Project

General

Profile

Download (27.1 KB) Statistics
| Branch: | Tag: | Revision:
1
<?php
2
/* $Id$ */
3
/*
4
	diag_backup.php
5
	Copyright (C) 2004-2009 Scott Ullrich
6
	All rights reserved.
7

    
8
	originally part of m0n0wall (http://m0n0.ch/wall)
9
	Copyright (C) 2003-2004 Manuel Kasper <mk@neon1.net>.
10
	All rights reserved.
11

    
12
	Redistribution and use in source and binary forms, with or without
13
	modification, are permitted provided that the following conditions are met:
14

    
15
	1. Redistributions of source code must retain the above copyright notice,
16
	   this list of conditions and the following disclaimer.
17

    
18
	2. Redistributions in binary form must reproduce the above copyright
19
	   notice, this list of conditions and the following disclaimer in the
20
	   documentation and/or other materials provided with the distribution.
21

    
22
	THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
23
	INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
24
	AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
25
	AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
26
	OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
27
	SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
28
	INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
29
	CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
30
	ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
31
	POSSIBILITY OF SUCH DAMAGE.
32
*/
33

    
34
/*
35
	pfSense_BUILDER_BINARIES:	/sbin/shutdown
36
	pfSense_MODULE:	backup
37
*/
38

    
39
##|+PRIV
40
##|*IDENT=page-diagnostics-backup/restore
41
##|*NAME=Diagnostics: Backup/restore page
42
##|*DESCR=Allow access to the 'Diagnostics: Backup/restore' page.
43
##|*MATCH=diag_backup.php*
44
##|-PRIV
45

    
46
/* Allow additional execution time 0 = no limit. */
47
ini_set('max_execution_time', '0');
48
ini_set('max_input_time', '0');
49

    
50
/* omit no-cache headers because it confuses IE with file downloads */
51
$omit_nocacheheaders = true;
52
$nocsrf = true;
53
require("guiconfig.inc");
54
require_once("functions.inc");
55
require_once("filter.inc");
56
require_once("shaper.inc");
57

    
58
$rrddbpath = "/var/db/rrd";
59
$rrdtool = "/usr/bin/nice -n20 /usr/local/bin/rrdtool";
60

    
61
function rrd_data_xml() {
62
	global $rrddbpath;
63
	global $rrdtool;
64
	
65
	$result = "\t<rrddata>\n";
66
	$rrd_files = glob("{$rrddbpath}/*.rrd");
67
	$xml_files = array();
68
	foreach ($rrd_files as $rrd_file) {
69
		$basename = basename($rrd_file);
70
		$xml_file = preg_replace('/\.rrd$/', ".xml", $rrd_file);
71
		exec("$rrdtool dump '{$rrd_file}' '{$xml_file}'");
72
		$xml_data = file_get_contents($xml_file);
73
		unlink($xml_file);
74
		if ($xml_data !== false) {
75
			$result .= "\t\t<rrddatafile>\n";
76
			$result .= "\t\t\t<filename>{$basename}</filename>\n";
77
			$result .= "\t\t\t<xmldata>" . base64_encode(gzdeflate($xml_data)) . "</xmldata>\n";
78
			$result .= "\t\t</rrddatafile>\n";
79
		}
80
	}
81
	$result .= "\t</rrddata>\n";
82
	return $result;
83
}
84

