Project

General

Profile

Download (27.8 KB) Statistics
| Branch: | Tag: | Revision:
1
<?php
2
/*
3
 * xmlrpc.php
4
 *
5
 * part of pfSense (https://www.pfsense.org)
6
 * Copyright (c) 2004-2013 BSD Perimeter
7
 * Copyright (c) 2013-2016 Electric Sheep Fencing
8
 * Copyright (c) 2014-2022 Rubicon Communications, LLC (Netgate)
9
 * Copyright (c) 2005 Colin Smith
10
 * All rights reserved.
11
 *
12
 * Licensed under the Apache License, Version 2.0 (the "License");
13
 * you may not use this file except in compliance with the License.
14
 * You may obtain a copy of the License at
15
 *
16
 * http://www.apache.org/licenses/LICENSE-2.0
17
 *
18
 * Unless required by applicable law or agreed to in writing, software
19
 * distributed under the License is distributed on an "AS IS" BASIS,
20
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
21
 * See the License for the specific language governing permissions and
22
 * limitations under the License.
23
 */
24

    
25
##|+PRIV
26
##|*IDENT=page-xmlrpclibrary
27
##|*NAME=XMLRPC Library
28
##|*DESCR=Allow access to the 'XMLRPC Library' page.
29
##|*MATCH=xmlrpc.php*
30
##|-PRIV
31

    
32
require_once("config.inc");
33
require_once("functions.inc");
34
require_once("auth.inc");
35
require_once("filter.inc");
36
require_once("ipsec.inc");
37
require_once("vpn.inc");
38
require_once("openvpn.inc");
39
require_once("captiveportal.inc");
40
require_once("shaper.inc");
41
require_once("XML/RPC2/Server.php");
42

    
43
class pfsense_xmlrpc_server {
44

    
45
	private $loop_detected = false;
46
	private $remote_addr;
47

    
48
	private function auth() {
49
		global $config, $userindex;
50
		$userindex = index_users();
51

    
52
		$username = $_SERVER['PHP_AUTH_USER'];
53
		$password = $_SERVER['PHP_AUTH_PW'];
54

    
55
		$login_ok = false;
56
		if (!empty($username) && !empty($password)) {
57
			$attributes = array();
58
			$authcfg = auth_get_authserver(
59
			    $config['system']['webgui']['authmode']);
60

    
61
			if (authenticate_user($username, $password,
62
			    $authcfg, $attributes) ||
63
			    authenticate_user($username, $password)) {
64
				$login_ok = true;
65
			}
66
		}
67

    
68
		if (!$login_ok) {
69
			log_auth(sprintf(gettext("webConfigurator authentication error for user '%1\$s' from: %2\$s"),
70
			    $username,
71
			    $this->remote_addr));
72

    
73
			require_once("XML/RPC2/Exception.php");
74
			throw new XML_RPC2_FaultException(gettext(
75
			    'Authentication failed: Invalid username or password'),
76
			    -1);
77
		}
78

    
79
		$user_entry = getUserEntry($username);
80
		/*
81
		 * admin (uid = 0) is allowed
82
		 * or regular user with necessary privilege
83
		 */
84
		if (isset($user_entry['uid']) && $user_entry['uid'] != '0' &&
85
		    !userHasPrivilege($user_entry, 'system-xmlrpc-ha-sync')) {
86
			log_auth("webConfigurator authentication error for '" .
87
			    $username . "' from " . $this->remote_addr .
88
			    " not enough privileges");
89

    
90
			require_once("XML/RPC2/Exception.php");
91
			throw new XML_RPC2_FaultException(gettext(
92
			    'Authentication failed: not enough privileges'),
93
			    -2);
94
		}
95

    
96
		return;
97
	}
98

    
99
	private function array_overlay($a1, $a2) {
100
		foreach ($a1 as $k => $v) {
101
			if (!array_key_exists($k, $a2)) {
102
				continue;
103
			}
104
			if (is_array($v) && is_array($a2[$k])) {
105
				$a1[$k] = $this->array_overlay($v, $a2[$k]);
106
			} else {
107
				$a1[$k] = $a2[$k];
108
			}
109
		}
110

    
111
		return $a1;
112
	}
113

    
114
	public function __construct() {
115
		global $config;
116

    
117
		$this->remote_addr = $_SERVER['REMOTE_ADDR'];
118

    
119
		/* grab sync to ip if enabled */
120
		if (isset($config['hasync']['synchronizetoip']) &&
121
		    $config['hasync']['synchronizetoip'] == $this->remote_addr) {
122
			$this->loop_detected = true;
123
		}
124
	}
125

