functions.mailbox.inc.php 140 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953295429552956295729582959296029612962296329642965296629672968296929702971297229732974297529762977297829792980298129822983298429852986298729882989299029912992299329942995299629972998299930003001300230033004300530063007300830093010301130123013301430153016301730183019302030213022302330243025302630273028302930303031303230333034303530363037303830393040304130423043304430453046304730483049305030513052305330543055305630573058305930603061306230633064306530663067306830693070307130723073307430753076307730783079308030813082308330843085308630873088308930903091309230933094309530963097309830993100310131023103310431053106310731083109311031113112311331143115311631173118311931203121312231233124312531263127312831293130313131323133313431353136313731383139314031413142314331443145314631473148314931503151315231533154315531563157315831593160316131623163316431653166316731683169317031713172317331743175317631773178317931803181318231833184318531863187318831893190319131923193319431953196319731983199320032013202320332043205320632073208320932103211321232133214321532163217321832193220322132223223322432253226322732283229323032313232323332343235323632373238323932403241324232433244324532463247324832493250325132523253325432553256325732583259326032613262326332643265326632673268326932703271327232733274327532763277327832793280328132823283328432853286328732883289329032913292329332943295329632973298329933003301330233033304330533063307330833093310331133123313331433153316
  1. <?php
  2. function mailbox($_action, $_type, $_data = null) {
  3. global $pdo;
  4. global $redis;
  5. global $lang;
  6. switch ($_action) {
  7. case 'add':
  8. switch ($_type) {
  9. case 'time_limited_alias':
  10. if (!isset($_SESSION['acl']['spam_alias']) || $_SESSION['acl']['spam_alias'] != "1" ) {
  11. $_SESSION['return'] = array(
  12. 'type' => 'danger',
  13. 'msg' => sprintf($lang['danger']['access_denied'])
  14. );
  15. return false;
  16. }
  17. if (isset($_data['username']) && filter_var($_data['username'], FILTER_VALIDATE_EMAIL)) {
  18. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data['username'])) {
  19. $_SESSION['return'] = array(
  20. 'type' => 'danger',
  21. 'msg' => sprintf($lang['danger']['access_denied'])
  22. );
  23. return false;
  24. }
  25. else {
  26. $username = $_data['username'];
  27. }
  28. }
  29. else {
  30. $username = $_SESSION['mailcow_cc_username'];
  31. }
  32. if (!is_numeric($_data["validity"]) || $_data["validity"] > 672) {
  33. $_SESSION['return'] = array(
  34. 'type' => 'danger',
  35. 'msg' => sprintf($lang['danger']['validity_missing'])
  36. );
  37. return false;
  38. }
  39. try {
  40. $stmt = $pdo->prepare("SELECT `domain` FROM `mailbox` WHERE `username` = :username");
  41. $stmt->execute(array(':username' => $_SESSION['mailcow_cc_username']));
  42. $domain = $stmt->fetch(PDO::FETCH_ASSOC)['domain'];
  43. }
  44. catch (PDOException $e) {
  45. $_SESSION['return'] = array(
  46. 'type' => 'danger',
  47. 'msg' => 'MySQL: '.$e
  48. );
  49. return false;
  50. }
  51. $validity = strtotime("+".$_data["validity"]." hour");
  52. $letters = 'abcefghijklmnopqrstuvwxyz1234567890';
  53. $random_name = substr(str_shuffle($letters), 0, 24);
  54. try {
  55. $stmt = $pdo->prepare("INSERT INTO `spamalias` (`address`, `goto`, `validity`) VALUES
  56. (:address, :goto, :validity)");
  57. $stmt->execute(array(
  58. ':address' => $random_name . '@' . $domain,
  59. ':goto' => $username,
  60. ':validity' => $validity
  61. ));
  62. }
  63. catch (PDOException $e) {
  64. $_SESSION['return'] = array(
  65. 'type' => 'danger',
  66. 'msg' => 'MySQL: '.$e
  67. );
  68. return false;
  69. }
  70. $_SESSION['return'] = array(
  71. 'type' => 'success',
  72. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($usernames))
  73. );
  74. break;
  75. case 'syncjob':
  76. if (!isset($_SESSION['acl']['syncjobs']) || $_SESSION['acl']['syncjobs'] != "1" ) {
  77. $_SESSION['return'] = array(
  78. 'type' => 'danger',
  79. 'msg' => sprintf($lang['danger']['access_denied'])
  80. );
  81. return false;
  82. }
  83. if (isset($_data['username']) && filter_var($_data['username'], FILTER_VALIDATE_EMAIL)) {
  84. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data['username'])) {
  85. $_SESSION['return'] = array(
  86. 'type' => 'danger',
  87. 'msg' => sprintf($lang['danger']['access_denied'])
  88. );
  89. return false;
  90. }
  91. else {
  92. $username = $_data['username'];
  93. }
  94. }
  95. elseif ($_SESSION['mailcow_cc_role'] == "user") {
  96. $username = $_SESSION['mailcow_cc_username'];
  97. }
  98. else {
  99. $_SESSION['return'] = array(
  100. 'type' => 'danger',
  101. 'msg' => 'No user defined'
  102. );
  103. return false;
  104. }
  105. $active = intval($_data['active']);
  106. $delete2duplicates = intval($_data['delete2duplicates']);
  107. $delete1 = intval($_data['delete1']);
  108. $delete2 = intval($_data['delete2']);
  109. $port1 = $_data['port1'];
  110. $host1 = strtolower($_data['host1']);
  111. $password1 = $_data['password1'];
  112. $exclude = $_data['exclude'];
  113. $maxage = $_data['maxage'];
  114. $subfolder2 = $_data['subfolder2'];
  115. $user1 = $_data['user1'];
  116. $mins_interval = $_data['mins_interval'];
  117. $enc1 = $_data['enc1'];
  118. if (empty($subfolder2)) {
  119. $subfolder2 = "";
  120. }
  121. if (!isset($maxage) || !filter_var($maxage, FILTER_VALIDATE_INT, array('options' => array('min_range' => 1, 'max_range' => 32767)))) {
  122. $maxage = "0";
  123. }
  124. if (!filter_var($port1, FILTER_VALIDATE_INT, array('options' => array('min_range' => 1, 'max_range' => 65535)))) {
  125. $_SESSION['return'] = array(
  126. 'type' => 'danger',
  127. 'msg' => sprintf($lang['danger']['access_denied'])
  128. );
  129. return false;
  130. }
  131. if (!filter_var($mins_interval, FILTER_VALIDATE_INT, array('options' => array('min_range' => 10, 'max_range' => 3600)))) {
  132. $_SESSION['return'] = array(
  133. 'type' => 'danger',
  134. 'msg' => sprintf($lang['danger']['access_denied'])
  135. );
  136. return false;
  137. }
  138. if (!is_valid_domain_name($host1)) {
  139. $_SESSION['return'] = array(
  140. 'type' => 'danger',
  141. 'msg' => sprintf($lang['danger']['access_denied'])
  142. );
  143. return false;
  144. }
  145. if ($enc1 != "TLS" && $enc1 != "SSL" && $enc1 != "PLAIN") {
  146. $_SESSION['return'] = array(
  147. 'type' => 'danger',
  148. 'msg' => sprintf($lang['danger']['access_denied'])
  149. );
  150. return false;
  151. }
  152. if (@preg_match("/" . $exclude . "/", null) === false) {
  153. $_SESSION['return'] = array(
  154. 'type' => 'danger',
  155. 'msg' => sprintf($lang['danger']['access_denied'])
  156. );
  157. return false;
  158. }
  159. try {
  160. $stmt = $pdo->prepare("SELECT '1' FROM `imapsync`
  161. WHERE `user2` = :user2 AND `user1` = :user1 AND `host1` = :host1");
  162. $stmt->execute(array(':user1' => $user1, ':user2' => $username, ':host1' => $host1));
  163. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  164. }
  165. catch(PDOException $e) {
  166. $_SESSION['return'] = array(
  167. 'type' => 'danger',
  168. 'msg' => 'MySQL: '.$e
  169. );
  170. return false;
  171. }
  172. if ($num_results != 0) {
  173. $_SESSION['return'] = array(
  174. 'type' => 'danger',
  175. 'msg' => sprintf($lang['danger']['object_exists'], htmlspecialchars($host1 . ' / ' . $user1))
  176. );
  177. return false;
  178. }
  179. try {
  180. $stmt = $pdo->prepare("INSERT INTO `imapsync` (`user2`, `exclude`, `delete1`, `delete2`, `maxage`, `subfolder2`, `host1`, `authmech1`, `user1`, `password1`, `mins_interval`, `port1`, `enc1`, `delete2duplicates`, `active`)
  181. VALUES (:user2, :exclude, :maxage, :delete1, :delete2, :subfolder2, :host1, :authmech1, :user1, :password1, :mins_interval, :port1, :enc1, :delete2duplicates, :active)");
  182. $stmt->execute(array(
  183. ':user2' => $username,
  184. ':exclude' => $exclude,
  185. ':maxage' => $maxage,
  186. ':delete1' => $delete1,
  187. ':delete2' => $delete2,
  188. ':subfolder2' => $subfolder2,
  189. ':host1' => $host1,
  190. ':authmech1' => 'PLAIN',
  191. ':user1' => $user1,
  192. ':password1' => $password1,
  193. ':mins_interval' => $mins_interval,
  194. ':port1' => $port1,
  195. ':enc1' => $enc1,
  196. ':delete2duplicates' => $delete2duplicates,
  197. ':active' => $active,
  198. ));
  199. }
  200. catch(PDOException $e) {
  201. $_SESSION['return'] = array(
  202. 'type' => 'danger',
  203. 'msg' => 'MySQL: '.$e
  204. );
  205. return false;
  206. }
  207. $_SESSION['return'] = array(
  208. 'type' => 'success',
  209. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  210. );
  211. return true;
  212. break;
  213. case 'domain':
  214. if ($_SESSION['mailcow_cc_role'] != "admin") {
  215. $_SESSION['return'] = array(
  216. 'type' => 'danger',
  217. 'msg' => sprintf($lang['danger']['access_denied'])
  218. );
  219. return false;
  220. }
  221. $domain = idn_to_ascii(strtolower(trim($_data['domain'])));
  222. $description = $_data['description'];
  223. $aliases = $_data['aliases'];
  224. $mailboxes = $_data['mailboxes'];
  225. $maxquota = $_data['maxquota'];
  226. $quota = $_data['quota'];
  227. if ($maxquota > $quota) {
  228. $_SESSION['return'] = array(
  229. 'type' => 'danger',
  230. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeds_domain_quota'])
  231. );
  232. return false;
  233. }
  234. if ($maxquota == "0" || empty($maxquota)) {
  235. $_SESSION['return'] = array(
  236. 'type' => 'danger',
  237. 'msg' => sprintf($lang['danger']['maxquota_empty'])
  238. );
  239. return false;
  240. }
  241. $active = intval($_data['active']);
  242. $relay_all_recipients = intval($_data['relay_all_recipients']);
  243. $backupmx = intval($_data['backupmx']);
  244. ($relay_all_recipients == 1) ? $backupmx = '1' : null;
  245. if (!is_valid_domain_name($domain)) {
  246. $_SESSION['return'] = array(
  247. 'type' => 'danger',
  248. 'msg' => sprintf($lang['danger']['domain_invalid'])
  249. );
  250. return false;
  251. }
  252. foreach (array($quota, $maxquota, $mailboxes, $aliases) as $data) {
  253. if (!is_numeric($data)) {
  254. $_SESSION['return'] = array(
  255. 'type' => 'danger',
  256. 'msg' => sprintf($lang['danger']['object_is_not_numeric'], htmlspecialchars($data))
  257. );
  258. return false;
  259. }
  260. }
  261. try {
  262. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  263. WHERE `domain` = :domain");
  264. $stmt->execute(array(':domain' => $domain));
  265. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  266. $stmt = $pdo->prepare("SELECT `alias_domain` FROM `alias_domain`
  267. WHERE `alias_domain` = :domain");
  268. $stmt->execute(array(':domain' => $domain));
  269. $num_results = $num_results + count($stmt->fetchAll(PDO::FETCH_ASSOC));
  270. }
  271. catch(PDOException $e) {
  272. $_SESSION['return'] = array(
  273. 'type' => 'danger',
  274. 'msg' => 'MySQL: '.$e
  275. );
  276. return false;
  277. }
  278. if ($num_results != 0) {
  279. $_SESSION['return'] = array(
  280. 'type' => 'danger',
  281. 'msg' => sprintf($lang['danger']['domain_exists'], htmlspecialchars($domain))
  282. );
  283. return false;
  284. }
  285. try {
  286. $stmt = $pdo->prepare("INSERT INTO `domain` (`domain`, `description`, `aliases`, `mailboxes`, `maxquota`, `quota`, `backupmx`, `active`, `relay_all_recipients`)
  287. VALUES (:domain, :description, :aliases, :mailboxes, :maxquota, :quota, :backupmx, :active, :relay_all_recipients)");
  288. $stmt->execute(array(
  289. ':domain' => $domain,
  290. ':description' => $description,
  291. ':aliases' => $aliases,
  292. ':mailboxes' => $mailboxes,
  293. ':maxquota' => $maxquota,
  294. ':quota' => $quota,
  295. ':backupmx' => $backupmx,
  296. ':active' => $active,
  297. ':relay_all_recipients' => $relay_all_recipients
  298. ));
  299. try {
  300. $redis->hSet('DOMAIN_MAP', $domain, 1);
  301. }
  302. catch (RedisException $e) {
  303. $_SESSION['return'] = array(
  304. 'type' => 'danger',
  305. 'msg' => 'Redis: '.$e
  306. );
  307. return false;
  308. }
  309. $_SESSION['return'] = array(
  310. 'type' => 'success',
  311. 'msg' => sprintf($lang['success']['domain_added'], htmlspecialchars($domain))
  312. );
  313. }
  314. catch (PDOException $e) {
  315. mailbox('delete', 'domain', array('domain' => $domain));
  316. $_SESSION['return'] = array(
  317. 'type' => 'danger',
  318. 'msg' => 'MySQL: '.$e
  319. );
  320. return false;
  321. }
  322. break;
  323. case 'alias':
  324. $addresses = array_map('trim', preg_split( "/( |,|;|\n)/", $_data['address']));
  325. $gotos = array_map('trim', preg_split( "/( |,|;|\n)/", $_data['goto']));
  326. $active = intval($_data['active']);
  327. $goto_null = intval($_data['goto_null']);
  328. if (empty($addresses[0])) {
  329. $_SESSION['return'] = array(
  330. 'type' => 'danger',
  331. 'msg' => sprintf($lang['danger']['alias_empty'])
  332. );
  333. return false;
  334. }
  335. if (empty($gotos[0]) && $goto_null == 0) {
  336. $_SESSION['return'] = array(
  337. 'type' => 'danger',
  338. 'msg' => sprintf($lang['danger']['goto_empty'])
  339. );
  340. return false;
  341. }
  342. if ($goto_null == "1") {
  343. $goto = "null@localhost";
  344. }
  345. else {
  346. foreach ($gotos as &$goto) {
  347. if (empty($goto)) {
  348. continue;
  349. }
  350. $goto_domain = idn_to_ascii(substr(strstr($goto, '@'), 1));
  351. $goto_local_part = strstr($goto, '@', true);
  352. $goto = $goto_local_part.'@'.$goto_domain;
  353. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox`
  354. WHERE `kind` REGEXP 'location|thing|group'
  355. AND `username`= :goto");
  356. $stmt->execute(array(':goto' => $goto));
  357. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  358. if ($num_results != 0) {
  359. $_SESSION['return'] = array(
  360. 'type' => 'danger',
  361. 'msg' => sprintf($lang['danger']['goto_invalid'])
  362. );
  363. return false;
  364. }
  365. if (!filter_var($goto, FILTER_VALIDATE_EMAIL) === true) {
  366. $_SESSION['return'] = array(
  367. 'type' => 'danger',
  368. 'msg' => sprintf($lang['danger']['goto_invalid'])
  369. );
  370. return false;
  371. }
  372. }
  373. $gotos = array_filter($gotos);
  374. $goto = implode(",", $gotos);
  375. }
  376. foreach ($addresses as $address) {
  377. if (empty($address)) {
  378. continue;
  379. }
  380. if (in_array($address, $gotos)) {
  381. continue;
  382. }
  383. $stmt = $pdo->prepare("SELECT `address` FROM `alias`
  384. WHERE `address`= :address");
  385. $stmt->execute(array(':address' => $address));
  386. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  387. if ($num_results != 0) {
  388. $_SESSION['return'] = array(
  389. 'type' => 'danger',
  390. 'msg' => sprintf($lang['danger']['is_alias_or_mailbox'], htmlspecialchars($address))
