functions.domain_admin.inc.php 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524
  1. <?php
  2. function domain_admin($_action, $_data = null) {
  3. global $pdo;
  4. global $lang;
  5. $_data_log = $_data;
  6. !isset($_data_log['password']) ?: $_data_log['password'] = '*';
  7. !isset($_data_log['password2']) ?: $_data_log['password2'] = '*';
  8. switch ($_action) {
  9. case 'add':
  10. $username = strtolower(trim($_data['username']));
  11. $password = $_data['password'];
  12. $password2 = $_data['password2'];
  13. $domains = (array)$_data['domains'];
  14. $active = intval($_data['active']);
  15. if ($_SESSION['mailcow_cc_role'] != "admin") {
  16. $_SESSION['return'][] = array(
  17. 'type' => 'danger',
  18. 'log' => array(__FUNCTION__, $_action, $_data_log),
  19. 'msg' => 'access_denied'
  20. );
  21. return false;
  22. }
  23. if (empty($domains)) {
  24. $_SESSION['return'][] = array(
  25. 'type' => 'danger',
  26. 'log' => array(__FUNCTION__, $_action, $_data_log),
  27. 'msg' => 'domain_invalid'
  28. );
  29. return false;
  30. }
  31. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username)) || empty ($username)) {
  32. $_SESSION['return'][] = array(
  33. 'type' => 'danger',
  34. 'log' => array(__FUNCTION__, $_action, $_data_log),
  35. 'msg' => 'username_invalid'
  36. );
  37. return false;
  38. }
  39. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox`
  40. WHERE `username` = :username");
  41. $stmt->execute(array(':username' => $username));
  42. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  43. $stmt = $pdo->prepare("SELECT `username` FROM `admin`
  44. WHERE `username` = :username");
  45. $stmt->execute(array(':username' => $username));
  46. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  47. $stmt = $pdo->prepare("SELECT `username` FROM `domain_admins`
  48. WHERE `username` = :username");
  49. $stmt->execute(array(':username' => $username));
  50. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  51. foreach ($num_results as $num_results_each) {
  52. if ($num_results_each != 0) {
  53. $_SESSION['return'][] = array(
  54. 'type' => 'danger',
  55. 'log' => array(__FUNCTION__, $_action, $_data_log),
  56. 'msg' => array('object_exists', htmlspecialchars($username))
  57. );
  58. return false;
  59. }
  60. }
  61. if (!empty($password) && !empty($password2)) {
  62. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) {
  63. $_SESSION['return'][] = array(
  64. 'type' => 'danger',
  65. 'log' => array(__FUNCTION__, $_action, $_data_log),
  66. 'msg' => 'password_complexity'
  67. );
  68. return false;
  69. }
  70. if ($password != $password2) {
  71. $_SESSION['return'][] = array(
  72. 'type' => 'danger',
  73. 'log' => array(__FUNCTION__, $_action, $_data_log),
  74. 'msg' => 'password_mismatch'
  75. );
  76. return false;
  77. }
  78. $password_hashed = hash_password($password);
  79. foreach ($domains as $domain) {
  80. if (!is_valid_domain_name($domain)) {
  81. $_SESSION['return'][] = array(
  82. 'type' => 'danger',
  83. 'log' => array(__FUNCTION__, $_action, $_data_log),
  84. 'msg' => 'domain_invalid'
  85. );
  86. return false;
  87. }
  88. try {
  89. $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
  90. VALUES (:username, :domain, :created, :active)");
  91. $stmt->execute(array(
  92. ':username' => $username,
  93. ':domain' => $domain,
  94. ':created' => date('Y-m-d H:i:s'),
  95. ':active' => $active
  96. ));
  97. }
  98. catch (PDOException $e) {
  99. domain_admin('delete', $username);