    
85
function restore_rrddata() {
86
	global $config, $g, $rrdtool, $input_errors;
87
	foreach($config['rrddata']['rrddatafile'] as $rrd) {
88
		if ($rrd['xmldata']) {
89
			$rrd_file = "{$g['vardb_path']}/rrd/{$rrd['filename']}";
90
			$xml_file = preg_replace('/\.rrd$/', ".xml", $rrd_file);
91
			if (file_put_contents($xml_file, gzinflate(base64_decode($rrd['xmldata']))) === false) {
92
				log_error("Cannot write $xml_file");
93
				continue;
94
			}
95
			$output = array();
96
			$status = null;
97
			exec("$rrdtool restore -f '{$xml_file}' '{$rrd_file}'", $output, $status);
98
			if ($status) {
99
				log_error("rrdtool restore -f '{$xml_file}' '{$rrd_file}' failed returning {$status}.");
100
				continue;
101
			}
102
			unlink($xml_file);
103
		}
104
		else if ($rrd['data']) {
105
			$rrd_file = "{$g['vardb_path']}/rrd/{$rrd['filename']}";
106
			$rrd_fd = fopen($rrd_file, "w");
107
			if (!$rrd_fd) {
108
				log_error("Cannot write $rrd_file");
109
				continue;
110
			}
111
			$data = base64_decode($rrd['data']);
112
			/* Try to decompress the data. */
113
			$dcomp = @gzinflate($data);
114
			if ($dcomp) {
115
				/* If the decompression worked, write the decompressed data */
116
				if (fwrite($rrd_fd, $dcomp) === false) {
117
					log_error("fwrite $rrd_file failed");
118
					continue;
119
				}
120
			} else {
121
				/* If the decompression failed, it wasn't compressed, so write raw data */
122
				if (fwrite($rrd_fd, $data) === false) {
123
					log_error("fwrite $rrd_file failed");
124
					continue;
125
				}
126
			}
127
			if (fclose($rrd_fd) === false) {
128
				log_error("fclose $rrd_file failed");
129
				continue;
130
			}
131
		}
132
	}
133
}
134

    
135
function add_base_packages_menu_items() {
136
	global $g, $config;
137
	$base_packages = explode($g['base_packages'], ",");
138
	$modified_config = false;
139
	foreach($base_packages as $bp) {
140
		$basepkg_path = "/usr/local/pkg/{$bp}";
141
		$tmpinfo = pathinfo($basepkg_path, PATHINFO_EXTENSION);
142
		if($tmpinfo['extension'] == "xml" && file_exists($basepkg_path)) {
143
			$pkg_config = parse_xml_config_pkg($basepkg_path, "packagegui");
144
			if($pkg_config['menu'] != "") {
145
				if(is_array($pkg_config['menu'])) {
146
					foreach($pkg_config['menu'] as $menu) {
147
						if(is_array($config['installedpackages']['menu']))
148
							foreach($config['installedpackages']['menu'] as $amenu)
149
								if($amenu['name'] == $menu['name'])
150
									continue;
151
						$config['installedpackages']['menu'][] = $menu;
152
						$modified_config = true;
153
					}
154
				}
155
				$static_output .= "done.\n";
156
				update_output_window($static_output);
157
			}
158
		}
159
	}
160
	if($modified_config) {
161
		write_config(gettext("Restored base_package menus after configuration restore."));
162
		$config = parse_config(true);
163
	}
164
}
165

    
166
function remove_bad_chars($string) {
167
	return preg_replace('/[^a-z_0-9]/i','',$string);
168
}
169

    
170
function check_and_returnif_section_exists($section) {
171
	global $config;
172
	if(is_array($config[$section]))
173
		return true;
174
	return false;
175
}
176

    
177
function spit_out_select_items($name, $showall) {
178
	global $config;
179
	
180
	$areas = array("aliases" => gettext("Aliases"),
181
		       "captiveportal" => gettext("Captive Portal"),
182
		       "voucher" => gettext("Captive Portal Vouchers"),
183
		       "dnsmasq" => gettext("DNS Forwarder"),
184
		       "dhcpd" => gettext("DHCP Server"),
185
		       "filter" => gettext("Firewall Rules"),
186
		       "interfaces" => gettext("Interfaces"),
187
		       "ipsec" => gettext("IPSEC"),
188
		       "nat" => gettext("NAT"),
189
		       "ovpn" => gettext("OpenVPN"),
190
		       "installedpackages" => gettext("Package Manager"),
191
		       "pptpd" => gettext("PPTP Server"),
192
		       "rrddata" => gettext("RRD Data"),
193
		       "cron" => gettext("Scheduled Tasks"),
194
		       "syslog" => gettext("Syslog"),
195
		       "system" => gettext("System"),
196
		       "staticroutes" => gettext("Static routes"),
197
		       "sysctl" => gettext("System tunables"),
198
		       "snmpd" => gettext("SNMP Server"),
199
		       "shaper" => gettext("Traffic Shaper"),
200
		       "vlans" => gettext("VLANS"),
201
		       "wol" => gettext("Wake on LAN")
202
		);
203

