functions.address_rewriting.inc.php 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498
  1. <?php
  2. function bcc($_action, $_data = null, $attr = null) {
  3. global $pdo;
  4. global $lang;
  5. if ($_SESSION['mailcow_cc_role'] != "admin" && $_SESSION['mailcow_cc_role'] != "domainadmin") {
  6. return false;
  7. }
  8. switch ($_action) {
  9. case 'add':
  10. if (!isset($_SESSION['acl']['bcc_maps']) || $_SESSION['acl']['bcc_maps'] != "1" ) {
  11. $_SESSION['return'] = array(
  12. 'type' => 'danger',
  13. 'msg' => sprintf($lang['danger']['access_denied'])
  14. );
  15. return false;
  16. }
  17. $local_dest = strtolower(trim($_data['local_dest']));
  18. $bcc_dest = $_data['bcc_dest'];
  19. $active = intval($_data['active']);
  20. $type = $_data['type'];
  21. if ($type != 'sender' && $type != 'rcpt') {
  22. $_SESSION['return'] = array(
  23. 'type' => 'danger',
  24. 'msg' => 'Invalid BCC map type'
  25. );
  26. return false;
  27. }
  28. if (empty($bcc_dest)) {
  29. $_SESSION['return'] = array(
  30. 'type' => 'danger',
  31. 'msg' => 'BCC destination cannot be empty'
  32. );
  33. return false;
  34. }
  35. if (is_valid_domain_name($local_dest)) {
  36. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $local_dest)) {
  37. $_SESSION['return'] = array(
  38. 'type' => 'danger',
  39. 'msg' => sprintf($lang['danger']['access_denied'])
  40. );
  41. return false;
  42. }
  43. $domain = idn_to_ascii($local_dest);
  44. $local_dest_sane = '@' . idn_to_ascii($local_dest);
  45. }
  46. elseif (filter_var($local_dest, FILTER_VALIDATE_EMAIL)) {
  47. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $local_dest)) {
  48. $_SESSION['return'] = array(
  49. 'type' => 'danger',
  50. 'msg' => sprintf($lang['danger']['access_denied'])
  51. );
  52. return false;
  53. }
  54. $domain = mailbox('get', 'mailbox_details', $local_dest)['domain'];
  55. if (empty($domain)) {
  56. return false;
  57. }
  58. $local_dest_sane = $local_dest;
  59. }
  60. else {
  61. return false;
  62. }
  63. if (!filter_var($bcc_dest, FILTER_VALIDATE_EMAIL)) {
  64. $_SESSION['return'] = array(
  65. 'type' => 'danger',
  66. 'msg' => 'BCC map must be a valid email address'
  67. );
  68. return false;
  69. }
  70. try {
  71. $stmt = $pdo->prepare("SELECT `id` FROM `bcc_maps`
  72. WHERE `local_dest` = :local_dest AND `type` = :type");
  73. $stmt->execute(array(':local_dest' => $local_dest_sane, ':type' => $type));
  74. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  75. }
  76. catch(PDOException $e) {
  77. $_SESSION['return'] = array(
  78. 'type' => 'danger',
  79. 'msg' => 'MySQL: '.$e
  80. );
  81. return false;
  82. }
  83. if ($num_results != 0) {
  84. $_SESSION['return'] = array(
  85. 'type' => 'danger',
  86. 'msg' => 'A BCC map entry "' . htmlspecialchars($local_dest_sane) . '" exists for type "' . $type . '"'
  87. );
  88. return false;
  89. }
  90. try {
  91. $stmt = $pdo->prepare("INSERT INTO `bcc_maps` (`local_dest`, `bcc_dest`, `domain`, `active`, `type`) VALUES
  92. (:local_dest, :bcc_dest, :domain, :active, :type)");
  93. $stmt->execute(array(
  94. ':local_dest' => $local_dest_sane,
  95. ':bcc_dest' => $bcc_dest,
  96. ':domain' => $domain,
  97. ':active' => $active,
  98. ':type' => $type
  99. ));
  100. }
  101. catch (PDOException $e) {
  102. $_SESSION['return'] = array(
  103. 'type' => 'danger',
  104. 'msg' => 'MySQL: '.$e
  105. );
  106. return false;
  107. }
  108. $_SESSION['return'] = array(
  109. 'type' => 'success',
  110. 'msg' => 'BCC map entry saved'
  111. );
  112. break;
  113. case 'edit':
  114. if (!isset($_SESSION['acl']['bcc_maps']) || $_SESSION['acl']['bcc_maps'] != "1" ) {
  115. $_SESSION['return'] = array(
  116. 'type' => 'danger',
  117. 'msg' => sprintf($lang['danger']['access_denied'])
  118. );
  119. return false;
  120. }
  121. $ids = (array)$_data['id'];
  122. foreach ($ids as $id) {