  100. $_SESSION['return'][] = array(
  101. 'type' => 'danger',
  102. 'log' => array(__FUNCTION__, $_action, $_data_log),
  103. 'msg' => array('mysql_error', $e)
  104. );
  105. return false;
  106. }
  107. }
  108. try {
  109. $stmt = $pdo->prepare("INSERT INTO `admin` (`username`, `password`, `superadmin`, `active`)
  110. VALUES (:username, :password_hashed, '0', :active)");
  111. $stmt->execute(array(
  112. ':username' => $username,
  113. ':password_hashed' => $password_hashed,
  114. ':active' => $active
  115. ));
  116. }
  117. catch (PDOException $e) {
  118. $_SESSION['return'][] = array(
  119. 'type' => 'danger',
  120. 'log' => array(__FUNCTION__, $_action, $_data_log),
  121. 'msg' => array('mysql_error', $e)
  122. );
  123. return false;
  124. }
  125. }
  126. else {
  127. $_SESSION['return'][] = array(
  128. 'type' => 'danger',
  129. 'log' => array(__FUNCTION__, $_action, $_data_log),
  130. 'msg' => 'password_empty'
  131. );
  132. return false;
  133. }
  134. $_SESSION['return'][] = array(
  135. 'type' => 'success',
  136. 'log' => array(__FUNCTION__, $_action, $_data_log),
  137. 'msg' => array('domain_admin_added', htmlspecialchars($username))
  138. );
  139. break;
  140. case 'edit':
  141. if ($_SESSION['mailcow_cc_role'] != "admin" && $_SESSION['mailcow_cc_role'] != "domainadmin") {
  142. $_SESSION['return'][] = array(
  143. 'type' => 'danger',
  144. 'log' => array(__FUNCTION__, $_action, $_data_log),
  145. 'msg' => 'access_denied'
  146. );
  147. return false;
  148. }
  149. // Administrator
  150. if ($_SESSION['mailcow_cc_role'] == "admin") {
  151. if (!is_array($_data['username'])) {
  152. $usernames = array();
  153. $usernames[] = $_data['username'];
  154. }
  155. else {
  156. $usernames = $_data['username'];
  157. }
  158. foreach ($usernames as $username) {
  159. $is_now = domain_admin('details', $username);
  160. $domains = (isset($_data['domains'])) ? (array)$_data['domains'] : null;
  161. if (!empty($is_now)) {
  162. $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active_int'];
  163. $domains = (!empty($domains)) ? $domains : $is_now['selected_domains'];
  164. $username_new = (!empty($_data['username_new'])) ? $_data['username_new'] : $is_now['username'];
  165. }
  166. else {
  167. $_SESSION['return'][] = array(
  168. 'type' => 'danger',
  169. 'log' => array(__FUNCTION__, $_action, $_data_log),
  170. 'msg' => 'access_denied'
  171. );
  172. continue;
  173. }
  174. $password = $_data['password'];
  175. $password2 = $_data['password2'];
  176. if (!empty($domains)) {
  177. foreach ($domains as $i => &$domain) {
  178. if (!is_valid_domain_name($domain)) {
  179. $_SESSION['return'][] = array(
  180. 'type' => 'danger',
  181. 'log' => array(__FUNCTION__, $_action, $_data_log),
  182. 'msg' => array('domain_invalid', htmlspecialchars($domain))
  183. );
  184. unset($domains[$i]);
  185. continue;
  186. }
  187. }
  188. }
  189. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username_new))) {
  190. $_SESSION['return'][] = array(
  191. 'type' => 'danger',
  192. 'log' => array(__FUNCTION__, $_action, $_data_log),
  193. 'msg' => array('username_invalid', $username_new)
  194. );
  195. continue;
  196. }
  197. if ($username_new != $username) {
  198. if (!empty(domain_admin('details', $username_new)['username'])) {
  199. $_SESSION['return'][] = array(
  200. 'type' => 'danger',
  201. 'log' => array(__FUNCTION__, $_action, $_data_log),
  202. 'msg' => array('username_invalid', $username_new)
  203. );
  204. continue;
