functions.pushover.inc.php 6.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175
  1. <?php
  2. function pushover($_action, $_data = null) {
  3. global $pdo;
  4. global $lang;
  5. switch ($_action) {
  6. case 'edit':
  7. if (!isset($_SESSION['acl']['pushover']) || $_SESSION['acl']['pushover'] != "1" ) {
  8. $_SESSION['return'][] = array(
  9. 'type' => 'danger',
  10. 'log' => array(__FUNCTION__, $_action, $_data),
  11. 'msg' => 'access_denied'
  12. );
  13. return false;
  14. }
  15. if (!is_array($_data['username'])) {
  16. $usernames = array();
  17. $usernames[] = $_data['username'];
  18. }
  19. else {
  20. $usernames = $_data['username'];
  21. }
  22. foreach ($usernames as $username) {
  23. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $username)) {
  24. $_SESSION['return'][] = array(
  25. 'type' => 'danger',
  26. 'log' => array(__FUNCTION__, $_action, $_data),
  27. 'msg' => 'access_denied'
  28. );
  29. continue;
  30. }
  31. $delete = $_data['delete'];
  32. if ($delete == "true") {
  33. $stmt = $pdo->prepare("DELETE FROM `pushover` WHERE `username` = :username");
  34. $stmt->execute(array(
  35. ':username' => $username
  36. ));
  37. $_SESSION['return'][] = array(
  38. 'type' => 'success',
  39. 'log' => array(__FUNCTION__, $_action, $_data, $_data),
  40. 'msg' => 'pushover_settings_edited'
  41. );
  42. continue;
  43. }
  44. $key = $_data['key'];
  45. $token = $_data['token'];
  46. if (!ctype_alnum($key) || strlen($key) != 30) {
  47. $_SESSION['return'][] = array(
  48. 'type' => 'danger',
  49. 'log' => array(__FUNCTION__, $_action, $_data, $_data),
  50. 'msg' => 'pushover_key'
  51. );
  52. continue;
  53. }
  54. if (!ctype_alnum($token) || strlen($token) != 30) {
  55. $_SESSION['return'][] = array(
  56. 'type' => 'danger',
  57. 'log' => array(__FUNCTION__, $_action, $_data, $_data),
  58. 'msg' => 'pushover_token'
  59. );
  60. continue;
  61. }
  62. $title = $_data['title'];
  63. $text = $_data['text'];
  64. $active = intval($_data['active']);
  65. $stmt = $pdo->prepare("REPLACE INTO `pushover` (`username`, `key`, `token`, `title`, `text`, `active`)
  66. VALUES (:username, :key, :token, :title, :text, :active)");
  67. $stmt->execute(array(
  68. ':username' => $username,
  69. ':key' => $key,
  70. ':token' => $token,
  71. ':title' => $title,
  72. ':text' => $text,
  73. ':active' => $active
  74. ));
  75. $_SESSION['return'][] = array(
  76. 'type' => 'success',
  77. 'log' => array(__FUNCTION__, $_action, $_data, $_data),
  78. 'msg' => 'pushover_settings_edited'
  79. );
  80. }
  81. break;
  82. case 'get':
  83. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  84. $_SESSION['return'][] = array(
  85. 'type' => 'danger',
  86. 'log' => array(__FUNCTION__, $_action, $_data),
  87. 'msg' => 'access_denied'
  88. );
  89. return false;
  90. }
  91. $stmt = $pdo->prepare("SELECT * FROM `pushover` WHERE `username` = :username");
  92. $stmt->execute(array(
  93. ':username' => $_data
  94. ));
  95. $data = $stmt->fetch(PDO::FETCH_ASSOC);
  96. if (empty($data)) {
  97. return false;
  98. }
  99. else {
  100. return $data;
  101. }
  102. break;
  103. case 'test':
  104. if (!isset($_SESSION['acl']['pushover']) || $_SESSION['acl']['pushover'] != "1" ) {
  105. $_SESSION['return'][] = array(
  106. 'type' => 'danger',
  107. 'log' => array(__FUNCTION__, $_action, $_data),
  108. 'msg' => 'access_denied'
  109. );
  110. return false;
  111. }
  112. if (!is_array($_data['username'])) {
  113. $usernames = array();
  114. $usernames[] = $_data['username'];
  115. }
  116. else {
  117. $usernames = $_data['username'];
  118. }
  119. foreach ($usernames as $username) {
  120. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $username)) {
  121. $_SESSION['return'][] = array(
  122. 'type' => 'danger',
  123. 'log' => array(__FUNCTION__, $_action, $_data),
  124. 'msg' => 'access_denied'
  125. );
  126. continue;
  127. }
  128. $stmt = $pdo->prepare("SELECT * FROM `pushover`
  129. WHERE `username` = :username");
  130. $stmt->execute(array(
  131. ':username' => $username
  132. ));
  133. $api_data = $stmt->fetch(PDO::FETCH_ASSOC);
  134. if (!empty($api_data)) {
  135. $title = (!empty($api_data['title'])) ? $api_data['title'] : 'Mail';
  136. $text = (!empty($api_data['text'])) ? $api_data['text'] : 'You\'ve got mail 📧';
  137. curl_setopt_array($ch = curl_init(), array(
  138. CURLOPT_URL => "https://api.pushover.net/1/users/validate.json",
  139. CURLOPT_POSTFIELDS => array(
  140. "token" => $api_data['token'],
  141. "user" => $api_data['key']
  142. ),
  143. CURLOPT_SAFE_UPLOAD => true,
  144. CURLOPT_RETURNTRANSFER => true,
  145. ));
  146. $result = curl_exec($ch);
  147. $httpcode = curl_getinfo($ch, CURLINFO_HTTP_CODE);
  148. curl_close($ch);
  149. if ($httpcode == 200) {
  150. $_SESSION['return'][] = array(
  151. 'type' => 'success',
  152. 'log' => array(__FUNCTION__, $_action, $_data),
  153. 'msg' => sprintf('Pushover API OK (%d): %s', $httpcode, $result)
  154. );
  155. }
  156. else {
  157. $_SESSION['return'][] = array(
  158. 'type' => 'danger',
  159. 'log' => array(__FUNCTION__, $_action, $_data),
  160. 'msg' => sprintf('Pushover API ERR (%d): %s', $httpcode, $result)
  161. );
  162. }
  163. }
  164. else {
  165. $_SESSION['return'][] = array(
  166. 'type' => 'danger',
  167. 'log' => array(__FUNCTION__, $_action, $_data),
  168. 'msg' => 'pushover_credentials_missing'
  169. );
  170. return false;
  171. }
  172. }
  173. break;
  174. }
  175. }