functions.transports.inc.php 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475
  1. <?php
  2. function relayhost($_action, $_data = null) {
  3. global $pdo;
  4. global $lang;
  5. $_data_log = $_data;
  6. switch ($_action) {
  7. case 'add':
  8. if ($_SESSION['mailcow_cc_role'] != "admin") {
  9. $_SESSION['return'][] = array(
  10. 'type' => 'danger',
  11. 'log' => array(__FUNCTION__, $_action, $_data_log),
  12. 'msg' => 'access_denied'
  13. );
  14. return false;
  15. }
  16. $hostname = trim($_data['hostname']);
  17. $username = str_replace(':', '\:', trim($_data['username']));
  18. $password = str_replace(':', '\:', trim($_data['password']));
  19. if (empty($hostname)) {
  20. $_SESSION['return'][] = array(
  21. 'type' => 'danger',
  22. 'log' => array(__FUNCTION__, $_action, $_data_log),
  23. 'msg' => array('invalid_host', htmlspecialchars($host))
  24. );
  25. return false;
  26. }
  27. try {
  28. $stmt = $pdo->prepare("INSERT INTO `relayhosts` (`hostname`, `username` ,`password`, `active`)
  29. VALUES (:hostname, :username, :password, :active)");
  30. $stmt->execute(array(
  31. ':hostname' => $hostname,
  32. ':username' => $username,
  33. ':password' => str_replace(':', '\:', $password),
  34. ':active' => '1'
  35. ));
  36. }
  37. catch (PDOException $e) {
  38. $_SESSION['return'][] = array(
  39. 'type' => 'danger',
  40. 'log' => array(__FUNCTION__, $_action, $_data_log),
  41. 'msg' => array('mysql_error', $e)
  42. );
  43. return false;
  44. }
  45. $_SESSION['return'][] = array(
  46. 'type' => 'success',
  47. 'log' => array(__FUNCTION__, $_action, $_data_log),
  48. 'msg' => array('relayhost_added', htmlspecialchars(implode(', ', $hosts)))
  49. );
  50. break;
  51. case 'edit':
  52. if ($_SESSION['mailcow_cc_role'] != "admin") {
  53. $_SESSION['return'][] = array(
  54. 'type' => 'danger',
  55. 'log' => array(__FUNCTION__, $_action, $_data_log),
  56. 'msg' => 'access_denied'
  57. );
  58. return false;
  59. }
  60. $ids = (array)$_data['id'];
  61. foreach ($ids as $id) {
  62. $is_now = relayhost('details', $id);
  63. if (!empty($is_now)) {
  64. $hostname = (!empty($_data['hostname'])) ? trim($_data['hostname']) : $is_now['hostname'];
  65. $username = (isset($_data['username'])) ? trim($_data['username']) : $is_now['username'];
  66. $password = (isset($_data['password'])) ? trim($_data['password']) : $is_now['password'];
  67. $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active_int'];
  68. }
  69. else {
  70. $_SESSION['return'][] = array(
  71. 'type' => 'danger',
  72. 'log' => array(__FUNCTION__, $_action, $_data_log),
  73. 'msg' => array('relayhost_invalid', $id)
  74. );
  75. continue;
  76. }
  77. try {
  78. $stmt = $pdo->prepare("UPDATE `relayhosts` SET
  79. `hostname` = :hostname,
  80. `username` = :username,
  81. `password` = :password,
  82. `active` = :active
  83. WHERE `id` = :id");
  84. $stmt->execute(array(
  85. ':id' => $id,
  86. ':hostname' => $hostname,
  87. ':username' => $username,
  88. ':password' => $password,
  89. ':active' => $active
  90. ));
  91. }
  92. catch (PDOException $e) {
  93. $_SESSION['return'][] = array(
  94. 'type' => 'danger',
  95. 'log' => array(__FUNCTION__, $_action, $_data_log),
  96. 'msg' => array('mysql_error', $e)
  97. );
  98. continue;
  99. }
  100. $_SESSION['return'][] = array(
  101. 'type' => 'success',
