functions.domain_admin.inc.php 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507
  1. <?php
  2. function domain_admin($_action, $_data = null) {
  3. global $pdo;
  4. global $lang;
  5. switch ($_action) {
  6. case 'add':
  7. $username = strtolower(trim($_data['username']));
  8. $password = $_data['password'];
  9. $password2 = $_data['password2'];
  10. $domains = (array)$_data['domains'];
  11. $active = intval($_data['active']);
  12. if ($_SESSION['mailcow_cc_role'] != "admin") {
  13. $_SESSION['return'] = array(
  14. 'type' => 'danger',
  15. 'msg' => sprintf($lang['danger']['access_denied'])
  16. );
  17. return false;
  18. }
  19. if (empty($domains)) {
  20. $_SESSION['return'] = array(
  21. 'type' => 'danger',
  22. 'msg' => sprintf($lang['danger']['domain_invalid'])
  23. );
  24. return false;
  25. }
  26. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username)) || empty ($username)) {
  27. $_SESSION['return'] = array(
  28. 'type' => 'danger',
  29. 'msg' => sprintf($lang['danger']['username_invalid'])
  30. );
  31. return false;
  32. }
  33. try {
  34. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox`
  35. WHERE `username` = :username");
  36. $stmt->execute(array(':username' => $username));
  37. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  38. $stmt = $pdo->prepare("SELECT `username` FROM `admin`
  39. WHERE `username` = :username");
  40. $stmt->execute(array(':username' => $username));
  41. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  42. $stmt = $pdo->prepare("SELECT `username` FROM `domain_admins`
  43. WHERE `username` = :username");
  44. $stmt->execute(array(':username' => $username));
  45. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  46. }
  47. catch(PDOException $e) {
  48. $_SESSION['return'] = array(
  49. 'type' => 'danger',
  50. 'msg' => 'MySQL: '.$e
  51. );
  52. return false;
  53. }
  54. foreach ($num_results as $num_results_each) {
  55. if ($num_results_each != 0) {
  56. $_SESSION['return'] = array(
  57. 'type' => 'danger',
  58. 'msg' => sprintf($lang['danger']['object_exists'], htmlspecialchars($username))
  59. );
  60. return false;
  61. }
  62. }
  63. if (!empty($password) && !empty($password2)) {
  64. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) {
  65. $_SESSION['return'] = array(
  66. 'type' => 'danger',
  67. 'msg' => sprintf($lang['danger']['password_complexity'])
  68. );
  69. return false;
  70. }
  71. if ($password != $password2) {
  72. $_SESSION['return'] = array(
  73. 'type' => 'danger',
  74. 'msg' => sprintf($lang['danger']['password_mismatch'])
  75. );
  76. return false;
  77. }
  78. $password_hashed = hash_password($password);
  79. foreach ($domains as $domain) {
  80. if (!is_valid_domain_name($domain)) {
  81. $_SESSION['return'] = array(
  82. 'type' => 'danger',
  83. 'msg' => sprintf($lang['danger']['domain_invalid'])
  84. );
  85. return false;
  86. }
  87. try {
  88. $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
  89. VALUES (:username, :domain, :created, :active)");
  90. $stmt->execute(array(
  91. ':username' => $username,
  92. ':domain' => $domain,
  93. ':created' => date('Y-m-d H:i:s'),
  94. ':active' => $active
  95. ));
  96. }
  97. catch (PDOException $e) {
  98. domain_admin('delete', $username);
  99. $_SESSION['return'] = array(
  100. 'type' => 'danger',
  101. 'msg' => 'MySQL: '.$e
  102. );
  103. return false;
  104. }
  105. }
  106. try {
  107. $stmt = $pdo->prepare("INSERT INTO `admin` (`username`, `password`, `superadmin`, `active`)
  108. VALUES (:username, :password_hashed, '0', :active)");
  109. $stmt->execute(array(
  110. ':username' => $username,
  111. ':password_hashed' => $password_hashed,
  112. ':active' => $active
  113. ));
  114. }
  115. catch (PDOException $e) {
  116. $_SESSION['return'] = array(
  117. 'type' => 'danger',
  118. 'msg' => 'MySQL: '.$e
  119. );
  120. return false;
  121. }
  122. }
  123. else {
  124. $_SESSION['return'] = array(
  125. 'type' => 'danger',
  126. 'msg' => sprintf($lang['danger']['password_empty'])
  127. );
  128. return false;
  129. }
