functions.customize.inc.php 5.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178
  1. <?php
  2. function customize($_action, $_item, $_data = null) {
  3. global $redis;
  4. global $lang;
  5. switch ($_action) {
  6. case 'add':
  7. if ($_SESSION['mailcow_cc_role'] != "admin") {
  8. $_SESSION['return'] = array(
  9. 'type' => 'danger',
  10. 'msg' => sprintf($lang['danger']['access_denied'])
  11. );
  12. return false;
  13. }
  14. switch ($_item) {
  15. case 'main_logo':
  16. if (in_array($_data['main_logo']['type'], array('image/gif', 'image/jpeg', 'image/pjpeg', 'image/x-png', 'image/png', 'image/svg+xml'))) {
  17. try {
  18. if (file_exists($_data['main_logo']['tmp_name']) !== true) {
  19. $_SESSION['return'] = array(
  20. 'type' => 'danger',
  21. 'msg' => 'Cannot validate image file: Temporary file not found'
  22. );
  23. return false;
  24. }
  25. $image = new Imagick($_data['main_logo']['tmp_name']);
  26. if ($image->valid() !== true) {
  27. $_SESSION['return'] = array(
  28. 'type' => 'danger',
  29. 'msg' => 'Cannot validate image file'
  30. );
  31. return false;
  32. }
  33. $image->destroy();
  34. }
  35. catch (ImagickException $e) {
  36. $_SESSION['return'] = array(
  37. 'type' => 'danger',
  38. 'msg' => 'Cannot validate image file'
  39. );
  40. return false;
  41. }
  42. }
  43. else {
  44. $_SESSION['return'] = array(
  45. 'type' => 'danger',
  46. 'msg' => 'Invalid mime type'
  47. );
  48. return false;
  49. }
  50. try {
  51. $redis->Set('MAIN_LOGO', 'data:' . $_data['main_logo']['type'] . ';base64,' . base64_encode(file_get_contents($_data['main_logo']['tmp_name'])));
  52. }
  53. catch (RedisException $e) {
  54. $_SESSION['return'] = array(
  55. 'type' => 'danger',
  56. 'msg' => 'Redis: '.$e
  57. );
  58. return false;
  59. }
  60. $_SESSION['return'] = array(
  61. 'type' => 'success',
  62. 'msg' => 'File uploaded successfully'
  63. );
  64. break;
  65. }
  66. break;
  67. case 'edit':
  68. if ($_SESSION['mailcow_cc_role'] != "admin") {
  69. $_SESSION['return'] = array(
  70. 'type' => 'danger',
  71. 'msg' => sprintf($lang['danger']['access_denied'])
  72. );
  73. return false;
  74. }
  75. switch ($_item) {
  76. case 'app_links':
  77. $apps = (array)$_data['app'];
  78. $links = (array)$_data['href'];
  79. $out = array();
  80. if (count($apps) == count($links)) {;
  81. for ($i = 0; $i < count($apps); $i++) {
  82. $out[] = array($apps[$i] => $links[$i]);
  83. }
  84. try {
  85. $redis->set('APP_LINKS', json_encode($out));
  86. }
  87. catch (RedisException $e) {
  88. $_SESSION['return'] = array(
  89. 'type' => 'danger',
  90. 'msg' => 'Redis: '.$e
  91. );
  92. return false;
  93. }
  94. }
  95. $_SESSION['return'] = array(
  96. 'type' => 'success',
  97. 'msg' => 'Saved changes to app links'
  98. );
  99. break;
  100. }
  101. break;
  102. case 'delete':
  103. if ($_SESSION['mailcow_cc_role'] != "admin") {
  104. $_SESSION['return'] = array(
  105. 'type' => 'danger',
  106. 'msg' => sprintf($lang['danger']['access_denied'])
  107. );
  108. return false;
  109. }
  110. switch ($_item) {
  111. case 'main_logo':
  112. try {
  113. if ($redis->del('MAIN_LOGO')) {
  114. $_SESSION['return'] = array(
  115. 'type' => 'success',
  116. 'msg' => 'Reset default logo'
  117. );
  118. return true;
  119. }
  120. }
  121. catch (RedisException $e) {
  122. $_SESSION['return'] = array(
  123. 'type' => 'danger',
  124. 'msg' => 'Redis: '.$e
  125. );
  126. return false;
  127. }
  128. break;
  129. }
  130. break;
  131. case 'get':
  132. switch ($_item) {
  133. case 'app_links':
  134. try {
  135. $app_links = json_decode($redis->get('APP_LINKS'), true);
  136. }
  137. catch (RedisException $e) {
  138. $_SESSION['return'] = array(
  139. 'type' => 'danger',
  140. 'msg' => 'Redis: '.$e
  141. );
  142. return false;
  143. }
  144. return ($app_links) ? $app_links : false;
  145. break;
  146. case 'main_logo':
  147. try {
  148. return $redis->get('MAIN_LOGO');
  149. }
  150. catch (RedisException $e) {
  151. $_SESSION['return'] = array(
  152. 'type' => 'danger',
  153. 'msg' => 'Redis: '.$e
  154. );
  155. return false;
  156. }
  157. break;
  158. case 'main_logo_specs':
  159. try {
  160. $image = new Imagick();
  161. $img_data = explode('base64,', customize('get', 'main_logo'));
  162. if ($img_data[1]) {
  163. $image->readImageBlob(base64_decode($img_data[1]));
  164. }
  165. return $image->identifyImage();
  166. }
  167. catch (ImagickException $e) {
  168. $_SESSION['return'] = array(
  169. 'type' => 'danger',
  170. 'msg' => 'Error: Imagick exception while reading image'
  171. );
  172. return false;
  173. }
  174. break;
  175. }
  176. break;
  177. }
  178. }