339 lines
10 KiB
PHP
339 lines
10 KiB
PHP
<?php
|
|
/*--------------------------------------------------------+
|
|
| SYSTOPIA CiviProxy |
|
|
| a simple proxy solution for external access to CiviCRM |
|
|
| Copyright (C) 2015 SYSTOPIA |
|
|
| Author: B. Endres (endres -at- systopia.de) |
|
|
| http://www.systopia.de/ |
|
|
+---------------------------------------------------------*/
|
|
|
|
require_once "config.php";
|
|
$civiproxy_version = '0.6.dev1';
|
|
|
|
/**
|
|
* this will redirect the request to another URL,
|
|
* i.e. will pass the reply on to this request
|
|
*
|
|
* @see losely based on https://code.google.com/p/php-proxy/
|
|
*
|
|
* @param $url the URL to which the
|
|
* where type can be 'int', 'string' (unchecked),
|
|
*/
|
|
function civiproxy_redirect($url_requested, $parameters) {
|
|
global $target_interface;
|
|
$url = $url_requested;
|
|
$curlSession = curl_init();
|
|
|
|
if ($_SERVER['REQUEST_METHOD'] == 'POST'){
|
|
// POST requests should be passed on as POST
|
|
$postinfo = '';
|
|
foreach ($parameters as $key=>$value) {
|
|
$postinfo .= $key.'='.urlencode($value).'&';
|
|
}
|
|
rtrim($postinfo,'&');
|
|
curl_setopt ($curlSession, CURLOPT_POST, 1);
|
|
curl_setopt ($curlSession, CURLOPT_POSTFIELDS, $postinfo);
|
|
} else {
|
|
// GET requests will get the parameters as url params
|
|
$urlparams = '';
|
|
foreach ($parameters as $key=>$value) {
|
|
$urlparams .= $key.'='.urlencode($value).'&';
|
|
}
|
|
if (!empty($urlparams)) {
|
|
$url .= '?' . $urlparams;
|
|
}
|
|
}
|
|
|
|
curl_setopt($curlSession, CURLOPT_URL, $url);
|
|
curl_setopt($curlSession, CURLOPT_HEADER, 1);
|
|
curl_setopt($curlSession, CURLOPT_RETURNTRANSFER,1);
|
|
curl_setopt($curlSession, CURLOPT_TIMEOUT, 30);
|
|
curl_setopt($curlSession, CURLOPT_SSL_VERIFYHOST, 1);
|
|
if (!empty($target_interface)) {
|
|
curl_setopt($curlSession, CURLOPT_INTERFACE, $target_interface);
|
|
}
|
|
if (file_exists(dirname(__FILE__).'/target.pem')) {
|
|
curl_setopt($curlSession, CURLOPT_CAINFO, dirname(__FILE__).'/target.pem');
|
|
}
|
|
|
|
//Send the request and store the result in an array
|
|
$response = curl_exec($curlSession);
|
|
|
|
// Check that a connection was made
|
|
if (curl_error($curlSession)){
|
|
civiproxy_http_error(curl_error($curlSession), curl_errno($curlSession));
|
|
|
|
} else {
|
|
//clean duplicate header that seems to appear on fastcgi with output buffer on some servers!!
|
|
$response = str_replace("HTTP/1.1 100 Continue\r\n\r\n","",$response);
|
|
|
|
// split header / content
|
|
$content = explode("\r\n\r\n", $response, 2);
|
|
$header = $content[0];
|
|
$body = $content[1];
|
|
|
|
// handle headers - simply re-outputing them
|
|
$header_ar = explode(chr(10), $header);
|
|
foreach ($header_ar as $header_line){
|
|
if (!preg_match("/^Transfer-Encoding/", $header_line)){
|
|
civiproxy_mend_URLs($header_line);
|
|
header(trim($header_line));
|
|
}
|
|
}
|
|
|
|
//rewrite all hard coded urls to ensure the links still work!