    
126
	/**
127
	 * Get host version information
128
	 *
129
	 * @return array
130
	 */
131
	public function host_firmware_version($dummy = 1, $timeout) {
132
		ini_set('default_socket_timeout', $timeout);
133
		$this->auth();
134
		return host_firmware_version();
135
	}
136

    
137
	/**
138
	 * Executes a PHP block of code
139
	 *
140
	 * @param string $code
141
	 *
142
	 * @return bool
143
	 */
144
	public function exec_php($code) {
145
		$this->auth();
146

    
147
		eval($code);
148
		if ($toreturn) {
149
			return $toreturn;
150
		}
151

    
152
		return true;
153
	}
154

    
155
	/**
156
	 * Executes shell commands
157
	 *
158
	 * @param string $code
159
	 *
160
	 * @return bool
161
	 */
162
	public function exec_shell($code) {
163
		$this->auth();
164

    
165
		mwexec($code);
166
		return true;
167
	}
168

    
169
	/**
170
	 * Backup chosen config sections
171
	 *
172
	 * @param array $section
173
	 *
174
	 * @return array
175
	 */
176
	public function backup_config_section($section) {
177
		$this->auth();
178

    
179
		global $config;
180

    
181
		return array_intersect_key($config, array_flip($section));
182
	}
183

    
184
	/**
185
	 * Restore defined config section into local config
186
	 *
187
	 * @param array $sections
188
	 *
189
	 * @return bool
190
	 */
191
	public function restore_config_section($sections, $timeout) {
192
		ini_set('default_socket_timeout', $timeout);
193
		$this->auth();
194

    
195
		global $config, $cpzone, $cpzoneid, $old_config;
196

    
197
		$old_config = $config;
198

    
199
		if ($this->loop_detected) {
200
			log_error("Disallowing CARP sync loop");
201
			return true;
202
		}
203

    
204
		/*
205
		 * Some sections should just be copied and not merged or we end
206
		 * up unable to sync the deletion of the last item in a section
207
		 */
208
		$sync_full_sections = array(
209
			'aliases',
210
			'ca',
211
			'cert',
212
			'crl',
213
			'dhcpd',
214
			'dhcrelay',
215
			'dhcrelay6',
216
			'dnshaper',
217
			'dnsmasq',
218
			'filter',
219
			'ipsec',
220
			'nat',
221
			'openvpn',
222
			'schedules',
223
			'shaper',
224
			'unbound',
225
			'wol',
226
		);
227

    
228
		$syncd_full_sections = array();
229

    
230
		foreach ($sync_full_sections as $section) {
231
			if (!isset($sections[$section])) {
232
				continue;
233
			}
234

    
235
			$config[$section] = $sections[$section];
236
			unset($sections[$section]);
237
			$syncd_full_sections[] = $section;
238
		}
239

    
240
		/* If captive portal sync is enabled on primary node, remove local CP on the secondary */
241
		if (is_array($config['captiveportal']) && is_array($sections['captiveportal'])) {
242
			foreach ($config['captiveportal'] as $zone => $item) {
243
				if (!isset($sections['captiveportal'][$zone])) {
244
					$cpzone = $zone;
245
					unset($config['captiveportal'][$cpzone]['enable']);
246
					captiveportal_configure_zone($config['captiveportal'][$cpzone]);
247
					unset($config['captiveportal'][$cpzone]);
248
					if (isset($config['voucher'][$cpzone])) {
249
						unset($config['voucher'][$cpzone]);
250
					}
251
					unlink_if_exists("/var/db/captiveportal{$cpzone}.db");
252
					unlink_if_exists("/var/db/captiveportal_usedmacs_{$cpzone}.db");
253
					unlink_if_exists("/var/db/voucher_{$cpzone}_*.db");
254
				}
255
			}
256
		}
257

    
258
		/* Only touch users if users are set to synchronize from the primary node
259
		 * See https://redmine.pfsense.org/issues/8450
260
		 */
261
		if ($sections['system']['user'] && $sections['system']['group']) {
262
			$g2add = array();
263
			$g2del = array();
264
			$g2del_idx = array();
265
			$g2keep = array();
266
			if (is_array($sections['system']['group'])) {
267
				$local_groups = isset($config['system']['group'])
268
				    ? $config['system']['group']
269
				    : array();
270

    
271
				foreach ($sections['system']['group'] as $group) {
272
					$idx = array_search($group['name'],
273
					    array_column($local_groups, 'name'));
274