    
204
	$select  = "<select name=\"{$name}\" id=\"{$name}\">";
205
	$select .= "<option VALUE=\"\">" . gettext("ALL") . "</option>";
206
	
207
	if($showall == true)
208
		foreach($areas as $area => $areaname)
209
			$select .= "<option value='{$area}'>{$areaname}</option>\n";
210
	else
211
		foreach($areas as $area => $areaname)
212
			if($area === "rrddata" || check_and_returnif_section_exists($area) == true)
213
				$select .= "<option value='{$area}'>{$areaname}</option>\n";
214

    
215
	$select .= "</select>\n";
216

    
217
	if ($name === "backuparea") {
218
		$select .= <<<END_SCRIPT_BLOCK
219
			<script type='text/javascript'>
220
				jQuery(function (\$) {
221
					$("#{$name}").change(function () {
222
						backuparea_change(this);
223
					}).trigger("change");
224
				});
225
			</script>
226
END_SCRIPT_BLOCK;
227
	}
228
	
229
	echo $select;
230
	
231
}
232

    
233
if ($_POST['apply']) {
234
        ob_flush();
235
        flush();
236
	conf_mount_rw();
237
	clear_subsystem_dirty("restore");
238
	conf_mount_ro();
239
        exit;
240
}
241

    
242
if ($_POST) {
243
	unset($input_errors);
244
	if (stristr($_POST['Submit'], gettext("Restore configuration")))
245
		$mode = "restore";
246
	else if (stristr($_POST['Submit'], gettext("Reinstall")))
247
		$mode = "reinstallpackages";
248
	else if (stristr($_POST['Submit'], gettext("Clear Package Lock")))
249
		$mode = "clearpackagelock";
250
	else if (stristr($_POST['Submit'], gettext("Download")))
251
		$mode = "download";
252
	else if (stristr($_POST['Submit'], gettext("Restore version")))
253
		$mode = "restore_ver";
254
	
255
	if ($_POST["nopackages"] <> "")
256
		$options = "nopackages";
257
	
258
	if ($_POST["ver"] <> "")
259
		$ver2restore = $_POST["ver"];
260
	
261
	if ($mode) {
262
		
263
		if ($mode == "download") {
264
			
265
			if ($_POST['encrypt']) {
266
				if(!$_POST['encrypt_password'] || !$_POST['encrypt_passconf'])
267
					$input_errors[] = gettext("You must supply and confirm the password for encryption.");
268
				if($_POST['encrypt_password'] != $_POST['encrypt_passconf'])
269
					$input_errors[] = gettext("The supplied 'Password' and 'Confirm' field values must match.");
270
			}
271
			
272
			if (!$input_errors) {
273
				
274
				//$lockbckp = lock('config');
275
				
276
				$host = "{$config['system']['hostname']}.{$config['system']['domain']}";
277
				$name = "config-{$host}-".date("YmdHis").".xml";
278
				$data = "";
279
				
280
				if($options == "nopackages") {
281
					if(!$_POST['backuparea']) {
282
						/* backup entire configuration */
283
						$data = file_get_contents("{$g['conf_path']}/config.xml");
284
					} else {
285
						/* backup specific area of configuration */
286
						$data = backup_config_section($_POST['backuparea']);
287
						$name = "{$_POST['backuparea']}-{$name}";
288
					}
289
					$sfn = "{$g['tmp_path']}/config.xml.nopkg";
290
					file_put_contents($sfn, $data);
291
					exec("sed '/<installedpackages>/,/<\/installedpackages>/d' {$sfn} > {$sfn}-new");
292
					$data = file_get_contents($sfn . "-new");
293
				} else {
294
					if(!$_POST['backuparea']) {
295
						/* backup entire configuration */
296
						$data = file_get_contents("{$g['conf_path']}/config.xml");
297
					} else if ($_POST['backuparea'] === "rrddata") {
298
						$data = rrd_data_xml();
299
						$name = "{$_POST['backuparea']}-{$name}";
300
					} else {
301
						/* backup specific area of configuration */
302
						$data = backup_config_section($_POST['backuparea']);
303
						$name = "{$_POST['backuparea']}-{$name}";
304
					}
305
				}
306
				
