|
@@ -1,407 +1,468 @@
|
|
-<?php
|
|
|
|
-function domain_admin($_action, $_data = null) {
|
|
|
|
- global $pdo;
|
|
|
|
- global $lang;
|
|
|
|
- $_data_log = $_data;
|
|
|
|
- !isset($_data_log['password']) ?: $_data_log['password'] = '*';
|
|
|
|
- !isset($_data_log['password2']) ?: $_data_log['password2'] = '*';
|
|
|
|
- !isset($_data_log['user_old_pass']) ?: $_data_log['user_old_pass'] = '*';
|
|
|
|
- !isset($_data_log['user_new_pass']) ?: $_data_log['user_new_pass'] = '*';
|
|
|
|
- !isset($_data_log['user_new_pass2']) ?: $_data_log['user_new_pass2'] = '*';
|
|
|
|
- switch ($_action) {
|
|
|
|
- case 'add':
|
|
|
|
- $username = strtolower(trim($_data['username']));
|
|
|
|
- $password = $_data['password'];
|
|
|
|
- $password2 = $_data['password2'];
|
|
|
|
- $domains = (array)$_data['domains'];
|
|
|
|
- $active = intval($_data['active']);
|
|
|
|
- if ($_SESSION['mailcow_cc_role'] != "admin") {
|
|
|
|
- $_SESSION['return'][] = array(
|
|
|
|
- 'type' => 'danger',
|
|
|
|
- 'log' => array(__FUNCTION__, $_action, $_data_log),
|
|
|
|
- 'msg' => 'access_denied'
|
|
|
|
- );
|
|
|
|
- return false;
|
|
|
|
- }
|
|
|
|
- if (empty($domains)) {
|
|
|
|
- $_SESSION['return'][] = array(
|
|
|
|
- 'type' => 'danger',
|
|
|
|
- 'log' => array(__FUNCTION__, $_action, $_data_log),
|
|
|
|
- 'msg' => 'domain_invalid'
|
|
|
|
- );
|
|
|
|
- return false;
|
|
|
|
- }
|
|
|
|
- if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username)) || empty ($username) || $username == 'API') {
|
|
|
|
- $_SESSION['return'][] = array(
|
|
|
|
- 'type' => 'danger',
|
|
|
|
- 'log' => array(__FUNCTION__, $_action, $_data_log),
|
|
|
|
- 'msg' => array('username_invalid', $username)
|
|
|
|
- );
|
|
|
|
- return false;
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- $stmt = $pdo->prepare("SELECT `username` FROM `mailbox`
|
|
|
|
- WHERE `username` = :username");
|
|
|
|
- $stmt->execute(array(':username' => $username));
|
|
|
|
- $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
|
|
|
|
-
|
|
|
|
- $stmt = $pdo->prepare("SELECT `username` FROM `admin`
|
|
|
|
- WHERE `username` = :username");
|
|
|
|
- $stmt->execute(array(':username' => $username));
|
|
|
|
- $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
|
|
|
|
-
|
|
|
|
- $stmt = $pdo->prepare("SELECT `username` FROM `domain_admins`
|
|
|
|
- WHERE `username` = :username");
|
|
|
|
- $stmt->execute(array(':username' => $username));
|
|
|
|
- $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
|
|
|
|
-
|
|
|
|
- foreach ($num_results as $num_results_each) {
|
|
|
|
- if ($num_results_each != 0) {
|
|
|
|
- $_SESSION['return'][] = array(
|
|
|
|
- 'type' => 'danger',
|
|
|
|
- 'log' => array(__FUNCTION__, $_action, $_data_log),
|
|
|
|
- 'msg' => array('object_exists', htmlspecialchars($username))
|
|
|
|
- );
|
|
|
|
- return false;
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
- if (password_check($password, $password2) !== true) {
|
|
|
|
- continue;
|
|
|
|
- }
|
|
|
|
- $password_hashed = hash_password($password);
|
|
|
|
- $valid_domains = 0;
|
|
|
|
- foreach ($domains as $domain) {
|
|
|
|
- if (!is_valid_domain_name($domain) || mailbox('get', 'domain_details', $domain) === false) {
|
|
|
|
- $_SESSION['return'][] = array(
|
|
|
|
- 'type' => 'danger',
|
|
|
|
- 'log' => array(__FUNCTION__, $_action, $_data_log),
|
|
|
|
- 'msg' => array('domain_invalid', htmlspecialchars($domain))
|
|
|
|
- );
|
|
|
|
- continue;
|
|
|
|
- }
|
|
|
|
- $valid_domains++;
|
|
|
|
- $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
|
|
|
|
- VALUES (:username, :domain, :created, :active)");
|
|
|
|
- $stmt->execute(array(
|
|
|
|
- ':username' => $username,
|
|
|
|
- ':domain' => $domain,
|
|
|
|
- ':created' => date('Y-m-d H:i:s'),
|
|
|
|
- ':active' => $active
|
|
|
|
- ));
|
|
|
|
- }
|
|
|
|
- if ($valid_domains != 0) {
|
|
|
|
- $stmt = $pdo->prepare("INSERT INTO `admin` (`username`, `password`, `superadmin`, `active`)
|
|
|
|
- VALUES (:username, :password_hashed, '0', :active)");
|
|
|
|
- $stmt->execute(array(
|
|
|
|
- ':username' => $username,
|
|
|
|
- ':password_hashed' => $password_hashed,
|
|
|
|
- ':active' => $active
|
|
|
|
- ));
|
|
|
|
- }
|
|
|
|
- $stmt = $pdo->prepare("INSERT INTO `da_acl` (`username`) VALUES (:username)");
|
|
|
|
- $stmt->execute(array(
|
|
|
|
- ':username' => $username
|
|
|
|
- ));
|
|
|
|
- $_SESSION['return'][] = array(
|
|
|
|
- 'type' => 'success',
|
|
|
|
- 'log' => array(__FUNCTION__, $_action, $_data_log),
