db($roll['number']));
854
					$active_vouchers[$roll['number']] = voucher_read_active_db($roll['number']);
855
				}
856
			}
857
			if (!empty($config['captiveportal'][$cpzone]['freelogins_count']) &&
858
			    !empty($config['captiveportal'][$cpzone]['freelogins_resettimeout'])) {
859
				$usedmacs = captiveportal_read_usedmacs_db();
860
			}
861
			// base64 is here for safety reasons, as we don't fully control
862
			// the content of these arrays.
863
			$returndata = array('connected_users' => base64_encode(serialize(captiveportal_read_db())),
864
			'active_vouchers' => base64_encode(serialize($active_vouchers)),
865
			'expired_vouchers' => base64_encode(serialize($expired_vouchers)),
866
			'usedmacs' => base64_encode(serialize($usedmacs)));
867

    
868
			return $returndata;
869
		} elseif ($arguments['op'] === 'connect_user') {
870
			$user = unserialize(base64_decode($arguments['user']));
871
			$user['attributes']['allow_time'] = $user['allow_time'];
872

    
873
			// pipeno might be different between primary and secondary
874
			$pipeno = captiveportal_get_next_dn_ruleno('auth');
875
			return portal_allow($user['clientip'], $user['clientmac'], $user['username'], $user['password'], null,
876
			    $user['attributes'], $pipeno, $user['authmethod'], $user['context'], $user['sessionid']);
877
		} elseif ($arguments['op'] === 'disconnect_user') {
878
			$session = unserialize(base64_decode($arguments['session']));
879
			/* read database again, as pipeno might be different between primary & secondary */
880
			$sessionid = SQLite3::escapeString($session['sessionid']);
881
			$local_dbentry = captiveportal_read_db("WHERE sessionid = '{$sessionid}'");
882

    
883
			if (!empty($local_dbentry) && count($local_dbentry) == 1) {
884
				return captiveportal_disconnect($local_dbentry[0], $session['term_cause'], $session['stop_time'], true);
885
			} else {
886
				return false;
887
			}
888
		} elseif ($arguments['op'] === 'remove_entries') {
889
			$entries = unserialize(base64_decode($arguments['entries']));
890

    
891
			return captiveportal_remove_entries($entries, true);
892
		} elseif ($arguments['op'] === 'disconnect_all') {
893
			$arguments = unserialize(base64_decode($arguments['arguments']));
894

    
895
			return captiveportal_disconnect_all($arguments['term_cause'], $arguments['logout_reason'], true);
896
		} elseif ($arguments['op'] === 'write_vouchers') {
897
			$arguments = unserialize(base64_decode($arguments['arguments']));
898

    
899
			if (is_array($arguments['active_and_used_vouchers_bitmasks'])) {
900
				foreach ($arguments['active_and_used_vouchers_bitmasks'] as $roll => $used) {
901
					if (is_array($used)) {
902
						foreach ($used as $u) {
903
							voucher_write_used_db($roll, base64_encode($u));
904
						}
905
					} else {
906
						voucher_write_used_db($roll, base64_encode($used));
907
					}
908
				}
909
			}
910
			foreach ($arguments['active_vouchers'] as $roll => $active_vouchers) {
911
				voucher_write_active_db($roll, $active_vouchers);
912
			}
913
			return true;
914
		} elseif ($arguments['op'] === 'write_usedmacs') {
915
			$arguments = unserialize(base64_decode($arguments['arguments']));
916

    
917
			captiveportal_write_usedmacs_db($arguments['usedmacs']); 
918
			return true;
919
		}
920
	}
921

    
922
	/**
923
	 * Wrapper for configuring CARP interfaces
924
	 *
925
	 * @return bool
926
	 */
927
	public function interfaces_carp_configure() {
928
		$this->auth();
929

    
930
		if ($this->loop_detected) {
931
			log_error("Disallowing CARP sync loop");
932
			return true;
933
		}
934

    
935
		interfaces_vips_configure();
936

    
937
		return true;
938
	}
939

    
940
	/**
941
	 * Wrapper for rc.reboot
942
	 *
943
	 * @return bool
944
	 */
945
	public function reboot() {
946
		$this->auth();
947

    
948
		mwexec_bg("/etc/rc.reboot");
949

    
950
		return true;
951
	}
952
}
953

    
954
// run script until its done and can 'unlock' the xmlrpc.lock, this prevents hanging php-fpm / webgui
955
ignore_user_abort(true);
956
set_time_limit(0);
957

    
958
$xmlrpclockkey = lock('xmlrpc', LOCK_EX);
959

    
960
XML_RPC2_Backend::setBackend('php');
961
$HTTP_RAW_POST_DATA = file_get_contents('php://input');
962

    
963
$options = array(
964
	'prefix' => 'pfsense.',
965
	'encoding' => 'utf-8',
966
	'autoDocument' => false,
967
);
968

    
969
$server = XML_RPC2_Server::create(new pfsense_xmlrpc_server(), $options);
970
$server->handleCall();
971

    
972
unlock($xmlrpclockkey);
973

    
974
?>
(227-227/227)