functions.policy.inc.php 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320
  1. <?php
  2. function policy($_action, $_scope, $_data = null) {
  3. global $pdo;
  4. global $redis;
  5. global $lang;
  6. $_data_log = $_data;
  7. switch ($_action) {
  8. case 'add':
  9. if (!isset($_SESSION['acl']['spam_policy']) || $_SESSION['acl']['spam_policy'] != "1" ) {
  10. $_SESSION['return'][] = array(
  11. 'type' => 'danger',
  12. 'log' => array(__FUNCTION__, $_action, $_scope, $_data_log),
  13. 'msg' => 'access_denied'
  14. );
  15. return false;
  16. }
  17. switch ($_scope) {
  18. case 'domain':
  19. $object = $_data['domain'];
  20. if (is_valid_domain_name($object)) {
  21. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $object)) {
  22. $_SESSION['return'][] = array(
  23. 'type' => 'danger',
  24. 'log' => array(__FUNCTION__, $_action, $_scope, $_data_log),
  25. 'msg' => 'access_denied'
  26. );
  27. return false;
  28. }
  29. $object = idn_to_ascii(strtolower(trim($object)), 0, INTL_IDNA_VARIANT_UTS46);
  30. }
  31. else {
  32. $_SESSION['return'][] = array(
  33. 'type' => 'danger',
  34. 'log' => array(__FUNCTION__, $_action, $_scope, $_data_log),
  35. 'msg' => 'access_denied'
  36. );
  37. return false;
  38. }
  39. if ($_data['object_list'] == "bl") {
  40. $object_list = "blacklist_from";
  41. }
  42. elseif ($_data['object_list'] == "wl") {
  43. $object_list = "whitelist_from";
  44. }
  45. $object_from = trim(strtolower($_data['object_from']));
  46. if (!ctype_alnum(str_replace(array('@', '_', '.', '-', '*'), '', $object_from))) {
  47. $_SESSION['return'][] = array(
  48. 'type' => 'danger',
  49. 'log' => array(__FUNCTION__, $_action, $_scope, $_data_log),
  50. 'msg' => 'policy_list_from_invalid'
  51. );
  52. return false;
  53. }
  54. if ($object_list != "blacklist_from" && $object_list != "whitelist_from") {
  55. $_SESSION['return'][] = array(
  56. 'type' => 'danger',
  57. 'log' => array(__FUNCTION__, $_action, $_scope, $_data_log),
  58. 'msg' => 'access_denied'
  59. );
  60. return false;
  61. }
  62. $stmt = $pdo->prepare("SELECT `object` FROM `filterconf`
  63. WHERE (`option` = 'whitelist_from' OR `option` = 'blacklist_from')
  64. AND `object` = :object
  65. AND `value` = :object_from");
  66. $stmt->execute(array(':object' => $object, ':object_from' => $object_from));
  67. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  68. if ($num_results != 0) {
  69. $_SESSION['return'][] = array(
  70. 'type' => 'danger',
  71. 'log' => array(__FUNCTION__, $_action, $_scope, $_data_log),
  72. 'msg' => 'policy_list_from_exists'
  73. );
  74. return false;
  75. }
  76. $stmt = $pdo->prepare("INSERT INTO `filterconf` (`object`, `option` ,`value`)
  77. VALUES (:object, :object_list, :object_from)");
  78. $stmt->execute(array(
  79. ':object' => $object,
  80. ':object_list' => $object_list,
  81. ':object_from' => $object_from
  82. ));
  83. $_SESSION['return'][] = array(
  84. 'type' => 'success',
  85. 'log' => array(__FUNCTION__, $_action, $_scope, $_data_log),
  86. 'msg' => array('domain_modified', $object)
  87. );
  88. break;
  89. case 'mailbox':
  90. $object = $_data['username'];
  91. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $object)) {
  92. $_SESSION['return'][] = array(
  93. 'type' => 'danger',
  94. 'log' => array(__FUNCTION__, $_action, $_scope, $_data_log),
  95. 'msg' => 'access_denied'
  96. );
  97. return false;
  98. }
  99. if ($_data['object_list'] == "bl") {
  100. $object_list = "blacklist_from";
  101. }
  102. elseif ($_data['object_list'] == "wl") {
  103. $object_list = "whitelist_from";
  104. }
  105. $object_from = trim(strtolower($_data['object_from']));
  106. if (!ctype_alnum(str_replace(array('@', '_', '.', '-', '*'), '', $object_from))) {