  130. $_SESSION['return'] = array(
  131. 'type' => 'success',
  132. 'msg' => sprintf($lang['success']['domain_admin_added'], htmlspecialchars($username))
  133. );
  134. break;
  135. case 'edit':
  136. if ($_SESSION['mailcow_cc_role'] != "admin" && $_SESSION['mailcow_cc_role'] != "domainadmin") {
  137. $_SESSION['return'] = array(
  138. 'type' => 'danger',
  139. 'msg' => sprintf($lang['danger']['access_denied'])
  140. );
  141. return false;
  142. }
  143. // Administrator
  144. if ($_SESSION['mailcow_cc_role'] == "admin") {
  145. if (!is_array($_data['username'])) {
  146. $usernames = array();
  147. $usernames[] = $_data['username'];
  148. }
  149. else {
  150. $usernames = $_data['username'];
  151. }
  152. foreach ($usernames as $username) {
  153. $is_now = domain_admin('details', $username);
  154. $domains = (isset($_data['domains'])) ? (array)$_data['domains'] : null;
  155. if (!empty($is_now)) {
  156. $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active_int'];
  157. $domains = (!empty($domains)) ? $domains : $is_now['selected_domains'];
  158. $username_new = (!empty($_data['username_new'])) ? $_data['username_new'] : $is_now['username'];
  159. }
  160. else {
  161. $_SESSION['return'] = array(
  162. 'type' => 'danger',
  163. 'msg' => sprintf($lang['danger']['access_denied'])
  164. );
  165. return false;
  166. }
  167. $password = $_data['password'];
  168. $password2 = $_data['password2'];
  169. if (!empty($domains)) {
  170. foreach ($domains as $domain) {
  171. if (!is_valid_domain_name($domain)) {
  172. $_SESSION['return'] = array(
  173. 'type' => 'danger',
  174. 'msg' => sprintf($lang['danger']['domain_invalid'])
  175. );
  176. return false;
  177. }
  178. }
  179. }
  180. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username_new))) {
  181. $_SESSION['return'] = array(
  182. 'type' => 'danger',
  183. 'msg' => sprintf($lang['danger']['username_invalid'])
  184. );
  185. return false;
  186. }
  187. if ($username_new != $username) {
  188. if (!empty(domain_admin('details', $username_new)['username'])) {
  189. $_SESSION['return'] = array(
  190. 'type' => 'danger',
  191. 'msg' => sprintf($lang['danger']['username_invalid'])
  192. );
  193. return false;
  194. }
  195. }
  196. try {
  197. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
  198. $stmt->execute(array(
  199. ':username' => $username,
  200. ));
  201. }
  202. catch (PDOException $e) {
  203. $_SESSION['return'] = array(
  204. 'type' => 'danger',
  205. 'msg' => 'MySQL: '.$e
  206. );
  207. return false;
  208. }
  209. if (!empty($domains)) {
  210. foreach ($domains as $domain) {
  211. try {
  212. $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
  213. VALUES (:username_new, :domain, :created, :active)");
  214. $stmt->execute(array(
  215. ':username_new' => $username_new,
  216. ':domain' => $domain,
  217. ':created' => date('Y-m-d H:i:s'),
  218. ':active' => $active
  219. ));
  220. }
  221. catch (PDOException $e) {
  222. $_SESSION['return'] = array(
  223. 'type' => 'danger',
  224. 'msg' => 'MySQL: '.$e
  225. );
  226. return false;
  227. }
  228. }
  229. }
  230. if (!empty($password) && !empty($password2)) {
  231. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) {
  232. $_SESSION['return'] = array(
  233. 'type' => 'danger',
  234. 'msg' => sprintf($lang['danger']['password_complexity'])
  235. );
  236. return false;
  237. }
  238. if ($password != $password2) {
  239. $_SESSION['return'] = array(
  240. 'type' => 'danger',
  241. 'msg' => sprintf($lang['danger']['password_mismatch'])
  242. );
  243. return false;
  244. }
  245. $password_hashed = hash_password($password);
  246. try {
  247. $stmt = $pdo->prepare("UPDATE `admin` SET `username` = :username_new, `active` = :active, `password` = :password_hashed WHERE `username` = :username");
  248. $stmt->execute(array(
  249. ':password_hashed' => $password_hashed,
  250. ':username_new' => $username_new,
  251. ':username' => $username,
  252. ':active' => $active
  253. ));
  254. if (isset($_data['disable_tfa'])) {
  255. $stmt = $pdo->prepare("UPDATE `tfa` SET `active` = '0' WHERE `username` = :username");