|
|
civiproxy_mend_URLs($body);
|
|
|
|
print $body;
|
|
}
|
|
|
|
curl_close ($curlSession);
|
|
}
|
|
|
|
|
|
/**
|
|
* Will mend all the URLs in the string that point to the target,
|
|
* so they will point to this proxy instead
|
|
*/
|
|
function civiproxy_mend_URLs(&$string) {
|
|
global $target_rest, $target_url, $target_open, $target_file, $target_mail, $proxy_base, $target_mosaico;
|
|
|
|
if ($target_rest) {
|
|
$string = preg_replace("#{$target_rest}#", $proxy_base . '/rest.php', $string);
|
|
}
|
|
if ($target_url) {
|
|
$string = preg_replace("#{$target_url}#", $proxy_base . '/url.php', $string);
|
|
}
|
|
if ($target_open) {
|
|
$string = preg_replace("#{$target_open}#", $proxy_base . '/open.php', $string);
|
|
}
|
|
if ($target_mail) {
|
|
$string = preg_replace("#{$target_mail}#", $proxy_base . '/mail.php', $string);
|
|
}
|
|
if ($target_file) {
|
|
$string = preg_replace("#{$target_file}#", $proxy_base . '/file.php?id=', $string);
|
|
}
|
|
if ($target_mosaico) {
|
|
// replace full, and relative URL
|
|
$string = preg_replace("#{$target_mosaico}#", $proxy_base . '/mosaico.php?id=', $string);
|
|
$string = preg_replace("#/civicrm/mosaico/img\\?src=#", $proxy_base . '/mosaico.php?id=', $string);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Will check the incoming connection.
|
|
* This hook allowes for (future) checks for flooding, spoofing,
|
|
* unauthorized access quantities, etc.
|
|
*
|
|
* @param $target
|
|
* @param $quit if TRUE, quit immediately if access denied
|
|
*
|
|
* @return TRUE if allowed, FALSE if not (or quits if $quit is set)
|
|
*/
|
|
function civiproxy_security_check($target, $quit=TRUE) {
|
|
// verify that we're SSL encrypted
|
|
if ($_SERVER['HTTPS'] != "on") {
|
|
civiproxy_http_error("This CiviProxy installation requires SSL encryption.", 400);
|
|
}
|
|
|
|
global $debug;
|
|
if (!empty($debug)) {
|
|
$file = fopen($debug, 'a');
|
|
|
|
// filter log data
|
|
$log_data = $_REQUEST;
|
|
if (isset($log_data['api_key'])) {
|
|
$log_data['api_key'] = substr($log_data['api_key'], 0, 4) . '...';
|
|
}
|
|
if (isset($log_data['key'])) {
|
|
$log_data['key'] = substr($log_data['key'], 0, 4) . '...';
|
|
}
|
|
|
|
// write log record
|
|
fwrite($file, "REQUEST FROM " . $_SERVER['REMOTE_ADDR'] . " ON " . date('Y-m-d H:i:s') . ' -- ' . print_r($log_data ,1));
|
|
fclose($file);
|
|
}
|
|
|
|
// TODO: implement
|
|
return TRUE;
|
|
}
|
|
|
|
|
|
/**
|
|
* extract and type check the parameters from the call params
|
|
*
|
|
* @param $valid_parameters array '<parameter name> => '<expected type>'
|
|
* where type can be 'int', 'string' (unchecked),
|
|
* @param $request provides the request data to use,
|
|
* defaults to $_REQUEST
|
|
*/
|
|
function civiproxy_get_parameters($valid_parameters, $request = NULL) {
|
|
if ($request === NULL) {
|
|
$request = $_REQUEST;
|
|
}
|
|
|
|
$result = array();
|
|
$default_sanitation = NULL;
|
|
|
|
foreach ($valid_parameters as $name => $type) {
|
|
if ($name == '*') {
|
|
// this sets default_sanitation
|
|
$default_sanitation = $type;
|
|
continue;
|
|
}
|
|
|
|
if (isset($request[$name])) {
|
|
$result[$name] = civiproxy_sanitise($request[$name], $type);
|
|
}
|
|
}
|
|
|
|
// process wildcard elements
|
|
if ($default_sanitation !== NULL) {
|
|
// i.e. we want the others too
|
|
$remove_parameters = array('key', 'api_key', 'version', 'entity', 'action');
|
|
foreach ($request as $name => $value) {
|
|
if (!in_array($name, $remove_parameters) && !isset($valid_parameters[$name])) {
|
|
$result[$name] = civiproxy_sanitise($value, $default_sanitation);
|
|
}
|
|
}
|
|
}
|
|
|
|
return $result;
|
|
}
|
|
|
|
/**
|
|
* sanitise the given value with the given sanitiation type
|
|
*/
|
|
function civiproxy_sanitise($value, $type) {
|
|
if ($type=='int') {
|
|
$value = (int) $value;
|
|
} elseif ($type == 'string') {
|
|
// TODO: sanitize? SQL?