|
|
|
|
- 'msg' => array('domain_admin_added', htmlspecialchars($username))
|
|
|
|
- );
|
|
|
|
- break;
|
|
|
|
- case 'edit':
|
|
|
|
- if ($_SESSION['mailcow_cc_role'] != "admin" && $_SESSION['mailcow_cc_role'] != "domainadmin") {
|
|
|
|
- $_SESSION['return'][] = array(
|
|
|
|
- 'type' => 'danger',
|
|
|
|
- 'log' => array(__FUNCTION__, $_action, $_data_log),
|
|
|
|
- 'msg' => 'access_denied'
|
|
|
|
- );
|
|
|
|
- return false;
|
|
|
|
- }
|
|
|
|
- // Administrator
|
|
|
|
- if ($_SESSION['mailcow_cc_role'] == "admin") {
|
|
|
|
- if (!is_array($_data['username'])) {
|
|
|
|
- $usernames = array();
|
|
|
|
- $usernames[] = $_data['username'];
|
|
|
|
- }
|
|
|
|
- else {
|
|
|
|
- $usernames = $_data['username'];
|
|
|
|
- }
|
|
|
|
- foreach ($usernames as $username) {
|
|
|
|
- $is_now = domain_admin('details', $username);
|
|
|
|
- $domains = (isset($_data['domains'])) ? (array)$_data['domains'] : null;
|
|
|
|
- if (!empty($is_now)) {
|
|
|
|
- $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active'];
|
|
|
|
- $domains = (!empty($domains)) ? $domains : $is_now['selected_domains'];
|
|
|
|
- $username_new = (!empty($_data['username_new'])) ? $_data['username_new'] : $is_now['username'];
|
|
|
|
- }
|
|
|
|
- else {
|
|
|
|
- $_SESSION['return'][] = array(
|
|
|
|
- 'type' => 'danger',
|
|
|
|
- 'log' => array(__FUNCTION__, $_action, $_data_log),
|
|
|
|
- 'msg' => 'access_denied'
|
|
|
|
- );
|
|
|
|
- continue;
|
|
|
|
- }
|
|
|
|
- $password = $_data['password'];
|
|
|
|
- $password2 = $_data['password2'];
|
|
|
|
- if (!empty($domains)) {
|
|
|
|
- foreach ($domains as $domain) {
|
|
|
|
- if (!is_valid_domain_name($domain) || mailbox('get', 'domain_details', $domain) === false) {
|
|
|
|
- $_SESSION['return'][] = array(
|
|
|
|
- 'type' => 'danger',
|
|
|
|
- 'log' => array(__FUNCTION__, $_action, $_data_log),
|
|
|
|
- 'msg' => array('domain_invalid', htmlspecialchars($domain))
|
|
|
|
- );
|
|
|
|
- continue 2;
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
- if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username_new))) {
|
|
|
|
- $_SESSION['return'][] = array(
|
|
|
|
- 'type' => 'danger',
|
|
|
|
- 'log' => array(__FUNCTION__, $_action, $_data_log),
|
|
|
|
- 'msg' => array('username_invalid', $username_new)
|
|
|
|
- );
|
|
|
|
- continue;
|
|
|
|
- }
|
|
|
|
- if ($username_new != $username) {
|
|
|
|
- if (!empty(domain_admin('details', $username_new)['username'])) {
|
|
|
|
- $_SESSION['return'][] = array(
|
|
|
|
- 'type' => 'danger',
|
|
|
|
- 'log' => array(__FUNCTION__, $_action, $_data_log),
|
|
|
|
- 'msg' => array('username_invalid', $username_new)
|
|
|
|
- );
|
|
|
|
- continue;
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
- $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
|
|
|
|
- $stmt->execute(array(
|
|
|
|
- ':username' => $username,
|
|
|
|
- ));
|
|
|
|
- $stmt = $pdo->prepare("UPDATE `da_acl` SET `username` = :username_new WHERE `username` = :username");
|
|
|
|
- $stmt->execute(array(
|
|
|
|
- ':username_new' => $username_new,
|
|
|
|
- ':username' => $username
|
|
|
|
- ));
|
|
|
|
- if (!empty($domains)) {
|
|
|
|
- foreach ($domains as $domain) {
|
|
|
|
- $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
|
|
|
|
- VALUES (:username_new, :domain, :created, :active)");
|
|
|
|
- $stmt->execute(array(
|
|
|
|
- ':username_new' => $username_new,
|
|
|
|
- ':domain' => $domain,
|
|
|
|
- ':created' => date('Y-m-d H:i:s'),
|
|
|
|
- ':active' => $active
|
|
|
|
- ));
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
- if (!empty($password)) {
|
|
|
|
- if (password_check($password, $password2) !== true) {
|
|
|
|
- return false;
|
|
|
|
- }
|
|
|
|
- $password_hashed = hash_password($password);
|
|
|
|
- $stmt = $pdo->prepare("UPDATE `admin` SET `username` = :username_new, `active` = :active, `password` = :password_hashed WHERE `username` = :username");
|
|
|
|
- $stmt->execute(array(
|
|
|
|
- ':password_hashed' => $password_hashed,
|
|
|
|
- ':username_new' => $username_new,
|
|
|
|
- ':username' => $username,
|
|
|
|
- ':active' => $active
|
|
|
|
- ));
|
|
|
|
- if (isset($_data['disable_tfa'])) {
|
|
|
|
- $stmt = $pdo->prepare("UPDATE `tfa` SET `active` = '0' WHERE `username` = :username");
|
|
|
|
- $stmt->execute(array(':username' => $username));
|
|
|
|
- }
|
|
|
|
- else {
|
|
|
|
- $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username_new WHERE `username` = :username");
|
|
|
|