  107. $_SESSION['return'][] = array(
  108. 'type' => 'danger',
  109. 'log' => array(__FUNCTION__, $_action, $_scope, $_data_log),
  110. 'msg' => 'policy_list_from_invalid'
  111. );
  112. return false;
  113. }
  114. if ($object_list != "blacklist_from" && $object_list != "whitelist_from") {
  115. $_SESSION['return'][] = array(
  116. 'type' => 'danger',
  117. 'log' => array(__FUNCTION__, $_action, $_scope, $_data_log),
  118. 'msg' => 'access_denied'
  119. );
  120. return false;
  121. }
  122. $stmt = $pdo->prepare("SELECT `object` FROM `filterconf`
  123. WHERE (`option` = 'whitelist_from' OR `option` = 'blacklist_from')
  124. AND `object` = :object
  125. AND `value` = :object_from");
  126. $stmt->execute(array(':object' => $object, ':object_from' => $object_from));
  127. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  128. if ($num_results != 0) {
  129. $_SESSION['return'][] = array(
  130. 'type' => 'danger',
  131. 'log' => array(__FUNCTION__, $_action, $_scope, $_data_log),
  132. 'msg' => 'policy_list_from_exists'
  133. );
  134. return false;
  135. }
  136. $stmt = $pdo->prepare("INSERT INTO `filterconf` (`object`, `option` ,`value`)
  137. VALUES (:object, :object_list, :object_from)");
  138. $stmt->execute(array(
  139. ':object' => $object,
  140. ':object_list' => $object_list,
  141. ':object_from' => $object_from
  142. ));
  143. $_SESSION['return'][] = array(
  144. 'type' => 'success',
  145. 'log' => array(__FUNCTION__, $_action, $_scope, $_data_log),
  146. 'msg' => array('mailbox_modified', $object)
  147. );
  148. break;
  149. }
  150. break;
  151. case 'delete':
  152. if (!isset($_SESSION['acl']['spam_policy']) || $_SESSION['acl']['spam_policy'] != "1" ) {
  153. $_SESSION['return'][] = array(
  154. 'type' => 'danger',
  155. 'log' => array(__FUNCTION__, $_action, $_scope, $_data_log),
  156. 'msg' => 'access_denied'
  157. );
  158. return false;
  159. }
  160. switch ($_scope) {
  161. case 'domain':
  162. (array)$prefids = $_data['prefid'];
  163. foreach ($prefids as $prefid) {
  164. if (!is_numeric($prefid)) {
  165. $_SESSION['return'][] = array(
  166. 'type' => 'danger',
  167. 'log' => array(__FUNCTION__, $_action, $_scope, $_data_log),
  168. 'msg' => 'access_denied'
  169. );
  170. continue;
  171. }
  172. $stmt = $pdo->prepare("SELECT `object` FROM `filterconf` WHERE `prefid` = :prefid");
  173. $stmt->execute(array(':prefid' => $prefid));
  174. $object = $stmt->fetch(PDO::FETCH_ASSOC)['object'];
  175. if (is_valid_domain_name($object)) {
  176. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $object)) {
  177. $_SESSION['return'][] = array(
  178. 'type' => 'danger',
  179. 'log' => array(__FUNCTION__, $_action, $_scope, $_data_log),
  180. 'msg' => 'access_denied'
  181. );
  182. continue;
  183. }
  184. $object = idn_to_ascii(strtolower(trim($object)), 0, INTL_IDNA_VARIANT_UTS46);
  185. }
  186. else {
  187. $_SESSION['return'][] = array(
  188. 'type' => 'danger',
  189. 'log' => array(__FUNCTION__, $_action, $_scope, $_data_log),
  190. 'msg' => 'access_denied'
  191. );
  192. continue;
  193. }
  194. try {
  195. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :object AND `prefid` = :prefid");
  196. $stmt->execute(array(
  197. ':object' => $object,
  198. ':prefid' => $prefid
  199. ));
  200. }
  201. catch (PDOException $e) {
  202. $_SESSION['return'][] = array(
  203. 'type' => 'danger',
  204. 'log' => array(__FUNCTION__, $_action, $_scope, $_data_log),
  205. 'msg' => array('mysql_error', $e)
  206. );
  207. continue;
  208. }
  209. $_SESSION['return'][] = array(
  210. 'type' => 'success',
  211. 'log' => array(__FUNCTION__, $_action, $_scope, $_data_log),
  212. 'msg' => array('item_deleted',$prefid)
  213. );
  214. }
  215. break;
  216. case 'mailbox':