    
275
					if ($idx === false) {
276
						$g2add[] = $group;
277
					} else if ($group['gid'] < 1999) {
278
						$g2keep[] = $idx;
279
					} else if ($group != $local_groups[$idx]) {
280
						$g2add[] = $group;
281
						$g2del[] = $group;
282
						$g2del_idx[] = $idx;
283
					} else {
284
						$g2keep[] = $idx;
285
					}
286
				}
287
			}
288
			if (is_array($config['system']['group'])) {
289
				foreach ($config['system']['group'] as $idx => $group) {
290
					if (array_search($idx, $g2keep) === false &&
291
					    array_search($idx, $g2del_idx) === false) {
292
						$g2del[] = $group;
293
						$g2del_idx[] = $idx;
294
					}
295
				}
296
			}
297
			unset($sections['system']['group'], $g2keep, $g2del_idx);
298

    
299
			$u2add = array();
300
			$u2del = array();
301
			$u2del_idx = array();
302
			$u2keep = array();
303
			if (is_array($sections['system']['user'])) {
304
				$local_users = isset($config['system']['user'])
305
				    ? $config['system']['user']
306
				    : array();
307

    
308
				foreach ($sections['system']['user'] as $user) {
309
					$idx = array_search($user['name'],
310
					    array_column($local_users, 'name'));
311

    
312
					if ($idx === false) {
313
						$u2add[] = $user;
314
					} else if (($user['uid'] < 2000) && ($sections['hasync']['adminsync'] != 'on')) {
315
						$u2keep[] = $idx;
316
					} else if ($user != $local_users[$idx]) {
317
						$u2add[] = $user;
318
						$u2del[] = $user;
319
						$u2del_idx[] = $idx;
320
					} else {
321
						$u2keep[] = $idx;
322
					}
323
				}
324
			}
325
			if (is_array($config['system']['user'])) {
326
				foreach ($config['system']['user'] as $idx => $user) {
327
					if (array_search($idx, $u2keep) === false &&
328
					    array_search($idx, $u2del_idx) === false) {
329
						$u2del[] = $user;
330
						$u2del_idx[] = $idx;
331
					}
332
				}
333
			}
334
			unset($sections['system']['user'], $u2keep, $u2del_idx);
335
		}
336

    
337
		$voucher = array();
338
		if (is_array($sections['voucher'])) {
339
			/* Save voucher rolls to process after merge */
340
			$voucher = $sections['voucher'];
341

    
342
			foreach($sections['voucher'] as $zone => $item) {
343
				unset($sections['voucher'][$zone]['roll']);
344
				// Note : This code can be safely deleted once #97 fix has been applied and deployed to pfSense stable release.
345
				// Please do not delete this code before
346
				if (isset($config['voucher'][$zone]['vouchersyncdbip'])) {
347
					$sections['voucher'][$zone]['vouchersyncdbip'] =
348
					    $config['voucher'][$zone]['vouchersyncdbip'];
349
				} else {
350
					unset($sections['voucher'][$zone]['vouchersyncdbip']);
351
				}
352
				if (isset($config['voucher'][$zone]['vouchersyncusername'])) {
353
					$sections['voucher'][$zone]['vouchersyncusername'] =
354
					    $config['voucher'][$zone]['vouchersyncusername'];
355
				} else {
356
					unset($sections['voucher'][$zone]['vouchersyncusername']);
357
				}
358
				if (isset($config['voucher'][$zone]['vouchersyncpass'])) {
359
					$sections['voucher'][$zone]['vouchersyncpass'] =
360
					    $config['voucher'][$zone]['vouchersyncpass'];
361
				} else {
362
					unset($sections['voucher'][$zone]['vouchersyncpass']);
363
				}
364
				// End note.
365
			}
366
		}
367

    
368
		if (is_array($sections['captiveportal'])) {
369
			// Captiveportal : Backward HA settings should remain local.
370
			foreach ($sections['captiveportal'] as $zone => $cp) {
371
				if (isset($config['captiveportal'][$zone]['enablebackwardsync'])) {
372
					$sections['captiveportal'][$zone]['enablebackwardsync'] = $config['captiveportal'][$zone]['enablebackwardsync'];
373
				} else {
374
					unset($sections['captiveportal'][$zone]['enablebackwardsync']);
375
				}
376
				if (isset($config['captiveportal'][$zone]['backwardsyncip'])) {
377
					$sections['captiveportal'][$zone]['backwardsyncip'] = $config['captiveportal'][$zone]['backwardsyncip'];
378
				} else {
379
					unset($sections['captiveportal'][$zone]['backwardsyncip']);
380
				}
381
				if (isset($config['captiveportal'][$zone]['backwardsyncuser'])) {
382
					$sections['captiveportal'][$zone]['backwardsyncuser'] = $config['captiveportal'][$zone]['backwardsyncuser'];
383
				} else {
384
					unset($sections['captiveportal'][$zone]['backwardsyncuser']);
385
				}
386
				if (isset($config['captiveportal'][$zone]['backwardsyncpassword'])) {
387
					$sections['captiveportal'][$zone]['backwardsyncpassword'] = $config['captiveportal'][$zone]['backwardsyncpassword'];
388
				} else {
389
					unset($sections['captiveportal'][$zone]['vouchersyncpass']);
390
				}
391
			}
392
			$config['captiveportal'] = $sections['captiveportal'];
393
			unset($sections['captiveportal']);
394
		}
395