- $stmt->execute(array(':username_new' => $username_new, ':username' => $username));
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
- else {
|
|
|
|
- $stmt = $pdo->prepare("UPDATE `admin` SET `username` = :username_new, `active` = :active WHERE `username` = :username");
|
|
|
|
- $stmt->execute(array(
|
|
|
|
- ':username_new' => $username_new,
|
|
|
|
- ':username' => $username,
|
|
|
|
- ':active' => $active
|
|
|
|
- ));
|
|
|
|
- if (isset($_data['disable_tfa'])) {
|
|
|
|
- $stmt = $pdo->prepare("UPDATE `tfa` SET `active` = '0' WHERE `username` = :username");
|
|
|
|
- $stmt->execute(array(':username' => $username));
|
|
|
|
- }
|
|
|
|
- else {
|
|
|
|
- $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username_new WHERE `username` = :username");
|
|
|
|
- $stmt->execute(array(':username_new' => $username_new, ':username' => $username));
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
- $_SESSION['return'][] = array(
|
|
|
|
- 'type' => 'success',
|
|
|
|
- 'log' => array(__FUNCTION__, $_action, $_data_log),
|
|
|
|
- 'msg' => array('domain_admin_modified', htmlspecialchars($username))
|
|
|
|
- );
|
|
|
|
- }
|
|
|
|
- return true;
|
|
|
|
- }
|
|
|
|
- // Domain administrator
|
|
|
|
- // Can only edit itself
|
|
|
|
- elseif ($_SESSION['mailcow_cc_role'] == "domainadmin") {
|
|
|
|
- $username = $_SESSION['mailcow_cc_username'];
|
|
|
|
- $password_old = $_data['user_old_pass'];
|
|
|
|
- $password_new = $_data['user_new_pass'];
|
|
|
|
- $password_new2 = $_data['user_new_pass2'];
|
|
|
|
-
|
|
|
|
- $stmt = $pdo->prepare("SELECT `password` FROM `admin`
|
|
|
|
- WHERE `username` = :user");
|
|
|
|
- $stmt->execute(array(':user' => $username));
|
|
|
|
- $row = $stmt->fetch(PDO::FETCH_ASSOC);
|
|
|
|
- if (!verify_hash($row['password'], $password_old)) {
|
|
|
|
- $_SESSION['return'][] = array(
|
|
|
|
- 'type' => 'danger',
|
|
|
|
- 'log' => array(__FUNCTION__, $_action, $_data_log),
|
|
|
|
- 'msg' => 'access_denied'
|
|
|
|
- );
|
|
|
|
- return false;
|
|
|
|
- }
|
|
|
|
- if (password_check($password_new, $password_new2) !== true) {
|
|
|
|
- return false;
|
|
|
|
- }
|
|
|
|
- $password_hashed = hash_password($password_new);
|
|
|
|
- $stmt = $pdo->prepare("UPDATE `admin` SET `password` = :password_hashed WHERE `username` = :username");
|
|
|
|
- $stmt->execute(array(
|
|
|
|
- ':password_hashed' => $password_hashed,
|
|
|
|
- ':username' => $username
|
|
|
|
- ));
|
|
|
|
- $_SESSION['return'][] = array(
|
|
|
|
- 'type' => 'success',
|
|
|
|
- 'log' => array(__FUNCTION__, $_action, $_data_log),
|
|
|
|
- 'msg' => array('domain_admin_modified', htmlspecialchars($username))
|
|
|
|
- );
|
|
|
|
- }
|
|
|
|
- break;
|
|
|
|
- case 'delete':
|
|
|
|
- if ($_SESSION['mailcow_cc_role'] != "admin") {
|
|
|
|
- $_SESSION['return'][] = array(
|
|
|
|
- 'type' => 'danger',
|
|
|
|
- 'log' => array(__FUNCTION__, $_action, $_data_log),
|
|
|
|
- 'msg' => 'access_denied'
|
|
|
|
- );
|
|
|
|
- return false;
|
|
|
|
- }
|
|
|
|
- $usernames = (array)$_data['username'];
|
|
|
|
- foreach ($usernames as $username) {
|
|
|
|
- if (empty(domain_admin('details', $username))) {
|
|
|
|
- $_SESSION['return'][] = array(
|
|
|
|
- 'type' => 'danger',
|
|
|
|
- 'log' => array(__FUNCTION__, $_action, $_data_log),
|
|
|
|
- 'msg' => array('username_invalid', $username)
|
|
|
|
- );
|
|
|
|
- continue;
|
|
|
|
- }
|
|
|
|
- $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
|
|
|
|
- $stmt->execute(array(
|
|
|
|
- ':username' => $username,
|
|
|
|
- ));
|
|
|
|
- $stmt = $pdo->prepare("DELETE FROM `admin` WHERE `username` = :username");
|
|
|
|
- $stmt->execute(array(
|
|
|
|
- ':username' => $username,
|
|
|
|
- ));
|
|
|
|
- $stmt = $pdo->prepare("DELETE FROM `da_acl` WHERE `username` = :username");
|
|
|
|
- $stmt->execute(array(
|
|
|
|
- ':username' => $username,
|
|
|
|
- ));
|
|
|
|
- $stmt = $pdo->prepare("DELETE FROM `tfa` WHERE `username` = :username");
|
|
|
|
- $stmt->execute(array(
|
|
|
|
- ':username' => $username,
|
|
|
|
- ));
|
|
|
|
- $stmt = $pdo->prepare("DELETE FROM `fido2` WHERE `username` = :username");
|
|
|
|
- $stmt->execute(array(
|
|
|
|
- ':username' => $username,
|
|
|
|
- ));
|
|
|
|
- $_SESSION['return'][] = array(
|
|
|
|
- 'type' => 'success',
|
|
|
|
- 'log' => array(__FUNCTION__, $_action, $_data_log),
|
|
|
|
- 'msg' => array('domain_admin_removed', htmlspecialchars($username))
|
|
|
|
- );
|
|
|
|
- }
|
|
|
|
- break;
|
|
|
|
- case 'get':
|
|
|
|
- $domainadmins = array();
|
|
|
|