  205. }
  206. }
  207. try {
  208. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
  209. $stmt->execute(array(
  210. ':username' => $username,
  211. ));
  212. }
  213. catch (PDOException $e) {
  214. $_SESSION['return'][] = array(
  215. 'type' => 'danger',
  216. 'log' => array(__FUNCTION__, $_action, $_data_log),
  217. 'msg' => array('mysql_error', $e)
  218. );
  219. continue;
  220. }
  221. if (!empty($domains)) {
  222. foreach ($domains as $domain) {
  223. try {
  224. $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
  225. VALUES (:username_new, :domain, :created, :active)");
  226. $stmt->execute(array(
  227. ':username_new' => $username_new,
  228. ':domain' => $domain,
  229. ':created' => date('Y-m-d H:i:s'),
  230. ':active' => $active
  231. ));
  232. }
  233. catch (PDOException $e) {
  234. $_SESSION['return'][] = array(
  235. 'type' => 'danger',
  236. 'log' => array(__FUNCTION__, $_action, $_data_log),
  237. 'msg' => array('mysql_error', $e)
  238. );
  239. continue;
  240. }
  241. }
  242. }
  243. if (!empty($password) && !empty($password2)) {
  244. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) {
  245. $_SESSION['return'][] = array(
  246. 'type' => 'danger',
  247. 'log' => array(__FUNCTION__, $_action, $_data_log),
  248. 'msg' => 'password_complexity'
  249. );
  250. continue;
  251. }
  252. if ($password != $password2) {
  253. $_SESSION['return'][] = array(
  254. 'type' => 'danger',
  255. 'log' => array(__FUNCTION__, $_action, $_data_log),
  256. 'msg' => 'password_mismatch'
  257. );
  258. continue;
  259. }
  260. $password_hashed = hash_password($password);
  261. try {
  262. $stmt = $pdo->prepare("UPDATE `admin` SET `username` = :username_new, `active` = :active, `password` = :password_hashed WHERE `username` = :username");
  263. $stmt->execute(array(
  264. ':password_hashed' => $password_hashed,
  265. ':username_new' => $username_new,
  266. ':username' => $username,
  267. ':active' => $active
  268. ));
  269. if (isset($_data['disable_tfa'])) {
  270. $stmt = $pdo->prepare("UPDATE `tfa` SET `active` = '0' WHERE `username` = :username");
  271. $stmt->execute(array(':username' => $username));
  272. }
  273. else {
  274. $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username_new WHERE `username` = :username");
  275. $stmt->execute(array(':username_new' => $username_new, ':username' => $username));
  276. }
  277. }
  278. catch (PDOException $e) {
  279. $_SESSION['return'][] = array(
  280. 'type' => 'danger',
  281. 'log' => array(__FUNCTION__, $_action, $_data_log),
  282. 'msg' => array('mysql_error', $e)
  283. );
  284. continue;
  285. }
  286. }
  287. else {
  288. try {
  289. $stmt = $pdo->prepare("UPDATE `admin` SET `username` = :username_new, `active` = :active WHERE `username` = :username");
  290. $stmt->execute(array(
  291. ':username_new' => $username_new,
  292. ':username' => $username,
  293. ':active' => $active
  294. ));
  295. if (isset($_data['disable_tfa'])) {
  296. $stmt = $pdo->prepare("UPDATE `tfa` SET `active` = '0' WHERE `username` = :username");
  297. $stmt->execute(array(':username' => $username));
  298. }
  299. else {
  300. $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username_new WHERE `username` = :username");
  301. $stmt->execute(array(':username_new' => $username_new, ':username' => $username));
  302. }
  303. }
  304. catch (PDOException $e) {
  305. $_SESSION['return'][] = array(
  306. 'type' => 'danger',
  307. 'log' => array(__FUNCTION__, $_action, $_data_log),