307
				//unlock($lockbckp);
308
				
309
				if ($_POST['encrypt']) {
310
					$data = encrypt_data($data, $_POST['encrypt_password']);
311
					tagfile_reformat($data, $data, "config.xml");
312
				}
313
				
314
				/*
315
				 *  Backup RRD Data
316
				 */
317
				if ($_POST['backuparea'] !== "rrddata" && !$_POST['donotbackuprrd']) {
318
					$rrd_data_xml = rrd_data_xml();
319
					$closing_tag = "</" . $g['xml_rootobj'] . ">";
320
					$data = str_replace($closing_tag, $rrd_data_xml . $closing_tag, $data);
321
				}
322
				
323
				$size = strlen($data);
324
				header("Content-Type: application/octet-stream");
325
				header("Content-Disposition: attachment; filename={$name}");
326
				header("Content-Length: $size");
327
				if (isset($_SERVER['HTTPS'])) {
328
					header('Pragma: ');
329
					header('Cache-Control: ');
330
				} else {
331
					header("Pragma: private");
332
					header("Cache-Control: private, must-revalidate");
333
				}
334
				echo $data;
335
				
336
				exit;
337
			}
338
		}
339
		
340
		if ($mode == "restore") {
341
			
342
			if ($_POST['decrypt']) {
343
				if(!$_POST['decrypt_password'] || !$_POST['decrypt_passconf'])
344
					$input_errors[] = gettext("You must supply and confirm the password for decryption.");
345
				if($_POST['decrypt_password'] != $_POST['decrypt_passconf'])
346
					$input_errors[] = gettext("The supplied 'Password' and 'Confirm' field values must match.");
347
			}
348
			
349
			if (!$input_errors) {
350
				
351
				if (is_uploaded_file($_FILES['conffile']['tmp_name'])) {
352
					
353
					/* read the file contents */
354
					$data = file_get_contents($_FILES['conffile']['tmp_name']);
355
					if(!$data) {
356
						log_error(sprintf(gettext("Warning, could not read file %s"), $_FILES['conffile']['tmp_name']));
357
						return 1;
358
					}
359
					
360
					if ($_POST['decrypt']) {
361
						if (!tagfile_deformat($data, $data, "config.xml")) {
362
							$input_errors[] = gettext("The uploaded file does not appear to contain an encrypted pfsense configuration.");
363
							return 1;
364
						}
365
						$data = decrypt_data($data, $_POST['decrypt_password']);
366
					}
367
					