|
|
$value = $value;
|
|
} elseif ($type == 'float2') {
|
|
// TODO: check if safe wrt l10n. rather use sprintf
|
|
$value = number_format($value, 2, '.', '');
|
|
} elseif ($type == 'hex') {
|
|
// hex code
|
|
if (!preg_match("#^[0-9a-f]*$#i", $value)) {
|
|
error_log("CiviProxy: removed invalid hex parameter: " . $value);
|
|
$value = '';
|
|
}
|
|
} elseif ($type == 'email') {
|
|
// valid email
|
|
if (!preg_match("#^[_a-z0-9-]+(\.[_a-z0-9-]+)*@[a-z0-9-]+(\.[a-z0-9-]+)*(\.[a-z]{2,3})$#i", $value)) {
|
|
error_log("CiviProxy: removed invalid email parameter: " . $value);
|
|
$value = '';
|
|
}
|
|
} elseif ($type == 'json') {
|
|
// valid json
|
|
$json_data = json_decode($value, true);
|
|
if ($json_data === NULL) {
|
|
$value = '';
|
|
} else {
|
|
$value = json_encode($value);
|
|
}
|
|
} elseif ($type == 'array') {
|
|
// this should only happen _inside_ the json field
|
|
if (!is_array($value)) {
|
|
$value = '';
|
|
}
|
|
} elseif (is_array($type)) {
|
|
// this is a list of valid options
|
|
$requested_value = $value;
|
|
$value = '';
|
|
foreach ($type as $allowed_value) {
|
|
if ($requested_value === $allowed_value) {
|
|
$value = $requested_value;
|
|
break;
|
|
}
|
|
}
|
|
} else {
|
|
error_log("CiviProxy: unknown type '$type'. Ignored.");
|
|
$value = '';
|
|
}
|
|
return $value;
|
|
}
|
|
|
|
|
|
/**
|
|
* generates a CiviCRM REST API compliant error
|
|
* and ends processing
|
|
*/
|
|
function civiproxy_http_error($message, $code = 404) {
|
|
global $civiproxy_version;
|
|
global $error_message;
|
|
global $civiproxy_logo;
|
|
|
|
$civiproxy_error_message = $message;
|
|
|
|
header("HTTP/1.1 $code $civiproxy_error_message (CiviProxy {$civiproxy_version})");
|
|
require "error.php";
|
|
|
|
exit();
|
|
}
|
|
|
|
|
|
/**
|
|
* call the CiviCRM REST API via CURL
|
|
*/
|
|
function civicrm_api3($entity, $action, $data) {
|
|
global $target_rest, $sys_key_map, $target_interface;
|
|
|
|
// extract site key
|
|
$site_keys = array_values($sys_key_map);
|
|
if (empty($site_keys)) civiproxy_http_error('No site key set.');
|
|
|
|
$query = $data; // array copy(!)
|
|
$query['key'] = $site_keys[0];
|
|
$query['json'] = 1;
|
|
$query['version'] = 3;
|
|
$query['entity'] = $entity;
|
|
$query['action'] = $action;
|
|
|
|
$curlSession = curl_init();
|
|
curl_setopt($curlSession, CURLOPT_POST, 1);
|
|
curl_setopt($curlSession, CURLOPT_POSTFIELDS, $query);
|
|
curl_setopt($curlSession, CURLOPT_URL, $target_rest);
|
|
curl_setopt($curlSession, CURLOPT_RETURNTRANSFER, 1);
|
|
if (!empty($target_interface)) {
|
|
curl_setopt($curlSession, CURLOPT_INTERFACE, $target_interface);
|
|
}
|
|
// curl_setopt($curlSession, CURLOPT_SSL_VERIFYPEER, 1);
|
|
curl_setopt($curlSession, CURLOPT_SSL_VERIFYHOST, 1);
|
|
if (file_exists(dirname(__FILE__).'/target.pem')) {
|
|
curl_setopt($curlSession, CURLOPT_CAINFO, dirname(__FILE__).'/target.pem');
|
|
}
|
|
|
|
$response = curl_exec($curlSession);
|
|
|
|
if (curl_error($curlSession)){
|
|
civiproxy_http_error(curl_error($curlSession));
|
|
} else {
|
|
return json_decode($response, true);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Function to get the valid rest_allowed_actions key
|
|
*
|
|
* @param $action
|
|
* @param $rest_allowed_actions
|
|
* @return bool
|
|
*/
|
|
function civiproxy_get_valid_allowed_actions_key($action, $rest_allowed_actions) {
|
|
$remote_addr = $_SERVER['REMOTE_ADDR'];
|
|
// check IP specific whitelisting if specified for this address
|
|
if (isset($rest_allowed_actions[$remote_addr])) {
|
|
if (isset($rest_allowed_actions[$remote_addr][$action['entity']]) && isset($rest_allowed_actions[$remote_addr][$action['entity']][$action['action']])) {
|
|
$valid_key = $remote_addr;
|
|
} else {
|
|
$valid_key = 'all';
|
|
}
|
|
} else {
|
|
$valid_key = 'all';
|
|
}
|
|
return $valid_key;
|
|
}
|
|
|