  308. 'msg' => array('mysql_error', $e)
  309. );
  310. continue;
  311. }
  312. }
  313. $_SESSION['return'][] = array(
  314. 'type' => 'success',
  315. 'log' => array(__FUNCTION__, $_action, $_data_log),
  316. 'msg' => array('domain_admin_modified', htmlspecialchars($username))
  317. );
  318. }
  319. return true;
  320. }
  321. // Domain administrator
  322. // Can only edit itself
  323. elseif ($_SESSION['mailcow_cc_role'] == "domainadmin") {
  324. $username = $_SESSION['mailcow_cc_username'];
  325. $password_old = $_data['user_old_pass'];
  326. $password_new = $_data['user_new_pass'];
  327. $password_new2 = $_data['user_new_pass2'];
  328. $stmt = $pdo->prepare("SELECT `password` FROM `admin`
  329. WHERE `username` = :user");
  330. $stmt->execute(array(':user' => $username));
  331. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  332. if (!verify_hash($row['password'], $password_old)) {
  333. $_SESSION['return'][] = array(
  334. 'type' => 'danger',
  335. 'log' => array(__FUNCTION__, $_action, $_data_log),
  336. 'msg' => 'access_denied'
  337. );
  338. return false;
  339. }
  340. if (!empty($password_new2) && !empty($password_new)) {
  341. if ($password_new2 != $password_new) {
  342. $_SESSION['return'][] = array(
  343. 'type' => 'danger',
  344. 'log' => array(__FUNCTION__, $_action, $_data_log),
  345. 'msg' => 'password_mismatch'
  346. );
  347. return false;
  348. }
  349. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password_new)) {
  350. $_SESSION['return'][] = array(
  351. 'type' => 'danger',
  352. 'log' => array(__FUNCTION__, $_action, $_data_log),
  353. 'msg' => 'password_complexity'
  354. );
  355. return false;
  356. }
  357. $password_hashed = hash_password($password_new);
  358. try {
  359. $stmt = $pdo->prepare("UPDATE `admin` SET `password` = :password_hashed WHERE `username` = :username");
  360. $stmt->execute(array(
  361. ':password_hashed' => $password_hashed,
  362. ':username' => $username
  363. ));
  364. }
  365. catch (PDOException $e) {
  366. $_SESSION['return'][] = array(
  367. 'type' => 'danger',
  368. 'log' => array(__FUNCTION__, $_action, $_data_log),
  369. 'msg' => array('mysql_error', $e)
  370. );
  371. return false;
  372. }
  373. }
  374. $_SESSION['return'][] = array(
  375. 'type' => 'success',
  376. 'log' => array(__FUNCTION__, $_action, $_data_log),
  377. 'msg' => array('domain_admin_modified', htmlspecialchars($username))
  378. );
  379. }
  380. break;
  381. case 'delete':
  382. if ($_SESSION['mailcow_cc_role'] != "admin") {
  383. $_SESSION['return'][] = array(
  384. 'type' => 'danger',
  385. 'log' => array(__FUNCTION__, $_action, $_data_log),
  386. 'msg' => 'access_denied'
  387. );
  388. return false;
  389. }
  390. $usernames = (array)$_data['username'];
  391. foreach ($usernames as $username) {
  392. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
  393. $_SESSION['return'][] = array(
  394. 'type' => 'danger',
  395. 'log' => array(__FUNCTION__, $_action, $_data_log),
  396. 'msg' => array('username_invalid', $username)
  397. );
  398. continue;
  399. }
  400. try {
  401. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
  402. $stmt->execute(array(
  403. ':username' => $username,
  404. ));
  405. $stmt = $pdo->prepare("DELETE FROM `admin` WHERE `username` = :username");
  406. $stmt->execute(array(
  407. ':username' => $username,
  408. ));
  409. }
  410. catch (PDOException $e) {
  411. $_SESSION['return'][] = array(
  412. 'type' => 'danger',