  102. 'log' => array(__FUNCTION__, $_action, $_data_log),
  103. 'msg' => array('object_modified', htmlspecialchars(implode(', ', $hostnames)))
  104. );
  105. }
  106. break;
  107. case 'delete':
  108. if ($_SESSION['mailcow_cc_role'] != "admin") {
  109. $_SESSION['return'][] = array(
  110. 'type' => 'danger',
  111. 'log' => array(__FUNCTION__, $_action, $_data_log),
  112. 'msg' => 'access_denied'
  113. );
  114. return false;
  115. }
  116. $ids = (array)$_data['id'];
  117. foreach ($ids as $id) {
  118. try {
  119. $stmt = $pdo->prepare("DELETE FROM `relayhosts` WHERE `id`= :id");
  120. $stmt->execute(array(':id' => $id));
  121. $stmt = $pdo->prepare("UPDATE `domain` SET `relayhost` = '0' WHERE `relayhost`= :id");
  122. $stmt->execute(array(':id' => $id));
  123. }
  124. catch (PDOException $e) {
  125. $_SESSION['return'][] = array(
  126. 'type' => 'danger',
  127. 'log' => array(__FUNCTION__, $_action, $_data_log),
  128. 'msg' => array('mysql_error', $e)
  129. );
  130. continue;
  131. }
  132. $_SESSION['return'][] = array(
  133. 'type' => 'success',
  134. 'log' => array(__FUNCTION__, $_action, $_data_log),
  135. 'msg' => array('relayhost_removed', htmlspecialchars($id))
  136. );
  137. }
  138. break;
  139. case 'get':
  140. if ($_SESSION['mailcow_cc_role'] != "admin") {
  141. return false;
  142. }
  143. $relayhosts = array();
  144. $stmt = $pdo->query("SELECT `id`, `hostname`, `username` FROM `relayhosts`");
  145. $relayhosts = $stmt->fetchAll(PDO::FETCH_ASSOC);
  146. return $relayhosts;
  147. break;
  148. case 'details':
  149. if ($_SESSION['mailcow_cc_role'] != "admin" || !isset($_data)) {
  150. return false;
  151. }
  152. $relayhostdata = array();
  153. $stmt = $pdo->prepare("SELECT `id`,
  154. `hostname`,
  155. `username`,
  156. `password`,
  157. `active` AS `active_int`,
  158. CONCAT(LEFT(`password`, 3), '...') AS `password_short`,
  159. CASE `active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`
  160. FROM `relayhosts`
  161. WHERE `id` = :id");
  162. $stmt->execute(array(':id' => $_data));
  163. $relayhostdata = $stmt->fetch(PDO::FETCH_ASSOC);
  164. if (!empty($relayhostdata)) {
  165. $stmt = $pdo->prepare("SELECT GROUP_CONCAT(`domain` SEPARATOR ', ') AS `used_by_domains` FROM `domain` WHERE `relayhost` = :id");
  166. $stmt->execute(array(':id' => $_data));
  167. $used_by_domains = $stmt->fetch(PDO::FETCH_ASSOC)['used_by_domains'];
  168. $used_by_domains = (empty($used_by_domains)) ? '' : $used_by_domains;
  169. $relayhostdata['used_by_domains'] = $used_by_domains;
  170. }
  171. return $relayhostdata;
  172. break;
  173. }
  174. }
  175. function transport($_action, $_data = null) {
  176. global $pdo;
  177. global $lang;
  178. $_data_log = $_data;
  179. switch ($_action) {
  180. case 'add':
  181. if ($_SESSION['mailcow_cc_role'] != "admin") {
  182. $_SESSION['return'][] = array(
  183. 'type' => 'danger',
  184. 'log' => array(__FUNCTION__, $_action, $_data_log),
  185. 'msg' => 'access_denied'
  186. );
  187. return false;
  188. }
  189. $destinations = array_map('trim', preg_split( "/( |,|;|\n)/", $_data['destination']));
  190. $active = intval($_data['active']);
  191. $lookup_mx = intval($_data['lookup_mx']);
  192. $nexthop = trim($_data['nexthop']);
  193. preg_match('/\[(.+)\].*/', $nexthop, $next_hop_matches);