- if ($_SESSION['mailcow_cc_role'] != "admin") {
|
|
|
|
- $_SESSION['return'][] = array(
|
|
|
|
- 'type' => 'danger',
|
|
|
|
- 'log' => array(__FUNCTION__, $_action, $_data_log),
|
|
|
|
- 'msg' => 'access_denied'
|
|
|
|
- );
|
|
|
|
- return false;
|
|
|
|
- }
|
|
|
|
- $stmt = $pdo->query("SELECT DISTINCT
|
|
|
|
- `username`
|
|
|
|
- FROM `domain_admins`
|
|
|
|
- WHERE `username` IN (
|
|
|
|
- SELECT `username` FROM `admin`
|
|
|
|
- WHERE `superadmin`!='1'
|
|
|
|
- )");
|
|
|
|
- $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
|
|
|
|
- while ($row = array_shift($rows)) {
|
|
|
|
- $domainadmins[] = $row['username'];
|
|
|
|
- }
|
|
|
|
- return $domainadmins;
|
|
|
|
- break;
|
|
|
|
- case 'details':
|
|
|
|
- $domainadmindata = array();
|
|
|
|
- if ($_SESSION['mailcow_cc_role'] == "domainadmin" && $_data != $_SESSION['mailcow_cc_username']) {
|
|
|
|
- return false;
|
|
|
|
- }
|
|
|
|
- elseif ($_SESSION['mailcow_cc_role'] != "admin" || !isset($_data)) {
|
|
|
|
- return false;
|
|
|
|
- }
|
|
|
|
- if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $_data))) {
|
|
|
|
- return false;
|
|
|
|
- }
|
|
|
|
- $stmt = $pdo->prepare("SELECT
|
|
|
|
- `tfa`.`active` AS `tfa_active`,
|
|
|
|
- `domain_admins`.`username`,
|
|
|
|
- `domain_admins`.`created`,
|
|
|
|
- `domain_admins`.`active` AS `active`
|
|
|
|
- FROM `domain_admins`
|
|
|
|
- LEFT OUTER JOIN `tfa` ON `tfa`.`username`=`domain_admins`.`username`
|
|
|
|
- WHERE `domain_admins`.`username`= :domain_admin");
|
|
|
|
- $stmt->execute(array(
|
|
|
|
- ':domain_admin' => $_data
|
|
|
|
- ));
|
|
|
|
- $row = $stmt->fetch(PDO::FETCH_ASSOC);
|
|
|
|
- if (empty($row)) {
|
|
|
|
- return false;
|
|
|
|
- }
|
|
|
|
- $domainadmindata['username'] = $row['username'];
|
|
|
|
- $domainadmindata['tfa_active'] = (is_null($row['tfa_active'])) ? 0 : $row['tfa_active'];
|
|
|
|
- $domainadmindata['tfa_active_int'] = (is_null($row['tfa_active'])) ? 0 : $row['tfa_active'];
|
|
|
|
- $domainadmindata['active'] = $row['active'];
|
|
|
|
- $domainadmindata['active_int'] = $row['active'];
|
|
|
|
- $domainadmindata['created'] = $row['created'];
|
|
|
|
- // GET SELECTED
|
|
|
|
- $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
|
|
|
|
- WHERE `domain` IN (
|
|
|
|
- SELECT `domain` FROM `domain_admins`
|
|
|
|
- WHERE `username`= :domain_admin)");
|
|
|
|
- $stmt->execute(array(':domain_admin' => $_data));
|
|
|
|
- $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
|
|
|
|
- while($row = array_shift($rows)) {
|
|
|
|
- $domainadmindata['selected_domains'][] = $row['domain'];
|
|
|
|
- }
|
|
|
|
- // GET UNSELECTED
|
|
|
|
- $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
|
|
|
|
- WHERE `domain` NOT IN (
|
|
|
|
- SELECT `domain` FROM `domain_admins`
|
|
|
|
- WHERE `username`= :domain_admin)");
|
|
|
|
- $stmt->execute(array(':domain_admin' => $_data));
|
|
|
|
- $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
|
|
|
|
- while($row = array_shift($rows)) {
|
|
|
|
- $domainadmindata['unselected_domains'][] = $row['domain'];
|
|
|
|
- }
|
|
|
|
- if (!isset($domainadmindata['unselected_domains'])) {
|
|
|
|
- $domainadmindata['unselected_domains'] = "";
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- return $domainadmindata;
|
|
|
|
- break;
|
|
|
|
- }
|
|
|
|
-}
|
|
|
|
|
|
+<?php
|
|
|
|
+function domain_admin($_action, $_data = null) {
|
|
|
|
+ global $pdo;
|
|
|
|
+ global $lang;
|
|
|
|
+ $_data_log = $_data;
|
|
|
|
+ !isset($_data_log['password']) ?: $_data_log['password'] = '*';
|
|
|
|
+ !isset($_data_log['password2']) ?: $_data_log['password2'] = '*';
|
|
|
|
+ !isset($_data_log['user_old_pass']) ?: $_data_log['user_old_pass'] = '*';
|
|
|
|
+ !isset($_data_log['user_new_pass']) ?: $_data_log['user_new_pass'] = '*';
|
|
|
|
+ !isset($_data_log['user_new_pass2']) ?: $_data_log['user_new_pass2'] = '*';
|
|
|
|
+ switch ($_action) {
|
|
|
|
+ case 'add':
|
|
|
|
+ $username = strtolower(trim($_data['username']));
|
|
|
|
+ $password = $_data['password'];
|
|
|
|
+ $password2 = $_data['password2'];
|
|
|
|
+ $domains = (array)$_data['domains'];
|
|
|
|
+ $active = intval($_data['active']);
|
|
|
|
+ if ($_SESSION['mailcow_cc_role'] != "admin") {
|
|
|
|
+ $_SESSION['return'][] = array(
|
|
|
|
+ 'type' => 'danger',
|
|
|
|
+ 'log' => array(__FUNCTION__, $_action, $_data_log),
|
|
|
|
+ 'msg' => 'access_denied'
|
|
|
|
+ );
|
|
|
|
+ return false;
|
|
|
|
+ }
|
|
|
|
+ if (empty($domains)) {
|
|
|
|
+ $_SESSION['return'][] = array(