  217. if (!is_array($_data['prefid'])) {
  218. $prefids = array();
  219. $prefids[] = $_data['prefid'];
  220. }
  221. else {
  222. $prefids = $_data['prefid'];
  223. }
  224. foreach ($prefids as $prefid) {
  225. if (!is_numeric($prefid)) {
  226. $_SESSION['return'][] = array(
  227. 'type' => 'danger',
  228. 'log' => array(__FUNCTION__, $_action, $_scope, $_data_log),
  229. 'msg' => 'access_denied'
  230. );
  231. continue;
  232. }
  233. $stmt = $pdo->prepare("SELECT `object` FROM `filterconf` WHERE `prefid` = :prefid");
  234. $stmt->execute(array(':prefid' => $prefid));
  235. $object = $stmt->fetch(PDO::FETCH_ASSOC)['object'];
  236. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $object)) {
  237. $_SESSION['return'][] = array(
  238. 'type' => 'danger',
  239. 'log' => array(__FUNCTION__, $_action, $_scope, $_data_log),
  240. 'msg' => 'access_denied'
  241. );
  242. continue;
  243. }
  244. try {
  245. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :object AND `prefid` = :prefid");
  246. $stmt->execute(array(
  247. ':object' => $object,
  248. ':prefid' => $prefid
  249. ));
  250. }
  251. catch (PDOException $e) {
  252. $_SESSION['return'][] = array(
  253. 'type' => 'danger',
  254. 'log' => array(__FUNCTION__, $_action, $_scope, $_data_log),
  255. 'msg' => array('mysql_error', $e)
  256. );
  257. continue;
  258. }
  259. $_SESSION['return'][] = array(
  260. 'type' => 'success',
  261. 'log' => array(__FUNCTION__, $_action, $_scope, $_data_log),
  262. 'msg' => array('items_deleted', implode(', ', (array)$prefids))
  263. );
  264. }
  265. break;
  266. }
  267. break;
  268. case 'get':
  269. switch ($_scope) {
  270. case 'domain':
  271. if (!is_valid_domain_name($_data)) {
  272. return false;
  273. }
  274. else {
  275. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  276. return false;
  277. }
  278. $_data = idn_to_ascii(strtolower(trim($_data)), 0, INTL_IDNA_VARIANT_UTS46);
  279. }
  280. // WHITELIST
  281. $stmt = $pdo->prepare("SELECT `object`, `value`, `prefid` FROM `filterconf` WHERE `option`='whitelist_from' AND (`object` LIKE :object_mail OR `object` = :object_domain)");
  282. $stmt->execute(array(':object_mail' => '%@' . $_data, ':object_domain' => $_data));
  283. $rows['whitelist'] = $stmt->fetchAll(PDO::FETCH_ASSOC);
  284. // BLACKLIST
  285. $stmt = $pdo->prepare("SELECT `object`, `value`, `prefid` FROM `filterconf` WHERE `option`='blacklist_from' AND (`object` LIKE :object_mail OR `object` = :object_domain)");
  286. $stmt->execute(array(':object_mail' => '%@' . $_data, ':object_domain' => $_data));
  287. $rows['blacklist'] = $stmt->fetchAll(PDO::FETCH_ASSOC);
  288. return $rows;
  289. break;
  290. case 'mailbox':
  291. if (isset($_data) && filter_var($_data, FILTER_VALIDATE_EMAIL)) {
  292. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  293. return false;
  294. }
  295. }
  296. else {
  297. $_data = $_SESSION['mailcow_cc_username'];
  298. }
  299. $domain = mailbox('get', 'mailbox_details', $_data)['domain'];
  300. if (empty($domain)) {
  301. return false;
  302. }
  303. // WHITELIST
  304. $stmt = $pdo->prepare("SELECT `object`, `value`, `prefid` FROM `filterconf` WHERE `option`='whitelist_from' AND (`object` = :username OR `object` = :domain)");
  305. $stmt->execute(array(':username' => $_data, ':domain' => $domain));
  306. $rows['whitelist'] = $stmt->fetchAll(PDO::FETCH_ASSOC);
  307. // BLACKLIST
  308. $stmt = $pdo->prepare("SELECT `object`, `value`, `prefid` FROM `filterconf` WHERE `option`='blacklist_from' AND (`object` = :username OR `object` = :domain)");
  309. $stmt->execute(array(':username' => $_data, ':domain' => $domain));
  310. $rows['blacklist'] = $stmt->fetchAll(PDO::FETCH_ASSOC);
  311. return $rows;
  312. break;
  313. }
  314. break;
  315. }
  316. }