  413. 'log' => array(__FUNCTION__, $_action, $_data_log),
  414. 'msg' => array('mysql_error', $e)
  415. );
  416. continue;
  417. }
  418. $_SESSION['return'][] = array(
  419. 'type' => 'success',
  420. 'log' => array(__FUNCTION__, $_action, $_data_log),
  421. 'msg' => array('domain_admin_removed', htmlspecialchars($username))
  422. );
  423. }
  424. break;
  425. case 'get':
  426. $domainadmins = array();
  427. if ($_SESSION['mailcow_cc_role'] != "admin") {
  428. $_SESSION['return'][] = array(
  429. 'type' => 'danger',
  430. 'log' => array(__FUNCTION__, $_action, $_data_log),
  431. 'msg' => 'access_denied'
  432. );
  433. return false;
  434. }
  435. $stmt = $pdo->query("SELECT DISTINCT
  436. `username`
  437. FROM `domain_admins`
  438. WHERE `username` IN (
  439. SELECT `username` FROM `admin`
  440. WHERE `superadmin`!='1'
  441. )");
  442. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  443. while ($row = array_shift($rows)) {
  444. $domainadmins[] = $row['username'];
  445. }
  446. return $domainadmins;
  447. break;
  448. case 'details':
  449. $domainadmindata = array();
  450. if ($_SESSION['mailcow_cc_role'] == "domainadmin" && $_data != $_SESSION['mailcow_cc_username']) {
  451. return false;
  452. }
  453. elseif ($_SESSION['mailcow_cc_role'] != "admin" || !isset($_data)) {
  454. return false;
  455. }
  456. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $_data))) {
  457. return false;
  458. }
  459. $stmt = $pdo->prepare("SELECT
  460. `tfa`.`active` AS `tfa_active_int`,
  461. CASE `tfa`.`active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `tfa_active`,
  462. `domain_admins`.`username`,
  463. `domain_admins`.`created`,
  464. `domain_admins`.`active` AS `active_int`,
  465. CASE `domain_admins`.`active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`
  466. FROM `domain_admins`
  467. LEFT OUTER JOIN `tfa` ON `tfa`.`username`=`domain_admins`.`username`
  468. WHERE `domain_admins`.`username`= :domain_admin");
  469. $stmt->execute(array(
  470. ':domain_admin' => $_data
  471. ));
  472. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  473. if (empty($row)) {
  474. return false;
  475. }
  476. $domainadmindata['username'] = $row['username'];
  477. $domainadmindata['tfa_active'] = $row['tfa_active'];
  478. $domainadmindata['active'] = $row['active'];
  479. $domainadmindata['tfa_active_int'] = $row['tfa_active_int'];
  480. $domainadmindata['active_int'] = $row['active_int'];
  481. $domainadmindata['modified'] = $row['created'];
  482. // GET SELECTED
  483. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  484. WHERE `domain` IN (
  485. SELECT `domain` FROM `domain_admins`
  486. WHERE `username`= :domain_admin)");
  487. $stmt->execute(array(':domain_admin' => $_data));
  488. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  489. while($row = array_shift($rows)) {
  490. $domainadmindata['selected_domains'][] = $row['domain'];
  491. }
  492. // GET UNSELECTED
  493. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  494. WHERE `domain` NOT IN (
  495. SELECT `domain` FROM `domain_admins`
  496. WHERE `username`= :domain_admin)");
  497. $stmt->execute(array(':domain_admin' => $_data));
  498. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  499. while($row = array_shift($rows)) {
  500. $domainadmindata['unselected_domains'][] = $row['domain'];
  501. }
  502. if (!isset($domainadmindata['unselected_domains'])) {
  503. $domainadmindata['unselected_domains'] = "";
  504. }
  505. return $domainadmindata;
  506. break;
  507. }
  508. }