functions.bcc.inc.php 9.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292
  1. <?php
  2. function bcc($_action, $_data = null, $attr = null) {
  3. global $pdo;
  4. global $lang;
  5. if ($_SESSION['mailcow_cc_role'] != "admin" && $_SESSION['mailcow_cc_role'] != "domainadmin") {
  6. return false;
  7. }
  8. switch ($_action) {
  9. case 'add':
  10. if (!isset($_SESSION['acl']['bcc_maps']) || $_SESSION['acl']['bcc_maps'] != "1" ) {
  11. $_SESSION['return'] = array(
  12. 'type' => 'danger',
  13. 'msg' => sprintf($lang['danger']['access_denied'])
  14. );
  15. return false;
  16. }
  17. $local_dest = strtolower(trim($_data['local_dest']));
  18. $bcc_dest = array_map('trim', preg_split( "/( |,|;|\n)/", $_data['bcc_dest']));
  19. $active = intval($_data['active']);
  20. $type = $_data['type'];
  21. if ($type != 'sender' && $type != 'rcpt') {
  22. $_SESSION['return'] = array(
  23. 'type' => 'danger',
  24. 'msg' => 'Invalid BCC map type'
  25. );
  26. return false;
  27. }
  28. if (empty($bcc_dest)) {
  29. $_SESSION['return'] = array(
  30. 'type' => 'danger',
  31. 'msg' => 'BCC destination cannot be empty'
  32. );
  33. return false;
  34. }
  35. if (is_valid_domain_name($local_dest)) {
  36. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $local_dest)) {
  37. $_SESSION['return'] = array(
  38. 'type' => 'danger',
  39. 'msg' => sprintf($lang['danger']['access_denied'])
  40. );
  41. return false;
  42. }
  43. $domain = idn_to_ascii($local_dest);
  44. $local_dest_sane = '@' . idn_to_ascii($local_dest);
  45. }
  46. elseif (filter_var($local_dest, FILTER_VALIDATE_EMAIL)) {
  47. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $local_dest)) {
  48. $_SESSION['return'] = array(
  49. 'type' => 'danger',
  50. 'msg' => sprintf($lang['danger']['access_denied'])
  51. );
  52. return false;
  53. }
  54. $domain = mailbox('get', 'mailbox_details', $local_dest)['domain'];
  55. if (empty($domain)) {
  56. return false;
  57. }
  58. $local_dest_sane = $local_dest;
  59. }
  60. else {
  61. return false;
  62. }
  63. foreach ($bcc_dest as &$bcc_dest_e) {
  64. if (!filter_var($bcc_dest_e, FILTER_VALIDATE_EMAIL)) {
  65. $bcc_dest_e = null;;
  66. }
  67. $bcc_dest_e = strtolower($bcc_dest_e);
  68. }
  69. $bcc_dest = array_filter($bcc_dest);
  70. $bcc_dest = implode(",", $bcc_dest);
  71. if (empty($bcc_dest)) {
  72. $_SESSION['return'] = array(
  73. 'type' => 'danger',
  74. 'msg' => 'BCC map destination cannot be empty'
  75. );
  76. return false;
  77. }
  78. try {
  79. $stmt = $pdo->prepare("SELECT `id` FROM `bcc_maps`
  80. WHERE `local_dest` = :local_dest AND `type` = :type");
  81. $stmt->execute(array(':local_dest' => $local_dest_sane, ':type' => $type));
  82. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  83. }
  84. catch(PDOException $e) {
  85. $_SESSION['return'] = array(
  86. 'type' => 'danger',
  87. 'msg' => 'MySQL: '.$e
  88. );
  89. return false;
  90. }
  91. if ($num_results != 0) {
  92. $_SESSION['return'] = array(
  93. 'type' => 'danger',
  94. 'msg' => 'A BCC map entry "' . htmlspecialchars($local_dest_sane) . '" exists for type "' . $type . '"'
  95. );
  96. return false;
  97. }
  98. try {
  99. $stmt = $pdo->prepare("INSERT INTO `bcc_maps` (`local_dest`, `bcc_dest`, `domain`, `active`, `type`) VALUES
  100. (:local_dest, :bcc_dest, :domain, :active, :type)");
  101. $stmt->execute(array(
  102. ':local_dest' => $local_dest_sane,
  103. ':bcc_dest' => $bcc_dest,
  104. ':domain' => $domain,
  105. ':active' => $active,
  106. ':type' => $type
  107. ));
  108. }
  109. catch (PDOException $e) {
  110. $_SESSION['return'] = array(
  111. 'type' => 'danger',
  112. 'msg' => 'MySQL: '.$e
  113. );
  114. return false;
  115. }
  116. $_SESSION['return'] = array(
  117. 'type' => 'success',
  118. 'msg' => 'BCC map entry saved'
  119. );
  120. break;
  121. case 'edit':
  122. if (!isset($_SESSION['acl']['bcc_maps']) || $_SESSION['acl']['bcc_maps'] != "1" ) {
  123. $_SESSION['return'] = array(
  124. 'type' => 'danger',
  125. 'msg' => sprintf($lang['danger']['access_denied'])
  126. );
  127. return false;
  128. }
  129. $ids = (array)$_data['id'];
  130. foreach ($ids as $id) {
  131. $is_now = bcc('details', $id);
  132. if (!empty($is_now)) {
  133. $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active_int'];
  134. $bcc_dest = (!empty($_data['bcc_dest'])) ? $_data['bcc_dest'] : $is_now['bcc_dest'];
  135. $local_dest = $is_now['local_dest'];
  136. $type = (!empty($_data['type'])) ? $_data['type'] : $is_now['type'];