    
396
		$vipbackup = array();
397
		$oldvips = array();
398
		if (isset($sections['virtualip']) &&
399
		    is_array($config['virtualip']['vip'])) {
400
			foreach ($config['virtualip']['vip'] as $vip) {
401
				if ($vip['mode'] == "carp") {
402
					$key = $vip['interface'] .
403
					    "_vip" . $vip['vhid'];
404

    
405
					$oldvips[$key]['content'] =
406
					    $vip['password'] .
407
					    $vip['advskew'] .
408
					    $vip['subnet'] .
409
					    $vip['subnet_bits'] .
410
					    $vip['advbase'];
411
					$oldvips[$key]['interface'] =
412
					    $vip['interface'];
413
					$oldvips[$key]['subnet'] =
414
					    $vip['subnet'];
415
				} else if ($vip['mode'] == "ipalias" &&
416
				    (substr($vip['interface'], 0, 4) == '_vip'
417
				    || strstr($vip['interface'], "lo0"))) {
418
					$oldvips[$vip['subnet']]['content'] =
419
					    $vip['interface'] .
420
					    $vip['subnet'] .
421
					    $vip['subnet_bits'];
422
					$oldvips[$vip['subnet']]['interface'] =
423
					    $vip['interface'];
424
					$oldvips[$vip['subnet']]['subnet'] =
425
					    $vip['subnet'];
426
				} else if (($vip['mode'] == "ipalias" ||
427
				    $vip['mode'] == 'proxyarp') &&
428
				    !(substr($vip['interface'], 0, 4) == '_vip')
429
				    || strstr($vip['interface'], "lo0")) {
430
					$vipbackup[] = $vip;
431
				}
432
			}
433
		}
434

    
435
		/* For vip section, first keep items sent from the master */
436
		$config = array_merge_recursive_unique($config, $sections);
437

    
438

    
439
		/* Remove locally items removed remote */
440
		foreach ($voucher as $zone => $item) {
441
			/* No rolls on master, delete local ones */
442
			if (!is_array($item['roll'])) {
443
				unset($config['voucher'][$zone]['roll']);
444
			}
445
		}
446

    
447
		$l_rolls = array();
448
		if (is_array($config['voucher'])) {
449
			foreach ($config['voucher'] as $zone => $item) {
450
				if (!is_array($item['roll'])) {
451
					continue;
452
				}
453
				foreach ($item['roll'] as $idx => $roll) {
454
					/* Make it easy to find roll by # */
455
					$l_rolls[$zone][$roll['number']] = $idx;
456
				}
457
			}
458
		}
459

    
460
		/*
461
		 * Process vouchers sent by primary node and:
462
		 * - Add new items
463
		 * - Update existing items based on 'lastsync' field
464
		 */
465
		foreach ($voucher as $zone => $item) {
466
			if (!is_array($item['roll'])) {
467
				continue;
468
			}
469
			foreach ($item['roll'] as $idx => $roll) {
470
				if (!isset($l_rolls[$zone][$roll['number']])) {
471
					$config['voucher'][$zone]['roll'][] =
472
					    $roll;
473
					continue;
474
				}
475
				$l_roll_idx = $l_rolls[$zone][$roll['number']];
476
				init_config_arr(array('voucher', $zone));
477
				$l_vouchers = &$config['voucher'][$zone];
478
				$l_roll = $l_vouchers['roll'][$l_roll_idx];
479
				if (!isset($l_roll['lastsync'])) {
480
					$l_roll['lastsync'] = 0;
481
				}
482

    
483
				if (isset($roll['lastsync']) &&
484
				    $roll['lastsync'] != $l_roll['lastsync']) {
485
					$l_vouchers['roll'][$l_roll_idx] =
486
					    $roll;
487
					unset($l_rolls[$zone][$roll['number']]);
488
				}
489
			}
490
		}
491

    
492
		/*
493
		 * At this point $l_rolls contains only items that are not
494
		 * present on primary node. They must be removed
495
		 */
496
		foreach ($l_rolls as $zone => $item) {
497
			foreach ($item as $number => $idx) {
498
				unset($config['voucher'][$zone][$idx]);
499
			}
500
		}
501