  194. $next_hop_clean = (isset($next_hop_matches[1])) ? $next_hop_matches[1] : $nexthop;
  195. $username = str_replace(':', '\:', trim($_data['username']));
  196. $password = str_replace(':', '\:', trim($_data['password']));
  197. if (empty($nexthop)) {
  198. $_SESSION['return'][] = array(
  199. 'type' => 'danger',
  200. 'log' => array(__FUNCTION__, $_action, $_data_log),
  201. 'msg' => array('invalid_nexthop')
  202. );
  203. return false;
  204. }
  205. $transports = transport('get');
  206. if (!empty($transports)) {
  207. foreach ($transports as $transport) {
  208. $transport_data = transport('details', $transport['id']);
  209. $existing_nh[] = $transport_data['nexthop'];
  210. preg_match('/\[(.+)\].*/', $transport_data['nexthop'], $existing_clean_nh[]);
  211. if (($transport_data['nexthop'] == $nexthop || $transport_data['nexthop'] == $next_hop_clean) && $transport_data['username'] != $username) {
  212. $_SESSION['return'][] = array(
  213. 'type' => 'danger',
  214. 'log' => array(__FUNCTION__, $_action, $_data_log),
  215. 'msg' => 'invalid_nexthop_authenticated'
  216. );
  217. return false;
  218. }
  219. foreach ($destinations as $d_ix => &$dest) {
  220. if (empty($dest)) {
  221. unset($destinations[$d_ix]);
  222. continue;
  223. }
  224. if ($transport_data['destination'] == $dest) {
  225. $_SESSION['return'][] = array(
  226. 'type' => 'danger',
  227. 'log' => array(__FUNCTION__, $_action, $_data_log),
  228. 'msg' => array('transport_dest_exists', $dest)
  229. );
  230. unset($destinations[$d_ix]);
  231. continue;
  232. }
  233. // ".domain" is a valid destination, "..domain" is not
  234. if (empty($dest) || (is_valid_domain_name(preg_replace('/^' . preg_quote('.', '/') . '/', '', $dest)) === false && $dest != '*' && filter_var($dest, FILTER_VALIDATE_EMAIL) === false)) {
  235. $_SESSION['return'][] = array(
  236. 'type' => 'danger',
  237. 'log' => array(__FUNCTION__, $_action, $_data_log),
  238. 'msg' => array('invalid_destination', $dest)
  239. );
  240. unset($destinations[$d_ix]);
  241. continue;
  242. }
  243. }
  244. }
  245. }
  246. $destinations = array_values($destinations);
  247. if (empty($destinations)) { return false; }
  248. if (isset($next_hop_matches[1])) {
  249. if (in_array($next_hop_clean, $existing_nh)) {
  250. $_SESSION['return'][] = array(
  251. 'type' => 'danger',
  252. 'log' => array(__FUNCTION__, $_action, $_data_log),
  253. 'msg' => array('next_hop_interferes', $next_hop_clean, $nexthop)
  254. );
  255. return false;
  256. }
  257. }
  258. else {
  259. foreach ($existing_clean_nh as $existing_clean_nh_each) {
  260. if ($existing_clean_nh_each[1] == $nexthop) {
  261. $_SESSION['return'][] = array(
  262. 'type' => 'danger',
  263. 'log' => array(__FUNCTION__, $_action, $_data_log),
  264. 'msg' => array('next_hop_interferes_any', $nexthop)
  265. );
  266. return false;
  267. }
  268. }
  269. }
  270. foreach ($destinations as $insert_dest) {
  271. $stmt = $pdo->prepare("INSERT INTO `transports` (`nexthop`, `destination`, `username` , `password`, `lookup_mx`, `active`)
  272. VALUES (:nexthop, :destination, :username, :password, :lookup_mx, :active)");
  273. $stmt->execute(array(
  274. ':nexthop' => $nexthop,
  275. ':destination' => $insert_dest,
  276. ':username' => $username,
  277. ':password' => str_replace(':', '\:', $password),
  278. ':lookup_mx' => $lookup_mx,
  279. ':active' => $active