368
					if(stristr($data, "<m0n0wall>")) {
369
						log_error(gettext("Upgrading m0n0wall configuration to pfsense."));
370
						/* m0n0wall was found in config.  convert it. */
371
						$data = str_replace("m0n0wall", "pfsense", $data);
372
						$m0n0wall_upgrade = true;
373
					}
374
					if($_POST['restorearea']) {
375
						/* restore a specific area of the configuration */
376
						if(!stristr($data, "<" . $_POST['restorearea'] . ">")) {
377
							$input_errors[] = gettext("You have selected to restore an area but we could not locate the correct xml tag.");
378
						} else {
379
							if (!restore_config_section($_POST['restorearea'], $data)) {
380
								$input_errors[] = gettext("You have selected to restore an area but we could not locate the correct xml tag.");
381
							} else {
382
								if ($config['rrddata']) {
383
									restore_rrddata();
384
									unset($config['rrddata']);
385
									unlink_if_exists("{$g['tmp_path']}/config.cache");
386
									write_config();
387
									add_base_packages_menu_items();
388
									convert_config();
389
									conf_mount_ro();
390
								}
391
								filter_configure();
392
								$savemsg = gettext("The configuration area has been restored.  You may need to reboot the firewall.");
393
							}
394
						}
395
					} else {
396
						if(!stristr($data, "<" . $g['xml_rootobj'] . ">")) {
397
							$input_errors[] = sprintf(gettext("You have selected to restore the full configuration but we could not locate a %s tag."), $g['xml_rootobj']);
398
						} else {
399
							/* restore the entire configuration */
400
							file_put_contents($_FILES['conffile']['tmp_name'], $data);
401
							if (config_install($_FILES['conffile']['tmp_name']) == 0) {
402
								/* this will be picked up by /index.php */
403
								conf_mount_rw();
404
								mark_subsystem_dirty("restore");
405
								touch("/conf/needs_package_sync");
406
								/* remove cache, we will force a config reboot */
407
								if(file_exists("{$g['tmp_path']}/config.cache"))
408
									unlink("{$g['tmp_path']}/config.cache");
409
								$config = parse_config(true);
410
								/* extract out rrd items, unset from $config when done */
411
								if($config['rrddata']) {
412
									restore_rrddata();
413
									unset($config['rrddata']);
414
									unlink_if_exists("{$g['tmp_path']}/config.cache");
415
									write_config();
416
									add_base_packages_menu_items();
417
									convert_config();
418
									conf_mount_ro();
419
								}
420
								if($m0n0wall_upgrade == true) {
421
									if($config['system']['gateway'] <> "")
422
										$config['interfaces']['wan']['gateway'] = $config['system']['gateway'];
423
									unset($config['shaper']);
424
									/* optional if list */
425
									$ifdescrs = get_configured_interface_list(true, true);
426
									/* remove special characters from interface descriptions */
427
									if(is_array($ifdescrs))
428
										foreach($ifdescrs as $iface)
429
											$config['interfaces'][$iface]['descr'] = remove_bad_chars($config['interfaces'][$iface]['descr']);
430
									/* check for interface names with an alias */
431
									if(is_array($ifdescrs)) {
432
										foreach($ifdescrs as $iface) {
433
											if(is_alias($config['interfaces'][$iface]['descr'])) {
434
												// Firewall rules
435
												$origname = $config['interfaces'][$iface]['descr'];
436
												$newname  = $config['interfaces'][$iface]['descr'] . "Alias";
437
												update_alias_names_upon_change(array('filter', 'rule'), array('source', 'address'), $newname, $origname);
438
												update_alias_names_upon_change(array('filter', 'rule'), array('destination', 'address'), $newname, $origname);
439
												// NAT Rules
440
												update_alias_names_upon_change(array('nat', 'rule'), array('source', 'address'), $newname, $origname);
441
												update_alias_names_upon_change(array('nat', 'rule'), array('destination', 'address'), $newname, $origname);
442
												update_alias_names_upon_change(array('nat', 'rule'), array('target'), $newname, $origname);
443
												// Alias in an alias
444
												update_alias_names_upon_change(array('aliases', 'alias'), array('address'), $newname, $origname);
445
											}
446
										}
447
									}
448