  123. $is_now = bcc('details', $id);
  124. if (!empty($is_now)) {
  125. $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active_int'];
  126. $bcc_dest = (!empty($_data['bcc_dest'])) ? $_data['bcc_dest'] : $is_now['bcc_dest'];
  127. $local_dest = $is_now['local_dest'];
  128. $type = (!empty($_data['type'])) ? $_data['type'] : $is_now['type'];
  129. }
  130. else {
  131. $_SESSION['return'] = array(
  132. 'type' => 'danger',
  133. 'msg' => sprintf($lang['danger']['access_denied'])
  134. );
  135. return false;
  136. }
  137. $active = intval($_data['active']);
  138. if (!filter_var($bcc_dest, FILTER_VALIDATE_EMAIL)) {
  139. $_SESSION['return'] = array(
  140. 'type' => 'danger',
  141. 'msg' => 'BCC map must be a valid email address'
  142. );
  143. return false;
  144. }
  145. if (empty($bcc_dest)) {
  146. $_SESSION['return'] = array(
  147. 'type' => 'danger',
  148. 'msg' => 'BCC map destination cannot be empty'
  149. );
  150. return false;
  151. }
  152. try {
  153. $stmt = $pdo->prepare("SELECT `id` FROM `bcc_maps`
  154. WHERE `local_dest` = :local_dest AND `type` = :type");
  155. $stmt->execute(array(':local_dest' => $local_dest, ':type' => $type));
  156. $id_now = $stmt->fetch(PDO::FETCH_ASSOC)['id'];
  157. }
  158. catch(PDOException $e) {
  159. $_SESSION['return'] = array(
  160. 'type' => 'danger',
  161. 'msg' => 'MySQL: '.$e
  162. );
  163. return false;
  164. }
  165. if (isset($id_now) && $id_now != $id) {
  166. $_SESSION['return'] = array(
  167. 'type' => 'danger',
  168. 'msg' => 'A BCC map entry ' . htmlspecialchars($local_dest) . ' exists for this type'
  169. );
  170. return false;
  171. }
  172. try {
  173. $stmt = $pdo->prepare("UPDATE `bcc_maps` SET `bcc_dest` = :bcc_dest, `active` = :active, `type` = :type WHERE `id`= :id");
  174. $stmt->execute(array(
  175. ':bcc_dest' => $bcc_dest,
  176. ':active' => $active,
  177. ':type' => $type,
  178. ':id' => $id
  179. ));
  180. }
  181. catch (PDOException $e) {
  182. $_SESSION['return'] = array(
  183. 'type' => 'danger',
  184. 'msg' => 'MySQL: '.$e
  185. );
  186. return false;
  187. }
  188. }
  189. $_SESSION['return'] = array(
  190. 'type' => 'success',
  191. 'msg' => 'BCC map entry edited'
  192. );
  193. break;
  194. case 'details':
  195. $bccdata = array();
  196. $id = intval($_data);
  197. try {
  198. $stmt = $pdo->prepare("SELECT `id`,
  199. `local_dest`,
  200. `bcc_dest`,
  201. `active` AS `active_int`,
  202. CASE `active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`,
  203. `type`,
  204. `created`,
  205. `domain`,
  206. `modified` FROM `bcc_maps`
  207. WHERE `id` = :id");
  208. $stmt->execute(array(':id' => $id));
  209. $bccdata = $stmt->fetch(PDO::FETCH_ASSOC);
  210. }
  211. catch(PDOException $e) {
  212. $_SESSION['return'] = array(
  213. 'type' => 'danger',
  214. 'msg' => 'MySQL: '.$e
  215. );
  216. return false;
  217. }
  218. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $bccdata['domain'])) {
  219. $bccdata = null;
  220. return false;
  221. }
  222. return $bccdata;
  223. break;
  224. case 'get':
  225. $bccdata = array();
  226. $all_items = array();
  227. $id = intval($_data);
  228. try {
  229. $stmt = $pdo->query("SELECT `id`, `domain` FROM `bcc_maps`");
  230. $all_items = $stmt->fetchAll(PDO::FETCH_ASSOC);
  231. }
  232. catch(PDOException $e) {
  233. $_SESSION['return'] = array(
  234. 'type' => 'danger',
  235. 'msg' => 'MySQL: '.$e
  236. );
  237. return false;
  238. }
  239. foreach ($all_items as $i) {
  240. if (hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $i['domain'])) {
  241. $bccdata[] = $i['id'];
  242. }
  243. }
  244. $all_items = null;
  245. return $bccdata;
  246. break;
  247. case 'delete':
  248. $ids = (array)$_data['id'];
  249. foreach ($ids as $id) {
  250. if (!is_numeric($id)) {
  251. return false;
  252. }
  253. try {