  391. );
  392. return false;
  393. }
  394. $domain = idn_to_ascii(substr(strstr($address, '@'), 1));
  395. $local_part = strstr($address, '@', true);
  396. $address = $local_part.'@'.$domain;
  397. $domaindata = mailbox('get', 'domain_details', $domain);
  398. if (is_array($domaindata) && $domaindata['aliases_left'] == "0") {
  399. $_SESSION['return'] = array(
  400. 'type' => 'danger',
  401. 'msg' => sprintf($lang['danger']['max_alias_exceeded'])
  402. );
  403. return false;
  404. }
  405. try {
  406. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  407. WHERE `domain`= :domain1 OR `domain` = (SELECT `target_domain` FROM `alias_domain` WHERE `alias_domain` = :domain2)");
  408. $stmt->execute(array(':domain1' => $domain, ':domain2' => $domain));
  409. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  410. if ($num_results == 0) {
  411. $_SESSION['return'] = array(
  412. 'type' => 'danger',
  413. 'msg' => sprintf($lang['danger']['domain_not_found'], htmlspecialchars($domain))
  414. );
  415. return false;
  416. }
  417. $stmt = $pdo->prepare("SELECT `address` FROM `alias`
  418. WHERE `address`= :address");
  419. $stmt->execute(array(':address' => $address));
  420. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  421. if ($num_results != 0) {
  422. $_SESSION['return'] = array(
  423. 'type' => 'danger',
  424. 'msg' => sprintf($lang['danger']['is_alias_or_mailbox'], htmlspecialchars($address))
  425. );
  426. return false;
  427. }
  428. $stmt = $pdo->prepare("SELECT `address` FROM `spamalias`
  429. WHERE `address`= :address");
  430. $stmt->execute(array(':address' => $address));
  431. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  432. if ($num_results != 0) {
  433. $_SESSION['return'] = array(
  434. 'type' => 'danger',
  435. 'msg' => sprintf($lang['danger']['is_spam_alias'], htmlspecialchars($address))
  436. );
  437. return false;
  438. }
  439. }
  440. catch(PDOException $e) {
  441. $_SESSION['return'] = array(
  442. 'type' => 'danger',
  443. 'msg' => 'MySQL: '.$e
  444. );
  445. return false;
  446. }
  447. if ((!filter_var($address, FILTER_VALIDATE_EMAIL) === true) && !empty($local_part)) {
  448. $_SESSION['return'] = array(
  449. 'type' => 'danger',
  450. 'msg' => sprintf($lang['danger']['alias_invalid'])
  451. );
  452. return false;
  453. }
  454. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  455. $_SESSION['return'] = array(
  456. 'type' => 'danger',
  457. 'msg' => sprintf($lang['danger']['access_denied'])
  458. );
  459. return false;
  460. }
  461. try {
  462. $stmt = $pdo->prepare("INSERT INTO `alias` (`address`, `goto`, `domain`, `active`)
  463. VALUES (:address, :goto, :domain, :active)");
  464. if (!filter_var($address, FILTER_VALIDATE_EMAIL) === true) {
  465. $stmt->execute(array(
  466. ':address' => '@'.$domain,
  467. ':goto' => $goto,
  468. ':domain' => $domain,
  469. ':active' => $active
  470. ));
  471. }
  472. else {
  473. $stmt->execute(array(
  474. ':address' => $address,
  475. ':goto' => $goto,
  476. ':domain' => $domain,
  477. ':active' => $active
  478. ));
  479. }
  480. $_SESSION['return'] = array(
  481. 'type' => 'success',
  482. 'msg' => sprintf($lang['success']['alias_added'])
  483. );
  484. }
  485. catch (PDOException $e) {
  486. mailbox('delete', 'alias', array('address' => $address));
  487. $_SESSION['return'] = array(
  488. 'type' => 'danger',
  489. 'msg' => 'MySQL: '.$e
  490. );
  491. return false;
  492. }
  493. }
  494. $_SESSION['return'] = array(
  495. 'type' => 'success',
  496. 'msg' => sprintf($lang['success']['alias_added'])
  497. );
  498. break;
  499. case 'alias_domain':
  500. $active = intval($_data['active']);
  501. $alias_domains = array_map('trim', preg_split( "/( |,|;|\n)/", $_data['alias_domain']));
  502. $target_domain = idn_to_ascii(strtolower(trim($_data['target_domain'])));
  503. if (!is_valid_domain_name($target_domain)) {
  504. $_SESSION['return'] = array(
  505. 'type' => 'danger',
  506. 'msg' => sprintf($lang['danger']['target_domain_invalid'])
  507. );
  508. return false;
  509. }
  510. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $target_domain)) {
  511. $_SESSION['return'] = array(
  512. 'type' => 'danger',
  513. 'msg' => sprintf($lang['danger']['access_denied'])
  514. );
  515. return false;
  516. }
  517. foreach ($alias_domains as $alias_domain) {
  518. $alias_domain = idn_to_ascii(strtolower(trim($alias_domain)));
  519. if (!is_valid_domain_name($alias_domain)) {
  520. $_SESSION['return'] = array(
  521. 'type' => 'danger',
  522. 'msg' => sprintf($lang['danger']['alias_domain_invalid'])
  523. );
  524. return false;
  525. }
  526. if ($alias_domain == $target_domain) {
  527. $_SESSION['return'] = array(
  528. 'type' => 'danger',
  529. 'msg' => sprintf($lang['danger']['aliasd_targetd_identical'])
  530. );
  531. return false;
  532. }
  533. try {
  534. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  535. WHERE `domain`= :target_domain");
  536. $stmt->execute(array(':target_domain' => $target_domain));
  537. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  538. if ($num_results == 0) {
  539. $_SESSION['return'] = array(
  540. 'type' => 'danger',
  541. 'msg' => sprintf($lang['danger']['targetd_not_found'])
  542. );
  543. return false;
  544. }
  545. $stmt = $pdo->prepare("SELECT `alias_domain` FROM `alias_domain` WHERE `alias_domain`= :alias_domain
  546. UNION
  547. SELECT `alias_domain` FROM `alias_domain` WHERE `alias_domain`= :alias_domain_in_domain");
  548. $stmt->execute(array(':alias_domain' => $alias_domain, ':alias_domain_in_domain' => $alias_domain));
  549. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  550. if ($num_results != 0) {
  551. $_SESSION['return'] = array(
  552. 'type' => 'danger',
  553. 'msg' => sprintf($lang['danger']['aliasd_exists'])
  554. );
  555. return false;
  556. }
  557. }
  558. catch(PDOException $e) {
  559. $_SESSION['return'] = array(
  560. 'type' => 'danger',
  561. 'msg' => 'MySQL: '.$e
  562. );
  563. return false;
  564. }
  565. try {
  566. $stmt = $pdo->prepare("INSERT INTO `alias_domain` (`alias_domain`, `target_domain`, `active`)
  567. VALUES (:alias_domain, :target_domain, :active)");
  568. $stmt->execute(array(
  569. ':alias_domain' => $alias_domain,
  570. ':target_domain' => $target_domain,
  571. ':active' => $active
  572. ));
  573. }
  574. catch (PDOException $e) {
  575. mailbox('delete', 'alias_domain', array('alias_domain' => $alias_domain));
  576. $_SESSION['return'] = array(
  577. 'type' => 'danger',
  578. 'msg' => 'MySQL: '.$e
  579. );
  580. return false;
  581. }
  582. }
  583. $_SESSION['return'] = array(
  584. 'type' => 'success',
  585. 'msg' => sprintf($lang['success']['aliasd_added'], htmlspecialchars(implode(', ', $alias_domains)))
  586. );
  587. break;
  588. case 'mailbox':
  589. $local_part = strtolower(trim($_data['local_part']));
  590. $domain = idn_to_ascii(strtolower(trim($_data['domain'])));
  591. $username = $local_part . '@' . $domain;
  592. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  593. $_SESSION['return'] = array(
  594. 'type' => 'danger',
  595. 'msg' => sprintf($lang['danger']['mailbox_invalid'])
  596. );
  597. return false;
  598. }
  599. if (empty($_data['local_part'])) {
  600. $_SESSION['return'] = array(
  601. 'type' => 'danger',
  602. 'msg' => sprintf($lang['danger']['mailbox_invalid'])
  603. );
  604. return false;
  605. }
  606. $password = $_data['password'];
  607. $password2 = $_data['password2'];
  608. $name = $_data['name'];
  609. $quota_m = filter_var($_data['quota'], FILTER_SANITIZE_NUMBER_FLOAT);
  610. if (empty($name)) {
  611. $name = $local_part;
  612. }
  613. $active = intval($_data['active']);
  614. $quota_b = ($quota_m * 1048576);
  615. $maildir = $domain."/".$local_part."/";
  616. if (!is_valid_domain_name($domain)) {
  617. $_SESSION['return'] = array(
  618. 'type' => 'danger',
  619. 'msg' => sprintf($lang['danger']['domain_invalid'])
  620. );
  621. return false;
  622. }
  623. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  624. $_SESSION['return'] = array(
  625. 'type' => 'danger',
  626. 'msg' => sprintf($lang['danger']['access_denied'])
  627. );
  628. return false;
  629. }
  630. try {
  631. $stmt = $pdo->prepare("SELECT `mailboxes`, `maxquota`, `quota` FROM `domain`
  632. WHERE `domain` = :domain");
  633. $stmt->execute(array(':domain' => $domain));
  634. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  635. $stmt = $pdo->prepare("SELECT
  636. COUNT(*) as count,
  637. COALESCE(ROUND(SUM(`quota`)/1048576), 0) as `quota`
  638. FROM `mailbox`
  639. WHERE `kind` NOT REGEXP 'location|thing|group'
  640. AND `domain` = :domain");
  641. $stmt->execute(array(':domain' => $domain));
  642. $MailboxData = $stmt->fetch(PDO::FETCH_ASSOC);
  643. $stmt = $pdo->prepare("SELECT `local_part` FROM `mailbox` WHERE `local_part` = :local_part and `domain`= :domain");
  644. $stmt->execute(array(':local_part' => $local_part, ':domain' => $domain));
  645. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  646. if ($num_results != 0) {
  647. $_SESSION['return'] = array(
  648. 'type' => 'danger',
  649. 'msg' => sprintf($lang['danger']['object_exists'], htmlspecialchars($username))
  650. );
  651. return false;
  652. }
  653. $stmt = $pdo->prepare("SELECT `address` FROM `alias` WHERE address= :username");
  654. $stmt->execute(array(':username' => $username));
  655. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  656. if ($num_results != 0) {
  657. $_SESSION['return'] = array(
  658. 'type' => 'danger',
  659. 'msg' => sprintf($lang['danger']['is_alias'], htmlspecialchars($username))
  660. );
  661. return false;
  662. }
  663. $stmt = $pdo->prepare("SELECT `address` FROM `spamalias` WHERE `address`= :username");
  664. $stmt->execute(array(':username' => $username));
  665. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  666. if ($num_results != 0) {
  667. $_SESSION['return'] = array(
  668. 'type' => 'danger',
  669. 'msg' => sprintf($lang['danger']['is_spam_alias'], htmlspecialchars($username))
  670. );
  671. return false;
  672. }
  673. $stmt = $pdo->prepare("SELECT `domain` FROM `domain` WHERE `domain`= :domain");
  674. $stmt->execute(array(':domain' => $domain));
  675. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  676. if ($num_results == 0) {
  677. $_SESSION['return'] = array(
  678. 'type' => 'danger',
  679. 'msg' => sprintf($lang['danger']['domain_not_found'], htmlspecialchars($domain))
  680. );
  681. return false;
  682. }
  683. }
  684. catch(PDOException $e) {
  685. $_SESSION['return'] = array(
  686. 'type' => 'danger',
  687. 'msg' => 'MySQL: '.$e
  688. );
  689. return false;
  690. }
  691. if (!is_numeric($quota_m) || $quota_m == "0") {
  692. $_SESSION['return'] = array(
  693. 'type' => 'danger',
  694. 'msg' => sprintf($lang['danger']['quota_not_0_not_numeric'])
  695. );
  696. return false;
  697. }
  698. if (!empty($password) && !empty($password2)) {
  699. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) {
  700. $_SESSION['return'] = array(
  701. 'type' => 'danger',
  702. 'msg' => sprintf($lang['danger']['password_complexity'])
  703. );
  704. return false;
  705. }
  706. if ($password != $password2) {
  707. $_SESSION['return'] = array(
  708. 'type' => 'danger',
  709. 'msg' => sprintf($lang['danger']['password_mismatch'])
  710. );
  711. return false;
  712. }
  713. $password_hashed = hash_password($password);
  714. }
  715. else {
  716. $_SESSION['return'] = array(
  717. 'type' => 'danger',
  718. 'msg' => sprintf($lang['danger']['password_empty'])
  719. );
  720. return false;
  721. }
  722. if ($MailboxData['count'] >= $DomainData['mailboxes']) {
  723. $_SESSION['return'] = array(
  724. 'type' => 'danger',
  725. 'msg' => sprintf($lang['danger']['max_mailbox_exceeded'], $MailboxData['count'], $DomainData['mailboxes'])
  726. );
  727. return false;
  728. }
  729. if ($quota_m > $DomainData['maxquota']) {
  730. $_SESSION['return'] = array(
  731. 'type' => 'danger',
  732. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeded'], $DomainData['maxquota'])
  733. );
  734. return false;
  735. }
  736. if (($MailboxData['quota'] + $quota_m) > $DomainData['quota']) {
  737. $quota_left_m = ($DomainData['quota'] - $MailboxData['quota']);
  738. $_SESSION['return'] = array(
  739. 'type' => 'danger',
  740. 'msg' => sprintf($lang['danger']['mailbox_quota_left_exceeded'], $quota_left_m)
  741. );
  742. return false;
  743. }
  744. try {
  745. $stmt = $pdo->prepare("INSERT INTO `mailbox` (`username`, `password`, `name`, `maildir`, `quota`, `local_part`, `domain`, `active`)
  746. VALUES (:username, :password_hashed, :name, :maildir, :quota_b, :local_part, :domain, :active)");
  747. $stmt->execute(array(
  748. ':username' => $username,
  749. ':password_hashed' => $password_hashed,
  750. ':name' => $name,
  751. ':maildir' => $maildir,
  752. ':quota_b' => $quota_b,
  753. ':local_part' => $local_part,
  754. ':domain' => $domain,
  755. ':active' => $active
  756. ));
  757. $stmt = $pdo->prepare("INSERT INTO `quota2` (`username`, `bytes`, `messages`)
  758. VALUES (:username, '0', '0') ON DUPLICATE KEY UPDATE `bytes` = '0', `messages` = '0';");
  759. $stmt->execute(array(':username' => $username));
  760. $stmt = $pdo->prepare("INSERT INTO `alias` (`address`, `goto`, `domain`, `active`)
  761. VALUES (:username1, :username2, :domain, :active)");
  762. $stmt->execute(array(
  763. ':username1' => $username,
  764. ':username2' => $username,
  765. ':domain' => $domain,
  766. ':active' => $active
  767. ));
  768. $stmt = $pdo->prepare("INSERT INTO `user_acl` (`username`) VALUES (:username)");
  769. $stmt->execute(array(
  770. ':username' => $username
  771. ));
  772. $_SESSION['return'] = array(
  773. 'type' => 'success',
  774. 'msg' => sprintf($lang['success']['mailbox_added'], htmlspecialchars($username))
  775. );
  776. }
  777. catch (PDOException $e) {
  778. mailbox('delete', 'mailbox', array('username' => $username));
  779. $_SESSION['return'] = array(
  780. 'type' => 'danger',
  781. 'msg' => 'MySQL: '.$e
  782. );
  783. return false;
  784. }
  785. break;
  786. case 'resource':
  787. $domain = idn_to_ascii(strtolower(trim($_data['domain'])));
  788. $description = $_data['description'];
  789. $local_part = preg_replace('/[^\da-z]/i', '', preg_quote($description, '/'));
  790. $name = $local_part . '@' . $domain;
  791. $kind = $_data['kind'];
  792. $active = intval($_data['active']);
  793. $multiple_bookings = intval($_data['multiple_bookings']);
  794. if (!filter_var($name, FILTER_VALIDATE_EMAIL)) {
  795. $_SESSION['return'] = array(
  796. 'type' => 'danger',
  797. 'msg' => sprintf($lang['danger']['resource_invalid'])
  798. );