|
|
|
|
+ 'type' => 'danger',
|
|
|
|
+ 'log' => array(__FUNCTION__, $_action, $_data_log),
|
|
|
|
+ 'msg' => 'domain_invalid'
|
|
|
|
+ );
|
|
|
|
+ return false;
|
|
|
|
+ }
|
|
|
|
+ if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username)) || empty ($username) || $username == 'API') {
|
|
|
|
+ $_SESSION['return'][] = array(
|
|
|
|
+ 'type' => 'danger',
|
|
|
|
+ 'log' => array(__FUNCTION__, $_action, $_data_log),
|
|
|
|
+ 'msg' => array('username_invalid', $username)
|
|
|
|
+ );
|
|
|
|
+ return false;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ $stmt = $pdo->prepare("SELECT `username` FROM `mailbox`
|
|
|
|
+ WHERE `username` = :username");
|
|
|
|
+ $stmt->execute(array(':username' => $username));
|
|
|
|
+ $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
|
|
|
|
+
|
|
|
|
+ $stmt = $pdo->prepare("SELECT `username` FROM `admin`
|
|
|
|
+ WHERE `username` = :username");
|
|
|
|
+ $stmt->execute(array(':username' => $username));
|
|
|
|
+ $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
|
|
|
|
+
|
|
|
|
+ $stmt = $pdo->prepare("SELECT `username` FROM `domain_admins`
|
|
|
|
+ WHERE `username` = :username");
|
|
|
|
+ $stmt->execute(array(':username' => $username));
|
|
|
|
+ $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
|
|
|
|
+
|
|
|
|
+ foreach ($num_results as $num_results_each) {
|
|
|
|
+ if ($num_results_each != 0) {
|
|
|
|
+ $_SESSION['return'][] = array(
|
|
|
|
+ 'type' => 'danger',
|
|
|
|
+ 'log' => array(__FUNCTION__, $_action, $_data_log),
|
|
|
|
+ 'msg' => array('object_exists', htmlspecialchars($username))
|
|
|
|
+ );
|
|
|
|
+ return false;
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+ if (password_check($password, $password2) !== true) {
|
|
|
|
+ continue;
|
|
|
|
+ }
|
|
|
|
+ $password_hashed = hash_password($password);
|
|
|
|
+ $valid_domains = 0;
|
|
|
|
+ foreach ($domains as $domain) {
|
|
|
|
+ if (!is_valid_domain_name($domain) || mailbox('get', 'domain_details', $domain) === false) {
|
|
|
|
+ $_SESSION['return'][] = array(
|
|
|
|
+ 'type' => 'danger',
|
|
|
|
+ 'log' => array(__FUNCTION__, $_action, $_data_log),
|
|
|
|
+ 'msg' => array('domain_invalid', htmlspecialchars($domain))
|
|
|
|
+ );
|
|
|
|
+ continue;
|
|
|
|
+ }
|
|
|
|
+ $valid_domains++;
|
|
|
|
+ $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
|
|
|
|
+ VALUES (:username, :domain, :created, :active)");
|
|
|
|
+ $stmt->execute(array(
|
|
|
|
+ ':username' => $username,
|
|
|
|
+ ':domain' => $domain,
|
|
|
|
+ ':created' => date('Y-m-d H:i:s'),
|
|
|
|
+ ':active' => $active
|
|
|
|
+ ));
|
|
|
|
+ }
|
|
|
|
+ if ($valid_domains != 0) {
|
|
|
|
+ $stmt = $pdo->prepare("INSERT INTO `admin` (`username`, `password`, `superadmin`, `active`)
|
|
|
|
+ VALUES (:username, :password_hashed, '0', :active)");
|
|
|
|
+ $stmt->execute(array(
|
|
|
|
+ ':username' => $username,
|
|
|
|
+ ':password_hashed' => $password_hashed,
|
|
|
|
+ ':active' => $active
|
|
|
|
+ ));
|
|
|
|
+ }
|
|
|
|
+ $stmt = $pdo->prepare("INSERT INTO `da_acl` (`username`) VALUES (:username)");
|
|
|
|
+ $stmt->execute(array(
|
|
|
|
+ ':username' => $username
|
|
|
|
+ ));
|
|
|
|
+ $_SESSION['return'][] = array(
|
|
|
|
+ 'type' => 'success',
|
|
|
|
+ 'log' => array(__FUNCTION__, $_action, $_data_log),
|
|
|
|
+ 'msg' => array('domain_admin_added', htmlspecialchars($username))
|
|
|
|
+ );
|
|
|
|
+ break;
|
|
|
|
+ case 'edit':
|
|
|
|
+ if ($_SESSION['mailcow_cc_role'] != "admin" && $_SESSION['mailcow_cc_role'] != "domainadmin") {
|
|
|
|
+ $_SESSION['return'][] = array(
|
|
|
|
+ 'type' => 'danger',
|
|
|
|
+ 'log' => array(__FUNCTION__, $_action, $_data_log),
|
|
|
|
+ 'msg' => 'access_denied'
|
|
|
|
+ );
|
|
|
|
+ return false;
|
|
|
|
+ }
|
|
|
|
+ // Administrator
|
|
|
|
+ if ($_SESSION['mailcow_cc_role'] == "admin") {
|
|
|
|
+ if (!is_array($_data['username'])) {
|
|
|
|
+ $usernames = array();
|
|
|
|
+ $usernames[] = $_data['username'];
|
|
|
|
+ }
|
|
|
|
+ else {
|
|
|
|
+ $usernames = $_data['username'];
|
|
|
|
+ }
|
|
|
|
+ foreach ($usernames as $username) {
|
|
|
|
+ $is_now = domain_admin('details', $username);
|
|
|
|
+ $domains = (isset($_data['domains'])) ? (array)$_data['domains'] : null;
|
|
|
|
+ if (!empty($is_now)) {
|
|
|
|
+ $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active'];
|
|
|
|
+ $domains = (!empty($domains)) ? $domains : $is_now['selected_domains'];
|
|
|
|
+ $username_new = (!empty($_data['username_new'])) ? $_data['username_new'] : $is_now['username'];