  254. $stmt = $pdo->prepare("SELECT `domain` FROM `bcc_maps` WHERE id = :id");
  255. $stmt->execute(array(':id' => $id));
  256. $domain = $stmt->fetch(PDO::FETCH_ASSOC)['domain'];
  257. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  258. $_SESSION['return'] = array(
  259. 'type' => 'danger',
  260. 'msg' => sprintf($lang['danger']['access_denied'])
  261. );
  262. return false;
  263. }
  264. $stmt = $pdo->prepare("DELETE FROM `bcc_maps` WHERE `id`= :id");
  265. $stmt->execute(array(':id' => $id));
  266. }
  267. catch (PDOException $e) {
  268. $_SESSION['return'] = array(
  269. 'type' => 'danger',
  270. 'msg' => 'MySQL: '.$e
  271. );
  272. return false;
  273. }
  274. }
  275. $_SESSION['return'] = array(
  276. 'type' => 'success',
  277. 'msg' => 'Deleted BCC map id/s ' . implode(', ', $ids)
  278. );
  279. return true;
  280. break;
  281. }
  282. }
  283. function recipient_map($_action, $_data = null, $attr = null) {
  284. global $pdo;
  285. global $lang;
  286. if ($_SESSION['mailcow_cc_role'] != "admin") {
  287. return false;
  288. }
  289. switch ($_action) {
  290. case 'add':
  291. $old_dest = strtolower(trim($_data['recipient_map_old']));
  292. if (substr($old_dest, 0, 1) == '@') {
  293. $old_dest = substr($old_dest, 1);
  294. }
  295. $new_dest = strtolower(trim($_data['recipient_map_new']));
  296. $active = intval($_data['active']);
  297. if (is_valid_domain_name($old_dest)) {
  298. $old_dest_sane = '@' . idn_to_ascii($old_dest);
  299. }
  300. elseif (filter_var($old_dest, FILTER_VALIDATE_EMAIL)) {
  301. $old_dest_sane = $old_dest;
  302. }
  303. else {
  304. $_SESSION['return'] = array(
  305. 'type' => 'danger',
  306. 'msg' => sprintf($lang['danger']['invalid_recipient_map_old'], htmlspecialchars($old_dest))
  307. );
  308. return false;
  309. }
  310. if (!filter_var($new_dest, FILTER_VALIDATE_EMAIL)) {
  311. $_SESSION['return'] = array(
  312. 'type' => 'danger',
  313. 'msg' => sprintf($lang['danger']['invalid_recipient_map_new'], htmlspecialchars($new_dest))
  314. );
  315. return false;
  316. }
  317. $rmaps = recipient_map('get');
  318. foreach ($rmaps as $rmap) {
  319. $old_dests_existing[] = recipient_map('details', $rmap)['recipient_map_old'];
  320. }
  321. if (in_array($old_dest_sane, $old_dests_existing)) {
  322. $_SESSION['return'] = array(
  323. 'type' => 'danger',
  324. 'msg' => sprintf($lang['danger']['recipient_map_entry_exists'], htmlspecialchars($old_dest))
  325. );
  326. return false;
  327. }
  328. try {
  329. $stmt = $pdo->prepare("INSERT INTO `recipient_maps` (`old_dest`, `new_dest`, `active`) VALUES
  330. (:old_dest, :new_dest, :active)");
  331. $stmt->execute(array(
  332. ':old_dest' => $old_dest_sane,
  333. ':new_dest' => $new_dest,
  334. ':active' => $active
  335. ));
  336. }
  337. catch (PDOException $e) {
  338. $_SESSION['return'] = array(
  339. 'type' => 'danger',
  340. 'msg' => 'MySQL: '.$e
  341. );
  342. return false;
  343. }
  344. $_SESSION['return'] = array(
  345. 'type' => 'success',
  346. 'msg' => sprintf($lang['success']['recipient_map_entry_saved'], htmlspecialchars($old_dest_sane))
  347. );
  348. break;
  349. case 'edit':
  350. $ids = (array)$_data['id'];
  351. foreach ($ids as $id) {
  352. $is_now = recipient_map('details', $id);
  353. if (!empty($is_now)) {
  354. $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active_int'];
  355. $new_dest = (!empty($_data['recipient_map_new'])) ? $_data['recipient_map_new'] : $is_now['recipient_map_new'];
  356. $old_dest = (!empty($_data['recipient_map_old'])) ? $_data['recipient_map_old'] : $is_now['recipient_map_old'];
  357. if (substr($old_dest, 0, 1) == '@') {
  358. $old_dest = substr($old_dest, 1);
  359. }
  360. }
  361. else {
  362. $_SESSION['return'] = array(
  363. 'type' => 'danger',
  364. 'msg' => sprintf($lang['danger']['access_denied'])
  365. );
  366. return false;
  367. }
