| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507 | <?phpfunction domain_admin($_action, $_data = null) {  global $pdo;  global $lang;  switch ($_action) {    case 'add':      $username		= strtolower(trim($_data['username']));      $password		= $_data['password'];      $password2  = $_data['password2'];      $domains    = (array)$_data['domains'];      $active     = intval($_data['active']);      if ($_SESSION['mailcow_cc_role'] != "admin") {        $_SESSION['return'] = array(          'type' => 'danger',          'msg' => sprintf($lang['danger']['access_denied'])        );        return false;      }      if (empty($domains)) {        $_SESSION['return'] = array(          'type' => 'danger',          'msg' => sprintf($lang['danger']['domain_invalid'])        );        return false;      }      if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username)) || empty ($username)) {        $_SESSION['return'] = array(          'type' => 'danger',          'msg' => sprintf($lang['danger']['username_invalid'])        );        return false;      }      try {        $stmt = $pdo->prepare("SELECT `username` FROM `mailbox`          WHERE `username` = :username");        $stmt->execute(array(':username' => $username));        $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));                $stmt = $pdo->prepare("SELECT `username` FROM `admin`          WHERE `username` = :username");        $stmt->execute(array(':username' => $username));        $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));                $stmt = $pdo->prepare("SELECT `username` FROM `domain_admins`          WHERE `username` = :username");        $stmt->execute(array(':username' => $username));        $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));      }      catch(PDOException $e) {        $_SESSION['return'] = array(          'type' => 'danger',          'msg' => 'MySQL: '.$e        );        return false;      }      foreach ($num_results as $num_results_each) {        if ($num_results_each != 0) {          $_SESSION['return'] = array(            'type' => 'danger',            'msg' => sprintf($lang['danger']['object_exists'], htmlspecialchars($username))          );          return false;        }      }      if (!empty($password) && !empty($password2)) {        if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) {          $_SESSION['return'] = array(            'type' => 'danger',            'msg' => sprintf($lang['danger']['password_complexity'])          );          return false;        }        if ($password != $password2) {          $_SESSION['return'] = array(            'type' => 'danger',            'msg' => sprintf($lang['danger']['password_mismatch'])          );          return false;        }        $password_hashed = hash_password($password);        foreach ($domains as $domain) {          if (!is_valid_domain_name($domain)) {            $_SESSION['return'] = array(              'type' => 'danger',              'msg' => sprintf($lang['danger']['domain_invalid'])            );            return false;          }          try {            $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)                VALUES (:username, :domain, :created, :active)");            $stmt->execute(array(              ':username' => $username,              ':domain' => $domain,              ':created' => date('Y-m-d H:i:s'),              ':active' => $active            ));          }          catch (PDOException $e) {            domain_admin('delete', $username);            $_SESSION['return'] = array(              'type' => 'danger',              'msg' => 'MySQL: '.$e            );            return false;          }        }        try {          $stmt = $pdo->prepare("INSERT INTO `admin` (`username`, `password`, `superadmin`, `active`)            VALUES (:username, :password_hashed, '0', :active)");          $stmt->execute(array(            ':username' => $username,            ':password_hashed' => $password_hashed,            ':active' => $active          ));        }        catch (PDOException $e) {          $_SESSION['return'] = array(            'type' => 'danger',            'msg' => 'MySQL: '.$e          );          return false;        }      }      else {        $_SESSION['return'] = array(          'type' => 'danger',          'msg' => sprintf($lang['danger']['password_empty'])        );        return false;      }      $_SESSION['return'] = array(        'type' => 'success',        'msg' => sprintf($lang['success']['domain_admin_added'], htmlspecialchars($username))      );    break;    case 'edit':      if ($_SESSION['mailcow_cc_role'] != "admin" && $_SESSION['mailcow_cc_role'] != "domainadmin") {        $_SESSION['return'] = array(          'type' => 'danger',          'msg' => sprintf($lang['danger']['access_denied'])        );        return false;      }      // Administrator      if ($_SESSION['mailcow_cc_role'] == "admin") {        if (!is_array($_data['username'])) {          $usernames = array();          $usernames[] = $_data['username'];        }        else {          $usernames = $_data['username'];        }        foreach ($usernames as $username) {          $is_now = domain_admin('details', $username);          $domains = (isset($_data['domains'])) ? (array)$_data['domains'] : null;          if (!empty($is_now)) {            $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active_int'];            $domains = (!empty($domains)) ? $domains : $is_now['selected_domains'];            $username_new = (!empty($_data['username_new'])) ? $_data['username_new'] : $is_now['username'];          }          else {            $_SESSION['return'] = array(              'type' => 'danger',              'msg' => sprintf($lang['danger']['access_denied'])            );            return false;          }          $password     = $_data['password'];          $password2    = $_data['password2'];          if (!empty($domains)) {            foreach ($domains as $domain) {              if (!is_valid_domain_name($domain)) {                $_SESSION['return'] = array(                  'type' => 'danger',                  'msg' => sprintf($lang['danger']['domain_invalid'])                );                return false;              }            }          }          if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username_new))) {            $_SESSION['return'] = array(              'type' => 'danger',              'msg' => sprintf($lang['danger']['username_invalid'])            );            return false;          }          if ($username_new != $username) {            if (!empty(domain_admin('details', $username_new)['username'])) {              $_SESSION['return'] = array(                'type' => 'danger',                'msg' => sprintf($lang['danger']['username_invalid'])              );              return false;            }          }          try {            $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");            $stmt->execute(array(              ':username' => $username,            ));          }          catch (PDOException $e) {            $_SESSION['return'] = array(              'type' => 'danger',              'msg' => 'MySQL: '.$e            );            return false;          }          if (!empty($domains)) {            foreach ($domains as $domain) {              try {                $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)                  VALUES (:username_new, :domain, :created, :active)");                $stmt->execute(array(                  ':username_new' => $username_new,                  ':domain' => $domain,                  ':created' => date('Y-m-d H:i:s'),                  ':active' => $active                ));              }              catch (PDOException $e) {                $_SESSION['return'] = array(                  'type' => 'danger',                  'msg' => 'MySQL: '.$e                );                return false;              }            }          }          if (!empty($password) && !empty($password2)) {            if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) {              $_SESSION['return'] = array(                'type' => 'danger',                'msg' => sprintf($lang['danger']['password_complexity'])              );              return false;            }            if ($password != $password2) {              $_SESSION['return'] = array(                'type' => 'danger',                'msg' => sprintf($lang['danger']['password_mismatch'])              );              return false;            }            $password_hashed = hash_password($password);            try {              $stmt = $pdo->prepare("UPDATE `admin` SET `username` = :username_new, `active` = :active, `password` = :password_hashed WHERE `username` = :username");              $stmt->execute(array(                ':password_hashed' => $password_hashed,                ':username_new' => $username_new,                ':username' => $username,                ':active' => $active              ));              if (isset($_data['disable_tfa'])) {                $stmt = $pdo->prepare("UPDATE `tfa` SET `active` = '0' WHERE `username` = :username");                $stmt->execute(array(':username' => $username));              }              else {                $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username_new WHERE `username` = :username");                $stmt->execute(array(':username_new' => $username_new, ':username' => $username));              }            }            catch (PDOException $e) {              $_SESSION['return'] = array(                'type' => 'danger',                'msg' => 'MySQL: '.$e              );              return false;            }          }          else {            try {              $stmt = $pdo->prepare("UPDATE `admin` SET `username` = :username_new, `active` = :active WHERE `username` = :username");              $stmt->execute(array(                ':username_new' => $username_new,                ':username' => $username,                ':active' => $active              ));              if (isset($_data['disable_tfa'])) {                $stmt = $pdo->prepare("UPDATE `tfa` SET `active` = '0' WHERE `username` = :username");                $stmt->execute(array(':username' => $username));              }              else {                $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username_new WHERE `username` = :username");                $stmt->execute(array(':username_new' => $username_new, ':username' => $username));              }            }            catch (PDOException $e) {              $_SESSION['return'] = array(                'type' => 'danger',                'msg' => 'MySQL: '.$e              );              return false;            }          }        }        $_SESSION['return'] = array(          'type' => 'success',          'msg' => sprintf($lang['success']['domain_admin_modified'], htmlspecialchars(implode(', ', $usernames)))        );      }      // Domain administrator      // Can only edit itself      elseif ($_SESSION['mailcow_cc_role'] == "domainadmin") {        $username = $_SESSION['mailcow_cc_username'];        $password_old		= $_data['user_old_pass'];        $password_new	= $_data['user_new_pass'];        $password_new2	= $_data['user_new_pass2'];        $stmt = $pdo->prepare("SELECT `password` FROM `admin`            WHERE `username` = :user");        $stmt->execute(array(':user' => $username));        $row = $stmt->fetch(PDO::FETCH_ASSOC);        if (!verify_ssha256($row['password'], $password_old)) {          $_SESSION['return'] = array(            'type' => 'danger',            'msg' => sprintf($lang['danger']['access_denied'])          );          return false;        }        if (!empty($password_new2) && !empty($password_new)) {          if ($password_new2 != $password_new) {            $_SESSION['return'] = array(              'type' => 'danger',              'msg' => sprintf($lang['danger']['password_mismatch'])            );            return false;          }          if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password_new)) {            $_SESSION['return'] = array(              'type' => 'danger',              'msg' => sprintf($lang['danger']['password_complexity'])            );            return false;          }          $password_hashed = hash_password($password_new);          try {            $stmt = $pdo->prepare("UPDATE `admin` SET `password` = :password_hashed WHERE `username` = :username");            $stmt->execute(array(              ':password_hashed' => $password_hashed,              ':username' => $username            ));          }          catch (PDOException $e) {            $_SESSION['return'] = array(              'type' => 'danger',              'msg' => 'MySQL: '.