|
|
|
|
+ }
|
|
|
|
+ else {
|
|
|
|
+ $_SESSION['return'][] = array(
|
|
|
|
+ 'type' => 'danger',
|
|
|
|
+ 'log' => array(__FUNCTION__, $_action, $_data_log),
|
|
|
|
+ 'msg' => 'access_denied'
|
|
|
|
+ );
|
|
|
|
+ continue;
|
|
|
|
+ }
|
|
|
|
+ $password = $_data['password'];
|
|
|
|
+ $password2 = $_data['password2'];
|
|
|
|
+ if (!empty($domains)) {
|
|
|
|
+ foreach ($domains as $domain) {
|
|
|
|
+ if (!is_valid_domain_name($domain) || mailbox('get', 'domain_details', $domain) === false) {
|
|
|
|
+ $_SESSION['return'][] = array(
|
|
|
|
+ 'type' => 'danger',
|
|
|
|
+ 'log' => array(__FUNCTION__, $_action, $_data_log),
|
|
|
|
+ 'msg' => array('domain_invalid', htmlspecialchars($domain))
|
|
|
|
+ );
|
|
|
|
+ continue 2;
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+ if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username_new))) {
|
|
|
|
+ $_SESSION['return'][] = array(
|
|
|
|
+ 'type' => 'danger',
|
|
|
|
+ 'log' => array(__FUNCTION__, $_action, $_data_log),
|
|
|
|
+ 'msg' => array('username_invalid', $username_new)
|
|
|
|
+ );
|
|
|
|
+ continue;
|
|
|
|
+ }
|
|
|
|
+ if ($username_new != $username) {
|
|
|
|
+ if (!empty(domain_admin('details', $username_new)['username'])) {
|
|
|
|
+ $_SESSION['return'][] = array(
|
|
|
|
+ 'type' => 'danger',
|
|
|
|
+ 'log' => array(__FUNCTION__, $_action, $_data_log),
|
|
|
|
+ 'msg' => array('username_invalid', $username_new)
|
|
|
|
+ );
|
|
|
|
+ continue;
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+ $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
|
|
|
|
+ $stmt->execute(array(
|
|
|
|
+ ':username' => $username,
|
|
|
|
+ ));
|
|
|
|
+ $stmt = $pdo->prepare("UPDATE `da_acl` SET `username` = :username_new WHERE `username` = :username");
|
|
|
|
+ $stmt->execute(array(
|
|
|
|
+ ':username_new' => $username_new,
|
|
|
|
+ ':username' => $username
|
|
|
|
+ ));
|
|
|
|
+ if (!empty($domains)) {
|
|
|
|
+ foreach ($domains as $domain) {
|
|
|
|
+ $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
|
|
|
|
+ VALUES (:username_new, :domain, :created, :active)");
|
|
|
|
+ $stmt->execute(array(
|
|
|
|
+ ':username_new' => $username_new,
|
|
|
|
+ ':domain' => $domain,
|
|
|
|
+ ':created' => date('Y-m-d H:i:s'),
|
|
|
|
+ ':active' => $active
|
|
|
|
+ ));
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+ if (!empty($password)) {
|
|
|
|
+ if (password_check($password, $password2) !== true) {
|
|
|
|
+ return false;
|
|
|
|
+ }
|
|
|
|
+ $password_hashed = hash_password($password);
|
|
|
|
+ $stmt = $pdo->prepare("UPDATE `admin` SET `username` = :username_new, `active` = :active, `password` = :password_hashed WHERE `username` = :username");
|
|
|
|
+ $stmt->execute(array(
|
|
|
|
+ ':password_hashed' => $password_hashed,
|
|
|
|
+ ':username_new' => $username_new,
|
|
|
|
+ ':username' => $username,
|
|
|
|
+ ':active' => $active
|
|
|
|
+ ));
|
|
|
|
+ if (isset($_data['disable_tfa'])) {
|
|
|
|
+ $stmt = $pdo->prepare("UPDATE `tfa` SET `active` = '0' WHERE `username` = :username");
|
|
|
|
+ $stmt->execute(array(':username' => $username));
|
|
|
|
+ }
|
|
|
|
+ else {
|
|
|
|
+ $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username_new WHERE `username` = :username");
|
|
|
|
+ $stmt->execute(array(':username_new' => $username_new, ':username' => $username));
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+ else {
|
|
|
|
+ $stmt = $pdo->prepare("UPDATE `admin` SET `username` = :username_new, `active` = :active WHERE `username` = :username");
|
|
|
|
+ $stmt->execute(array(
|
|
|
|
+ ':username_new' => $username_new,
|
|
|
|
+ ':username' => $username,
|
|
|
|
+ ':active' => $active
|
|
|
|
+ ));
|
|
|
|
+ if (isset($_data['disable_tfa'])) {
|
|
|
|
+ $stmt = $pdo->prepare("UPDATE `tfa` SET `active` = '0' WHERE `username` = :username");
|
|
|
|
+ $stmt->execute(array(':username' => $username));
|
|
|
|
+ }
|
|
|
|
+ else {
|
|
|
|
+ $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username_new WHERE `username` = :username");
|
|
|
|
+ $stmt->execute(array(':username_new' => $username_new, ':username' => $username));
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+ $_SESSION['return'][] = array(
|
|
|
|
+ 'type' => 'success',
|
|
|
|
+ 'log' => array(__FUNCTION__, $_action, $_data_log),
|
|
|
|
+ 'msg' => array('domain_admin_modified', htmlspecialchars($username))
|
|
|
|
+ );
|
|
|
|
+ }
|
|
|
|
+ return true;
|
|
|
|
+ }
|
|
|
|
+ // Domain administrator
|
|
|
|