    
502
		/*
503
		 * Then add ipalias and proxyarp types already defined
504
		 * on the backup
505
		 */
506
		if (is_array($vipbackup) && !empty($vipbackup)) {
507
			if (!is_array($config['virtualip'])) {
508
				$config['virtualip'] = array();
509
			}
510
			if (!is_array($config['virtualip']['vip'])) {
511
				$config['virtualip']['vip'] = array();
512
			}
513
			foreach ($vipbackup as $vip) {
514
				array_unshift($config['virtualip']['vip'], $vip);
515
			}
516
		}
517

    
518
		/* Log what happened */
519
		$mergedkeys = implode(", ", array_merge(array_keys($sections),
520
		    $syncd_full_sections));
521
		write_config(sprintf(gettext(
522
		    "Merged in config (%s sections) from XMLRPC client."),
523
		    $mergedkeys));
524

    
525
		/*
526
		 * The real work on handling the vips specially
527
		 * This is a copy of interfaces_vips_configure with addition of
528
		 * not reloading existing/not changed carps
529
		 */
530
		$force_filterconfigure = false;
531
		if (isset($sections['virtualip']) &&
532
		    is_array($config['virtualip']) &&
533
		    is_array($config['virtualip']['vip'])) {
534
			$carp_setuped = false;
535
			$anyproxyarp = false;
536

    
537
			foreach ($config['virtualip']['vip'] as $vip) {
538
				$key = "{$vip['interface']}_vip{$vip['vhid']}";
539

    
540
				if ($vip['mode'] == "carp" &&
541
				    isset($oldvips[$key])) {
542
					if ($oldvips[$key]['content'] ==
543
					    $vip['password'] .
544
					    $vip['advskew'] .
545
					    $vip['subnet'] .
546
					    $vip['subnet_bits'] .
547
					    $vip['advbase'] &&
548
					    does_vip_exist($vip)) {
549
						unset($oldvips[$key]);
550
						/*
551
						 * Skip reconfiguring this vips
552
						 * since nothing has changed.
553
						 */
554
						continue;
555
					}
556

    
557
				} elseif ($vip['mode'] == "ipalias" &&
558
				    (substr($vip['interface'], 0, 4) == '_vip'
559
				    || strstr($vip['interface'], "lo0")) &&
560
				    isset($oldvips[$vip['subnet']])) {
561
					$key = $vip['subnet'];
562
					if ($oldvips[$key]['content'] ==
563
					    $vip['interface'] .
564
					    $vip['subnet'] .
565
					    $vip['subnet_bits'] &&
566
					    does_vip_exist($vip)) {
567
						unset($oldvips[$key]);
568
						/*
569
						 * Skip reconfiguring this vips
570
						 * since nothing has changed.
571
						 */
572
						continue;
573
					}
574
					unset($oldvips[$key]);
575
				}
576

    
577
				switch ($vip['mode']) {
578
				case "proxyarp":
579
					$anyproxyarp = true;
580
					break;
581
				case "ipalias":
582
					interface_ipalias_configure($vip);
583
					break;
584
				case "carp":
585
					$carp_setuped = true;
586
					/* properly remove the old VHID
587
					 * see https://redmine.pfsense.org/issues/12202 */
588
					$realif = get_real_interface($vip['interface']);
589
					mwexec("/sbin/ifconfig {$realif} " .
590
					    escapeshellarg($vip['subnet']) . " -alias");
591
					interface_carp_configure($vip);
592
					break;
593
				}
594
				$force_filterconfigure = true;
595
			}
596

    
597
			/* Cleanup remaining old carps */
598
			foreach ($oldvips as $oldvipar) {
599
				$oldvipif = get_real_interface(
600
				    $oldvipar['interface']);
601

    
602
				if (empty($oldvipif)) {
603
					continue;
604
				}
605

    
606
				/* do not remove VIP if the IP address remains the same */
607
				foreach ($config['virtualip']['vip'] as $vip) {
608
					if ($vip['subnet'] == $oldvipar['subnet']) {
609
						continue 2;
610
					}
611
				}
612

    
613
				if (is_ipaddrv6($oldvipar['subnet'])) {
614
					 mwexec("/sbin/ifconfig " .
615
					     escapeshellarg($oldvipif) .
616
					     " inet6 " .
617
					     escapeshellarg($oldvipar['subnet']) .
618
					     " delete");
619
				} else {
620
					pfSense_interface_deladdress($oldvipif,
621
					    $oldvipar['subnet']);
622
				}
623
			}
624
			if ($carp_setuped == true) {
625
				interfaces_sync_setup();
626
			}
627
			if ($anyproxyarp == true) {
628
				interface_proxyarp_configure();
629
			}
630
		}
631

