functions.quarantine.inc.php 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311
  1. <?php
  2. function quarantine($_action, $_data = null) {
  3. global $pdo;
  4. global $redis;
  5. global $lang;
  6. $_data_log = $_data;
  7. switch ($_action) {
  8. case 'delete':
  9. if (!is_array($_data['id'])) {
  10. $ids = array();
  11. $ids[] = $_data['id'];
  12. }
  13. else {
  14. $ids = $_data['id'];
  15. }
  16. if (!isset($_SESSION['acl']['quarantine']) || $_SESSION['acl']['quarantine'] != "1" ) {
  17. $_SESSION['return'] = array(
  18. 'type' => 'danger',
  19. 'log' => array(__FUNCTION__, $_action, $_data_log),
  20. 'msg' => 'access_denied'
  21. );
  22. return false;
  23. }
  24. foreach ($ids as $id) {
  25. if (!is_numeric($id)) {
  26. $_SESSION['return'] = array(
  27. 'type' => 'danger',
  28. 'log' => array(__FUNCTION__, $_action, $_data_log),
  29. 'msg' => 'access_denied'
  30. );
  31. return false;
  32. }
  33. try {
  34. $stmt = $pdo->prepare('SELECT `rcpt` FROM `quarantine` WHERE `id` = :id');
  35. $stmt->execute(array(':id' => $id));
  36. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  37. if (hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $row['rcpt'])) {
  38. try {
  39. $stmt = $pdo->prepare("DELETE FROM `quarantine` WHERE `id` = :id");
  40. $stmt->execute(array(
  41. ':id' => $id
  42. ));
  43. }
  44. catch (PDOException $e) {
  45. $_SESSION['return'] = array(
  46. 'type' => 'danger',
  47. 'log' => array(__FUNCTION__, $_action, $_data_log),
  48. 'msg' => array('mysql_error', $e)
  49. );
  50. return false;
  51. }
  52. }
  53. else {
  54. $_SESSION['return'] = array(
  55. 'type' => 'danger',
  56. 'log' => array(__FUNCTION__, $_action, $_data_log),
  57. 'msg' => 'access_denied'
  58. );
  59. return false;
  60. }
  61. }
  62. catch(PDOException $e) {
  63. $_SESSION['return'] = array(
  64. 'type' => 'danger',
  65. 'log' => array(__FUNCTION__, $_action, $_data_log),
  66. 'msg' => array('mysql_error', $e)
  67. );
  68. }
  69. }
  70. $_SESSION['return'] = array(
  71. 'type' => 'success',
  72. 'log' => array(__FUNCTION__, $_action, $_data_log),
  73. 'msg' => array('items_deleted', implode(', ', $ids))
  74. );
  75. break;
  76. case 'edit':
  77. if (!isset($_SESSION['acl']['quarantine']) || $_SESSION['acl']['quarantine'] != "1" ) {
  78. $_SESSION['return'] = array(
  79. 'type' => 'danger',
  80. 'log' => array(__FUNCTION__, $_action, $_data_log),
  81. 'msg' => 'access_denied'
  82. );
  83. return false;
  84. }
  85. // Edit settings
  86. if ($_data['action'] == 'settings') {
  87. if ($_SESSION['mailcow_cc_role'] != "admin") {
  88. $_SESSION['return'] = array(
  89. 'type' => 'danger',
  90. 'log' => array(__FUNCTION__, $_action, $_data_log),
  91. 'msg' => 'access_denied'
  92. );
  93. return false;
  94. }
  95. $retention_size = $_data['retention_size'];
  96. $max_size = $_data['max_size'];
  97. $exclude_domains = (array)$_data['exclude_domains'];
  98. try {
  99. $redis->Set('Q_RETENTION_SIZE', intval($retention_size));
  100. $redis->Set('Q_MAX_SIZE', intval($max_size));
  101. $redis->Set('Q_EXCLUDE_DOMAINS', json_encode($exclude_domains));
  102. }
  103. catch (RedisException $e) {
  104. $_SESSION['return'] = array(
  105. 'type' => 'danger',
  106. 'log' => array(__FUNCTION__, $_action, $_data_log),