  137. }
  138. else {
  139. $_SESSION['return'] = array(
  140. 'type' => 'danger',
  141. 'msg' => sprintf($lang['danger']['access_denied'])
  142. );
  143. return false;
  144. }
  145. $bcc_dest = array_map('trim', preg_split( "/( |,|;|\n)/", $bcc_dest));
  146. $active = intval($_data['active']);
  147. foreach ($bcc_dest as &$bcc_dest_e) {
  148. if (!filter_var($bcc_dest_e, FILTER_VALIDATE_EMAIL)) {
  149. $bcc_dest_e = null;;
  150. }
  151. $bcc_dest_e = strtolower($bcc_dest_e);
  152. }
  153. $bcc_dest = array_filter($bcc_dest);
  154. $bcc_dest = implode(",", $bcc_dest);
  155. if (empty($bcc_dest)) {
  156. $_SESSION['return'] = array(
  157. 'type' => 'danger',
  158. 'msg' => 'BCC map destination cannot be empty'
  159. );
  160. return false;
  161. }
  162. try {
  163. $stmt = $pdo->prepare("SELECT `id` FROM `bcc_maps`
  164. WHERE `local_dest` = :local_dest AND `type` = :type");
  165. $stmt->execute(array(':local_dest' => $local_dest, ':type' => $type));
  166. $id_now = $stmt->fetch(PDO::FETCH_ASSOC)['id'];
  167. }
  168. catch(PDOException $e) {
  169. $_SESSION['return'] = array(
  170. 'type' => 'danger',
  171. 'msg' => 'MySQL: '.$e
  172. );
  173. return false;
  174. }
  175. if (isset($id_now) && $id_now != $id) {
  176. $_SESSION['return'] = array(
  177. 'type' => 'danger',
  178. 'msg' => 'A BCC map entry ' . htmlspecialchars($local_dest) . ' exists for this type'
  179. );
  180. return false;
  181. }
  182. try {
  183. $stmt = $pdo->prepare("UPDATE `bcc_maps` SET `bcc_dest` = :bcc_dest, `active` = :active, `type` = :type WHERE `id`= :id");
  184. $stmt->execute(array(
  185. ':bcc_dest' => $bcc_dest,
  186. ':active' => $active,
  187. ':type' => $type,
  188. ':id' => $id
  189. ));
  190. }
  191. catch (PDOException $e) {
  192. $_SESSION['return'] = array(
  193. 'type' => 'danger',
  194. 'msg' => 'MySQL: '.$e
  195. );
  196. return false;
  197. }
  198. }
  199. $_SESSION['return'] = array(
  200. 'type' => 'success',
  201. 'msg' => 'BCC map entry edited'
  202. );
  203. break;
  204. case 'details':
  205. $bccdata = array();
  206. $id = intval($_data);
  207. try {
  208. $stmt = $pdo->prepare("SELECT `id`,
  209. `local_dest`,
  210. `bcc_dest`,
  211. `active` AS `active_int`,
  212. CASE `active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`,
  213. `type`,
  214. `created`,
  215. `domain`,
  216. `modified` FROM `bcc_maps`
  217. WHERE `id` = :id");
  218. $stmt->execute(array(':id' => $id));
  219. $bccdata = $stmt->fetch(PDO::FETCH_ASSOC);
  220. }
  221. catch(PDOException $e) {
  222. $_SESSION['return'] = array(
  223. 'type' => 'danger',
  224. 'msg' => 'MySQL: '.$e
  225. );
  226. return false;
  227. }
  228. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $bccdata['domain'])) {
  229. $bccdata = null;
  230. return false;
  231. }
  232. return $bccdata;
  233. break;
  234. case 'get':
  235. $bccdata = array();
  236. $all_items = array();
  237. $id = intval($_data);
  238. try {
  239. $stmt = $pdo->query("SELECT `id`, `domain` FROM `bcc_maps`");
  240. $all_items = $stmt->fetchAll(PDO::FETCH_ASSOC);
  241. }
  242. catch(PDOException $e) {
  243. $_SESSION['return'] = array(
  244. 'type' => 'danger',
  245. 'msg' => 'MySQL: '.$e
  246. );
  247. return false;
  248. }
  249. foreach ($all_items as $i) {
  250. if (hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $i['domain'])) {
  251. $bccdata[] = $i['id'];
  252. }
  253. }
  254. $all_items = null;
  255. return $bccdata;
  256. break;
  257. case 'delete':
  258. $ids = (array)$_data['id'];
  259. foreach ($ids as $id) {
  260. if (!is_numeric($id)) {
  261. return false;
  262. }
  263. try {
  264. $stmt = $pdo->prepare("SELECT `domain` FROM `bcc_maps` WHERE id = :id");
  265. $stmt->execute(array(':id' => $id));
  266. $domain = $stmt->fetch(PDO::FETCH_ASSOC)['domain'];
  267. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  268. $_SESSION['return'] = array(
  269. 'type' => 'danger',
  270. 'msg' => sprintf($lang['danger']['access_denied'])
  271. );
  272. return false;
  273. }
  274. $stmt = $pdo->prepare("DELETE FROM `bcc_maps` WHERE `id`= :id");
  275. $stmt->execute(array(':id' => $id));
  276. }
  277. catch (PDOException $e) {
  278. $_SESSION['return'] = array(
  279. 'type' => 'danger',
  280. 'msg' => 'MySQL: '.$e
  281. );
  282. return false;
  283. }
  284. }
  285. $_SESSION['return'] = array(
  286. 'type' => 'success',
  287. 'msg' => 'Deleted BCC map id/s ' . implode(', ', $ids)
  288. );
  289. return true;
  290. break;
  291. }
  292. }