									unlink_if_exists("{$g['tmp_path']}/config.cache");
449
									// Reset configuration version to something low
450
									// in order to force the config upgrade code to
451
									// run through with all steps that are required.
452
									$config['system']['version'] = "1.0";
453
									// Deal with descriptions longer than 63 characters
454
									for ($i = 0; isset($config["filter"]["rule"][$i]); $i++) {
455
										if(count($config['filter']['rule'][$i]['descr']) > 63)
456
											$config['filter']['rule'][$i]['descr'] = substr($config['filter']['rule'][$i]['descr'], 0, 63);
457
									}
458
									// Move interface from ipsec to enc0
459
									for ($i = 0; isset($config["filter"]["rule"][$i]); $i++) {
460
										if($config['filter']['rule'][$i]['interface'] == "ipsec")
461
											$config['filter']['rule'][$i]['interface'] = "enc0";
462
									}
463
									// Convert icmp types
464
									// http://www.openbsd.org/cgi-bin/man.cgi?query=icmp&sektion=4&arch=i386&apropos=0&manpath=OpenBSD+Current
465
									for ($i = 0; isset($config["filter"]["rule"][$i]); $i++) {
466
										if($config["filter"]["rule"][$i]['icmptype']) {
467
											switch($config["filter"]["rule"][$i]['icmptype']) {
468
											case "echo":
469
												$config["filter"]["rule"][$i]['icmptype'] = "echoreq";
470
												break;
471
											case "unreach":
472
												$config["filter"]["rule"][$i]['icmptype'] = "unreach";
473
												break;
474
											case "echorep":
475
												$config["filter"]["rule"][$i]['icmptype'] = "echorep";
476
												break;
477
											case "squench":
478
												$config["filter"]["rule"][$i]['icmptype'] = "squench";
479
												break;
480
											case "redir":
481
												$config["filter"]["rule"][$i]['icmptype'] = "redir";
482
												break;
483
											case "timex":
484
												$config["filter"]["rule"][$i]['icmptype'] = "timex";
485
												break;
486
											case "paramprob":
487
												$config["filter"]["rule"][$i]['icmptype'] = "paramprob";
488
												break;
489
											case "timest":
490
												$config["filter"]["rule"][$i]['icmptype'] = "timereq";
491
												break;
492
											case "timestrep":
493
												$config["filter"]["rule"][$i]['icmptype'] = "timerep";
494
												break;
495
											case "inforeq":
496
												$config["filter"]["rule"][$i]['icmptype'] = "inforeq";
497
												break;
498
											case "inforep":
499
												$config["filter"]["rule"][$i]['icmptype'] = "inforep";
500
												break;
501
											case "maskreq":
502
												$config["filter"]["rule"][$i]['icmptype'] = "maskreq";
503
												break;
504
											case "maskrep":
505
												$config["filter"]["rule"][$i]['icmptype'] = "maskrep";
506
												break;
507
											}
508
										}
509
									}
510
									$config['diag']['ipv6nat'] = true;
511
									write_config();
512
									add_base_packages_menu_items();
513
									convert_config();
514
									conf_mount_ro();
515
									$savemsg = gettext("The m0n0wall configuration has been restored and upgraded to pfSense.");
516
									mark_subsystem_dirty("restore");
517
								}
518
								if(isset($config['captiveportal']['enable'])) {
519
									/* for some reason ipfw doesn't init correctly except on bootup sequence */
520
									mark_subsystem_dirty("restore");
521
								}
522
								setup_serial_port();
523
								if(is_interface_mismatch() == true) {
524
									touch("/var/run/interface_mismatch_reboot_needed");
525
									clear_subsystem_dirty("restore");
526
									convert_config();
527
									header("Location: interfaces_assign.php");
528
									exit;
529
								}
530
								if (is_interface_vlan_mismatch() == true) {
531
									touch("/var/run/interface_mismatch_reboot_needed");
532
									clear_subsystem_dirty("restore");
533
									convert_config();
534
									header("Location: interfaces_assign.php");
535
									exit;
536
								}
537
							} else {
538
								$input_errors[] = gettext("The configuration could not be restored.");
539
							}
540
						}
541
					}
542
				} else {
543
					$input_errors[] = gettext("The configuration could not be restored (file upload error).");
544
				}
545
			}
546
		}
547
		