  799. return false;
  800. }
  801. if (empty($description)) {
  802. $_SESSION['return'] = array(
  803. 'type' => 'danger',
  804. 'msg' => sprintf($lang['danger']['description_invalid'])
  805. );
  806. return false;
  807. }
  808. if ($kind != 'location' && $kind != 'group' && $kind != 'thing') {
  809. $_SESSION['return'] = array(
  810. 'type' => 'danger',
  811. 'msg' => sprintf($lang['danger']['resource_invalid'])
  812. );
  813. return false;
  814. }
  815. if (!is_valid_domain_name($domain)) {
  816. $_SESSION['return'] = array(
  817. 'type' => 'danger',
  818. 'msg' => sprintf($lang['danger']['domain_invalid'])
  819. );
  820. return false;
  821. }
  822. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  823. $_SESSION['return'] = array(
  824. 'type' => 'danger',
  825. 'msg' => sprintf($lang['danger']['access_denied'])
  826. );
  827. return false;
  828. }
  829. try {
  830. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox` WHERE `username` = :name");
  831. $stmt->execute(array(':name' => $name));
  832. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  833. if ($num_results != 0) {
  834. $_SESSION['return'] = array(
  835. 'type' => 'danger',
  836. 'msg' => sprintf($lang['danger']['object_exists'], htmlspecialchars($name))
  837. );
  838. return false;
  839. }
  840. $stmt = $pdo->prepare("SELECT `address` FROM `alias` WHERE address= :name");
  841. $stmt->execute(array(':name' => $name));
  842. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  843. if ($num_results != 0) {
  844. $_SESSION['return'] = array(
  845. 'type' => 'danger',
  846. 'msg' => sprintf($lang['danger']['is_alias'], htmlspecialchars($name))
  847. );
  848. return false;
  849. }
  850. $stmt = $pdo->prepare("SELECT `address` FROM `spamalias` WHERE `address`= :name");
  851. $stmt->execute(array(':name' => $name));
  852. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  853. if ($num_results != 0) {
  854. $_SESSION['return'] = array(
  855. 'type' => 'danger',
  856. 'msg' => sprintf($lang['danger']['is_spam_alias'], htmlspecialchars($name))
  857. );
  858. return false;
  859. }
  860. $stmt = $pdo->prepare("SELECT `domain` FROM `domain` WHERE `domain`= :domain");
  861. $stmt->execute(array(':domain' => $domain));
  862. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  863. if ($num_results == 0) {
  864. $_SESSION['return'] = array(
  865. 'type' => 'danger',
  866. 'msg' => sprintf($lang['danger']['domain_not_found'], htmlspecialchars($domain))
  867. );
  868. return false;
  869. }
  870. }
  871. catch(PDOException $e) {
  872. $_SESSION['return'] = array(
  873. 'type' => 'danger',
  874. 'msg' => 'MySQL: '.$e
  875. );
  876. return false;
  877. }
  878. try {
  879. $stmt = $pdo->prepare("INSERT INTO `mailbox` (`username`, `password`, `name`, `maildir`, `quota`, `local_part`, `domain`, `active`, `multiple_bookings`, `kind`)
  880. VALUES (:name, 'RESOURCE', :description, 'RESOURCE', 0, :local_part, :domain, :active, :multiple_bookings, :kind)");
  881. $stmt->execute(array(
  882. ':name' => $name,
  883. ':description' => $description,
  884. ':local_part' => $local_part,
  885. ':domain' => $domain,
  886. ':active' => $active,
  887. ':kind' => $kind,
  888. ':multiple_bookings' => $multiple_bookings
  889. ));
  890. $_SESSION['return'] = array(
  891. 'type' => 'success',
  892. 'msg' => sprintf($lang['success']['resource_added'], htmlspecialchars($name))
  893. );
  894. }
  895. catch (PDOException $e) {
  896. mailbox('delete', 'resource', array('name' => $name));
  897. $_SESSION['return'] = array(
  898. 'type' => 'danger',
  899. 'msg' => 'MySQL: '.$e
  900. );
  901. return false;
  902. }
  903. break;
  904. }
  905. break;
  906. case 'edit':
  907. switch ($_type) {
  908. case 'alias_domain':
  909. $alias_domains = (array)$_data['alias_domain'];
  910. foreach ($alias_domains as $alias_domain) {
  911. $alias_domain = idn_to_ascii(strtolower(trim($alias_domain)));
  912. $is_now = mailbox('get', 'alias_domain_details', $alias_domain);
  913. if (!empty($is_now)) {
  914. $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active_int'];
  915. $target_domain = (!empty($_data['target_domain'])) ? idn_to_ascii(strtolower(trim($_data['target_domain']))) : $is_now['target_domain'];
  916. }
  917. else {
  918. $_SESSION['return'] = array(
  919. 'type' => 'danger',
  920. 'msg' => sprintf($lang['danger']['alias_domain_invalid'])
  921. );
  922. return false;
  923. }
  924. if (!is_valid_domain_name($target_domain)) {
  925. $_SESSION['return'] = array(
  926. 'type' => 'danger',
  927. 'msg' => sprintf($lang['danger']['target_domain_invalid'])
  928. );
  929. return false;
  930. }
  931. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $target_domain)) {
  932. $_SESSION['return'] = array(
  933. 'type' => 'danger',
  934. 'msg' => sprintf($lang['danger']['access_denied'])
  935. );
  936. return false;
  937. }
  938. if (empty(mailbox('get', 'domain_details', $target_domain)) || !empty(mailbox('get', 'alias_domain_details', $target_domain))) {
  939. $_SESSION['return'] = array(
  940. 'type' => 'danger',
  941. 'msg' => sprintf($lang['danger']['target_domain_invalid'])
  942. );
  943. return false;
  944. }
  945. try {
  946. $stmt = $pdo->prepare("UPDATE `alias_domain` SET
  947. `target_domain` = :target_domain,
  948. `active` = :active
  949. WHERE `alias_domain` = :alias_domain");
  950. $stmt->execute(array(
  951. ':alias_domain' => $alias_domain,
  952. ':target_domain' => $target_domain,
  953. ':active' => $active
  954. ));
  955. }
  956. catch (PDOException $e) {
  957. $_SESSION['return'] = array(
  958. 'type' => 'danger',
  959. 'msg' => 'MySQL: '.$e
  960. );
  961. return false;
  962. }
  963. }
  964. $_SESSION['return'] = array(
  965. 'type' => 'success',
  966. 'msg' => sprintf($lang['success']['aliasd_modified'], htmlspecialchars(implode(', ', $alias_domains)))
  967. );
  968. break;
  969. case 'tls_policy':
  970. if (!is_array($_data['username'])) {
  971. $usernames = array();
  972. $usernames[] = $_data['username'];
  973. }
  974. else {
  975. $usernames = $_data['username'];
  976. }
  977. if (!isset($_SESSION['acl']['tls_policy']) || $_SESSION['acl']['tls_policy'] != "1" ) {
  978. $_SESSION['return'] = array(
  979. 'type' => 'danger',
  980. 'msg' => sprintf($lang['danger']['access_denied'])
  981. );
  982. return false;
  983. }
  984. foreach ($usernames as $username) {
  985. if (!filter_var($username, FILTER_VALIDATE_EMAIL) || !hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $username)) {
  986. $_SESSION['return'] = array(
  987. 'type' => 'danger',
  988. 'msg' => sprintf($lang['danger']['access_denied'])
  989. );
  990. return false;
  991. }
  992. $is_now = mailbox('get', 'tls_policy', $username);
  993. if (!empty($is_now)) {
  994. $tls_enforce_in = (isset($_data['tls_enforce_in'])) ? intval($_data['tls_enforce_in']) : $is_now['tls_enforce_in'];
  995. $tls_enforce_out = (isset($_data['tls_enforce_out'])) ? intval($_data['tls_enforce_out']) : $is_now['tls_enforce_out'];
  996. }
  997. else {
  998. $_SESSION['return'] = array(
  999. 'type' => 'danger',
  1000. 'msg' => sprintf($lang['danger']['access_denied'])
  1001. );
  1002. return false;
  1003. }
  1004. try {
  1005. $stmt = $pdo->prepare("UPDATE `mailbox` SET `tls_enforce_out` = :tls_out, `tls_enforce_in` = :tls_in WHERE `username` = :username");
  1006. $stmt->execute(array(
  1007. ':tls_out' => $tls_enforce_out,
  1008. ':tls_in' => $tls_enforce_in,
  1009. ':username' => $username
  1010. ));
  1011. }
  1012. catch (PDOException $e) {
  1013. $_SESSION['return'] = array(
  1014. 'type' => 'danger',
  1015. 'msg' => 'MySQL: '.$e
  1016. );
  1017. return false;
  1018. }
  1019. }
  1020. $_SESSION['return'] = array(
  1021. 'type' => 'success',
  1022. 'msg' => sprintf($lang['success']['mailbox_modified'], implode(', ', $usernames))
  1023. );
  1024. break;
  1025. case 'spam_score':
  1026. if (!is_array($_data['username'])) {
  1027. $usernames = array();
  1028. $usernames[] = $_data['username'];
  1029. }
  1030. else {
  1031. $usernames = $_data['username'];
  1032. }
  1033. if (!isset($_SESSION['acl']['spam_score']) || $_SESSION['acl']['spam_score'] != "1" ) {
  1034. $_SESSION['return'] = array(
  1035. 'type' => 'danger',
  1036. 'msg' => sprintf($lang['danger']['access_denied'])
  1037. );
  1038. return false;
  1039. }
  1040. foreach ($usernames as $username) {
  1041. $lowspamlevel = explode(',', $_data['spam_score'])[0];
  1042. $highspamlevel = explode(',', $_data['spam_score'])[1];
  1043. if (!is_numeric($lowspamlevel) || !is_numeric($highspamlevel)) {
  1044. $_SESSION['return'] = array(
  1045. 'type' => 'danger',
  1046. 'msg' => sprintf($lang['danger']['access_denied'])
  1047. );
  1048. return false;
  1049. }
  1050. try {
  1051. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :username
  1052. AND (`option` = 'lowspamlevel' OR `option` = 'highspamlevel')");
  1053. $stmt->execute(array(
  1054. ':username' => $username
  1055. ));
  1056. $stmt = $pdo->prepare("INSERT INTO `filterconf` (`object`, `option`, `value`)
  1057. VALUES (:username, 'highspamlevel', :highspamlevel)");
  1058. $stmt->execute(array(
  1059. ':username' => $username,
  1060. ':highspamlevel' => $highspamlevel
  1061. ));
  1062. $stmt = $pdo->prepare("INSERT INTO `filterconf` (`object`, `option`, `value`)
  1063. VALUES (:username, 'lowspamlevel', :lowspamlevel)");
  1064. $stmt->execute(array(
  1065. ':username' => $username,
  1066. ':lowspamlevel' => $lowspamlevel
  1067. ));
  1068. }
  1069. catch (PDOException $e) {
  1070. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :username
  1071. AND (`option` = 'lowspamlevel' OR `option` = 'highspamlevel')");
  1072. $stmt->execute(array(
  1073. ':username' => $username
  1074. ));
  1075. $_SESSION['return'] = array(
  1076. 'type' => 'danger',
  1077. 'msg' => 'MySQL: '.$e
  1078. );
  1079. return false;
  1080. }
  1081. }
  1082. $_SESSION['return'] = array(
  1083. 'type' => 'success',
  1084. 'msg' => sprintf($lang['success']['mailbox_modified'], implode(', ', $usernames))
  1085. );
  1086. break;
  1087. case 'time_limited_alias':
  1088. if (!isset($_SESSION['acl']['spam_alias']) || $_SESSION['acl']['spam_alias'] != "1" ) {
  1089. $_SESSION['return'] = array(
  1090. 'type' => 'danger',
  1091. 'msg' => sprintf($lang['danger']['access_denied'])
  1092. );
  1093. return false;
  1094. }
  1095. if (!is_array($_data['address'])) {
  1096. $addresses = array();
  1097. $addresses[] = $_data['address'];
  1098. }
  1099. else {
  1100. $addresses = $_data['address'];
  1101. }
  1102. foreach ($addresses as $address) {
  1103. try {
  1104. $stmt = $pdo->prepare("SELECT `goto` FROM `spamalias` WHERE `address` = :address");
  1105. $stmt->execute(array(':address' => $address));
  1106. $goto = $stmt->fetch(PDO::FETCH_ASSOC)['goto'];
  1107. }
  1108. catch (PDOException $e) {
  1109. $_SESSION['return'] = array(
  1110. 'type' => 'danger',
  1111. 'msg' => 'MySQL: '.$e
  1112. );
  1113. return false;
  1114. }
  1115. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $goto)) {
  1116. $_SESSION['return'] = array(
  1117. 'type' => 'danger',
  1118. 'msg' => sprintf($lang['danger']['access_denied'])
  1119. );
  1120. return false;
  1121. }
  1122. try {
  1123. $stmt = $pdo->prepare("UPDATE `spamalias` SET `validity` = (`validity` + 3600) WHERE
  1124. `address` = :address AND
  1125. `validity` >= :validity");
  1126. $stmt->execute(array(
  1127. ':address' => $address,
  1128. ':validity' => time()
  1129. ));
  1130. }
  1131. catch (PDOException $e) {
  1132. $_SESSION['return'] = array(
  1133. 'type' => 'danger',
  1134. 'msg' => 'MySQL: '.$e
  1135. );
  1136. return false;
  1137. }
  1138. }
  1139. $_SESSION['return'] = array(
  1140. 'type' => 'success',
  1141. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars(implode(', ', $usernames)))
  1142. );
  1143. break;
  1144. case 'delimiter_action':
  1145. if (!is_array($_data['username'])) {
  1146. $usernames = array();
  1147. $usernames[] = $_data['username'];
  1148. }
  1149. else {
  1150. $usernames = $_data['username'];
  1151. }
  1152. if (!isset($_SESSION['acl']['delimiter_action']) || $_SESSION['acl']['delimiter_action'] != "1" ) {
  1153. $_SESSION['return'] = array(
  1154. 'type' => 'danger',
  1155. 'msg' => sprintf($lang['danger']['access_denied'])
  1156. );
  1157. return false;
  1158. }
  1159. foreach ($usernames as $username) {
  1160. if (!filter_var($username, FILTER_VALIDATE_EMAIL) || !hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $username)) {
  1161. $_SESSION['return'] = array(
  1162. 'type' => 'danger',
  1163. 'msg' => sprintf($lang['danger']['access_denied'])
  1164. );
  1165. return false;
  1166. }
  1167. if (isset($_data['tagged_mail_handler']) && $_data['tagged_mail_handler'] == "subject") {
  1168. try {
  1169. $redis->hSet('RCPT_WANTS_SUBJECT_TAG', $username, 1);
  1170. }
  1171. catch (RedisException $e) {
  1172. $_SESSION['return'] = array(
  1173. 'type' => 'danger',
  1174. 'msg' => 'Redis: '.$e
  1175. );
  1176. return false;
  1177. }
  1178. }
  1179. else {
  1180. try {
  1181. $redis->hDel('RCPT_WANTS_SUBJECT_TAG', $username);
  1182. }
  1183. catch (RedisException $e) {
  1184. $_SESSION['return'] = array(
  1185. 'type' => 'danger',
  1186. 'msg' => 'Redis: '.$e
  1187. );
  1188. return false;
  1189. }
  1190. }
  1191. }
  1192. $_SESSION['return'] = array(
  1193. 'type' => 'success',
  1194. 'msg' => sprintf($lang['success']['mailbox_modified'], implode(', ', $usernames))
  1195. );
  1196. break;
  1197. case 'ratelimit':
  1198. $rl_value = intval($_data['rl_value']);
  1199. $rl_frame = $_data['rl_frame'];
  1200. if (!in_array($rl_frame, array('s', 'm', 'h'))) {
  1201. $_SESSION['return'] = array(
  1202. 'type' => 'danger',
  1203. 'msg' => 'Ratelimit time frame is incorrect'
  1204. );
  1205. return false;
  1206. }
  1207. if (!is_array($_data['object'])) {
  1208. $objects = array();
  1209. $objects[] = $_data['object'];
  1210. }
  1211. else {
  1212. $objects = $_data['object'];
  1213. }
  1214. foreach ($objects as $object) {
  1215. if (is_valid_domain_name($object)) {
  1216. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $object)) {
  1217. $_SESSION['return'] = array(
  1218. 'type' => 'danger',
  1219. 'msg' => sprintf($lang['danger']['access_denied'])
  1220. );
  1221. return false;
  1222. }
  1223. }
  1224. elseif (filter_var($object, FILTER_VALIDATE_EMAIL)) {
  1225. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $object)) {
  1226. $_SESSION['return'] = array(
  1227. 'type' => 'danger',
  1228. 'msg' => sprintf($lang['danger']['access_denied'])
  1229. );
  1230. return false;
  1231. }
  1232. }
  1233. else {
  1234. return false;
  1235. }
  1236. if (empty($rl_value)) {
