| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142 | <?phpfunction dkim_add_key($postarray) {	global $lang;	global $pdo;  if ($_SESSION['mailcow_cc_role'] != "admin") {    $_SESSION['return'] = array(      'type' => 'danger',      'msg' => sprintf($lang['danger']['access_denied'])    );    return false;  }  // if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {    // $_SESSION['return'] = array(      // 'type' => 'danger',      // 'msg' => sprintf($lang['danger']['access_denied'])    // );    // return false;  // }  $key_length	= intval($postarray['key_size']);  $domain	= $postarray['domain'];  if (!is_valid_domain_name($domain) || !is_numeric($key_length)) {    $_SESSION['return'] = array(      'type' => 'danger',      'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid'])    );    return false;  }  if (!empty(glob($GLOBALS['MC_DKIM_TXTS'] . '/' . $domain . '.dkim'))) {    $_SESSION['return'] = array(      'type' => 'danger',      'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid'])    );    return false;  }  $config = array(    "digest_alg" => "sha256",    "private_key_bits" => $key_length,    "private_key_type" => OPENSSL_KEYTYPE_RSA,  );  if ($keypair_ressource = openssl_pkey_new($config)) {    $key_details = openssl_pkey_get_details($keypair_ressource);    $pubKey = implode(array_slice(        array_filter(          explode(PHP_EOL, $key_details['key'])        ), 1, -1)      );    // Save public key to file    file_put_contents($GLOBALS['MC_DKIM_TXTS'] . '/' . $domain . '.dkim', $pubKey);    // Save private key to file    openssl_pkey_export_to_file($keypair_ressource, $GLOBALS['MC_DKIM_KEYS'] . '/' . $domain . '.dkim');    $_SESSION['return'] = array(      'type' => 'success',      'msg' => sprintf($lang['success']['dkim_added'])    );    return true;  }  else {    $_SESSION['return'] = array(      'type' => 'danger',      'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid'])    );    return false;  }}function dkim_get_key_details($domain) {  $data = array();  if (hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {    $dkim_pubkey_file = escapeshellarg($GLOBALS["MC_DKIM_TXTS"]. "/" . $domain . "." . "dkim");    if (file_exists(substr($dkim_pubkey_file, 1, -1))) {      $data['pubkey'] = file_get_contents($GLOBALS["MC_DKIM_TXTS"]. "/" . $domain . "." . "dkim");      $data['length'] = (strlen($data['pubkey']) < 391) ? 1024 : 2048;      $data['dkim_txt'] = 'v=DKIM1;k=rsa;t=s;s=email;p=' . file_get_contents($GLOBALS["MC_DKIM_TXTS"]. "/" . $domain . "." . "dkim");    }  }  return $data;}function dkim_get_blind_keys() {	global $lang;  if ($_SESSION['mailcow_cc_role'] != "admin") {    $_SESSION['return'] = array(      'type' => 'danger',      'msg' => sprintf($lang['danger']['access_denied'])    );    return false;  }  $domains = array();  $dnstxt_folder = scandir($GLOBALS["MC_DKIM_TXTS"]);  $dnstxt_files = array_diff($dnstxt_folder, array('.', '..'));  foreach($dnstxt_files as $file) {    $domains[] = substr($file, 0, -5);  }  return array_diff($domains, array_merge(mailbox_get_domains(), mailbox_get_alias_domains()));}function dkim_delete_key($postarray) {	global $lang;  $domain	= $postarray['domain'];  if ($_SESSION['mailcow_cc_role'] != "admin") {    $_SESSION['return'] = array(      'type' => 'danger',      'msg' => sprintf($lang['danger']['access_denied'])    );    return false;  }  // if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {    // $_SESSION['return'] = array(      // 'type' => 'danger',      // 'msg' => sprintf($lang['danger']['access_denied'])    // );    // return false;  // }  if (!is_valid_domain_name($domain)) {    $_SESSION['return'] = array(      'type' => 'danger',      'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid'])    );    return false;  }  exec('rm ' . escapeshellarg($GLOBALS['MC_DKIM_TXTS'] . '/' . $domain . '.dkim'), $out, $return);  if ($return != "0") {    $_SESSION['return'] = array(      'type' => 'danger',      'msg' => sprintf($lang['danger']['dkim_remove_failed'])    );    return false;  }  exec('rm ' . escapeshellarg($GLOBALS['MC_DKIM_KEYS'] . '/' . $domain . '.dkim'), $out, $return);  if ($return != "0") {    $_SESSION['return'] = array(      'type' => 'danger',      'msg' => sprintf($lang['danger']['dkim_remove_failed'])    );    return false;  }  $_SESSION['return'] = array(    'type' => 'success',    'msg' => sprintf($lang['success']['dkim_removed'])  );  return true;}
 |