548
		if ($mode == "reinstallpackages") {
549
			
550
			header("Location: pkg_mgr_install.php?mode=reinstallall");
551
			exit;
552
		} else if ($mode == "clearpackagelock") {
553
			clear_subsystem_dirty('packagelock');
554
			$savemsg = "Package Lock Cleared";
555
                } else if ($mode == "restore_ver") {
556
			$input_errors[] = gettext("XXX - this feature may hose your config (do NOT backrev configs!) - billm");
557
			if ($ver2restore <> "") {
558
				$conf_file = "{$g['cf_conf_path']}/bak/config-" . strtotime($ver2restore) . ".xml";
559
				if (config_install($conf_file) == 0) {
560
					mark_subsystem_dirty("restore");
561
				} else {
562
					$input_errors[] = gettext("The configuration could not be restored.");
563
				}
564
			} else {
565
				$input_errors[] = gettext("No version selected.");
566
			}
567
		}
568
	}
569
}
570

    
571
$id = rand() . '.' . time();
572

    
573
$mth = ini_get('upload_progress_meter.store_method');
574
$dir = ini_get('upload_progress_meter.file.filename_template');
575

    
576
$pgtitle = array(gettext("Diagnostics"),gettext("Backup/restore"));
577
include("head.inc");
578

    
579
?>
580

    
581
<body link="#0000CC" vlink="#0000CC" alink="#0000CC">
582
<?php include("fbegin.inc"); ?>
583
<script language="JavaScript">
584
<!--
585

    
586
function encrypt_change() {
587

    
588
	if (!document.iform.encrypt.checked)
589
		document.getElementById("encrypt_opts").style.display="none";
590
	else
591
		document.getElementById("encrypt_opts").style.display="";
592
}
593

    
594
function decrypt_change() {
595

    
596
	if (!document.iform.decrypt.checked)
597
		document.getElementById("decrypt_opts").style.display="none";
598
	else
599
		document.getElementById("decrypt_opts").style.display="";
600
}
601

    
602
function backuparea_change(obj) {
603
	if (obj.value == "rrddata") {
604
                document.getElementById("nopackages").disabled      = true;
605
                document.getElementById("dotnotbackuprrd").disabled = true;
606
	} else {
607
                document.getElementById("nopackages").disabled      = false;
608
                document.getElementById("dotnotbackuprrd").disabled = false;
609
	}
610
}
611
//-->
612
</script>
613