  1237. try {
  1238. $redis->hDel('RL_VALUE', $object);
  1239. }
  1240. catch (RedisException $e) {
  1241. $_SESSION['return'] = array(
  1242. 'type' => 'danger',
  1243. 'msg' => 'Redis: '.$e
  1244. );
  1245. return false;
  1246. }
  1247. }
  1248. else {
  1249. try {
  1250. $redis->hSet('RL_VALUE', $object, $rl_value . ' / 1' . $rl_frame);
  1251. }
  1252. catch (RedisException $e) {
  1253. $_SESSION['return'] = array(
  1254. 'type' => 'danger',
  1255. 'msg' => 'Redis: '.$e
  1256. );
  1257. return false;
  1258. }
  1259. }
  1260. }
  1261. $_SESSION['return'] = array(
  1262. 'type' => 'success',
  1263. 'msg' => sprintf($lang['success']['domain_modified'], implode(', ', $objects))
  1264. );
  1265. break;
  1266. case 'syncjob':
  1267. if (!is_array($_data['id'])) {
  1268. $ids = array();
  1269. $ids[] = $_data['id'];
  1270. }
  1271. else {
  1272. $ids = $_data['id'];
  1273. }
  1274. if (!isset($_SESSION['acl']['syncjobs']) || $_SESSION['acl']['syncjobs'] != "1" ) {
  1275. $_SESSION['return'] = array(
  1276. 'type' => 'danger',
  1277. 'msg' => sprintf($lang['danger']['access_denied'])
  1278. );
  1279. return false;
  1280. }
  1281. foreach ($ids as $id) {
  1282. $is_now = mailbox('get', 'syncjob_details', $id);
  1283. if (!empty($is_now)) {
  1284. $username = $is_now['user2'];
  1285. $user1 = (!empty($_data['user1'])) ? $_data['user1'] : $is_now['user1'];
  1286. $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active_int'];
  1287. $delete2duplicates = (isset($_data['delete2duplicates'])) ? intval($_data['delete2duplicates']) : $is_now['delete2duplicates'];
  1288. $delete1 = (isset($_data['delete1'])) ? intval($_data['delete1']) : $is_now['delete1'];
  1289. $delete2 = (isset($_data['delete2'])) ? intval($_data['delete2']) : $is_now['delete2'];
  1290. $port1 = (!empty($_data['port1'])) ? $_data['port1'] : $is_now['port1'];
  1291. $password1 = (!empty($_data['password1'])) ? $_data['password1'] : $is_now['password1'];
  1292. $host1 = (!empty($_data['host1'])) ? $_data['host1'] : $is_now['host1'];
  1293. $subfolder2 = (isset($_data['subfolder2'])) ? $_data['subfolder2'] : $is_now['subfolder2'];
  1294. $enc1 = (!empty($_data['enc1'])) ? $_data['enc1'] : $is_now['enc1'];
  1295. $mins_interval = (!empty($_data['mins_interval'])) ? $_data['mins_interval'] : $is_now['mins_interval'];
  1296. $exclude = (!empty($_data['exclude'])) ? $_data['exclude'] : '';
  1297. $maxage = (isset($_data['maxage']) && $_data['maxage'] != "") ? intval($_data['maxage']) : $is_now['maxage'];
  1298. }
  1299. else {
  1300. $_SESSION['return'] = array(
  1301. 'type' => 'danger',
  1302. 'msg' => sprintf($lang['danger']['access_denied'])
  1303. );
  1304. return false;
  1305. }
  1306. if (empty($subfolder2)) {
  1307. $subfolder2 = "";
  1308. }
  1309. if (!isset($maxage) || !filter_var($maxage, FILTER_VALIDATE_INT, array('options' => array('min_range' => 1, 'max_range' => 32767)))) {
  1310. $maxage = "0";
  1311. }
  1312. if (!filter_var($port1, FILTER_VALIDATE_INT, array('options' => array('min_range' => 1, 'max_range' => 65535)))) {
  1313. $_SESSION['return'] = array(
  1314. 'type' => 'danger',
  1315. 'msg' => sprintf($lang['danger']['access_denied'])
  1316. );
  1317. return false;
  1318. }
  1319. if (!filter_var($mins_interval, FILTER_VALIDATE_INT, array('options' => array('min_range' => 10, 'max_range' => 3600)))) {
  1320. $_SESSION['return'] = array(
  1321. 'type' => 'danger',
  1322. 'msg' => sprintf($lang['danger']['access_denied'])
  1323. );
  1324. return false;
  1325. }
  1326. if (!is_valid_domain_name($host1)) {
  1327. $_SESSION['return'] = array(
  1328. 'type' => 'danger',
  1329. 'msg' => sprintf($lang['danger']['access_denied'])
  1330. );
  1331. return false;
  1332. }
  1333. if ($enc1 != "TLS" && $enc1 != "SSL" && $enc1 != "PLAIN") {
  1334. $_SESSION['return'] = array(
  1335. 'type' => 'danger',
  1336. 'msg' => sprintf($lang['danger']['access_denied'])
  1337. );
  1338. return false;
  1339. }
  1340. if (@preg_match("/" . $exclude . "/", null) === false) {
  1341. $_SESSION['return'] = array(
  1342. 'type' => 'danger',
  1343. 'msg' => sprintf($lang['danger']['access_denied'])
  1344. );
  1345. return false;
  1346. }
  1347. try {
  1348. $stmt = $pdo->prepare("UPDATE `imapsync` SET `delete1` = :delete1, `delete2` = :delete2, `maxage` = :maxage, `subfolder2` = :subfolder2, `exclude` = :exclude, `host1` = :host1, `user1` = :user1, `password1` = :password1, `mins_interval` = :mins_interval, `port1` = :port1, `enc1` = :enc1, `delete2duplicates` = :delete2duplicates, `active` = :active
  1349. WHERE `id` = :id");
  1350. $stmt->execute(array(
  1351. ':delete1' => $delete1,
  1352. ':delete2' => $delete2,
  1353. ':id' => $id,
  1354. ':exclude' => $exclude,
  1355. ':maxage' => $maxage,
  1356. ':subfolder2' => $subfolder2,
  1357. ':host1' => $host1,
  1358. ':user1' => $user1,
  1359. ':password1' => $password1,
  1360. ':mins_interval' => $mins_interval,
  1361. ':port1' => $port1,
  1362. ':enc1' => $enc1,
  1363. ':delete2duplicates' => $delete2duplicates,
  1364. ':active' => $active,
  1365. ));
  1366. }
  1367. catch(PDOException $e) {
  1368. $_SESSION['return'] = array(
  1369. 'type' => 'danger',
  1370. 'msg' => 'MySQL: '.$e
  1371. );
  1372. return false;
  1373. }
  1374. }
  1375. $_SESSION['return'] = array(
  1376. 'type' => 'success',
  1377. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  1378. );
  1379. return true;
  1380. break;
  1381. case 'alias':
  1382. if (!is_array($_data['address'])) {
  1383. $addresses = array();
  1384. $addresses[] = $_data['address'];
  1385. }
  1386. else {
  1387. $addresses = $_data['address'];
  1388. }
  1389. foreach ($addresses as $address) {
  1390. $is_now = mailbox('get', 'alias_details', $address);
  1391. if (!empty($is_now)) {
  1392. $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active_int'];
  1393. $goto_null = (isset($_data['goto_null'])) ? intval($_data['goto_null']) : $is_now['goto_null'];
  1394. $goto = (!empty($_data['goto'])) ? $_data['goto'] : $is_now['goto'];
  1395. }
  1396. else {
  1397. $_SESSION['return'] = array(
  1398. 'type' => 'danger',
  1399. 'msg' => sprintf($lang['danger']['alias_invalid'])
  1400. );
  1401. return false;
  1402. }
  1403. if ($goto_null == "1") {
  1404. $goto = "null@localhost";
  1405. }
  1406. else {
  1407. $gotos = array_map('trim', preg_split( "/( |,|;|\n)/", $_data['goto']));
  1408. foreach ($gotos as &$goto) {
  1409. if (empty($goto)) {
  1410. continue;
  1411. }
  1412. if (!filter_var($goto, FILTER_VALIDATE_EMAIL)) {
  1413. $_SESSION['return'] = array(
  1414. 'type' => 'danger',
  1415. 'msg' =>sprintf($lang['danger']['goto_invalid'])
  1416. );
  1417. return false;
  1418. }
  1419. if ($goto == $address) {
  1420. $_SESSION['return'] = array(
  1421. 'type' => 'danger',
  1422. 'msg' => sprintf($lang['danger']['alias_goto_identical'])
  1423. );
  1424. return false;
  1425. }
  1426. }
  1427. $gotos = array_filter($gotos);
  1428. $goto = implode(",", $gotos);
  1429. }
  1430. $domain = idn_to_ascii(substr(strstr($address, '@'), 1));
  1431. $local_part = strstr($address, '@', true);
  1432. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  1433. $_SESSION['return'] = array(
  1434. 'type' => 'danger',
  1435. 'msg' => sprintf($lang['danger']['access_denied'])
  1436. );
  1437. return false;
  1438. }
  1439. if ((!filter_var($address, FILTER_VALIDATE_EMAIL) === true) && !empty($local_part)) {
  1440. $_SESSION['return'] = array(
  1441. 'type' => 'danger',
  1442. 'msg' => sprintf($lang['danger']['alias_invalid'])
  1443. );
  1444. return false;
  1445. }
  1446. try {
  1447. if (!empty($goto)) {
  1448. $stmt = $pdo->prepare("UPDATE `alias` SET
  1449. `goto` = :goto,
  1450. `active`= :active
  1451. WHERE `address` = :address");
  1452. $stmt->execute(array(
  1453. ':goto' => $goto,
  1454. ':active' => $active,
  1455. ':address' => $address
  1456. ));
  1457. }
  1458. else {
  1459. $stmt = $pdo->prepare("UPDATE `alias` SET
  1460. `active`= :active
  1461. WHERE `address` = :address");
  1462. $stmt->execute(array(
  1463. ':active' => $active,
  1464. ':address' => $address
  1465. ));
  1466. }
  1467. }
  1468. catch (PDOException $e) {
  1469. $_SESSION['return'] = array(
  1470. 'type' => 'danger',
  1471. 'msg' => 'MySQL: '.$e
  1472. );
  1473. return false;
  1474. }
  1475. }
  1476. $_SESSION['return'] = array(
  1477. 'type' => 'success',
  1478. 'msg' => sprintf($lang['success']['alias_modified'], htmlspecialchars(implode(', ', $addresses)))
  1479. );
  1480. break;
  1481. case 'domain':
  1482. if (!is_array($_data['domain'])) {
  1483. $domains = array();
  1484. $domains[] = $_data['domain'];
  1485. }
  1486. else {
  1487. $domains = $_data['domain'];
  1488. }
  1489. foreach ($domains as $domain) {
  1490. $domain = idn_to_ascii($domain);
  1491. if (!is_valid_domain_name($domain)) {
  1492. $_SESSION['return'] = array(
  1493. 'type' => 'danger',
  1494. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1495. );
  1496. return false;
  1497. }
  1498. if ($_SESSION['mailcow_cc_role'] == "domainadmin" &&
  1499. hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  1500. $description = $_data['description'];
  1501. $active = intval($_data['active']);
  1502. try {
  1503. $stmt = $pdo->prepare("UPDATE `domain` SET
  1504. `description` = :description
  1505. WHERE `domain` = :domain");
  1506. $stmt->execute(array(
  1507. ':description' => $description,
  1508. ':domain' => $domain
  1509. ));
  1510. $_SESSION['return'] = array(
  1511. 'type' => 'success',
  1512. 'msg' => sprintf($lang['success']['domain_modified'], htmlspecialchars($domain))
  1513. );
  1514. }
  1515. catch (PDOException $e) {
  1516. $_SESSION['return'] = array(
  1517. 'type' => 'danger',
  1518. 'msg' => 'MySQL: '.$e
  1519. );
  1520. return false;
  1521. }
  1522. }
  1523. elseif ($_SESSION['mailcow_cc_role'] == "admin") {
  1524. $is_now = mailbox('get', 'domain_details', $domain);
  1525. if (!empty($is_now)) {
  1526. $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active_int'];
  1527. $backupmx = (isset($_data['backupmx'])) ? intval($_data['backupmx']) : $is_now['backupmx_int'];
  1528. $relay_all_recipients = (isset($_data['relay_all_recipients'])) ? intval($_data['relay_all_recipients']) : $is_now['relay_all_recipients_int'];
  1529. $relayhost = (isset($_data['relayhost'])) ? intval($_data['relayhost']) : $is_now['relayhost'];
  1530. $aliases = (!empty($_data['aliases'])) ? $_data['aliases'] : $is_now['max_num_aliases_for_domain'];
  1531. $mailboxes = (!empty($_data['mailboxes'])) ? $_data['mailboxes'] : $is_now['max_num_mboxes_for_domain'];
  1532. $maxquota = (!empty($_data['maxquota'])) ? $_data['maxquota'] : ($is_now['max_quota_for_mbox'] / 1048576);
  1533. $quota = (!empty($_data['quota'])) ? $_data['quota'] : ($is_now['max_quota_for_domain'] / 1048576);
  1534. $description = (!empty($_data['description'])) ? $_data['description'] : $is_now['description'];
  1535. ($relay_all_recipients == '1') ? $backupmx = '1' : null;
  1536. }
  1537. else {
  1538. $_SESSION['return'] = array(
  1539. 'type' => 'danger',
  1540. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1541. );
  1542. return false;
  1543. }
  1544. try {
  1545. // todo: should be using api here
  1546. $stmt = $pdo->prepare("SELECT
  1547. COUNT(*) AS count,
  1548. MAX(COALESCE(ROUND(`quota`/1048576), 0)) AS `biggest_mailbox`,
  1549. COALESCE(ROUND(SUM(`quota`)/1048576), 0) AS `quota_all`
  1550. FROM `mailbox`
  1551. WHERE `kind` NOT REGEXP 'location|thing|group'
  1552. AND domain = :domain");
  1553. $stmt->execute(array(':domain' => $domain));
  1554. $MailboxData = $stmt->fetch(PDO::FETCH_ASSOC);
  1555. // todo: should be using api here
  1556. $stmt = $pdo->prepare("SELECT COUNT(*) AS `count` FROM `alias`
  1557. WHERE domain = :domain
  1558. AND address NOT IN (
  1559. SELECT `username` FROM `mailbox`
  1560. )");
  1561. $stmt->execute(array(':domain' => $domain));
  1562. $AliasData = $stmt->fetch(PDO::FETCH_ASSOC);
  1563. }
  1564. catch(PDOException $e) {
  1565. $_SESSION['return'] = array(
  1566. 'type' => 'danger',
  1567. 'msg' => 'MySQL: '.$e
  1568. );
  1569. return false;
  1570. }
  1571. if ($maxquota > $quota) {
  1572. $_SESSION['return'] = array(
  1573. 'type' => 'danger',
  1574. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeds_domain_quota'])
  1575. );
  1576. return false;
  1577. }
  1578. if ($maxquota == "0" || empty($maxquota)) {
  1579. $_SESSION['return'] = array(
  1580. 'type' => 'danger',
  1581. 'msg' => sprintf($lang['danger']['maxquota_empty'])
  1582. );
  1583. return false;
  1584. }
  1585. if ($MailboxData['biggest_mailbox'] > $maxquota) {
  1586. $_SESSION['return'] = array(
  1587. 'type' => 'danger',
  1588. 'msg' => sprintf($lang['danger']['max_quota_in_use'], $MailboxData['biggest_mailbox'])
  1589. );
  1590. return false;
  1591. }
  1592. if ($MailboxData['quota_all'] > $quota) {
  1593. $_SESSION['return'] = array(
  1594. 'type' => 'danger',
  1595. 'msg' => sprintf($lang['danger']['domain_quota_m_in_use'], $MailboxData['quota_all'])
  1596. );
  1597. return false;
  1598. }
  1599. if ($MailboxData['count'] > $mailboxes) {
  1600. $_SESSION['return'] = array(
  1601. 'type' => 'danger',
  1602. 'msg' => sprintf($lang['danger']['mailboxes_in_use'], $MailboxData['count'])
  1603. );
  1604. return false;
  1605. }
  1606. if ($AliasData['count'] > $aliases) {
  1607. $_SESSION['return'] = array(
  1608. 'type' => 'danger',
  1609. 'msg' => sprintf($lang['danger']['aliases_in_use'], $AliasData['count'])
  1610. );
  1611. return false;
  1612. }
  1613. try {
  1614. $stmt = $pdo->prepare("UPDATE `domain` SET
  1615. `relay_all_recipients` = :relay_all_recipients,
  1616. `backupmx` = :backupmx,
  1617. `active` = :active,
  1618. `quota` = :quota,
  1619. `maxquota` = :maxquota,
  1620. `relayhost` = :relayhost,
  1621. `mailboxes` = :mailboxes,
  1622. `aliases` = :aliases,
  1623. `description` = :description
  1624. WHERE `domain` = :domain");
  1625. $stmt->execute(array(
  1626. ':relay_all_recipients' => $relay_all_recipients,
  1627. ':backupmx' => $backupmx,
  1628. ':active' => $active,
  1629. ':quota' => $quota,
  1630. ':maxquota' => $maxquota,
  1631. ':relayhost' => $relayhost,
  1632. ':mailboxes' => $mailboxes,
  1633. ':aliases' => $aliases,
  1634. ':description' => $description,
  1635. ':domain' => $domain
  1636. ));
  1637. }
  1638. catch (PDOException $e) {
  1639. $_SESSION['return'] = array(
  1640. 'type' => 'danger',
  1641. 'msg' => 'MySQL: '.$e
  1642. );
  1643. return false;
  1644. }
  1645. }
  1646. }
  1647. $_SESSION['return'] = array(
  1648. 'type' => 'success',
  1649. 'msg' => sprintf($lang['success']['domain_modified'], htmlspecialchars(implode(', ', $domains)))