  107. 'msg' => array('redis_error', $e)
  108. );
  109. return false;
  110. }
  111. $_SESSION['return'] = array(
  112. 'type' => 'success',
  113. 'log' => array(__FUNCTION__, $_action, $_data_log),
  114. 'msg' => 'saved_settings'
  115. );
  116. }
  117. // Release item
  118. elseif ($_data['action'] == 'release') {
  119. if (!is_array($_data['id'])) {
  120. $ids = array();
  121. $ids[] = $_data['id'];
  122. }
  123. else {
  124. $ids = $_data['id'];
  125. }
  126. foreach ($ids as $id) {
  127. if (!is_numeric($id)) {
  128. $_SESSION['return'] = array(
  129. 'type' => 'danger',
  130. 'log' => array(__FUNCTION__, $_action, $_data_log),
  131. 'msg' => 'access_denied'
  132. );
  133. return false;
  134. }
  135. try {
  136. $stmt = $pdo->prepare('SELECT `msg`, `qid`, `sender`, `rcpt` FROM `quarantine` WHERE `id` = :id');
  137. $stmt->execute(array(':id' => $id));
  138. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  139. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $row['rcpt'])) {
  140. $_SESSION['return'] = array(
  141. 'type' => 'danger',
  142. 'msg' => 'access_denied'
  143. );
  144. return false;
  145. }
  146. }
  147. catch(PDOException $e) {
  148. $_SESSION['return'] = array(
  149. 'type' => 'danger',
  150. 'log' => array(__FUNCTION__, $_action, $_data_log),
  151. 'msg' => array('mysql_error', $e)
  152. );
  153. }
  154. $sender = (isset($row['sender'])) ? $row['sender'] : 'sender-unknown@rspamd';
  155. try {
  156. $mail = new PHPMailer(true);
  157. $mail->isSMTP();
  158. $mail->SMTPDebug = 0;
  159. $mail->SMTPOptions = array(
  160. 'ssl' => array(
  161. 'verify_peer' => false,
  162. 'verify_peer_name' => false,
  163. 'allow_self_signed' => true
  164. )
  165. );
  166. if (!empty(gethostbynamel('postfix-mailcow'))) {
  167. $postfix = 'postfix-mailcow';
  168. }
  169. if (!empty(gethostbynamel('postfix'))) {
  170. $postfix = 'postfix';
  171. }
  172. else {
  173. $_SESSION['return'] = array(
  174. 'type' => 'warning',
  175. 'log' => array(__FUNCTION__, $_action, $_data_log),
  176. 'msg' => array('release_send_failed', 'Cannot determine Postfix host')
  177. );
  178. return false;
  179. }
  180. $mail->Host = $postfix;
  181. $mail->Port = 590;
  182. $mail->setFrom($sender);
  183. $mail->CharSet = 'UTF-8';
  184. $mail->Subject = sprintf($lang['quarantine']['release_subject'], $row['qid']);
  185. $mail->addAddress($row['rcpt']);
  186. $mail->IsHTML(false);
  187. $msg_tmpf = tempnam("/tmp", $row['qid']);
  188. file_put_contents($msg_tmpf, $row['msg']);
  189. $mail->addAttachment($msg_tmpf, $row['qid'] . '.eml');
  190. $mail->Body = sprintf($lang['quarantine']['release_body']);
  191. $mail->send();
  192. unlink($msg_tmpf);
  193. }
  194. catch (phpmailerException $e) {
  195. unlink($msg_tmpf);
  196. $_SESSION['return'] = array(
  197. 'type' => 'warning',
  198. 'log' => array(__FUNCTION__, $_action, $_data_log),
  199. 'msg' => array('release_send_failed', $e->errorMessage())
  200. );
  201. return false;
  202. }
  203. try {
  204. $stmt = $pdo->prepare("DELETE FROM `quarantine` WHERE `id` = :id");
  205. $stmt->execute(array(
  206. ':id' => $id
  207. ));
  208. }
  209. catch (PDOException $e) {
  210. $_SESSION['return'] = array(
  211. 'type' => 'danger',
  212. 'log' => array(__FUNCTION__, $_action, $_data_log),