+ // Can only edit itself
|
|
|
|
+ elseif ($_SESSION['mailcow_cc_role'] == "domainadmin") {
|
|
|
|
+ $username = $_SESSION['mailcow_cc_username'];
|
|
|
|
+ $password_old = $_data['user_old_pass'];
|
|
|
|
+ $password_new = $_data['user_new_pass'];
|
|
|
|
+ $password_new2 = $_data['user_new_pass2'];
|
|
|
|
+
|
|
|
|
+ $stmt = $pdo->prepare("SELECT `password` FROM `admin`
|
|
|
|
+ WHERE `username` = :user");
|
|
|
|
+ $stmt->execute(array(':user' => $username));
|
|
|
|
+ $row = $stmt->fetch(PDO::FETCH_ASSOC);
|
|
|
|
+ if (!verify_hash($row['password'], $password_old)) {
|
|
|
|
+ $_SESSION['return'][] = array(
|
|
|
|
+ 'type' => 'danger',
|
|
|
|
+ 'log' => array(__FUNCTION__, $_action, $_data_log),
|
|
|
|
+ 'msg' => 'access_denied'
|
|
|
|
+ );
|
|
|
|
+ return false;
|
|
|
|
+ }
|
|
|
|
+ if (password_check($password_new, $password_new2) !== true) {
|
|
|
|
+ return false;
|
|
|
|
+ }
|
|
|
|
+ $password_hashed = hash_password($password_new);
|
|
|
|
+ $stmt = $pdo->prepare("UPDATE `admin` SET `password` = :password_hashed WHERE `username` = :username");
|
|
|
|
+ $stmt->execute(array(
|
|
|
|
+ ':password_hashed' => $password_hashed,
|
|
|
|
+ ':username' => $username
|
|
|
|
+ ));
|
|
|
|
+ $_SESSION['return'][] = array(
|
|
|
|
+ 'type' => 'success',
|
|
|
|
+ 'log' => array(__FUNCTION__, $_action, $_data_log),
|
|
|
|
+ 'msg' => array('domain_admin_modified', htmlspecialchars($username))
|
|
|
|
+ );
|
|
|
|
+ }
|
|
|
|
+ break;
|
|
|
|
+ case 'delete':
|
|
|
|
+ if ($_SESSION['mailcow_cc_role'] != "admin") {
|
|
|
|
+ $_SESSION['return'][] = array(
|
|
|
|
+ 'type' => 'danger',
|
|
|
|
+ 'log' => array(__FUNCTION__, $_action, $_data_log),
|
|
|
|
+ 'msg' => 'access_denied'
|
|
|
|
+ );
|
|
|
|
+ return false;
|
|
|
|
+ }
|
|
|
|
+ $usernames = (array)$_data['username'];
|
|
|
|
+ foreach ($usernames as $username) {
|
|
|
|
+ if (empty(domain_admin('details', $username))) {
|
|
|
|
+ $_SESSION['return'][] = array(
|
|
|
|
+ 'type' => 'danger',
|
|
|
|
+ 'log' => array(__FUNCTION__, $_action, $_data_log),
|
|
|
|
+ 'msg' => array('username_invalid', $username)
|
|
|
|
+ );
|
|
|
|
+ continue;
|
|
|
|
+ }
|
|
|
|
+ $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
|
|
|
|
+ $stmt->execute(array(
|
|
|
|
+ ':username' => $username,
|
|
|
|
+ ));
|
|
|
|
+ $stmt = $pdo->prepare("DELETE FROM `admin` WHERE `username` = :username");
|
|
|
|
+ $stmt->execute(array(
|
|
|
|
+ ':username' => $username,
|
|
|
|
+ ));
|
|
|
|
+ $stmt = $pdo->prepare("DELETE FROM `da_acl` WHERE `username` = :username");
|
|
|
|
+ $stmt->execute(array(
|
|
|
|
+ ':username' => $username,
|
|
|
|
+ ));
|
|
|
|
+ $stmt = $pdo->prepare("DELETE FROM `tfa` WHERE `username` = :username");
|
|
|
|
+ $stmt->execute(array(
|
|
|
|
+ ':username' => $username,
|
|
|
|
+ ));
|
|
|
|
+ $stmt = $pdo->prepare("DELETE FROM `fido2` WHERE `username` = :username");
|
|
|
|
+ $stmt->execute(array(
|
|
|
|
+ ':username' => $username,
|
|
|
|
+ ));
|
|
|
|
+ $_SESSION['return'][] = array(
|
|
|
|
+ 'type' => 'success',
|
|
|
|
+ 'log' => array(__FUNCTION__, $_action, $_data_log),
|
|
|
|
+ 'msg' => array('domain_admin_removed', htmlspecialchars($username))
|
|
|
|
+ );
|
|
|
|
+ }
|
|
|
|
+ break;
|
|
|
|
+ case 'get':
|
|
|
|
+ $domainadmins = array();
|
|
|
|
+ if ($_SESSION['mailcow_cc_role'] != "admin") {
|
|
|
|
+ $_SESSION['return'][] = array(
|
|
|
|
+ 'type' => 'danger',
|
|
|
|
+ 'log' => array(__FUNCTION__, $_action, $_data_log),
|
|
|
|
+ 'msg' => 'access_denied'
|
|
|
|
+ );
|
|
|
|
+ return false;
|
|
|
|
+ }
|
|
|
|
+ $stmt = $pdo->query("SELECT DISTINCT
|
|
|
|
+ `username`
|
|
|
|
+ FROM `domain_admins`
|
|
|
|
+ WHERE `username` IN (
|
|
|
|
+ SELECT `username` FROM `admin`
|
|
|
|
+ WHERE `superadmin`!='1'
|
|
|
|
+ )");
|
|
|
|
+ $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
|
|
|
|
+ while ($row = array_shift($rows)) {
|
|
|
|
+ $domainadmins[] = $row['username'];
|
|
|
|
+ }
|
|
|
|
+ return $domainadmins;
|
|
|
|
+ break;
|
|
|
|
+ case 'details':
|
|
|
|
+ $domainadmindata = array();
|
|
|
|
+ if ($_SESSION['mailcow_cc_role'] == "domainadmin" && $_data != $_SESSION['mailcow_cc_username']) {
|
|
|
|
+ return false;
|
|
|
|
+ }
|
|
|
|
+ elseif ($_SESSION['mailcow_cc_role'] != "admin" || !isset($_data)) {
|
|
|
|
+ return false;
|
|
|
|
+ }
|
|
|
|
+ if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $_data))) {
|
|
|
|
+ return false;
|
|
|
|
+ }
|
|
|
|
+ $stmt = $pdo->prepare("SELECT
|
|
|
|
+ `tfa`.`active` AS `tfa_active`,