  1650. );
  1651. break;
  1652. case 'mailbox':
  1653. if (!is_array($_data['username'])) {
  1654. $usernames = array();
  1655. $usernames[] = $_data['username'];
  1656. }
  1657. else {
  1658. $usernames = $_data['username'];
  1659. }
  1660. foreach ($usernames as $username) {
  1661. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  1662. $_SESSION['return'] = array(
  1663. 'type' => 'danger',
  1664. 'msg' => sprintf($lang['danger']['username_invalid'])
  1665. );
  1666. return false;
  1667. }
  1668. $is_now = mailbox('get', 'mailbox_details', $username);
  1669. if (!empty($is_now)) {
  1670. $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active_int'];
  1671. $name = (!empty($_data['name'])) ? $_data['name'] : $is_now['name'];
  1672. $domain = $is_now['domain'];
  1673. $quota_m = (!empty($_data['quota'])) ? $_data['quota'] : ($is_now['quota'] / 1048576);
  1674. $quota_b = $quota_m * 1048576;
  1675. $password = (!empty($_data['password'])) ? $_data['password'] : null;
  1676. $password2 = (!empty($_data['password2'])) ? $_data['password2'] : null;
  1677. }
  1678. else {
  1679. $_SESSION['return'] = array(
  1680. 'type' => 'danger',
  1681. 'msg' => sprintf($lang['danger']['access_denied'])
  1682. );
  1683. return false;
  1684. }
  1685. try {
  1686. $stmt = $pdo->prepare("SELECT `quota`, `maxquota`
  1687. FROM `domain`
  1688. WHERE `domain` = :domain");
  1689. $stmt->execute(array(':domain' => $domain));
  1690. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  1691. }
  1692. catch(PDOException $e) {
  1693. $_SESSION['return'] = array(
  1694. 'type' => 'danger',
  1695. 'msg' => 'MySQL: '.$e
  1696. );
  1697. return false;
  1698. }
  1699. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  1700. $_SESSION['return'] = array(
  1701. 'type' => 'danger',
  1702. 'msg' => sprintf($lang['danger']['access_denied'])
  1703. );
  1704. return false;
  1705. }
  1706. if (!is_numeric($quota_m) || $quota_m == "0") {
  1707. $_SESSION['return'] = array(
  1708. 'type' => 'danger',
  1709. 'msg' => sprintf($lang['danger']['quota_not_0_not_numeric'], htmlspecialchars($quota_m))
  1710. );
  1711. return false;
  1712. }
  1713. if ($quota_m > $DomainData['maxquota']) {
  1714. $_SESSION['return'] = array(
  1715. 'type' => 'danger',
  1716. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeded'], $DomainData['maxquota'])
  1717. );
  1718. return false;
  1719. }
  1720. if (((($is_now['quota_used'] / 1048576) - $quota_m) + $quota_m) > $DomainData['quota']) {
  1721. $_SESSION['return'] = array(
  1722. 'type' => 'danger',
  1723. 'msg' => sprintf($lang['danger']['mailbox_quota_left_exceeded'], ($is_now['max_new_quota'] / 1048576))
  1724. );
  1725. return false;
  1726. }
  1727. if (isset($_data['sender_acl'])) {
  1728. // Get sender_acl items set by admin
  1729. $sender_acl_admin = array_merge(
  1730. mailbox('get', 'sender_acl_handles', $username)['sender_acl_domains']['ro'],
  1731. mailbox('get', 'sender_acl_handles', $username)['sender_acl_addresses']['ro']
  1732. );
  1733. // Get sender_acl items from POST array
  1734. $sender_acl_domain_admin = ($_data['sender_acl'] == "0") ? array() : (array)$_data['sender_acl'];
  1735. if (!empty($sender_acl_domain_admin) || !empty($sender_acl_admin)) {
  1736. // Check items in POST array and skip invalid
  1737. foreach ($sender_acl_domain_admin as $key => $val) {
  1738. if (!filter_var($val, FILTER_VALIDATE_EMAIL) && !is_valid_domain_name(ltrim($val, '@'))) {
  1739. unset($sender_acl_domain_admin[$key]);
  1740. }
  1741. if (is_valid_domain_name(ltrim($val, '@'))) {
  1742. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], ltrim($val, '@'))) {
  1743. $_SESSION['return'] = array(
  1744. 'type' => 'danger',
  1745. 'msg' => sprintf($lang['danger']['sender_acl_invalid'])
  1746. );
  1747. return false;
  1748. }
  1749. }
  1750. if (filter_var($val, FILTER_VALIDATE_EMAIL)) {
  1751. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $val)) {
  1752. $_SESSION['return'] = array(
  1753. 'type' => 'danger',
  1754. 'msg' => sprintf($lang['danger']['sender_acl_invalid'])
  1755. );
  1756. return false;
  1757. }
  1758. }
  1759. }
  1760. // Merge both arrays
  1761. $sender_acl_merged = array_merge($sender_acl_domain_admin, $sender_acl_admin);
  1762. try {
  1763. $stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` = :username");
  1764. $stmt->execute(array(
  1765. ':username' => $username
  1766. ));
  1767. }
  1768. catch (PDOException $e) {
  1769. $_SESSION['return'] = array(
  1770. 'type' => 'danger',
  1771. 'msg' => 'MySQL: '.$e
  1772. );
  1773. return false;
  1774. }
  1775. foreach ($sender_acl_merged as $sender_acl) {
  1776. $domain = ltrim($sender_acl, '@');
  1777. if (is_valid_domain_name($domain)) {
  1778. $sender_acl = '@' . $domain;
  1779. }
  1780. try {
  1781. $stmt = $pdo->prepare("INSERT INTO `sender_acl` (`send_as`, `logged_in_as`)
  1782. VALUES (:sender_acl, :username)");
  1783. $stmt->execute(array(
  1784. ':sender_acl' => $sender_acl,
  1785. ':username' => $username
  1786. ));
  1787. }
  1788. catch (PDOException $e) {
  1789. $_SESSION['return'] = array(
  1790. 'type' => 'danger',
  1791. 'msg' => 'MySQL: '.$e
  1792. );
  1793. return false;
  1794. }
  1795. }
  1796. }
  1797. else {
  1798. try {
  1799. $stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` = :username");
  1800. $stmt->execute(array(
  1801. ':username' => $username
  1802. ));
  1803. }
  1804. catch (PDOException $e) {
  1805. $_SESSION['return'] = array(
  1806. 'type' => 'danger',
  1807. 'msg' => 'MySQL: '.$e
  1808. );
  1809. return false;
  1810. }
  1811. }
  1812. }
  1813. if (!empty($password) && !empty($password2)) {
  1814. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) {
  1815. $_SESSION['return'] = array(
  1816. 'type' => 'danger',
  1817. 'msg' => sprintf($lang['danger']['password_complexity'])
  1818. );
  1819. return false;
  1820. }
  1821. if ($password != $password2) {
  1822. $_SESSION['return'] = array(
  1823. 'type' => 'danger',
  1824. 'msg' => sprintf($lang['danger']['password_mismatch'])
  1825. );
  1826. return false;
  1827. }
  1828. $password_hashed = hash_password($password);
  1829. try {
  1830. $stmt = $pdo->prepare("UPDATE `alias` SET
  1831. `active` = :active
  1832. WHERE `address` = :address");
  1833. $stmt->execute(array(
  1834. ':address' => $username,
  1835. ':active' => $active
  1836. ));
  1837. $stmt = $pdo->prepare("UPDATE `mailbox` SET
  1838. `active` = :active,
  1839. `password` = :password_hashed,
  1840. `name`= :name,
  1841. `quota` = :quota_b
  1842. WHERE `username` = :username");
  1843. $stmt->execute(array(
  1844. ':password_hashed' => $password_hashed,
  1845. ':active' => $active,
  1846. ':name' => $name,
  1847. ':quota_b' => $quota_b,
  1848. ':username' => $username
  1849. ));
  1850. }
  1851. catch (PDOException $e) {
  1852. $_SESSION['return'] = array(
  1853. 'type' => 'danger',
  1854. 'msg' => 'MySQL: '.$e
  1855. );
  1856. return false;
  1857. }
  1858. }
  1859. try {
  1860. $stmt = $pdo->prepare("UPDATE `alias` SET
  1861. `active` = :active
  1862. WHERE `address` = :address");
  1863. $stmt->execute(array(
  1864. ':address' => $username,
  1865. ':active' => $active
  1866. ));
  1867. $stmt = $pdo->prepare("UPDATE `mailbox` SET
  1868. `active` = :active,
  1869. `name`= :name,
  1870. `quota` = :quota_b
  1871. WHERE `username` = :username");
  1872. $stmt->execute(array(
  1873. ':active' => $active,
  1874. ':name' => $name,
  1875. ':quota_b' => $quota_b,
  1876. ':username' => $username
  1877. ));
  1878. }
  1879. catch (PDOException $e) {
  1880. $_SESSION['return'] = array(
  1881. 'type' => 'danger',
  1882. 'msg' => 'MySQL: '.$e
  1883. );
  1884. return false;
  1885. }
  1886. }
  1887. $_SESSION['return'] = array(
  1888. 'type' => 'success',
  1889. 'msg' => sprintf($lang['success']['mailbox_modified'], implode(', ', $usernames))
  1890. );
  1891. break;
  1892. case 'resource':
  1893. if (!is_array($_data['name'])) {
  1894. $names = array();
  1895. $names[] = $_data['name'];
  1896. }
  1897. else {
  1898. $names = $_data['name'];
  1899. }
  1900. foreach ($names as $name) {
  1901. $is_now = mailbox('get', 'resource_details', $name);
  1902. if (!empty($is_now)) {
  1903. $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active_int'];
  1904. $multiple_bookings = (isset($_data['multiple_bookings'])) ? intval($_data['multiple_bookings']) : $is_now['multiple_bookings_int'];
  1905. $description = (!empty($_data['description'])) ? $_data['description'] : $is_now['description'];
  1906. $kind = (!empty($_data['kind'])) ? $_data['kind'] : $is_now['kind'];
  1907. }
  1908. else {
  1909. $_SESSION['return'] = array(
  1910. 'type' => 'danger',
  1911. 'msg' => sprintf($lang['danger']['resource_invalid'])
  1912. );
  1913. return false;
  1914. }
  1915. if (!filter_var($name, FILTER_VALIDATE_EMAIL)) {
  1916. $_SESSION['return'] = array(
  1917. 'type' => 'danger',
  1918. 'msg' => sprintf($lang['danger']['resource_invalid'])
  1919. );
  1920. return false;
  1921. }
  1922. if (empty($description)) {
  1923. $_SESSION['return'] = array(
  1924. 'type' => 'danger',
  1925. 'msg' => sprintf($lang['danger']['description_invalid'])
  1926. );
  1927. return false;
  1928. }
  1929. if ($kind != 'location' && $kind != 'group' && $kind != 'thing') {
  1930. $_SESSION['return'] = array(
  1931. 'type' => 'danger',
  1932. 'msg' => sprintf($lang['danger']['resource_invalid'])
  1933. );
  1934. return false;
  1935. }
  1936. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $name)) {
  1937. $_SESSION['return'] = array(
  1938. 'type' => 'danger',
  1939. 'msg' => sprintf($lang['danger']['access_denied'])
  1940. );
  1941. return false;
  1942. }
  1943. try {
  1944. $stmt = $pdo->prepare("UPDATE `mailbox` SET
  1945. `active` = :active,
  1946. `name`= :description,
  1947. `kind`= :kind,
  1948. `multiple_bookings`= :multiple_bookings
  1949. WHERE `username` = :name");
  1950. $stmt->execute(array(
  1951. ':active' => $active,
  1952. ':description' => $description,
  1953. ':multiple_bookings' => $multiple_bookings,
  1954. ':kind' => $kind,
  1955. ':name' => $name
  1956. ));
  1957. }
  1958. catch (PDOException $e) {
  1959. $_SESSION['return'] = array(
  1960. 'type' => 'danger',
  1961. 'msg' => 'MySQL: '.$e
  1962. );
  1963. return false;
  1964. }
  1965. }
  1966. $_SESSION['return'] = array(
  1967. 'type' => 'success',
  1968. 'msg' => sprintf($lang['success']['resource_modified'], implode(', ', $names))
  1969. );
  1970. break;
  1971. }
  1972. break;
  1973. case 'get':
  1974. switch ($_type) {
  1975. case 'sender_acl_handles':
  1976. if ($_SESSION['mailcow_cc_role'] != "admin" && $_SESSION['mailcow_cc_role'] != "domainadmin") {
  1977. return false;
  1978. }
  1979. $data['sender_acl_domains']['ro'] = array();
  1980. $data['sender_acl_domains']['rw'] = array();
  1981. $data['sender_acl_domains']['selectable'] = array();
  1982. $data['sender_acl_addresses']['ro'] = array();
  1983. $data['sender_acl_addresses']['rw'] = array();
  1984. $data['sender_acl_addresses']['selectable'] = array();
  1985. $data['fixed_sender_aliases'] = array();
  1986. try {
  1987. // Fixed addresses
  1988. $stmt = $pdo->prepare("SELECT `address` FROM `alias` WHERE `goto` REGEXP :goto AND `address` NOT LIKE '@%'");
  1989. $stmt->execute(array(':goto' => '(^|,)'.$_data.'($|,)'));
  1990. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  1991. while ($row = array_shift($rows)) {
  1992. $data['fixed_sender_aliases'][] = $row['address'];
  1993. }
  1994. $stmt = $pdo->prepare("SELECT CONCAT(`local_part`, '@', `alias_domain`.`alias_domain`) AS `alias_domain_alias` FROM `mailbox`, `alias_domain`
  1995. WHERE `alias_domain`.`target_domain` = `mailbox`.`domain`
  1996. AND `mailbox`.`username` = :username");
  1997. $stmt->execute(array(':username' => $_data));
  1998. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  1999. while ($row = array_shift($rows)) {
  2000. if (!empty($row['alias_domain_alias'])) {
  2001. $data['fixed_sender_aliases'][] = $row['alias_domain_alias'];
  2002. }
  2003. }
  2004. // Return array $data['sender_acl_domains/addresses']['ro'] with read-only objects
  2005. // Return array $data['sender_acl_domains/addresses']['rw'] with read-write objects (can be deleted)
  2006. $stmt = $pdo->prepare("SELECT REPLACE(`send_as`, '@', '') AS `send_as` FROM `sender_acl` WHERE `logged_in_as` = :logged_in_as AND `send_as` LIKE '@%'");
  2007. $stmt->execute(array(':logged_in_as' => $_data));
  2008. $domain_rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2009. while ($domain_row = array_shift($domain_rows)) {
  2010. if (is_valid_domain_name($domain_row['send_as']) && !hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain_row['send_as'])) {
  2011. $data['sender_acl_domains']['ro'][] = $domain_row['send_as'];
  2012. continue;
  2013. }
  2014. if (is_valid_domain_name($domain_row['send_as']) && hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain_row['send_as'])) {
  2015. $data['sender_acl_domains']['rw'][] = $domain_row['send_as'];
  2016. continue;
  2017. }
  2018. }
  2019. $stmt = $pdo->prepare("SELECT `send_as` FROM `sender_acl` WHERE `logged_in_as` = :logged_in_as AND `send_as` NOT LIKE '@%'");
  2020. $stmt->execute(array(':logged_in_as' => $_data));
  2021. $address_rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2022. while ($address_row = array_shift($address_rows)) {
  2023. if (filter_var($address_row['send_as'], FILTER_VALIDATE_EMAIL) && !hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $address_row['send_as'])) {
  2024. $data['sender_acl_addresses']['ro'][] = $address_row['send_as'];
  2025. continue;
  2026. }
  2027. if (filter_var($address_row['send_as'], FILTER_VALIDATE_EMAIL) && hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $address_row['send_as'])) {
  2028. $data['sender_acl_addresses']['rw'][] = $address_row['send_as'];
  2029. continue;
  2030. }
  2031. }
  2032. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  2033. WHERE `domain` NOT IN (
  2034. SELECT REPLACE(`send_as`, '@', '') FROM `sender_acl`
  2035. WHERE `logged_in_as` = :logged_in_as
  2036. AND `send_as` LIKE '@%')");
  2037. $stmt->execute(array(
  2038. ':logged_in_as' => $_data,
  2039. ));
  2040. $rows_domain = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2041. while ($row_domain = array_shift($rows_domain)) {
  2042. if (is_valid_domain_name($row_domain['domain']) && hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $row_domain['domain'])) {
  2043. $data['sender_acl_domains']['selectable'][] = $row_domain['domain'];
  2044. }
  2045. }
  2046. $stmt = $pdo->prepare("SELECT `address` FROM `alias`
  2047. WHERE `goto` != :goto
  2048. AND `address` NOT IN (