  368. if (is_valid_domain_name($old_dest)) {
  369. $old_dest_sane = '@' . idn_to_ascii($old_dest);
  370. }
  371. elseif (filter_var($old_dest, FILTER_VALIDATE_EMAIL)) {
  372. $old_dest_sane = $old_dest;
  373. }
  374. else {
  375. $_SESSION['return'] = array(
  376. 'type' => 'danger',
  377. 'msg' => sprintf($lang['danger']['invalid_recipient_map_old'], htmlspecialchars($old_dest))
  378. );
  379. return false;
  380. }
  381. $active = intval($_data['active']);
  382. if (!filter_var($new_dest, FILTER_VALIDATE_EMAIL)) {
  383. $_SESSION['return'] = array(
  384. 'type' => 'danger',
  385. 'msg' => sprintf($lang['danger']['invalid_recipient_map_new'], htmlspecialchars($new_dest))
  386. );
  387. return false;
  388. }
  389. $rmaps = recipient_map('get');
  390. foreach ($rmaps as $rmap) {
  391. $old_dests_existing[] = recipient_map('details', $rmap)['recipient_map_old'];
  392. }
  393. if (in_array($old_dest_sane, $old_dests_existing) &&
  394. recipient_map('details', $id)['recipient_map_old'] != $old_dest_sane) {
  395. $_SESSION['return'] = array(
  396. 'type' => 'danger',
  397. 'msg' => sprintf($lang['danger']['recipient_map_entry_exists'], htmlspecialchars($old_dest_sane))
  398. );
  399. return false;
  400. }
  401. try {
  402. $stmt = $pdo->prepare("UPDATE `recipient_maps` SET
  403. `old_dest` = :old_dest,
  404. `new_dest` = :new_dest,
  405. `active` = :active
  406. WHERE `id`= :id");
  407. $stmt->execute(array(
  408. ':old_dest' => $old_dest_sane,
  409. ':new_dest' => $new_dest,
  410. ':active' => $active,
  411. ':id' => $id
  412. ));
  413. }
  414. catch (PDOException $e) {
  415. $_SESSION['return'] = array(
  416. 'type' => 'danger',
  417. 'msg' => 'MySQL: '.$e
  418. );
  419. return false;
  420. }
  421. }
  422. $_SESSION['return'] = array(
  423. 'type' => 'success',
  424. 'msg' => sprintf($lang['success']['recipient_map_entry_saved'], htmlspecialchars($old_dest))
  425. );
  426. break;
  427. case 'details':
  428. $mapdata = array();
  429. $id = intval($_data);
  430. try {
  431. $stmt = $pdo->prepare("SELECT `id`,
  432. `old_dest` AS `recipient_map_old`,
  433. `new_dest` AS `recipient_map_new`,
  434. `active` AS `active_int`,
  435. CASE `active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`,
  436. `created`,
  437. `modified` FROM `recipient_maps`
  438. WHERE `id` = :id");
  439. $stmt->execute(array(':id' => $id));
  440. $mapdata = $stmt->fetch(PDO::FETCH_ASSOC);
  441. }
  442. catch(PDOException $e) {
  443. $_SESSION['return'] = array(
  444. 'type' => 'danger',
  445. 'msg' => 'MySQL: '.$e
  446. );
  447. return false;
  448. }
  449. return $mapdata;
  450. break;
  451. case 'get':
  452. $mapdata = array();
  453. $all_items = array();
  454. $id = intval($_data);
  455. try {
  456. $stmt = $pdo->query("SELECT `id` FROM `recipient_maps`");
  457. $all_items = $stmt->fetchAll(PDO::FETCH_ASSOC);
  458. }
  459. catch(PDOException $e) {
  460. $_SESSION['return'] = array(
  461. 'type' => 'danger',
  462. 'msg' => 'MySQL: '.$e
  463. );
  464. return false;
  465. }
  466. foreach ($all_items as $i) {
  467. $mapdata[] = $i['id'];
  468. }
  469. $all_items = null;
  470. return $mapdata;
  471. break;
  472. case 'delete':
  473. $ids = (array)$_data['id'];
  474. foreach ($ids as $id) {
  475. if (!is_numeric($id)) {
  476. return false;
  477. }
  478. try {
  479. $stmt = $pdo->prepare("DELETE FROM `recipient_maps` WHERE `id`= :id");
  480. $stmt->execute(array(':id' => $id));
  481. }
  482. catch (PDOException $e) {
  483. $_SESSION['return'] = array(
  484. 'type' => 'danger',
  485. 'msg' => 'MySQL: '.$e
  486. );
  487. return false;
  488. }
  489. }
  490. $_SESSION['return'] = array(
  491. 'type' => 'success',
  492. 'msg' => sprintf($lang['success']['recipient_map_entry_deleted'], htmlspecialchars($old_dest))
  493. );
  494. return true;
  495. break;
  496. }
  497. }