diff options
author | Scott Ullrich <sullrich@pfsense.org> | 2006-02-08 03:48:51 +0000 |
---|---|---|
committer | Scott Ullrich <sullrich@pfsense.org> | 2006-02-08 03:48:51 +0000 |
commit | 5717163bffb113333fba51c2775cb07564a5b081 (patch) | |
tree | 42e962dc30ef09dbc233fcb5f93cf38272f7c697 /packages/spamd_db_ext.php | |
parent | c1b7f69001060481212be27196181f5cdcb49095 (diff) | |
download | pfsense-packages-5717163bffb113333fba51c2775cb07564a5b081.tar.gz pfsense-packages-5717163bffb113333fba51c2775cb07564a5b081.tar.bz2 pfsense-packages-5717163bffb113333fba51c2775cb07564a5b081.zip |
Add Outlook plugin config tab
Diffstat (limited to 'packages/spamd_db_ext.php')
-rw-r--r-- | packages/spamd_db_ext.php | 137 |
1 files changed, 137 insertions, 0 deletions
diff --git a/packages/spamd_db_ext.php b/packages/spamd_db_ext.php new file mode 100644 index 00000000..f94fc5b2 --- /dev/null +++ b/packages/spamd_db_ext.php @@ -0,0 +1,137 @@ +<?php +/* $Id$ */ +/* + spamd_db_ext.php + Copyright (C) 2006 Scott Ullrich + All rights reserved. + + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions are met: + + 1. Redistributions of source code must retain the above copyright notice, + this list of conditions and the following disclaimer. + + 2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + + THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, + INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY + AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE + AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, + OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF + SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS + INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN + CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE + POSSIBILITY OF SUCH DAMAGE. +*/ + +require("config.inc"); + +if($_GET['username']) + $username = $_GET['username']; +if($_GET['password']) + $password = $_GET['password']; +if($_POST['username']) + $username = $_POST['username']; +if($_POST['password']) + $password = $_POST['password']; + +foreach($config['installedpackages']['spamdoutlook']['config'] as $outlook) { + if($outlook['username'] <> $username) { + echo "550. INVALID USERNAME {$username}."; + exit; + } + if($outlook['password'] <> $password) { + echo "550. INVALID PASSWORD {$password}."; + exit; + } +} + +/* handle AJAX operations */ +if($_GET['action'] or $_POST['action']) { + /* echo back buttonid so it can be turned + * back off when request is completed. + */ + echo $_GET['buttonid'] . "|"; + if($_GET['action']) + $action = $_GET['action']; + if($_POST['action']) + $action = $_POST['action']; + if($_GET['srcip']) + $srcip = $_GET['srcip']; + if($_POST['srcip']) + $srcip = $_POST['srcip']; + /* execute spamdb command */ + if($action == "whitelist") { + exec("/usr/local/sbin/spamdb -a {$srcip}"); + } else if($action == "delete") { + exec("/usr/local/sbin/spamdb -d {$srcip}"); + exec("/usr/local/sbin/spamdb -d -T \"<{$srcip}>\""); + exec("/usr/local/sbin/spamdb -d -t \"<{$srcip}>\""); + } else if($action == "spamtrap") { + exec("/usr/local/sbin/spamdb -a {$srcip} -T"); + } else if($action == "trapped") { + exec("/usr/local/sbin/spamdb -a {$srcip} -t"); + } + /* signal a reload for real time effect. */ + mwexec("killall -HUP spamlogd"); + exit; +} + +/* spam trap e-mail address */ +if($_POST['spamtrapemail'] <> "") { + mwexec("/usr/local/sbin/spamdb -T -a \"<{$_POST['spamtrapemail']}>\""); + mwexec("killall -HUP spamlogd"); + $savemsg = $_POST['spamtrapemail'] . " added to spam trap database."; +} + +if($_GET['getstatus'] <> "") { + $status = exec("/usr/local/sbin/spamdb | grep \"{$_GET['getstatus']}\""); + if(stristr($status, "WHITE") == true) { + echo "WHITE"; + } else if(stristr($status, "TRAPPED") == true) { + echo "TRAPPED"; + } else if(stristr($status, "GREY") == true) { + echo "GREY"; + } else if(stristr($status, "SPAMTRAP") == true) { + echo "SPAMTRAP"; + } else { + echo "NOT FOUND"; + } + exit; +} + +/* spam trap e-mail address */ +if($_GET['spamtrapemail'] <> "") { + $status = exec("spamdb -T -a \"<{$_GET['spamtrapemail']}>\""); + mwexec("killall -HUP spamlogd"); + if($status) + echo $status; + else + echo $_POST['spamtrapemail'] . " added to spam trap database."; + exit; +} + +/* spam trap e-mail address */ +if($_GET['whitelist'] <> "") { + $status = exec("spamdb -a \"<{$_GET['spamtrapemail']}>\""); + mwexec("killall -HUP spamlogd"); + if($status) + echo $status; + else + echo $_POST['spamtrapemail'] . " added to whitelist database."; + exit; +} + +function basic_auth_prompt(){ + header("WWW-Authenticate: Basic realm=\".\""); + header("HTTP/1.0 401 Unauthorized"); + echo "You must enter valid credentials to access this resource."; + exit; +} + +exit; + +?>
\ No newline at end of file |