  2049. SELECT `send_as` FROM `sender_acl`
  2050. WHERE `logged_in_as` = :logged_in_as
  2051. AND `send_as` NOT LIKE '@%')");
  2052. $stmt->execute(array(
  2053. ':logged_in_as' => $_data,
  2054. ':goto' => $_data
  2055. ));
  2056. $rows_mbox = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2057. while ($row = array_shift($rows_mbox)) {
  2058. if (filter_var($row['address'], FILTER_VALIDATE_EMAIL) && hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $row['address'])) {
  2059. $data['sender_acl_addresses']['selectable'][] = $row['address'];
  2060. }
  2061. }
  2062. }
  2063. catch(PDOException $e) {
  2064. $_SESSION['return'] = array(
  2065. 'type' => 'danger',
  2066. 'msg' => 'MySQL: '.$e
  2067. );
  2068. return false;
  2069. }
  2070. return $data;
  2071. break;
  2072. case 'mailboxes':
  2073. $mailboxes = array();
  2074. if (isset($_data) && !hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2075. return false;
  2076. }
  2077. elseif (isset($_data) && hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2078. try {
  2079. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox` WHERE `kind` NOT REGEXP 'location|thing|group' AND `domain` != 'ALL' AND `domain` = :domain");
  2080. $stmt->execute(array(
  2081. ':domain' => $_data,
  2082. ));
  2083. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2084. while($row = array_shift($rows)) {
  2085. $mailboxes[] = $row['username'];
  2086. }
  2087. }
  2088. catch (PDOException $e) {
  2089. $_SESSION['return'] = array(
  2090. 'type' => 'danger',
  2091. 'msg' => 'MySQL: '.$e
  2092. );
  2093. return false;
  2094. }
  2095. }
  2096. else {
  2097. try {
  2098. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox` WHERE `kind` NOT REGEXP 'location|thing|group' AND `domain` IN (SELECT `domain` FROM `domain_admins` WHERE `active` = '1' AND `username` = :username) OR 'admin' = :role");
  2099. $stmt->execute(array(
  2100. ':username' => $_SESSION['mailcow_cc_username'],
  2101. ':role' => $_SESSION['mailcow_cc_role'],
  2102. ));
  2103. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2104. while($row = array_shift($rows)) {
  2105. $mailboxes[] = $row['username'];
  2106. }
  2107. }
  2108. catch (PDOException $e) {
  2109. $_SESSION['return'] = array(
  2110. 'type' => 'danger',
  2111. 'msg' => 'MySQL: '.$e
  2112. );
  2113. return false;
  2114. }
  2115. }
  2116. return $mailboxes;
  2117. break;
  2118. case 'tls_policy':
  2119. $policydata = array();
  2120. if (isset($_data) && filter_var($_data, FILTER_VALIDATE_EMAIL)) {
  2121. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2122. return false;
  2123. }
  2124. }
  2125. else {
  2126. $_data = $_SESSION['mailcow_cc_username'];
  2127. }
  2128. try {
  2129. $stmt = $pdo->prepare("SELECT `tls_enforce_out`, `tls_enforce_in` FROM `mailbox` WHERE `username` = :username");
  2130. $stmt->execute(array(':username' => $_data));
  2131. $policydata = $stmt->fetch(PDO::FETCH_ASSOC);
  2132. }
  2133. catch(PDOException $e) {
  2134. $_SESSION['return'] = array(
  2135. 'type' => 'danger',
  2136. 'msg' => 'MySQL: '.$e
  2137. );
  2138. return false;
  2139. }
  2140. return $policydata;
  2141. break;
  2142. case 'syncjob_details':
  2143. $syncjobdetails = array();
  2144. if (!is_numeric($_data)) {
  2145. return false;
  2146. }
  2147. try {
  2148. $stmt = $pdo->prepare("SELECT *,
  2149. CONCAT(LEFT(`password1`, 3), '...') AS `password1_short`,
  2150. `active` AS `active_int`,
  2151. CASE `active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`
  2152. FROM `imapsync` WHERE id = :id");
  2153. $stmt->execute(array(':id' => $_data));
  2154. $syncjobdetails = $stmt->fetch(PDO::FETCH_ASSOC);
  2155. }
  2156. catch(PDOException $e) {
  2157. $_SESSION['return'] = array(
  2158. 'type' => 'danger',
  2159. 'msg' => 'MySQL: '.$e
  2160. );
  2161. }
  2162. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $syncjobdetails['user2'])) {
  2163. return false;
  2164. }
  2165. return $syncjobdetails;
  2166. break;
  2167. case 'syncjobs':
  2168. $syncjobdata = array();
  2169. if (isset($_data) && filter_var($_data, FILTER_VALIDATE_EMAIL)) {
  2170. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2171. return false;
  2172. }
  2173. }
  2174. else {
  2175. $_data = $_SESSION['mailcow_cc_username'];
  2176. }
  2177. try {
  2178. $stmt = $pdo->prepare("SELECT `id` FROM `imapsync` WHERE `user2` = :username");
  2179. $stmt->execute(array(':username' => $_data));
  2180. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2181. while($row = array_shift($rows)) {
  2182. $syncjobdata[] = $row['id'];
  2183. }
  2184. }
  2185. catch(PDOException $e) {
  2186. $_SESSION['return'] = array(
  2187. 'type' => 'danger',
  2188. 'msg' => 'MySQL: '.$e
  2189. );
  2190. }
  2191. return $syncjobdata;
  2192. break;
  2193. case 'spam_score':
  2194. $default = "5, 15";
  2195. $policydata = array();
  2196. if (isset($_data) && filter_var($_data, FILTER_VALIDATE_EMAIL)) {
  2197. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2198. return false;
  2199. }
  2200. }
  2201. else {
  2202. $_data = $_SESSION['mailcow_cc_username'];
  2203. }
  2204. try {
  2205. $stmt = $pdo->prepare("SELECT `value` FROM `filterconf` WHERE `object` = :username AND
  2206. (`option` = 'lowspamlevel' OR `option` = 'highspamlevel')");
  2207. $stmt->execute(array(':username' => $_data));
  2208. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  2209. }
  2210. catch(PDOException $e) {
  2211. $_SESSION['return'] = array(
  2212. 'type' => 'danger',
  2213. 'msg' => 'MySQL: '.$e
  2214. );
  2215. return false;
  2216. }
  2217. if (empty($num_results)) {
  2218. return $default;
  2219. }
  2220. else {
  2221. try {
  2222. $stmt = $pdo->prepare("SELECT `value` FROM `filterconf` WHERE `option` = 'highspamlevel' AND `object` = :username");
  2223. $stmt->execute(array(':username' => $_data));
  2224. $highspamlevel = $stmt->fetch(PDO::FETCH_ASSOC);
  2225. $stmt = $pdo->prepare("SELECT `value` FROM `filterconf` WHERE `option` = 'lowspamlevel' AND `object` = :username");
  2226. $stmt->execute(array(':username' => $_data));
  2227. $lowspamlevel = $stmt->fetch(PDO::FETCH_ASSOC);
  2228. return $lowspamlevel['value'].', '.$highspamlevel['value'];
  2229. }
  2230. catch(PDOException $e) {
  2231. $_SESSION['return'] = array(
  2232. 'type' => 'danger',
  2233. 'msg' => 'MySQL: '.$e
  2234. );
  2235. return false;
  2236. }
  2237. }
  2238. break;
  2239. case 'time_limited_aliases':
  2240. $tladata = array();
  2241. if (isset($_data) && filter_var($_data, FILTER_VALIDATE_EMAIL)) {
  2242. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2243. return false;
  2244. }
  2245. }
  2246. else {
  2247. $_data = $_SESSION['mailcow_cc_username'];
  2248. }
  2249. try {
  2250. $stmt = $pdo->prepare("SELECT `address`,
  2251. `goto`,
  2252. `validity`
  2253. FROM `spamalias`
  2254. WHERE `goto` = :username
  2255. AND `validity` >= :unixnow");
  2256. $stmt->execute(array(':username' => $_data, ':unixnow' => time()));
  2257. $tladata = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2258. }
  2259. catch(PDOException $e) {
  2260. $_SESSION['return'] = array(
  2261. 'type' => 'danger',
  2262. 'msg' => 'MySQL: '.$e
  2263. );
  2264. }
  2265. return $tladata;
  2266. break;
  2267. case 'delimiter_action':
  2268. $policydata = array();
  2269. if (isset($_data) && filter_var($_data, FILTER_VALIDATE_EMAIL)) {
  2270. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2271. return false;
  2272. }
  2273. }
  2274. else {
  2275. $_data = $_SESSION['mailcow_cc_username'];
  2276. }
  2277. try {
  2278. if ($redis->hGet('RCPT_WANTS_SUBJECT_TAG', $_data)) {
  2279. return "subject";
  2280. }
  2281. else {
  2282. return "subfolder";
  2283. }
  2284. }
  2285. catch (RedisException $e) {
  2286. $_SESSION['return'] = array(
  2287. 'type' => 'danger',
  2288. 'msg' => 'Redis: '.$e
  2289. );
  2290. return false;
  2291. }
  2292. break;
  2293. case 'resources':
  2294. $resources = array();
  2295. if (isset($_data) && !hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2296. return false;
  2297. }
  2298. elseif (isset($_data) && hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2299. try {
  2300. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox` WHERE `kind` REGEXP 'location|thing|group' AND `domain` != 'ALL' AND `domain` = :domain");
  2301. $stmt->execute(array(
  2302. ':domain' => $_data,
  2303. ));
  2304. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2305. while($row = array_shift($rows)) {
  2306. $resources[] = $row['username'];
  2307. }
  2308. }
  2309. catch (PDOException $e) {
  2310. $_SESSION['return'] = array(
  2311. 'type' => 'danger',
  2312. 'msg' => 'MySQL: '.$e
  2313. );
  2314. return false;
  2315. }
  2316. }
  2317. else {
  2318. try {
  2319. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox` WHERE `kind` REGEXP 'location|thing|group' AND `domain` IN (SELECT `domain` FROM `domain_admins` WHERE `active` = '1' AND `username` = :username) OR 'admin' = :role");
  2320. $stmt->execute(array(
  2321. ':username' => $_SESSION['mailcow_cc_username'],
  2322. ':role' => $_SESSION['mailcow_cc_role'],
  2323. ));
  2324. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2325. while($row = array_shift($rows)) {
  2326. $resources[] = $row['username'];
  2327. }
  2328. }
  2329. catch (PDOException $e) {
  2330. $_SESSION['return'] = array(
  2331. 'type' => 'danger',
  2332. 'msg' => 'MySQL: '.$e
  2333. );
  2334. return false;
  2335. }
  2336. }
  2337. return $resources;
  2338. break;
  2339. case 'alias_domains':
  2340. $aliasdomains = array();
  2341. if (isset($_data) && !hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2342. return false;
  2343. }
  2344. elseif (isset($_data) && hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2345. try {
  2346. $stmt = $pdo->prepare("SELECT `alias_domain` FROM `alias_domain` WHERE `target_domain` = :domain");
  2347. $stmt->execute(array(
  2348. ':domain' => $_data,
  2349. ));
  2350. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2351. while($row = array_shift($rows)) {
  2352. $aliasdomains[] = $row['alias_domain'];
  2353. }
  2354. }
  2355. catch (PDOException $e) {
  2356. $_SESSION['return'] = array(
  2357. 'type' => 'danger',
  2358. 'msg' => 'MySQL: '.$e
  2359. );
  2360. return false;
  2361. }
  2362. }
  2363. else {
  2364. try {
  2365. $stmt = $pdo->prepare("SELECT `alias_domain` FROM `alias_domain` WHERE `target_domain` IN (SELECT `domain` FROM `domain_admins` WHERE `active` = '1' AND `username` = :username) OR 'admin' = :role");
  2366. $stmt->execute(array(
  2367. ':username' => $_SESSION['mailcow_cc_username'],
  2368. ':role' => $_SESSION['mailcow_cc_role'],
  2369. ));
  2370. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2371. while($row = array_shift($rows)) {
  2372. $aliasdomains[] = $row['alias_domain'];
  2373. }
  2374. }
  2375. catch (PDOException $e) {
  2376. $_SESSION['return'] = array(
  2377. 'type' => 'danger',
  2378. 'msg' => 'MySQL: '.$e
  2379. );
  2380. return false;
  2381. }
  2382. }
  2383. return $aliasdomains;
  2384. break;
  2385. case 'aliases':
  2386. $aliases = array();
  2387. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2388. return false;
  2389. }
  2390. try {
  2391. $stmt = $pdo->prepare("SELECT `address` FROM `alias` WHERE `address` != `goto` AND `domain` = :domain");
  2392. $stmt->execute(array(
  2393. ':domain' => $_data,
  2394. ));
  2395. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2396. while($row = array_shift($rows)) {
  2397. $aliases[] = $row['address'];
  2398. }
  2399. }
  2400. catch (PDOException $e) {
  2401. $_SESSION['return'] = array(
  2402. 'type' => 'danger',
  2403. 'msg' => 'MySQL: '.$e
  2404. );
  2405. return false;
  2406. }
  2407. return $aliases;
  2408. break;
  2409. case 'ratelimit':
  2410. if (is_valid_domain_name($_data)) {
  2411. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2412. $_SESSION['return'] = array(
  2413. 'type' => 'danger',
  2414. 'msg' => sprintf($lang['danger']['access_denied'])
  2415. );
  2416. return false;
  2417. }
  2418. }
  2419. elseif (filter_var($_data, FILTER_VALIDATE_EMAIL)) {
  2420. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2421. $_SESSION['return'] = array(
  2422. 'type' => 'danger',
  2423. 'msg' => sprintf($lang['danger']['access_denied'])
  2424. );
  2425. return false;
  2426. }
  2427. }
  2428. else {
  2429. return false;
  2430. }
  2431. try {
  2432. if ($rl_value = $redis->hGet('RL_VALUE', $_data)) {
  2433. $rl = explode(' / 1', $rl_value);
  2434. $data['value'] = $rl[0];
  2435. $data['frame'] = $rl[1];
  2436. return $data;
  2437. }
  2438. else {
  2439. return false;
  2440. }
  2441. }
  2442. catch (RedisException $e) {
  2443. $_SESSION['return'] = array(
  2444. 'type' => 'danger',
  2445. 'msg' => 'Redis: '.$e
  2446. );
  2447. return false;
  2448. }
  2449. return false;
  2450. break;
  2451. case 'alias_details':
  2452. $aliasdata = array();
  2453. try {
  2454. $stmt = $pdo->prepare("SELECT
  2455. `domain`,
  2456. `goto`,
  2457. `address`,
  2458. `active` as `active_int`,
  2459. CASE `active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`,
  2460. `created`,
  2461. `modified`
  2462. FROM `alias`
  2463. WHERE `address` = :address AND `address` != `goto`");
  2464. $stmt->execute(array(
  2465. ':address' => $_data,
  2466. ));
  2467. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  2468. $stmt = $pdo->prepare("SELECT `target_domain` FROM `alias_domain` WHERE `alias_domain` = :domain");
  2469. $stmt->execute(array(
  2470. ':domain' => $row['domain'],
  2471. ));
  2472. $row_alias_domain = $stmt->fetch(PDO::FETCH_ASSOC);
  2473. if (isset($row_alias_domain['target_domain']) && !empty($row_alias_domain['target_domain'])) {
  2474. $aliasdata['in_primary_domain'] = $row_alias_domain['target_domain'];
  2475. }
  2476. else {
  2477. $aliasdata['in_primary_domain'] = "";
  2478. }
  2479. $aliasdata['domain'] = $row['domain'];
  2480. $aliasdata['goto'] = $row['goto'];
  2481. $aliasdata['address'] = $row['address'];
  2482. (!filter_var($aliasdata['address'], FILTER_VALIDATE_EMAIL)) ? $aliasdata['is_catch_all'] = 1 : $aliasdata['is_catch_all'] = 0;
  2483. $aliasdata['active'] = $row['active'];
  2484. $aliasdata['active_int'] = $row['active_int'];
  2485. $aliasdata['created'] = $row['created'];
  2486. $aliasdata['modified'] = $row['modified'];
  2487. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $aliasdata['domain'])) {
  2488. return false;
  2489. }
  2490. }
  2491. catch (PDOException $e) {
  2492. $_SESSION['return'] = array(
  2493. 'type' => 'danger',
  2494. 'msg' => 'MySQL: '.$e
  2495. );
  2496. return false;
  2497. }
  2498. return $aliasdata;
  2499. break;