  280. ));
  281. }
  282. $stmt = $pdo->prepare("UPDATE `transports` SET
  283. `username` = :username,
  284. `password` = :password
  285. WHERE `nexthop` = :nexthop");
  286. $stmt->execute(array(
  287. ':nexthop' => $nexthop,
  288. ':username' => $username,
  289. ':password' => $password
  290. ));
  291. $_SESSION['return'][] = array(
  292. 'type' => 'success',
  293. 'log' => array(__FUNCTION__, $_action, $_data_log),
  294. 'msg' => array('relayhost_added', htmlspecialchars(implode(', ', $hosts)))
  295. );
  296. break;
  297. case 'edit':
  298. if ($_SESSION['mailcow_cc_role'] != "admin") {
  299. $_SESSION['return'][] = array(
  300. 'type' => 'danger',
  301. 'log' => array(__FUNCTION__, $_action, $_data_log),
  302. 'msg' => 'access_denied'
  303. );
  304. return false;
  305. }
  306. $ids = (array)$_data['id'];
  307. foreach ($ids as $id) {
  308. $is_now = transport('details', $id);
  309. if (!empty($is_now)) {
  310. $destination = (!empty($_data['destination'])) ? trim($_data['destination']) : $is_now['destination'];
  311. $nexthop = (!empty($_data['nexthop'])) ? trim($_data['nexthop']) : $is_now['nexthop'];
  312. $username = (isset($_data['username'])) ? trim($_data['username']) : $is_now['username'];
  313. $password = (isset($_data['password'])) ? trim($_data['password']) : $is_now['password'];
  314. $lookup_mx = (isset($_data['lookup_mx']) && $_data['lookup_mx'] != '') ? intval($_data['lookup_mx']) : $is_now['lookup_mx_int'];
  315. $active = (isset($_data['active']) && $_data['active'] != '') ? intval($_data['active']) : $is_now['active_int'];
  316. }
  317. else {
  318. $_SESSION['return'][] = array(
  319. 'type' => 'danger',
  320. 'log' => array(__FUNCTION__, $_action, $_data_log),
  321. 'msg' => array('relayhost_invalid', $id)
  322. );
  323. continue;
  324. }
  325. preg_match('/\[(.+)\].*/', $nexthop, $next_hop_matches);
  326. $next_hop_clean = (isset($next_hop_matches[1])) ? $next_hop_matches[1] : $nexthop;
  327. $transports = transport('get');
  328. if (!empty($transports)) {
  329. foreach ($transports as $transport) {
  330. $transport_data = transport('details', $transport['id']);
  331. if ($transport['id'] == $id) {
  332. continue;
  333. }
  334. $existing_nh[] = $transport_data['nexthop'];
  335. preg_match('/\[(.+)\].*/', $transport_data['nexthop'], $existing_clean_nh[]);
  336. if ($transport_data['destination'] == $destination) {
  337. $_SESSION['return'][] = array(
  338. 'type' => 'danger',
  339. 'log' => array(__FUNCTION__, $_action, $_data_log),
  340. 'msg' => 'transport_dest_exists'
  341. );
  342. return false;
  343. }
  344. }
  345. }
  346. if (isset($next_hop_matches[1])) {
  347. if (in_array($next_hop_clean, $existing_nh)) {
  348. $_SESSION['return'][] = array(
  349. 'type' => 'danger',
  350. 'log' => array(__FUNCTION__, $_action, $_data_log),
  351. 'msg' => array('next_hop_interferes', $next_hop_clean, $nexthop)
  352. );
  353. return false;
  354. }
  355. }
  356. else {
  357. foreach ($existing_clean_nh as $existing_clean_nh_each) {
  358. if ($existing_clean_nh_each[1] == $nexthop) {
  359. $_SESSION['return'][] = array(
  360. 'type' => 'danger',
  361. 'log' => array(__FUNCTION__, $_action, $_data_log),
  362. 'msg' => array('next_hop_interferes_any', $nexthop)
  363. );
  364. return false;
  365. }
  366. }
  367. }
  368. if (empty($username)) {