  256. $stmt->execute(array(':username' => $username));
  257. }
  258. else {
  259. $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username_new WHERE `username` = :username");
  260. $stmt->execute(array(':username_new' => $username_new, ':username' => $username));
  261. }
  262. }
  263. catch (PDOException $e) {
  264. $_SESSION['return'] = array(
  265. 'type' => 'danger',
  266. 'msg' => 'MySQL: '.$e
  267. );
  268. return false;
  269. }
  270. }
  271. else {
  272. try {
  273. $stmt = $pdo->prepare("UPDATE `admin` SET `username` = :username_new, `active` = :active WHERE `username` = :username");
  274. $stmt->execute(array(
  275. ':username_new' => $username_new,
  276. ':username' => $username,
  277. ':active' => $active
  278. ));
  279. if (isset($_data['disable_tfa'])) {
  280. $stmt = $pdo->prepare("UPDATE `tfa` SET `active` = '0' WHERE `username` = :username");
  281. $stmt->execute(array(':username' => $username));
  282. }
  283. else {
  284. $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username_new WHERE `username` = :username");
  285. $stmt->execute(array(':username_new' => $username_new, ':username' => $username));
  286. }
  287. }
  288. catch (PDOException $e) {
  289. $_SESSION['return'] = array(
  290. 'type' => 'danger',
  291. 'msg' => 'MySQL: '.$e
  292. );
  293. return false;
  294. }
  295. }
  296. }
  297. $_SESSION['return'] = array(
  298. 'type' => 'success',
  299. 'msg' => sprintf($lang['success']['domain_admin_modified'], htmlspecialchars(implode(', ', $usernames)))
  300. );
  301. }
  302. // Domain administrator
  303. // Can only edit itself
  304. elseif ($_SESSION['mailcow_cc_role'] == "domainadmin") {
  305. $username = $_SESSION['mailcow_cc_username'];
  306. $password_old = $_data['user_old_pass'];
  307. $password_new = $_data['user_new_pass'];
  308. $password_new2 = $_data['user_new_pass2'];
  309. $stmt = $pdo->prepare("SELECT `password` FROM `admin`
  310. WHERE `username` = :user");
  311. $stmt->execute(array(':user' => $username));
  312. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  313. if (!verify_hash($row['password'], $password_old)) {
  314. $_SESSION['return'] = array(
  315. 'type' => 'danger',
  316. 'msg' => sprintf($lang['danger']['access_denied'])
  317. );
  318. return false;
  319. }
  320. if (!empty($password_new2) && !empty($password_new)) {
  321. if ($password_new2 != $password_new) {
  322. $_SESSION['return'] = array(
  323. 'type' => 'danger',
  324. 'msg' => sprintf($lang['danger']['password_mismatch'])
  325. );
  326. return false;
  327. }
  328. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password_new)) {
  329. $_SESSION['return'] = array(
  330. 'type' => 'danger',
  331. 'msg' => sprintf($lang['danger']['password_complexity'])
  332. );
  333. return false;
  334. }
  335. $password_hashed = hash_password($password_new);
  336. try {
  337. $stmt = $pdo->prepare("UPDATE `admin` SET `password` = :password_hashed WHERE `username` = :username");
  338. $stmt->execute(array(
  339. ':password_hashed' => $password_hashed,
  340. ':username' => $username
  341. ));
  342. }
  343. catch (PDOException $e) {
  344. $_SESSION['return'] = array(
  345. 'type' => 'danger',
  346. 'msg' => 'MySQL: '.$e
  347. );
  348. return false;
  349. }
  350. }
  351. $_SESSION['return'] = array(
  352. 'type' => 'success',
  353. 'msg' => sprintf($lang['success']['domain_admin_modified'], htmlspecialchars($username))
  354. );
  355. }
  356. break;
  357. case 'delete':
  358. if ($_SESSION['mailcow_cc_role'] != "admin") {
  359. $_SESSION['return'] = array(
  360. 'type' => 'danger',
  361. 'msg' => sprintf($lang['danger']['access_denied'])
  362. );
  363. return false;
  364. }
  365. $usernames = (array)$_data['username'];
  366. foreach ($usernames as $username) {
  367. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
  368. $_SESSION['return'] = array(
  369. 'type' => 'danger',
  370. 'msg' => sprintf($lang['danger']['username_invalid'])
  371. );
  372. return false;
  373. }
  374. try {
  375. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