  2500. case 'alias_domain_details':
  2501. $aliasdomaindata = array();
  2502. try {
  2503. $stmt = $pdo->prepare("SELECT
  2504. `alias_domain`,
  2505. `target_domain`,
  2506. `active` AS `active_int`,
  2507. CASE `active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`,
  2508. `created`,
  2509. `modified`
  2510. FROM `alias_domain`
  2511. WHERE `alias_domain` = :aliasdomain");
  2512. $stmt->execute(array(
  2513. ':aliasdomain' => $_data,
  2514. ));
  2515. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  2516. $aliasdomaindata['alias_domain'] = $row['alias_domain'];
  2517. $aliasdomaindata['target_domain'] = $row['target_domain'];
  2518. $aliasdomaindata['active'] = $row['active'];
  2519. $aliasdomaindata['active_int'] = $row['active_int'];
  2520. $aliasdomaindata['created'] = $row['created'];
  2521. $aliasdomaindata['modified'] = $row['modified'];
  2522. }
  2523. catch (PDOException $e) {
  2524. $_SESSION['return'] = array(
  2525. 'type' => 'danger',
  2526. 'msg' => 'MySQL: '.$e
  2527. );
  2528. return false;
  2529. }
  2530. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $aliasdomaindata['target_domain'])) {
  2531. return false;
  2532. }
  2533. return $aliasdomaindata;
  2534. break;
  2535. case 'domains':
  2536. $domains = array();
  2537. if ($_SESSION['mailcow_cc_role'] != "admin" && $_SESSION['mailcow_cc_role'] != "domainadmin") {
  2538. return false;
  2539. }
  2540. try {
  2541. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  2542. WHERE (`domain` IN (
  2543. SELECT `domain` from `domain_admins`
  2544. WHERE (`active`='1' AND `username` = :username))
  2545. )
  2546. OR ('admin'= :role)
  2547. AND `domain` != 'ALL'");
  2548. $stmt->execute(array(
  2549. ':username' => $_SESSION['mailcow_cc_username'],
  2550. ':role' => $_SESSION['mailcow_cc_role'],
  2551. ));
  2552. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2553. while($row = array_shift($rows)) {
  2554. $domains[] = $row['domain'];
  2555. }
  2556. }
  2557. catch (PDOException $e) {
  2558. $_SESSION['return'] = array(
  2559. 'type' => 'danger',
  2560. 'msg' => 'MySQL: '.$e
  2561. );
  2562. return false;
  2563. }
  2564. return $domains;
  2565. break;
  2566. case 'domain_details':
  2567. $domaindata = array();
  2568. $_data = idn_to_ascii(strtolower(trim($_data)));
  2569. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2570. return false;
  2571. }
  2572. try {
  2573. $stmt = $pdo->prepare("SELECT `target_domain` FROM `alias_domain` WHERE `alias_domain` = :domain");
  2574. $stmt->execute(array(
  2575. ':domain' => $_data
  2576. ));
  2577. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  2578. if (!empty($row)) {
  2579. $_data = $row['target_domain'];
  2580. }
  2581. $stmt = $pdo->prepare("SELECT
  2582. `domain`,
  2583. `description`,
  2584. `aliases`,
  2585. `mailboxes`,
  2586. `maxquota`,
  2587. `quota`,
  2588. `relayhost`,
  2589. `relay_all_recipients` as `relay_all_recipients_int`,
  2590. `backupmx` as `backupmx_int`,
  2591. `active` as `active_int`,
  2592. CASE `relay_all_recipients` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `relay_all_recipients`,
  2593. CASE `backupmx` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `backupmx`,
  2594. CASE `active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`
  2595. FROM `domain` WHERE `domain`= :domain");
  2596. $stmt->execute(array(
  2597. ':domain' => $_data
  2598. ));
  2599. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  2600. if (empty($row)) {
  2601. return false;
  2602. }
  2603. $stmt = $pdo->prepare("SELECT COUNT(*) AS `count`,
  2604. COALESCE(SUM(`quota`), 0) AS `in_use`
  2605. FROM `mailbox`
  2606. WHERE `kind` NOT REGEXP 'location|thing|group'
  2607. AND `domain` = :domain");
  2608. $stmt->execute(array(':domain' => $row['domain']));
  2609. $MailboxDataDomain = $stmt->fetch(PDO::FETCH_ASSOC);
  2610. $domaindata['max_new_mailbox_quota'] = ($row['quota'] * 1048576) - $MailboxDataDomain['in_use'];
  2611. if ($domaindata['max_new_mailbox_quota'] > ($row['maxquota'] * 1048576)) {
  2612. $domaindata['max_new_mailbox_quota'] = ($row['maxquota'] * 1048576);
  2613. }
  2614. $domaindata['quota_used_in_domain'] = $MailboxDataDomain['in_use'];
  2615. $domaindata['mboxes_in_domain'] = $MailboxDataDomain['count'];
  2616. $domaindata['mboxes_left'] = $row['mailboxes'] - $MailboxDataDomain['count'];
  2617. $domaindata['domain_name'] = $row['domain'];
  2618. $domaindata['description'] = $row['description'];
  2619. $domaindata['max_num_aliases_for_domain'] = $row['aliases'];
  2620. $domaindata['max_num_mboxes_for_domain'] = $row['mailboxes'];
  2621. $domaindata['max_quota_for_mbox'] = $row['maxquota'] * 1048576;
  2622. $domaindata['max_quota_for_domain'] = $row['quota'] * 1048576;
  2623. $domaindata['relayhost'] = $row['relayhost'];
  2624. $domaindata['backupmx'] = $row['backupmx'];
  2625. $domaindata['backupmx_int'] = $row['backupmx_int'];
  2626. $domaindata['active'] = $row['active'];
  2627. $domaindata['active_int'] = $row['active_int'];
  2628. $domaindata['relay_all_recipients'] = $row['relay_all_recipients'];
  2629. $domaindata['relay_all_recipients_int'] = $row['relay_all_recipients_int'];
  2630. $stmt = $pdo->prepare("SELECT COUNT(*) AS `alias_count` FROM `alias`
  2631. WHERE (`domain`= :domain OR `domain` IN (SELECT `alias_domain` FROM `alias_domain` WHERE `target_domain` = :domain2))
  2632. AND `address` NOT IN (
  2633. SELECT `username` FROM `mailbox`
  2634. )");
  2635. $stmt->execute(array(
  2636. ':domain' => $_data,
  2637. ':domain2' => $_data
  2638. ));
  2639. $AliasDataDomain = $stmt->fetch(PDO::FETCH_ASSOC);
  2640. (isset($AliasDataDomain['alias_count'])) ? $domaindata['aliases_in_domain'] = $AliasDataDomain['alias_count'] : $domaindata['aliases_in_domain'] = "0";
  2641. $domaindata['aliases_left'] = $row['aliases'] - $AliasDataDomain['alias_count'];
  2642. }
  2643. catch (PDOException $e) {
  2644. $_SESSION['return'] = array(
  2645. 'type' => 'danger',
  2646. 'msg' => 'MySQL: '.$e
  2647. );
  2648. return false;
  2649. }
  2650. return $domaindata;
  2651. break;
  2652. case 'mailbox_details':
  2653. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2654. return false;
  2655. }
  2656. $mailboxdata = array();
  2657. try {
  2658. $stmt = $pdo->prepare("SELECT
  2659. `domain`.`backupmx`,
  2660. `mailbox`.`username`,
  2661. `mailbox`.`name`,
  2662. `mailbox`.`active` AS `active_int`,
  2663. CASE `mailbox`.`active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`,
  2664. `mailbox`.`domain`,
  2665. `mailbox`.`quota`,
  2666. `quota2`.`bytes`,
  2667. `quota2`.`messages`
  2668. FROM `mailbox`, `quota2`, `domain`
  2669. WHERE `mailbox`.`kind` NOT REGEXP 'location|thing|group' AND `mailbox`.`username` = `quota2`.`username` AND `domain`.`domain` = `mailbox`.`domain` AND `mailbox`.`username` = :mailbox");
  2670. $stmt->execute(array(
  2671. ':mailbox' => $_data,
  2672. ));
  2673. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  2674. $stmt = $pdo->prepare("SELECT `maxquota`, `quota` FROM `domain` WHERE `domain` = :domain");
  2675. $stmt->execute(array(':domain' => $row['domain']));
  2676. $DomainQuota = $stmt->fetch(PDO::FETCH_ASSOC);
  2677. $stmt = $pdo->prepare("SELECT COALESCE(SUM(`quota`), 0) as `in_use` FROM `mailbox` WHERE `kind` NOT REGEXP 'location|thing|group' AND `domain` = :domain AND `username` != :username");
  2678. $stmt->execute(array(':domain' => $row['domain'], ':username' => $_data));
  2679. $MailboxUsage = $stmt->fetch(PDO::FETCH_ASSOC);
  2680. $stmt = $pdo->prepare("SELECT IFNULL(COUNT(`address`), 0) AS `sa_count` FROM `spamalias` WHERE `goto` = :address AND `validity` >= :unixnow");
  2681. $stmt->execute(array(':address' => $_data, ':unixnow' => time()));
  2682. $SpamaliasUsage = $stmt->fetch(PDO::FETCH_ASSOC);
  2683. $mailboxdata['max_new_quota'] = ($DomainQuota['quota'] * 1048576) - $MailboxUsage['in_use'];
  2684. if ($mailboxdata['max_new_quota'] > ($DomainQuota['maxquota'] * 1048576)) {
  2685. $mailboxdata['max_new_quota'] = ($DomainQuota['maxquota'] * 1048576);
  2686. }
  2687. $mailboxdata['username'] = $row['username'];
  2688. $mailboxdata['is_relayed'] = $row['backupmx'];
  2689. $mailboxdata['name'] = $row['name'];
  2690. $mailboxdata['active'] = $row['active'];
  2691. $mailboxdata['active_int'] = $row['active_int'];
  2692. $mailboxdata['domain'] = $row['domain'];
  2693. $mailboxdata['quota'] = $row['quota'];
  2694. $mailboxdata['quota_used'] = intval($row['bytes']);
  2695. $mailboxdata['percent_in_use'] = round((intval($row['bytes']) / intval($row['quota'])) * 100);
  2696. $mailboxdata['messages'] = $row['messages'];
  2697. $mailboxdata['spam_aliases'] = $SpamaliasUsage['sa_count'];
  2698. if ($mailboxdata['percent_in_use'] >= 90) {
  2699. $mailboxdata['percent_class'] = "danger";
  2700. }
  2701. elseif ($mailboxdata['percent_in_use'] >= 75) {
  2702. $mailboxdata['percent_class'] = "warning";
  2703. }
  2704. else {
  2705. $mailboxdata['percent_class'] = "success";
  2706. }
  2707. }
  2708. catch (PDOException $e) {
  2709. $_SESSION['return'] = array(
  2710. 'type' => 'danger',
  2711. 'msg' => 'MySQL: '.$e
  2712. );
  2713. return false;
  2714. }
  2715. return $mailboxdata;
  2716. break;
  2717. case 'resource_details':
  2718. $resourcedata = array();
  2719. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2720. return false;
  2721. }
  2722. try {
  2723. $stmt = $pdo->prepare("SELECT
  2724. `username`,
  2725. `name`,
  2726. `kind`,
  2727. `multiple_bookings` AS `multiple_bookings_int`,
  2728. `local_part`,
  2729. `active` AS `active_int`,
  2730. CASE `multiple_bookings` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `multiple_bookings`,
  2731. CASE `active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`,
  2732. `domain`
  2733. FROM `mailbox` WHERE `kind` REGEXP 'location|thing|group' AND `username` = :resource");
  2734. $stmt->execute(array(
  2735. ':resource' => $_data,
  2736. ));
  2737. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  2738. $resourcedata['name'] = $row['username'];
  2739. $resourcedata['kind'] = $row['kind'];
  2740. $resourcedata['multiple_bookings'] = $row['multiple_bookings'];
  2741. $resourcedata['multiple_bookings_int'] = $row['multiple_bookings_int'];
  2742. $resourcedata['description'] = $row['name'];
  2743. $resourcedata['active'] = $row['active'];
  2744. $resourcedata['active_int'] = $row['active_int'];
  2745. $resourcedata['domain'] = $row['domain'];
  2746. $resourcedata['local_part'] = $row['local_part'];
  2747. }
  2748. catch (PDOException $e) {
  2749. $_SESSION['return'] = array(
  2750. 'type' => 'danger',
  2751. 'msg' => 'MySQL: '.$e
  2752. );
  2753. return false;
  2754. }
  2755. if (!isset($resourcedata['domain']) ||
  2756. (isset($resourcedata['domain']) && !hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $resourcedata['domain']))) {
  2757. return false;
  2758. }
  2759. return $resourcedata;
  2760. break;
  2761. }
  2762. break;
  2763. case 'delete':
  2764. switch ($_type) {
  2765. case 'syncjob':
  2766. if (!is_array($_data['id'])) {
  2767. $ids = array();
  2768. $ids[] = $_data['id'];
  2769. }
  2770. else {
  2771. $ids = $_data['id'];
  2772. }
  2773. if (!isset($_SESSION['acl']['syncjobs']) || $_SESSION['acl']['syncjobs'] != "1" ) {
  2774. $_SESSION['return'] = array(
  2775. 'type' => 'danger',
  2776. 'msg' => sprintf($lang['danger']['access_denied'])
  2777. );
  2778. return false;
  2779. }
  2780. foreach ($ids as $id) {
  2781. if (!is_numeric($id)) {
  2782. $_SESSION['return'] = array(
  2783. 'type' => 'danger',
  2784. 'msg' => $id
  2785. );
  2786. return false;
  2787. }
  2788. try {
  2789. $stmt = $pdo->prepare("SELECT `user2` FROM `imapsync` WHERE id = :id");
  2790. $stmt->execute(array(':id' => $id));
  2791. $user2 = $stmt->fetch(PDO::FETCH_ASSOC)['user2'];
  2792. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $user2)) {
  2793. $_SESSION['return'] = array(
  2794. 'type' => 'danger',
  2795. 'msg' => sprintf($lang['danger']['access_denied'])
  2796. );
  2797. return false;
  2798. }
  2799. $stmt = $pdo->prepare("DELETE FROM `imapsync` WHERE `id`= :id");
  2800. $stmt->execute(array(':id' => $id));
  2801. }
  2802. catch (PDOException $e) {
  2803. $_SESSION['return'] = array(
  2804. 'type' => 'danger',
  2805. 'msg' => 'MySQL: '.$e
  2806. );
  2807. return false;
  2808. }
  2809. }
  2810. $_SESSION['return'] = array(
  2811. 'type' => 'success',
  2812. 'msg' => 'Deleted syncjob id/s ' . implode(', ', $ids)
  2813. );
  2814. return true;
  2815. break;
  2816. case 'time_limited_alias':
  2817. if (!is_array($_data['address'])) {
  2818. $addresses = array();
  2819. $addresses[] = $_data['address'];
  2820. }
  2821. else {
  2822. $addresses = $_data['address'];
  2823. }
  2824. if (!isset($_SESSION['acl']['spam_alias']) || $_SESSION['acl']['spam_alias'] != "1" ) {
  2825. $_SESSION['return'] = array(
  2826. 'type' => 'danger',
  2827. 'msg' => sprintf($lang['danger']['access_denied'])
  2828. );
  2829. return false;
  2830. }
  2831. foreach ($addresses as $address) {
  2832. try {
  2833. $stmt = $pdo->prepare("SELECT `goto` FROM `spamalias` WHERE `address` = :address");
  2834. $stmt->execute(array(':address' => $address));
  2835. $goto = $stmt->fetch(PDO::FETCH_ASSOC)['goto'];
  2836. }
  2837. catch (PDOException $e) {
  2838. $_SESSION['return'] = array(
  2839. 'type' => 'danger',
  2840. 'msg' => 'MySQL: '.$e
  2841. );
  2842. return false;
  2843. }
  2844. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $goto)) {
  2845. $_SESSION['return'] = array(
  2846. 'type' => 'danger',
  2847. 'msg' => sprintf($lang['danger']['access_denied'])
  2848. );
  2849. return false;
  2850. }
  2851. try {
  2852. $stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `goto` = :username AND `address` = :item");
  2853. $stmt->execute(array(
  2854. ':username' => $goto,
  2855. ':item' => $address
  2856. ));
  2857. }
  2858. catch (PDOException $e) {
  2859. $_SESSION['return'] = array(
  2860. 'type' => 'danger',
  2861. 'msg' => 'MySQL: '.$e
  2862. );
  2863. return false;
  2864. }
  2865. }
  2866. $_SESSION['return'] = array(
  2867. 'type' => 'success',
  2868. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($usernames))
  2869. );
  2870. break;
  2871. case 'eas_cache':
  2872. if (!is_array($_data['username'])) {
  2873. $usernames = array();
  2874. $usernames[] = $_data['username'];
  2875. }
  2876. else {
  2877. $usernames = $_data['username'];
  2878. }
  2879. if (!isset($_SESSION['acl']['eas_reset']) || $_SESSION['acl']['eas_reset'] != "1" ) {
  2880. $_SESSION['return'] = array(
  2881. 'type' => 'danger',
  2882. 'msg' => sprintf($lang['danger']['access_denied'])
  2883. );
  2884. return false;
  2885. }
  2886. foreach ($usernames as $username) {