    
632
		local_sync_accounts($u2add, $u2del, $g2add, $g2del);
633
		$this->filter_configure(false, $force_filterconfigure);
634
		unset($old_config);
635

    
636
		return true;
637
	}
638

    
639
	/**
640
	 * Merge items into installedpackages config section
641
	 *
642
	 * @param array $section
643
	 *
644
	 * @return bool
645
	 */
646
	public function merge_installedpackages_section($section, $timeout) {
647
		ini_set('default_socket_timeout', $timeout);
648
		$this->auth();
649

    
650
		global $config;
651

    
652
		if ($this->loop_detected) {
653
			log_error("Disallowing CARP sync loop");
654
			return true;
655
		}
656

    
657
		$config['installedpackages'] = array_merge(
658
		    $config['installedpackages'], $section);
659
		$mergedkeys = implode(", ", array_keys($section));
660
		write_config(sprintf(gettext(
661
		    "Merged in config (%s sections) from XMLRPC client."),
662
		    $mergedkeys));
663

    
664
		return true;
665
	}
666

    
667
	/**
668
	 * Merge items into config
669
	 *
670
	 * @param array $section
671
	 *
672
	 * @return bool
673
	 */
674
	public function merge_config_section($section, $timeout) {
675
		ini_set('default_socket_timeout', $timeout);
676
		$this->auth();
677

    
678
		global $config;
679

    
680
		if ($this->loop_detected) {
681
			log_error("Disallowing CARP sync loop");
682
			return true;
683
		}
684

    
685
		$config_new = $this->array_overlay($config, $section);
686
		$config = $config_new;
687
		$mergedkeys = implode(", ", array_keys($section));
688
		write_config(sprintf(gettext(
689
		    "Merged in config (%s sections) from XMLRPC client."),
690
		    $mergedkeys));
691

    
692
		return true;
693
	}
694

    
695
	/**
696
	 * Wrapper for filter_configure()
697
	 *
698
	 * @return bool
699
	 */
700
	private function filter_configure($reset_accounts = true, $force = false) {
701
		global $g, $config, $old_config;
702

    
703
		filter_configure();
704
		system_routing_configure();
705
		setup_gateways_monitor();
706

    
707
		/* do not restart unchanged services on XMLRPC sync,
708
		 * see https://redmine.pfsense.org/issues/11082 
709
		 */
710
		if (is_array($config['openvpn']) || is_array($old_config['openvpn'])) {
711
			foreach (array("server", "client") as $type) {
712
				$remove_id = array();
713
				if (is_array($old_config['openvpn']["openvpn-{$type}"])) {
714
					foreach ($old_config['openvpn']["openvpn-{$type}"] as & $old_settings) {
715
						$remove_id[] = $old_settings['vpnid'];
716
					}
717
				}
718
				if (!is_array($config['openvpn']["openvpn-{$type}"])) {
719
					continue;
720
				}
721
				foreach ($config['openvpn']["openvpn-{$type}"] as & $settings) {
722
					$new_instance = true;
723
					if (in_array($settings['vpnid'], $remove_id)) {
724
						$remove_id = array_diff($remove_id, array($settings['vpnid']));
725
					}
726
					if (is_array($old_config['openvpn']["openvpn-{$type}"])) {
727
						foreach ($old_config['openvpn']["openvpn-{$type}"] as & $old_settings) {
728
							if ($settings['vpnid'] == $old_settings['vpnid']) {
729
								$new_instance = false;
730
								if (($settings != $old_settings) || $force) {
731
									/* restart changed openvpn instance */
732
									openvpn_resync($type, $settings);
733
									break;
734
								}
735
							}
736
						}
737
					}
738
					if ($new_instance) {
739
						/* start new openvpn instance */
740
						openvpn_resync($type, $settings);
741
					}
742
				}
743
				if (!empty($remove_id)) {
744
					foreach ($remove_id as $id) {
745
						/* stop/delete removed openvpn instances */
746
						openvpn_delete($type, array('vpnid' => $id));
747
					}
748
				}
749
			}
750
			/* no service restart required */
751
			openvpn_resync_csc_all();
752
		}
753

    
754
		/* run ipsec_configure() on any IPsec change, see https://redmine.pfsense.org/issues/12075 */
755
		if (((is_array($config['ipsec']) || is_array($old_config['ipsec'])) &&
756
		    ($config['ipsec'] != $old_config['ipsec'])) ||
757
		    $force) {
758
			ipsec_configure();
759
		}
760