|
|
|
|
+ `domain_admins`.`username`,
|
|
|
|
+ `domain_admins`.`created`,
|
|
|
|
+ `domain_admins`.`active` AS `active`
|
|
|
|
+ FROM `domain_admins`
|
|
|
|
+ LEFT OUTER JOIN `tfa` ON `tfa`.`username`=`domain_admins`.`username`
|
|
|
|
+ WHERE `domain_admins`.`username`= :domain_admin");
|
|
|
|
+ $stmt->execute(array(
|
|
|
|
+ ':domain_admin' => $_data
|
|
|
|
+ ));
|
|
|
|
+ $row = $stmt->fetch(PDO::FETCH_ASSOC);
|
|
|
|
+ if (empty($row)) {
|
|
|
|
+ return false;
|
|
|
|
+ }
|
|
|
|
+ $domainadmindata['username'] = $row['username'];
|
|
|
|
+ $domainadmindata['tfa_active'] = (is_null($row['tfa_active'])) ? 0 : $row['tfa_active'];
|
|
|
|
+ $domainadmindata['tfa_active_int'] = (is_null($row['tfa_active'])) ? 0 : $row['tfa_active'];
|
|
|
|
+ $domainadmindata['active'] = $row['active'];
|
|
|
|
+ $domainadmindata['active_int'] = $row['active'];
|
|
|
|
+ $domainadmindata['created'] = $row['created'];
|
|
|
|
+ // GET SELECTED
|
|
|
|
+ $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
|
|
|
|
+ WHERE `domain` IN (
|
|
|
|
+ SELECT `domain` FROM `domain_admins`
|
|
|
|
+ WHERE `username`= :domain_admin)");
|
|
|
|
+ $stmt->execute(array(':domain_admin' => $_data));
|
|
|
|
+ $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
|
|
|
|
+ while($row = array_shift($rows)) {
|
|
|
|
+ $domainadmindata['selected_domains'][] = $row['domain'];
|
|
|
|
+ }
|
|
|
|
+ // GET UNSELECTED
|
|
|
|
+ $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
|
|
|
|
+ WHERE `domain` NOT IN (
|
|
|
|
+ SELECT `domain` FROM `domain_admins`
|
|
|
|
+ WHERE `username`= :domain_admin)");
|
|
|
|
+ $stmt->execute(array(':domain_admin' => $_data));
|
|
|
|
+ $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
|
|
|
|
+ while($row = array_shift($rows)) {
|
|
|
|
+ $domainadmindata['unselected_domains'][] = $row['domain'];
|
|
|
|
+ }
|
|
|
|
+ if (!isset($domainadmindata['unselected_domains'])) {
|
|
|
|
+ $domainadmindata['unselected_domains'] = "";
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ return $domainadmindata;
|
|
|
|
+ break;
|
|
|
|
+ }
|
|
|
|
+}
|
|
|
|
+function domain_admin_sso($_action, $_data) {
|
|
|
|
+ global $pdo;
|
|
|
|
+
|
|
|
|
+ switch ($_action) {
|
|
|
|
+ case 'check':
|
|
|
|
+ $token = $_data;
|
|
|
|
+
|
|
|
|
+ $stmt = $pdo->prepare("SELECT `t1`.`username` FROM `da_sso` AS `t1` JOIN `admin` AS `t2` ON `t1`.`username` = `t2`.`username` WHERE `t1`.`token` = :token AND `t1`.`created` > DATE_SUB(NOW(), INTERVAL '30' SECOND) AND `t2`.`active` = 1 AND `t2`.`superadmin` = 0;");
|
|
|
|
+ $stmt->execute(array(
|
|
|
|
+ ':token' => preg_replace('/[^a-zA-Z0-9-]/', '', $token)
|
|
|
|
+ ));
|
|
|
|
+ $return = $stmt->fetch(PDO::FETCH_ASSOC);
|
|
|
|
+ return empty($return['username']) ? false : $return['username'];
|
|
|
|
+ case 'issue':
|
|
|
|
+ if ($_SESSION['mailcow_cc_role'] != "admin") {
|
|
|
|
+ $_SESSION['return'][] = array(
|
|
|
|
+ 'type' => 'danger',
|
|
|
|
+ 'log' => array(__FUNCTION__, $_action, $_data),
|
|
|
|
+ 'msg' => 'access_denied'
|
|
|
|
+ );
|
|
|
|
+ return false;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ $username = $_data['username'];
|
|
|
|
+
|
|
|
|
+ $stmt = $pdo->prepare("SELECT `username` FROM `domain_admins`
|
|
|
|
+ WHERE `username` = :username");
|
|
|
|
+ $stmt->execute(array(':username' => $username));
|
|
|
|
+ $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
|
|
|
|
+
|
|
|
|
+ if ($num_results < 1) {
|
|
|
|
+ $_SESSION['return'][] = array(
|
|
|
|
+ 'type' => 'danger',
|
|
|
|
+ 'log' => array(__FUNCTION__, $_action, $_data),
|
|
|
|
+ 'msg' => array('object_doesnt_exist', htmlspecialchars($username))
|
|
|
|
+ );
|
|
|
|
+ return false;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ $token = implode('-', array(
|
|
|
|
+ strtoupper(bin2hex(random_bytes(3))),
|
|
|
|
+ strtoupper(bin2hex(random_bytes(3))),
|
|
|
|
+ strtoupper(bin2hex(random_bytes(3))),
|
|
|
|
+ strtoupper(bin2hex(random_bytes(3))),
|
|
|
|
+ strtoupper(bin2hex(random_bytes(3)))
|
|
|
|
+ ));
|
|
|
|
+
|
|
|
|
+ $stmt = $pdo->prepare("INSERT INTO `da_sso` (`username`, `token`)
|
|
|
|
+ VALUES (:username, :token)");
|
|
|
|
+ $stmt->execute(array(
|
|
|
|
+ ':username' => $username,
|
|
|
|
+ ':token' => $token
|
|
|
|
+ ));
|
|
|
|
+
|
|
|
|
+ // perform cleanup
|
|
|
|
+ $pdo->query("DELETE FROM `da_sso` WHERE created < DATE_SUB(NOW(), INTERVAL '30' SECOND);");
|
|
|
|
+
|
|
|
|
+ return ['token' => $token];
|
|
|
|
+ break;
|
|
|
|
+ }
|
|
|
|
+}
|