  2887. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $username)) {
  2888. $_SESSION['return'] = array(
  2889. 'type' => 'danger',
  2890. 'msg' => sprintf($lang['danger']['access_denied'])
  2891. );
  2892. return false;
  2893. }
  2894. try {
  2895. $stmt = $pdo->prepare("DELETE FROM `sogo_cache_folder` WHERE `c_uid` = :username");
  2896. $stmt->execute(array(
  2897. ':username' => $username
  2898. ));
  2899. }
  2900. catch (PDOException $e) {
  2901. $_SESSION['return'] = array(
  2902. 'type' => 'danger',
  2903. 'msg' => 'MySQL: '.$e
  2904. );
  2905. return false;
  2906. }
  2907. }
  2908. $_SESSION['return'] = array(
  2909. 'type' => 'success',
  2910. 'msg' => sprintf($lang['success']['eas_reset'], htmlspecialchars(implode(', ', $usernames)))
  2911. );
  2912. break;
  2913. case 'domain':
  2914. if (!is_array($_data['domain'])) {
  2915. $domains = array();
  2916. $domains[] = $_data['domain'];
  2917. }
  2918. else {
  2919. $domains = $_data['domain'];
  2920. }
  2921. if ($_SESSION['mailcow_cc_role'] != "admin") {
  2922. $_SESSION['return'] = array(
  2923. 'type' => 'danger',
  2924. 'msg' => sprintf($lang['danger']['access_denied'])
  2925. );
  2926. return false;
  2927. }
  2928. foreach ($domains as $domain) {
  2929. if (!is_valid_domain_name($domain)) {
  2930. $_SESSION['return'] = array(
  2931. 'type' => 'danger',
  2932. 'msg' => sprintf($lang['danger']['domain_invalid'])
  2933. );
  2934. return false;
  2935. }
  2936. $domain = idn_to_ascii(strtolower(trim($domain)));
  2937. try {
  2938. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox`
  2939. WHERE `domain` = :domain");
  2940. $stmt->execute(array(':domain' => $domain));
  2941. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  2942. }
  2943. catch(PDOException $e) {
  2944. $_SESSION['return'] = array(
  2945. 'type' => 'danger',
  2946. 'msg' => 'MySQL: '.$e
  2947. );
  2948. return false;
  2949. }
  2950. if ($num_results != 0 || !empty($num_results)) {
  2951. $_SESSION['return'] = array(
  2952. 'type' => 'danger',
  2953. 'msg' => sprintf($lang['danger']['domain_not_empty'])
  2954. );
  2955. return false;
  2956. }
  2957. try {
  2958. $stmt = $pdo->prepare("DELETE FROM `domain` WHERE `domain` = :domain");
  2959. $stmt->execute(array(
  2960. ':domain' => $domain,
  2961. ));
  2962. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `domain` = :domain");
  2963. $stmt->execute(array(
  2964. ':domain' => $domain,
  2965. ));
  2966. $stmt = $pdo->prepare("DELETE FROM `alias` WHERE `domain` = :domain");
  2967. $stmt->execute(array(
  2968. ':domain' => $domain,
  2969. ));
  2970. $stmt = $pdo->prepare("DELETE FROM `alias_domain` WHERE `target_domain` = :domain");
  2971. $stmt->execute(array(
  2972. ':domain' => $domain,
  2973. ));
  2974. $stmt = $pdo->prepare("DELETE FROM `mailbox` WHERE `domain` = :domain");
  2975. $stmt->execute(array(
  2976. ':domain' => $domain,
  2977. ));
  2978. $stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` LIKE :domain");
  2979. $stmt->execute(array(
  2980. ':domain' => '%@'.$domain,
  2981. ));
  2982. $stmt = $pdo->prepare("DELETE FROM `quota2` WHERE `username` = :domain");
  2983. $stmt->execute(array(
  2984. ':domain' => '%@'.$domain,
  2985. ));
  2986. $stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `address` = :domain");
  2987. $stmt->execute(array(
  2988. ':domain' => '%@'.$domain,
  2989. ));
  2990. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :domain");
  2991. $stmt->execute(array(
  2992. ':domain' => '%@'.$domain,
  2993. ));
  2994. }
  2995. catch (PDOException $e) {
  2996. $_SESSION['return'] = array(
  2997. 'type' => 'danger',
  2998. 'msg' => 'MySQL: '.$e
  2999. );
  3000. return false;
  3001. }
  3002. try {
  3003. $redis->hDel('DOMAIN_MAP', $domain);
  3004. }
  3005. catch (RedisException $e) {
  3006. $_SESSION['return'] = array(
  3007. 'type' => 'danger',
  3008. 'msg' => 'Redis: '.$e
  3009. );
  3010. return false;
  3011. }
  3012. }
  3013. $_SESSION['return'] = array(
  3014. 'type' => 'success',
  3015. 'msg' => sprintf($lang['success']['domain_removed'], htmlspecialchars(implode(', ', $domains)))
  3016. );
  3017. return true;
  3018. break;
  3019. case 'alias':
  3020. if (!is_array($_data['address'])) {
  3021. $addresses = array();
  3022. $addresses[] = $_data['address'];
  3023. }
  3024. else {
  3025. $addresses = $_data['address'];
  3026. }
  3027. foreach ($addresses as $address) {
  3028. $local_part = strstr($address, '@', true);
  3029. $domain = mailbox('get', 'alias_details', $address)['domain'];
  3030. try {
  3031. $stmt = $pdo->prepare("SELECT `goto` FROM `alias` WHERE `address` = :address");
  3032. $stmt->execute(array(':address' => $address));
  3033. $gotos = $stmt->fetch(PDO::FETCH_ASSOC);
  3034. }
  3035. catch(PDOException $e) {
  3036. $_SESSION['return'] = array(
  3037. 'type' => 'danger',
  3038. 'msg' => 'MySQL: '.$e
  3039. );
  3040. return false;
  3041. }
  3042. $goto_array = explode(',', $gotos['goto']);
  3043. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  3044. $_SESSION['return'] = array(
  3045. 'type' => 'danger',
  3046. 'msg' => sprintf($lang['danger']['access_denied'])
  3047. );
  3048. return false;
  3049. }
  3050. try {
  3051. $stmt = $pdo->prepare("DELETE FROM `alias` WHERE `address` = :address AND `address` NOT IN (SELECT `username` FROM `mailbox`)");
  3052. $stmt->execute(array(
  3053. ':address' => $address
  3054. ));
  3055. }
  3056. catch (PDOException $e) {
  3057. $_SESSION['return'] = array(
  3058. 'type' => 'danger',
  3059. 'msg' => 'MySQL: '.$e
  3060. );
  3061. return false;
  3062. }
  3063. }
  3064. $_SESSION['return'] = array(
  3065. 'type' => 'success',
  3066. 'msg' => sprintf($lang['success']['alias_removed'], htmlspecialchars(implode(', ', $addresses)))
  3067. );
  3068. break;
  3069. case 'alias_domain':
  3070. if (!is_array($_data['alias_domain'])) {
  3071. $alias_domains = array();
  3072. $alias_domains[] = $_data['alias_domain'];
  3073. }
  3074. else {
  3075. $alias_domains = $_data['alias_domain'];
  3076. }
  3077. foreach ($alias_domains as $alias_domain) {
  3078. if (!is_valid_domain_name($alias_domain)) {
  3079. $_SESSION['return'] = array(
  3080. 'type' => 'danger',
  3081. 'msg' => sprintf($lang['danger']['domain_invalid'])
  3082. );
  3083. return false;
  3084. }
  3085. try {
  3086. $stmt = $pdo->prepare("SELECT `target_domain` FROM `alias_domain`
  3087. WHERE `alias_domain`= :alias_domain");
  3088. $stmt->execute(array(':alias_domain' => $alias_domain));
  3089. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  3090. }
  3091. catch(PDOException $e) {
  3092. $_SESSION['return'] = array(
  3093. 'type' => 'danger',
  3094. 'msg' => 'MySQL: '.$e
  3095. );
  3096. return false;
  3097. }
  3098. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $DomainData['target_domain'])) {
  3099. $_SESSION['return'] = array(
  3100. 'type' => 'danger',
  3101. 'msg' => sprintf($lang['danger']['access_denied'])
  3102. );
  3103. return false;
  3104. }
  3105. try {
  3106. $stmt = $pdo->prepare("DELETE FROM `alias_domain` WHERE `alias_domain` = :alias_domain");
  3107. $stmt->execute(array(
  3108. ':alias_domain' => $alias_domain,
  3109. ));
  3110. $stmt = $pdo->prepare("DELETE FROM `alias` WHERE `domain` = :alias_domain");
  3111. $stmt->execute(array(
  3112. ':alias_domain' => $alias_domain,
  3113. ));
  3114. }
  3115. catch (PDOException $e) {
  3116. $_SESSION['return'] = array(
  3117. 'type' => 'danger',
  3118. 'msg' => 'MySQL: '.$e
  3119. );
  3120. return false;
  3121. }
  3122. }
  3123. $_SESSION['return'] = array(
  3124. 'type' => 'success',
  3125. 'msg' => sprintf($lang['success']['alias_domain_removed'], htmlspecialchars(implode(', ', $alias_domains)))
  3126. );
  3127. break;
  3128. case 'mailbox':
  3129. if (!is_array($_data['username'])) {
  3130. $usernames = array();
  3131. $usernames[] = $_data['username'];
  3132. }
  3133. else {
  3134. $usernames = $_data['username'];
  3135. }
  3136. foreach ($usernames as $username) {
  3137. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  3138. $_SESSION['return'] = array(
  3139. 'type' => 'danger',
  3140. 'msg' => sprintf($lang['danger']['access_denied'])
  3141. );
  3142. return false;
  3143. }
  3144. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $username)) {
  3145. $_SESSION['return'] = array(
  3146. 'type' => 'danger',
  3147. 'msg' => sprintf($lang['danger']['access_denied'])
  3148. );
  3149. return false;
  3150. }
  3151. try {
  3152. $stmt = $pdo->prepare("DELETE FROM `alias` WHERE `goto` = :username");
  3153. $stmt->execute(array(
  3154. ':username' => $username
  3155. ));
  3156. $stmt = $pdo->prepare("DELETE FROM `quota2` WHERE `username` = :username");
  3157. $stmt->execute(array(
  3158. ':username' => $username
  3159. ));
  3160. $stmt = $pdo->prepare("DELETE FROM `mailbox` WHERE `username` = :username");
  3161. $stmt->execute(array(
  3162. ':username' => $username
  3163. ));
  3164. $stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` = :username");
  3165. $stmt->execute(array(
  3166. ':username' => $username
  3167. ));
  3168. $stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `goto` = :username");
  3169. $stmt->execute(array(
  3170. ':username' => $username
  3171. ));
  3172. $stmt = $pdo->prepare("DELETE FROM `imapsync` WHERE `user2` = :username");
  3173. $stmt->execute(array(
  3174. ':username' => $username
  3175. ));
  3176. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :username");
  3177. $stmt->execute(array(
  3178. ':username' => $username
  3179. ));
  3180. $stmt = $pdo->prepare("DELETE FROM `sogo_user_profile` WHERE `c_uid` = :username");
  3181. $stmt->execute(array(
  3182. ':username' => $username
  3183. ));
  3184. $stmt = $pdo->prepare("DELETE FROM `sogo_cache_folder` WHERE `c_uid` = :username");
  3185. $stmt->execute(array(
  3186. ':username' => $username
  3187. ));
  3188. $stmt = $pdo->prepare("DELETE FROM `sogo_acl` WHERE `c_object` LIKE '%/" . $username . "/%' OR `c_uid` = :username");
  3189. $stmt->execute(array(
  3190. ':username' => $username
  3191. ));
  3192. $stmt = $pdo->prepare("DELETE FROM `sogo_store` WHERE `c_folder_id` IN (SELECT `c_folder_id` FROM `sogo_folder_info` WHERE `c_path2` = :username)");
  3193. $stmt->execute(array(
  3194. ':username' => $username
  3195. ));
  3196. $stmt = $pdo->prepare("DELETE FROM `sogo_quick_contact` WHERE `c_folder_id` IN (SELECT `c_folder_id` FROM `sogo_folder_info` WHERE `c_path2` = :username)");
  3197. $stmt->execute(array(
  3198. ':username' => $username
  3199. ));
  3200. $stmt = $pdo->prepare("DELETE FROM `sogo_quick_appointment` WHERE `c_folder_id` IN (SELECT `c_folder_id` FROM `sogo_folder_info` WHERE `c_path2` = :username)");
  3201. $stmt->execute(array(
  3202. ':username' => $username
  3203. ));
  3204. $stmt = $pdo->prepare("DELETE FROM `sogo_folder_info` WHERE `c_path2` = :username");
  3205. $stmt->execute(array(
  3206. ':username' => $username
  3207. ));
  3208. $stmt = $pdo->prepare("SELECT `address`, `goto` FROM `alias`
  3209. WHERE `goto` REGEXP :username");
  3210. $stmt->execute(array(':username' => '(^|,)'.$username.'($|,)'));
  3211. $GotoData = $stmt->fetchAll(PDO::FETCH_ASSOC);
  3212. foreach ($GotoData as $gotos) {
  3213. $goto_exploded = explode(',', $gotos['goto']);
  3214. if (($key = array_search($username, $goto_exploded)) !== false) {
  3215. unset($goto_exploded[$key]);
  3216. }
  3217. $gotos_rebuild = implode(',', $goto_exploded);
  3218. $stmt = $pdo->prepare("UPDATE `alias` SET
  3219. `goto` = :goto
  3220. WHERE `address` = :address");
  3221. $stmt->execute(array(
  3222. ':goto' => $gotos_rebuild,
  3223. ':address' => $gotos['address']
  3224. ));
  3225. }
  3226. }
  3227. catch (PDOException $e) {
  3228. $_SESSION['return'] = array(
  3229. 'type' => 'danger',
  3230. 'msg' => 'MySQL: '.$e
  3231. );
  3232. return false;
  3233. }
  3234. }
  3235. $_SESSION['return'] = array(
  3236. 'type' => 'success',
  3237. 'msg' => sprintf($lang['success']['mailbox_removed'], htmlspecialchars(implode(', ', $usernames)))
  3238. );
  3239. break;
  3240. case 'resource':
  3241. if (!is_array($_data['name'])) {
  3242. $names = array();
  3243. $names[] = $_data['name'];
  3244. }
  3245. else {
  3246. $names = $_data['name'];
  3247. }
  3248. foreach ($names as $name) {
  3249. if (!filter_var($name, FILTER_VALIDATE_EMAIL)) {
  3250. $_SESSION['return'] = array(
  3251. 'type' => 'danger',
  3252. 'msg' => sprintf($lang['danger']['access_denied'])
  3253. );
  3254. return false;
  3255. }
  3256. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $name)) {
  3257. $_SESSION['return'] = array(
  3258. 'type' => 'danger',
  3259. 'msg' => sprintf($lang['danger']['access_denied'])
  3260. );
  3261. return false;
  3262. }
  3263. try {
  3264. $stmt = $pdo->prepare("DELETE FROM `mailbox` WHERE `username` = :username");
  3265. $stmt->execute(array(
  3266. ':username' => $name
  3267. ));
  3268. $stmt = $pdo->prepare("DELETE FROM `sogo_user_profile` WHERE `c_uid` = :username");
  3269. $stmt->execute(array(
  3270. ':username' => $name
  3271. ));
  3272. $stmt = $pdo->prepare("DELETE FROM `sogo_cache_folder` WHERE `c_uid` = :username");
  3273. $stmt->execute(array(
  3274. ':username' => $name
  3275. ));
  3276. $stmt = $pdo->prepare("DELETE FROM `sogo_acl` WHERE `c_object` LIKE '%/" . $name . "/%' OR `c_uid` = :username");
  3277. $stmt->execute(array(
  3278. ':username' => $name
  3279. ));
  3280. $stmt = $pdo->prepare("DELETE FROM `sogo_store` WHERE `c_folder_id` IN (SELECT `c_folder_id` FROM `sogo_folder_info` WHERE `c_path2` = :username)");
  3281. $stmt->execute(array(
  3282. ':username' => $name
  3283. ));
  3284. $stmt = $pdo->prepare("DELETE FROM `sogo_quick_contact` WHERE `c_folder_id` IN (SELECT `c_folder_id` FROM `sogo_folder_info` WHERE `c_path2` = :username)");
  3285. $stmt->execute(array(
  3286. ':username' => $name
  3287. ));
  3288. $stmt = $pdo->prepare("DELETE FROM `sogo_quick_appointment` WHERE `c_folder_id` IN (SELECT `c_folder_id` FROM `sogo_folder_info` WHERE `c_path2` = :username)");
  3289. $stmt->execute(array(
  3290. ':username' => $name
  3291. ));
  3292. $stmt = $pdo->prepare("DELETE FROM `sogo_folder_info` WHERE `c_path2` = :username");
  3293. $stmt->execute(array(
  3294. ':username' => $name
  3295. ));
  3296. }
  3297. catch (PDOException $e) {
  3298. $_SESSION['return'] = array(
  3299. 'type' => 'danger',
  3300. 'msg' => 'MySQL: '.$e
  3301. );
  3302. return false;
  3303. }
  3304. }
  3305. $_SESSION['return'] = array(
  3306. 'type' => 'success',
  3307. 'msg' => sprintf($lang['success']['resource_removed'], htmlspecialchars(implode(', ', $names)))
  3308. );
  3309. break;
  3310. }
  3311. break;
  3312. }
  3313. }