  376. $stmt->execute(array(
  377. ':username' => $username,
  378. ));
  379. $stmt = $pdo->prepare("DELETE FROM `admin` WHERE `username` = :username");
  380. $stmt->execute(array(
  381. ':username' => $username,
  382. ));
  383. }
  384. catch (PDOException $e) {
  385. $_SESSION['return'] = array(
  386. 'type' => 'danger',
  387. 'msg' => 'MySQL: '.$e
  388. );
  389. return false;
  390. }
  391. }
  392. $_SESSION['return'] = array(
  393. 'type' => 'success',
  394. 'msg' => sprintf($lang['success']['domain_admin_removed'], htmlspecialchars(implode(', ', $usernames)))
  395. );
  396. break;
  397. case 'get':
  398. $domainadmins = array();
  399. if ($_SESSION['mailcow_cc_role'] != "admin") {
  400. $_SESSION['return'] = array(
  401. 'type' => 'danger',
  402. 'msg' => sprintf($lang['danger']['access_denied'])
  403. );
  404. return false;
  405. }
  406. try {
  407. $stmt = $pdo->query("SELECT DISTINCT
  408. `username`
  409. FROM `domain_admins`
  410. WHERE `username` IN (
  411. SELECT `username` FROM `admin`
  412. WHERE `superadmin`!='1'
  413. )");
  414. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  415. while ($row = array_shift($rows)) {
  416. $domainadmins[] = $row['username'];
  417. }
  418. }
  419. catch(PDOException $e) {
  420. $_SESSION['return'] = array(
  421. 'type' => 'danger',
  422. 'msg' => 'MySQL: '.$e
  423. );
  424. }
  425. return $domainadmins;
  426. break;
  427. case 'details':
  428. $domainadmindata = array();
  429. if ($_SESSION['mailcow_cc_role'] == "domainadmin" && $_data != $_SESSION['mailcow_cc_username']) {
  430. return false;
  431. }
  432. elseif ($_SESSION['mailcow_cc_role'] != "admin" || !isset($_data)) {
  433. return false;
  434. }
  435. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $_data))) {
  436. return false;
  437. }
  438. try {
  439. $stmt = $pdo->prepare("SELECT
  440. `tfa`.`active` AS `tfa_active_int`,
  441. CASE `tfa`.`active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `tfa_active`,
  442. `domain_admins`.`username`,
  443. `domain_admins`.`created`,
  444. `domain_admins`.`active` AS `active_int`,
  445. CASE `domain_admins`.`active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`
  446. FROM `domain_admins`
  447. LEFT OUTER JOIN `tfa` ON `tfa`.`username`=`domain_admins`.`username`
  448. WHERE `domain_admins`.`username`= :domain_admin");
  449. $stmt->execute(array(
  450. ':domain_admin' => $_data
  451. ));
  452. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  453. if (empty($row)) {
  454. return false;
  455. }
  456. $domainadmindata['username'] = $row['username'];
  457. $domainadmindata['tfa_active'] = $row['tfa_active'];
  458. $domainadmindata['active'] = $row['active'];
  459. $domainadmindata['tfa_active_int'] = $row['tfa_active_int'];
  460. $domainadmindata['active_int'] = $row['active_int'];
  461. $domainadmindata['modified'] = $row['created'];
  462. // GET SELECTED
  463. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  464. WHERE `domain` IN (
  465. SELECT `domain` FROM `domain_admins`
  466. WHERE `username`= :domain_admin)");
  467. $stmt->execute(array(':domain_admin' => $_data));
  468. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  469. while($row = array_shift($rows)) {
  470. $domainadmindata['selected_domains'][] = $row['domain'];
  471. }
  472. // GET UNSELECTED
  473. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  474. WHERE `domain` NOT IN (
  475. SELECT `domain` FROM `domain_admins`
  476. WHERE `username`= :domain_admin)");
  477. $stmt->execute(array(':domain_admin' => $_data));
  478. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  479. while($row = array_shift($rows)) {
  480. $domainadmindata['unselected_domains'][] = $row['domain'];
  481. }
  482. if (!isset($domainadmindata['unselected_domains'])) {
  483. $domainadmindata['unselected_domains'] = "";
  484. }
  485. }
  486. catch(PDOException $e) {
  487. $_SESSION['return'] = array(
  488. 'type' => 'danger',
  489. 'msg' => 'MySQL: '.$e
  490. );
  491. }
  492. return $domainadmindata;
  493. break;
  494. }
  495. }