$e            );            return false;          }        }                $_SESSION['return'] = array(          'type' => 'success',          'msg' => sprintf($lang['success']['domain_admin_modified'], htmlspecialchars($username))        );      }    break;    case 'delete':      if ($_SESSION['mailcow_cc_role'] != "admin") {        $_SESSION['return'] = array(          'type' => 'danger',          'msg' => sprintf($lang['danger']['access_denied'])        );        return false;      }      $usernames = (array)$_data['username'];      foreach ($usernames as $username) {        if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {          $_SESSION['return'] = array(            'type' => 'danger',            'msg' => sprintf($lang['danger']['username_invalid'])          );          return false;        }        try {          $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");          $stmt->execute(array(            ':username' => $username,          ));          $stmt = $pdo->prepare("DELETE FROM `admin` WHERE `username` = :username");          $stmt->execute(array(            ':username' => $username,          ));        }        catch (PDOException $e) {          $_SESSION['return'] = array(            'type' => 'danger',            'msg' => 'MySQL: '.$e          );          return false;        }      }      $_SESSION['return'] = array(        'type' => 'success',        'msg' => sprintf($lang['success']['domain_admin_removed'], htmlspecialchars(implode(', ', $usernames)))      );    break;    case 'get':      $domainadmins = array();      if ($_SESSION['mailcow_cc_role'] != "admin") {        $_SESSION['return'] = array(          'type' => 'danger',          'msg' => sprintf($lang['danger']['access_denied'])        );        return false;      }      try {        $stmt = $pdo->query("SELECT DISTINCT          `username`            FROM `domain_admins`               WHERE `username` IN (                SELECT `username` FROM `admin`                  WHERE `superadmin`!='1'              )");        $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);        while ($row = array_shift($rows)) {          $domainadmins[] = $row['username'];        }      }      catch(PDOException $e) {        $_SESSION['return'] = array(          'type' => 'danger',          'msg' => 'MySQL: '.$e        );      }      return $domainadmins;    break;    case 'details':      $domainadmindata = array();      if ($_SESSION['mailcow_cc_role'] == "domainadmin" && $_data != $_SESSION['mailcow_cc_username']) {        return false;      }      elseif ($_SESSION['mailcow_cc_role'] != "admin" || !isset($_data)) {        return false;      }      if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $_data))) {        return false;      }      try {        $stmt = $pdo->prepare("SELECT          `tfa`.`active` AS `tfa_active_int`,          CASE `tfa`.`active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `tfa_active`,          `domain_admins`.`username`,          `domain_admins`.`created`,          `domain_admins`.`active` AS `active_int`,          CASE `domain_admins`.`active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`            FROM `domain_admins`            LEFT OUTER JOIN `tfa` ON `tfa`.`username`=`domain_admins`.`username`              WHERE `domain_admins`.`username`= :domain_admin");        $stmt->execute(array(          ':domain_admin' => $_data        ));        $row = $stmt->fetch(PDO::FETCH_ASSOC);        if (empty($row)) {           return false;        }        $domainadmindata['username'] = $row['username'];        $domainadmindata['tfa_active'] = $row['tfa_active'];        $domainadmindata['active'] = $row['active'];        $domainadmindata['tfa_active_int'] = $row['tfa_active_int'];        $domainadmindata['active_int'] = $row['active_int'];        $domainadmindata['modified'] = $row['created'];        // GET SELECTED        $stmt = $pdo->prepare("SELECT `domain` FROM `domain`          WHERE `domain` IN (            SELECT `domain` FROM `domain_admins`              WHERE `username`= :domain_admin)");        $stmt->execute(array(':domain_admin' => $_data));        $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);        while($row = array_shift($rows)) {          $domainadmindata['selected_domains'][] = $row['domain'];        }        // GET UNSELECTED        $stmt = $pdo->prepare("SELECT `domain` FROM `domain`          WHERE `domain` NOT IN (            SELECT `domain` FROM `domain_admins`              WHERE `username`= :domain_admin)");        $stmt->execute(array(':domain_admin' => $_data));        $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);        while($row = array_shift($rows)) {          $domainadmindata['unselected_domains'][] = $row['domain'];        }        if (!isset($domainadmindata['unselected_domains'])) {          $domainadmindata['unselected_domains'] = "";        }      }      catch(PDOException $e) {        $_SESSION['return'] = array(          'type' => 'danger',          'msg' => 'MySQL: '.$e        );      }      return $domainadmindata;    break;  }}
 |