    
761
		/*
762
		 * The DNS Resolver and the DNS Forwarder may both be active so
763
		 * long as * they are running on different ports.
764
		 * See ticket #5882
765
		 */
766
		if (((is_array($config['dnsmasq']) || is_array($old_config['dnsmasq'])) &&
767
		    ($config['dnsmasq'] != $old_config['dnsmasq'])) ||
768
		    $force) {
769
			if (isset($config['dnsmasq']['enable'])) {
770
				/* Configure dnsmasq but tell it NOT to restart DHCP */
771
				services_dnsmasq_configure(false);
772
			} else {
773
				/* kill any running dnsmasq instance */
774
				if (isvalidpid("{$g['varrun_path']}/dnsmasq.pid")) {
775
					sigkillbypid("{$g['varrun_path']}/dnsmasq.pid",
776
					    "TERM");
777
				}
778
			}
779
		}
780
		if (((is_array($config['unbound']) || is_array($old_config['unbound'])) &&
781
		    ($config['unbound'] != $old_config['unbound'])) ||
782
		    $force) {
783
			if (isset($config['unbound']['enable'])) {
784
				/* Configure unbound but tell it NOT to restart DHCP */
785
				services_unbound_configure(false);
786
			} else {
787
				/* kill any running Unbound instance */
788
				if (isvalidpid("{$g['varrun_path']}/unbound.pid")) {
789
					sigkillbypid("{$g['varrun_path']}/unbound.pid",
790
					    "TERM");
791
				}
792
			}
793
		}
794

    
795
		/*
796
		 * Call this separately since the above are manually set to
797
		 * skip the DHCP restart they normally perform.
798
		 * This avoids restarting dhcpd twice as described on
799
		 * ticket #3797
800
		 */
801
		if (((is_array($config['dhcpd']) || is_array($old_config['dhcpd'])) &&
802
		    ($config['dhcpd'] != $old_config['dhcpd'])) ||
803
		    $force) {
804
			services_dhcpd_configure();
805
		}
806

    
807
		if (((is_array($config['dhcrelay']) || is_array($old_config['dhcrelay'])) &&
808
		    ($config['dhcrelay'] != $old_config['dhcrelay'])) ||
809
		    $force) {
810
			services_dhcrelay_configure();
811
		}
812

    
813
		if (((is_array($config['dhcrelay6']) || is_array($old_config['dhcrelay6'])) &&
814
		    ($config['dhcrelay6'] != $old_config['dhcrelay6'])) ||
815
		    $force) {
816
			services_dhcrelay6_configure();
817
		}
818

    
819
		if ($reset_accounts) {
820
			local_reset_accounts();
821
		}
822

    
823
		if ((is_array($config['captiveportal']) || is_array($old_config['captiveportal']) &&
824
		    ($config['captiveportal'] != $old_config['captiveportal'])) ||
825
		    $force) {
826
			captiveportal_configure();
827
		}
828
		if ((is_array($config['voucher']) || is_array($old_config['voucher']) &&
829
		    ($config['voucher'] != $old_config['voucher'])) ||
830
		    $force) {
831
			voucher_configure();
832
		}
833

    
834
		return true;
835
	}
836

    
837
	/**
838
	 * Wrapper for captiveportal connected users and
839
	 * active/expired vouchers synchronization
840
	 *
841
	 * @param array $arguments
842
	 *
843
	 * @return array
844
	 */
845
	public function captive_portal_sync($arguments, $timeout) {
846
		ini_set('default_socket_timeout', $timeout);
847
		$this->auth();
848
		// Note : no protection against CARP loop is done here, and this is in purpose.
849
		// This function is used for bi-directionnal sync, which is precisely what CARP loop protection is supposed to prevent.
850
		// CARP loop has to be managed within functions using captive_portal_sync()
851
		global $g, $config, $cpzone;
852

    
853
		if (empty($arguments['op']) || empty($arguments['zone']) || empty($config['captiveportal'][$arguments['zone']])) {
854
			return false;
855
		}
856
		$cpzone = $arguments['zone'];
857

    
858
		if ($arguments['op'] === 'get_databases') {
859
			$active_vouchers = array();
860
			$expired_vouchers = array();
861
			$usedmacs = '';
862

    
863
			if (is_array($config['voucher'][$cpzone]['roll'])) {
864
				foreach($config['voucher'][$cpzone]['roll'] as $id => $roll) {
865
					$expired_vouchers[$roll['number']] = base64_encode(voucher_read_used_db($roll['number']));
866
					$active_vouchers[$roll['number']] = voucher_read_active_db($roll['number']);
867
				}
868
			}
869
			if (!empty($config['captiveportal'][$cpzone]['freelogins_count']) &&
870
			    !empty($config['captiveportal'][$cpzone]['freelogins_resettimeout'])) {
871
				$usedmacs = captiveportal_read_usedmacs_db();
872
			}
873
			// base64 is here for safety reasons, as we don't fully control
874
			// the content of these arrays.
875
			$returndata = array('connected_users' => base64_encode(serialize(captiveportal_read_db())),
876
			'active_vouchers' => base64_encode(serialize($active_vouchers)),
877
			'expired_vouchers' => base64_encode(serialize($expired_vouchers)),
878
			'usedmacs' => base64_encode(serialize($usedmacs)));
879

