functions.customize.inc.php 5.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180
  1. <?php
  2. function customize($_action, $_item, $_data = null) {
  3. global $redis;
  4. global $lang;
  5. switch ($_action) {
  6. case 'add':
  7. if ($_SESSION['mailcow_cc_role'] != "admin") {
  8. $_SESSION['return'] = array(
  9. 'type' => 'danger',
  10. 'msg' => sprintf($lang['danger']['access_denied'])
  11. );
  12. return false;
  13. }
  14. switch ($_item) {
  15. case 'main_logo':
  16. if (in_array($_data['main_logo']['type'], array('image/gif', 'image/jpeg', 'image/pjpeg', 'image/x-png', 'image/png', 'image/svg+xml'))) {
  17. try {
  18. if (file_exists($_data['main_logo']['tmp_name']) !== true) {
  19. $_SESSION['return'] = array(
  20. 'type' => 'danger',
  21. 'msg' => 'Cannot validate image file: Temporary file not found'
  22. );
  23. return false;
  24. }
  25. $image = new Imagick($_data['main_logo']['tmp_name']);
  26. if ($image->valid() !== true) {
  27. $_SESSION['return'] = array(
  28. 'type' => 'danger',
  29. 'msg' => 'Cannot validate image file'
  30. );
  31. return false;
  32. }
  33. $image->destroy();
  34. }
  35. catch (ImagickException $e) {
  36. $image->destroy();
  37. $_SESSION['return'] = array(
  38. 'type' => 'danger',
  39. 'msg' => 'Cannot validate image file'
  40. );
  41. return false;
  42. }
  43. }
  44. else {
  45. $_SESSION['return'] = array(
  46. 'type' => 'danger',
  47. 'msg' => 'Invalid mime type'
  48. );
  49. return false;
  50. }
  51. try {
  52. $redis->Set('MAIN_LOGO', 'data:' . $_data['main_logo']['type'] . ';base64,' . base64_encode(file_get_contents($_data['main_logo']['tmp_name'])));
  53. }
  54. catch (RedisException $e) {
  55. $_SESSION['return'] = array(
  56. 'type' => 'danger',
  57. 'msg' => 'Redis: '.$e
  58. );
  59. return false;
  60. }
  61. $_SESSION['return'] = array(
  62. 'type' => 'success',
  63. 'msg' => 'File uploaded successfully'
  64. );
  65. break;
  66. }
  67. break;
  68. case 'edit':
  69. if ($_SESSION['mailcow_cc_role'] != "admin") {
  70. $_SESSION['return'] = array(
  71. 'type' => 'danger',
  72. 'msg' => sprintf($lang['danger']['access_denied'])
  73. );
  74. return false;
  75. }
  76. switch ($_item) {
  77. case 'app_links':
  78. $apps = (array)$_data['app'];
  79. $links = (array)$_data['href'];
  80. $out = array();
  81. if (count($apps) == count($links)) {;
  82. for ($i = 0; $i < count($apps); $i++) {
  83. $out[] = array($apps[$i] => $links[$i]);
  84. }
  85. try {
  86. $redis->set('APP_LINKS', json_encode($out));
  87. }
  88. catch (RedisException $e) {
  89. $_SESSION['return'] = array(
  90. 'type' => 'danger',
  91. 'msg' => 'Redis: '.$e
  92. );
  93. return false;
  94. }
  95. }
  96. $_SESSION['return'] = array(
  97. 'type' => 'success',
  98. 'msg' => 'Saved changes to app links'
  99. );
  100. break;
  101. }
  102. break;
  103. case 'delete':
  104. if ($_SESSION['mailcow_cc_role'] != "admin") {
  105. $_SESSION['return'] = array(
  106. 'type' => 'danger',
  107. 'msg' => sprintf($lang['danger']['access_denied'])
  108. );
  109. return false;
  110. }
  111. switch ($_item) {
  112. case 'main_logo':
  113. try {
  114. if ($redis->del('MAIN_LOGO')) {
  115. $_SESSION['return'] = array(
  116. 'type' => 'success',
  117. 'msg' => 'Reset default logo'
  118. );
  119. return true;
  120. }
  121. }
  122. catch (RedisException $e) {
  123. $_SESSION['return'] = array(
  124. 'type' => 'danger',
  125. 'msg' => 'Redis: '.$e
  126. );
  127. return false;
  128. }
  129. break;
  130. }
  131. break;
  132. case 'get':
  133. switch ($_item) {
  134. case 'app_links':
  135. try {
  136. $app_links = json_decode($redis->get('APP_LINKS'), true);
  137. }
  138. catch (RedisException $e) {
  139. $_SESSION['return'] = array(
  140. 'type' => 'danger',
  141. 'msg' => 'Redis: '.$e
  142. );
  143. return false;
  144. }
  145. return ($app_links) ? $app_links : false;
  146. break;
  147. case 'main_logo':
  148. try {
  149. return $redis->get('MAIN_LOGO');
  150. }
  151. catch (RedisException $e) {
  152. $_SESSION['return'] = array(
  153. 'type' => 'danger',
  154. 'msg' => 'Redis: '.$e
  155. );
  156. return false;
  157. }
  158. break;
  159. case 'main_logo_specs':
  160. try {
  161. $image = new Imagick();
  162. $img_data = explode('base64,', customize('get', 'main_logo'));
  163. if ($img_data[1]) {
  164. $image->readImageBlob(base64_decode($img_data[1]));
  165. }
  166. return $image->identifyImage();
  167. }
  168. catch (ImagickException $e) {
  169. $_SESSION['return'] = array(
  170. 'type' => 'danger',
  171. 'msg' => 'Error: Imagick exception while reading image'
  172. );
  173. return false;
  174. }
  175. break;
  176. }
  177. break;
  178. }
  179. }