  369. $password = '';
  370. }
  371. try {
  372. $stmt = $pdo->prepare("UPDATE `transports` SET
  373. `destination` = :destination,
  374. `nexthop` = :nexthop,
  375. `username` = :username,
  376. `password` = :password,
  377. `lookup_mx` = :lookup_mx,
  378. `active` = :active
  379. WHERE `id` = :id");
  380. $stmt->execute(array(
  381. ':id' => $id,
  382. ':destination' => $destination,
  383. ':nexthop' => $nexthop,
  384. ':username' => $username,
  385. ':password' => $password,
  386. ':lookup_mx' => $lookup_mx,
  387. ':active' => $active
  388. ));
  389. $stmt = $pdo->prepare("UPDATE `transports` SET
  390. `username` = :username,
  391. `password` = :password
  392. WHERE `nexthop` = :nexthop");
  393. $stmt->execute(array(
  394. ':nexthop' => $nexthop,
  395. ':username' => $username,
  396. ':password' => $password
  397. ));
  398. }
  399. catch (PDOException $e) {
  400. $_SESSION['return'][] = array(
  401. 'type' => 'danger',
  402. 'log' => array(__FUNCTION__, $_action, $_data_log),
  403. 'msg' => array('mysql_error', $e)
  404. );
  405. continue;
  406. }
  407. $_SESSION['return'][] = array(
  408. 'type' => 'success',
  409. 'log' => array(__FUNCTION__, $_action, $_data_log),
  410. 'msg' => array('object_modified', htmlspecialchars(implode(', ', $hostnames)))
  411. );
  412. }
  413. break;
  414. case 'delete':
  415. if ($_SESSION['mailcow_cc_role'] != "admin") {
  416. $_SESSION['return'][] = array(
  417. 'type' => 'danger',
  418. 'log' => array(__FUNCTION__, $_action, $_data_log),
  419. 'msg' => 'access_denied'
  420. );
  421. return false;
  422. }
  423. $ids = (array)$_data['id'];
  424. foreach ($ids as $id) {
  425. try {
  426. $stmt = $pdo->prepare("DELETE FROM `transports` WHERE `id`= :id");
  427. $stmt->execute(array(':id' => $id));
  428. }
  429. catch (PDOException $e) {
  430. $_SESSION['return'][] = array(
  431. 'type' => 'danger',
  432. 'log' => array(__FUNCTION__, $_action, $_data_log),
  433. 'msg' => array('mysql_error', $e)
  434. );
  435. continue;
  436. }
  437. $_SESSION['return'][] = array(
  438. 'type' => 'success',
  439. 'log' => array(__FUNCTION__, $_action, $_data_log),
  440. 'msg' => array('relayhost_removed', htmlspecialchars($id))
  441. );
  442. }
  443. break;
  444. case 'get':
  445. if ($_SESSION['mailcow_cc_role'] != "admin") {
  446. return false;
  447. }
  448. $transports = array();
  449. $stmt = $pdo->query("SELECT `id`, `destination`, `nexthop`, `username` FROM `transports`");
  450. $transports = $stmt->fetchAll(PDO::FETCH_ASSOC);
  451. return $transports;
  452. break;
  453. case 'details':
  454. if ($_SESSION['mailcow_cc_role'] != "admin" || !isset($_data)) {
  455. return false;
  456. }
  457. $transportdata = array();
  458. $stmt = $pdo->prepare("SELECT `id`,
  459. `destination`,
  460. `nexthop`,
  461. `username`,
  462. `password`,
  463. `active` AS `active_int`,
  464. `lookup_mx` AS `lookup_mx_int`,
  465. CONCAT(LEFT(`password`, 3), '...') AS `password_short`,
  466. CASE `active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`,
  467. CASE `lookup_mx` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `lookup_mx`
  468. FROM `transports`
  469. WHERE `id` = :id");
  470. $stmt->execute(array(':id' => $_data));
  471. $transportdata = $stmt->fetch(PDO::FETCH_ASSOC);
  472. return $transportdata;
  473. break;
  474. }
  475. }