    
614
<?php if ($input_errors) print_input_errors($input_errors); ?>
615
<?php if ($savemsg) print_info_box($savemsg); ?>
616
<?php if (is_subsystem_dirty('restore')): ?><p>
617
<form action="reboot.php" method="post">
618
<input name="Submit" type="hidden" value=" Yes ">
619
<?php print_info_box(gettext("The firewall configuration has been changed.") . "<br/>" . gettext("The firewall is now rebooting."));?><br>
620
</form>
621
<?php endif; ?>
622
<form action="diag_backup.php" method="post" name="iform" enctype="multipart/form-data">
623
<table width="100%" border="0" cellspacing="0" cellpadding="0">
624
	<tr>
625
		<td>
626
<?php
627
		$tab_array = array();
628
		$tab_array[0] = array(gettext("Config History"), false, "diag_confbak.php");
629
		$tab_array[1] = array(gettext("Backup/Restore"), true, "diag_backup.php");
630
		display_top_tabs($tab_array);
631
?>
632
		</td>
633
	</tr>
634
	<tr>
635
		<td>
636
			<div id="mainarea">
637
			<table class="tabcont" align="center" width="100%" border="0" cellpadding="6" cellspacing="0">
638
				<tr>
639
					<td colspan="2" class="listtopic"><?=gettext("Backup configuration"); ?></td>
640
				</tr>
641
				<tr>
642
					<td width="22%" valign="baseline" class="vncell">&nbsp;</td>
643
					<td width="78%" class="vtable">
644
						<p><?=gettext("Click this button to download the system configuration in XML format."); ?><br /><br /> <?=gettext("Backup area:"); ?> <?php spit_out_select_items("backuparea", false); ?></p>
645
						<table>
646
							<tr>
647
								<td>
648
									<input name="nopackages" type="checkbox" class="formcheckbox" id="nopackages">
649
								</td>
650
								<td>
651
									<span class="vexpl"><?=gettext("Do not backup package information."); ?></span>
652
								</td>
653
							</tr>
654
						</table>
655
						<table>
656
							<tr>
657
								<td>
658
									<input name="encrypt" type="checkbox" class="formcheckbox" id="nopackages" onClick="encrypt_change()">
659
								</td>
660
								<td>
661
									<span class="vexpl"><?=gettext("Encrypt this configuration file."); ?></span>
662
								</td>
663
							</tr>
664
							<tr>
665
								<td>
666
									<input name="donotbackuprrd" type="checkbox" class="formcheckbox" id="dotnotbackuprrd" checked>
667
								</td>
668
								<td>
669
									<span class="vexpl"><?=gettext("Do not backup RRD data (NOTE: RRD Data can consume 4+ megabytes of config.xml space!)"); ?></span>
670
								</td>
671
							</tr>
672
						</table>
673
						<table id="encrypt_opts">
674
							<tr>
675
								<td>
676
									<span class="vexpl"><?=gettext("Password:"); ?> </span>
677
								</td>
678
								<td>
679
									<input name="encrypt_password" type="password" class="formfld pwd" size="20" value="" />
680
								</td>
681
							</tr>
682
							<tr>
683
								<td>
684
									<span class="vexpl"><?=gettext("confirm:"); ?> </span>
685
								</td>
686
								<td>
687
									<input name="encrypt_passconf" type="password" class="formfld pwd" size="20" value="" />
688
								</td>
689
							</tr>
690
						</table>
691
						<p><input name="Submit" type="submit" class="formbtn" id="download" value="<?=gettext("Download configuration"); ?>"></p>
692
					</td>
693
				</tr>
694
				<tr>
695
					<td colspan="2" class="list" height="12">&nbsp;</td>
696
                </tr>
697
                <tr>
698
					<td colspan="2" class="listtopic"><?=gettext("Restore configuration"); ?></td>
699
				</tr>
700
				<tr>
701
					<td width="22%" valign="baseline" class="vncell">&nbsp;</td>
702
					<td width="78%" class="vtable">
703
						<?=gettext("Open a"); ?> <?=$g['[product_name']?> <?=gettext("configuration XML file and click the button below to restore the configuration."); ?>
704
						<br /><br />
705
						<?=gettext("Restore area:"); ?> <?php spit_out_select_items("restorearea", true); ?>
706
						<p><input name="conffile" type="file" class="formfld unknown" id="conffile" size="40"></p>
707
						<table>
708
							<tr>
709
								<td>
710
									<input name="decrypt" type="checkbox" class="formcheckbox" id="nopackages" onClick="decrypt_change()">
711
								</td>
712
								<td>
713
									<span class="vexpl"><?=gettext("Configuration file is encrypted."); ?></span>
714
								</td>
715
							</tr>
716
						</table>
717
						<table id="decrypt_opts">
718
							<tr>
719
								<td>
720
									<span class="vexpl"><?=gettext("Password :"); ?></span>
721
								</td>
722
								<td>
723
									<input name="decrypt_password" type="password" class="formfld pwd" size="20" value="" />
724
								</td>
725
							</tr>
726
							<tr>
727
								<td>
728
									<span class="vexpl"><?=gettext("confirm :"); ?></span>
729
								</td>
730
								<td>
731
									<input name="decrypt_passconf" type="password" class="formfld pwd" size="20" value="" />
732
								</td>
733
							</tr>
734
						</table>
735
						<p><input name="Submit" type="submit" class="formbtn" id="restore" value="<?=gettext("Restore configuration"); ?>"></p>
736
						<p><strong><span class="red"><?=gettext("Note:"); ?></span></strong><br /><?=gettext("The firewall will reboot after restoring the configuration."); ?><br /></p>
737
					</td>
738
				</tr>
739
				<?php if($config['installedpackages']['package'] != "") { ?>
740
				<tr>
741
					<td colspan="2" class="list" height="12">&nbsp;</td>
742
				</tr>
743
				<tr>
744
					<td colspan="2" class="listtopic"><?=gettext("Package Functions"); ?></td>
745
				</tr>
746
				<tr>
747
					<td width="22%" valign="baseline" class="vncell">&nbsp;</td>
748
					<td width="78%" class="vtable">
749
						<p><?=gettext("Click this button to reinstall all system packages.  This may take a while."); ?> <br /><br />
750
		  				<input name="Submit" type="submit" class="formbtn" id="reinstallpackages" value="<?=gettext("Reinstall packages"); ?>">
751
						<br/>
752
						<br/>
753
						<p><?=gettext("Click this button to clear the package lock if a package fails to reinstall properly after an upgrade."); ?> <br /><br />
754
						<input name="Submit" type="submit" class="formbtn" id="clearpackagelock" value="<?=gettext("Clear Package Lock"); ?>">
755
					</td>
756
				</tr>
757
				<?php } ?>
758
			</table>
759
			</div>
760
		</td>
761
	</tr>
762
</table>
763
</form>
764

    
765
<script language="JavaScript">
766
<!--
767
encrypt_change();
768
decrypt_change();
769
//-->
770
</script>
771

    
772
<?php include("fend.inc"); ?>
773
</body>
774
</html>
775
<?php
776

    
777
if (is_subsystem_dirty('restore'))
778
	system_reboot();
779

    
780
?>
(7-7/249)