  213. 'msg' => array('mysql_error', $e)
  214. );
  215. return false;
  216. }
  217. }
  218. $_SESSION['return'] = array(
  219. 'type' => 'success',
  220. 'log' => array(__FUNCTION__, $_action, $_data_log),
  221. 'msg' => 'items_released'
  222. );
  223. }
  224. return true;
  225. break;
  226. case 'get':
  227. try {
  228. if ($_SESSION['mailcow_cc_role'] == "user") {
  229. $stmt = $pdo->prepare('SELECT `id`, `qid`, `rcpt`, `sender`, UNIX_TIMESTAMP(`created`) AS `created` FROM `quarantine` WHERE `rcpt` = :mbox');
  230. $stmt->execute(array(':mbox' => $_SESSION['mailcow_cc_username']));
  231. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  232. while($row = array_shift($rows)) {
  233. $q_meta[] = $row;
  234. }
  235. }
  236. elseif ($_SESSION['mailcow_cc_role'] == "admin") {
  237. $stmt = $pdo->query('SELECT `id`, `qid`, `rcpt`, `sender`, UNIX_TIMESTAMP(`created`) AS `created` FROM `quarantine`');
  238. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  239. while($row = array_shift($rows)) {
  240. $q_meta[] = $row;
  241. }
  242. }
  243. else {
  244. $domains = array_merge(mailbox('get', 'domains'), mailbox('get', 'alias_domains'));
  245. foreach ($domains as $domain) {
  246. $stmt = $pdo->prepare('SELECT `id`, `qid`, `rcpt`, `sender`, UNIX_TIMESTAMP(`created`) AS `created` FROM `quarantine` WHERE `rcpt` REGEXP :domain');
  247. $stmt->execute(array(':domain' => '@' . $domain . '$'));
  248. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  249. while($row = array_shift($rows)) {
  250. $q_meta[] = $row;
  251. }
  252. }
  253. }
  254. }
  255. catch(PDOException $e) {
  256. $_SESSION['return'] = array(
  257. 'type' => 'danger',
  258. 'log' => array(__FUNCTION__, $_action, $_data_log),
  259. 'msg' => array('mysql_error', $e)
  260. );
  261. }
  262. return $q_meta;
  263. break;
  264. case 'settings':
  265. if ($_SESSION['mailcow_cc_role'] != "admin") {
  266. $_SESSION['return'] = array(
  267. 'type' => 'danger',
  268. 'log' => array(__FUNCTION__, $_action, $_data_log),
  269. 'msg' => 'access_denied'
  270. );
  271. return false;
  272. }
  273. try {
  274. $settings['exclude_domains'] = json_decode($redis->Get('Q_EXCLUDE_DOMAINS'), true);
  275. $settings['max_size'] = $redis->Get('Q_MAX_SIZE');
  276. $settings['retention_size'] = $redis->Get('Q_RETENTION_SIZE');
  277. }
  278. catch (RedisException $e) {
  279. $_SESSION['return'] = array(
  280. 'type' => 'danger',
  281. 'log' => array(__FUNCTION__, $_action, $_data_log),
  282. 'msg' => array('redis_error', $e)
  283. );
  284. return false;
  285. }
  286. return $settings;
  287. break;
  288. case 'details':
  289. if (!is_numeric($_data) || empty($_data)) {
  290. return false;
  291. }
  292. try {
  293. $stmt = $pdo->prepare('SELECT `rcpt`, `symbols`, `msg`, `domain` FROM `quarantine` WHERE `id`= :id');
  294. $stmt->execute(array(':id' => $_data));
  295. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  296. if (hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $row['rcpt'])) {
  297. return $row;
  298. }
  299. return false;
  300. }
  301. catch(PDOException $e) {
  302. $_SESSION['return'] = array(
  303. 'type' => 'danger',
  304. 'log' => array(__FUNCTION__, $_action, $_data_log),
  305. 'msg' => array('mysql_error', $e)
  306. );
  307. }
  308. return false;
  309. break;
  310. }
  311. }