    
880
			return $returndata;
881
		} elseif ($arguments['op'] === 'connect_user') {
882
			$user = unserialize(base64_decode($arguments['user']));
883
			$user['attributes']['allow_time'] = $user['allow_time'];
884

    
885
			// pipeno might be different between primary and secondary
886
			$pipeno = captiveportal_get_next_dn_ruleno('auth');
887
			return portal_allow($user['clientip'], $user['clientmac'], $user['username'], $user['password'], null,
888
			    $user['attributes'], $pipeno, $user['authmethod'], $user['context'], $user['sessionid']);
889
		} elseif ($arguments['op'] === 'disconnect_user') {
890
			$session = unserialize(base64_decode($arguments['session']));
891
			/* read database again, as pipeno might be different between primary & secondary */
892
			$sessionid = SQLite3::escapeString($session['sessionid']);
893
			$local_dbentry = captiveportal_read_db("WHERE sessionid = '{$sessionid}'");
894

    
895
			if (!empty($local_dbentry) && count($local_dbentry) == 1) {
896
				return captiveportal_disconnect($local_dbentry[0], $session['term_cause'], $session['stop_time'], true);
897
			} else {
898
				return false;
899
			}
900
		} elseif ($arguments['op'] === 'remove_entries') {
901
			$entries = unserialize(base64_decode($arguments['entries']));
902

    
903
			return captiveportal_remove_entries($entries, true);
904
		} elseif ($arguments['op'] === 'disconnect_all') {
905
			$arguments = unserialize(base64_decode($arguments['arguments']));
906

    
907
			return captiveportal_disconnect_all($arguments['term_cause'], $arguments['logout_reason'], true);
908
		} elseif ($arguments['op'] === 'write_vouchers') {
909
			$arguments = unserialize(base64_decode($arguments['arguments']));
910

    
911
			if (is_array($arguments['active_and_used_vouchers_bitmasks'])) {
912
				foreach ($arguments['active_and_used_vouchers_bitmasks'] as $roll => $used) {
913
					if (is_array($used)) {
914
						foreach ($used as $u) {
915
							voucher_write_used_db($roll, base64_encode($u));
916
						}
917
					} else {
918
						voucher_write_used_db($roll, base64_encode($used));
919
					}
920
				}
921
			}
922
			foreach ($arguments['active_vouchers'] as $roll => $active_vouchers) {
923
				voucher_write_active_db($roll, $active_vouchers);
924
			}
925
			return true;
926
		} elseif ($arguments['op'] === 'write_usedmacs') {
927
			$arguments = unserialize(base64_decode($arguments['arguments']));
928

    
929
			captiveportal_write_usedmacs_db($arguments['usedmacs']); 
930
			return true;
931
		}
932
	}
933

    
934
	/**
935
	 * Wrapper for configuring CARP interfaces
936
	 *
937
	 * @return bool
938
	 */
939
	public function interfaces_carp_configure() {
940
		$this->auth();
941

    
942
		if ($this->loop_detected) {
943
			log_error("Disallowing CARP sync loop");
944
			return true;
945
		}
946

    
947
		interfaces_vips_configure();
948

    
949
		return true;
950
	}
951

    
952
	/**
953
	 * Wrapper for rc.reboot
954
	 *
955
	 * @return bool
956
	 */
957
	public function reboot() {
958
		$this->auth();
959

    
960
		mwexec_bg("/etc/rc.reboot");
961

    
962
		return true;
963
	}
964
}
965

    
966
// run script until its done and can 'unlock' the xmlrpc.lock, this prevents hanging php-fpm / webgui
967
ignore_user_abort(true);
968
set_time_limit(0);
969

    
970
$xmlrpclockkey = lock('xmlrpc', LOCK_EX);
971

    
972
XML_RPC2_Backend::setBackend('php');
973
$HTTP_RAW_POST_DATA = file_get_contents('php://input');
974

    
975
$options = array(
976
	'prefix' => 'pfsense.',
977
	'encoding' => 'utf-8',
978
	'autoDocument' => false,
979
);
980

    
981
$server = XML_RPC2_Server::create(new pfsense_xmlrpc_server(), $options);
982
$server->handleCall();
983

    
984
unlock($xmlrpclockkey);
985

    
986
?>
(228-228/228)