functions.inc.php 74 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566
  1. <?php
  2. function hash_password($password) {
  3. $salt_str = bin2hex(openssl_random_pseudo_bytes(8));
  4. if ($GLOBALS['HASHING'] == "SHA512-CRYPT") {
  5. return "{SHA512-CRYPT}".crypt($password, '$6$'.$salt_str.'$');
  6. }
  7. else {
  8. return "{SSHA256}".base64_encode(hash('sha256', $password.$salt_str, true).$salt_str);
  9. }
  10. }
  11. function hasDomainAccess($username, $role, $domain) {
  12. global $pdo;
  13. if (!filter_var($username, FILTER_VALIDATE_EMAIL) && !ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
  14. return false;
  15. }
  16. if (!is_valid_domain_name($domain)) {
  17. return false;
  18. }
  19. try {
  20. $stmt = $pdo->prepare("SELECT `domain` FROM `domain_admins`
  21. WHERE (
  22. `active`='1'
  23. AND `username` = :username
  24. AND `domain` = :domain
  25. )
  26. OR 'admin' = :role");
  27. $stmt->execute(array(':username' => $username, ':domain' => $domain, ':role' => $role));
  28. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  29. } catch(PDOException $e) {
  30. error_log($e);
  31. return false;
  32. }
  33. if ($num_results != 0 && !empty($num_results)) {
  34. return true;
  35. }
  36. return false;
  37. }
  38. function doveadm_authenticate($hash, $algorithm, $password) {
  39. $descr = array(0 => array('pipe', 'r'), 1 => array('pipe', 'w'), 2 => array('pipe', 'w'));
  40. $pipes = array();
  41. $process = proc_open("/usr/bin/doveadm pw -s ".$algorithm." -t '".$hash."'", $descr, $pipes);
  42. if (is_resource($process)) {
  43. fputs($pipes[0], $password);
  44. fclose($pipes[0]);
  45. while ($f = fgets($pipes[1])) {
  46. if (preg_match('/(verified)/', $f)) {
  47. proc_close($process);
  48. return true;
  49. }
  50. return false;
  51. }
  52. fclose($pipes[1]);
  53. while ($f = fgets($pipes[2])) {
  54. proc_close($process);
  55. return false;
  56. }
  57. fclose($pipes[2]);
  58. proc_close($process);
  59. }
  60. return false;
  61. }
  62. function check_login($user, $pass) {
  63. global $pdo;
  64. if (!filter_var($user, FILTER_VALIDATE_EMAIL) && !ctype_alnum(str_replace(array('_', '.', '-'), '', $user))) {
  65. return false;
  66. }
  67. if (!strpos(shell_exec("file --mime-encoding /usr/bin/doveadm"), "binary")) {
  68. return false;
  69. }
  70. $user = strtolower(trim($user));
  71. $stmt = $pdo->prepare("SELECT `password` FROM `admin`
  72. WHERE `superadmin` = '1'
  73. AND `username` = :user");
  74. $stmt->execute(array(':user' => $user));
  75. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  76. foreach ($rows as $row) {
  77. if (doveadm_authenticate($row['password'], $GLOBALS['HASHING'], $pass) !== false) {
  78. unset($_SESSION['ldelay']);
  79. return "admin";
  80. }
  81. }
  82. $stmt = $pdo->prepare("SELECT `password` FROM `admin`
  83. WHERE `superadmin` = '0'
  84. AND `active`='1'
  85. AND `username` = :user");
  86. $stmt->execute(array(':user' => $user));
  87. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  88. foreach ($rows as $row) {
  89. if (doveadm_authenticate($row['password'], $GLOBALS['HASHING'], $pass) !== false) {
  90. unset($_SESSION['ldelay']);
  91. return "domainadmin";
  92. }
  93. }
  94. $stmt = $pdo->prepare("SELECT `password` FROM `mailbox`
  95. WHERE `active`='1'
  96. AND `username` = :user");
  97. $stmt->execute(array(':user' => $user));
  98. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  99. foreach ($rows as $row) {
  100. if (doveadm_authenticate($row['password'], $GLOBALS['HASHING'], $pass) !== false) {
  101. unset($_SESSION['ldelay']);
  102. return "user";
  103. }
  104. }
  105. if (!isset($_SESSION['ldelay'])) {
  106. $_SESSION['ldelay'] = "0";
  107. }
  108. elseif (!isset($_SESSION['mailcow_cc_username'])) {
  109. $_SESSION['ldelay'] = $_SESSION['ldelay']+0.5;
  110. }
  111. sleep($_SESSION['ldelay']);
  112. }
  113. function formatBytes($size, $precision = 2) {
  114. if(!is_numeric($size)) {
  115. return "0";
  116. }
  117. $base = log($size, 1024);
  118. $suffixes = array(' Byte', ' KiB', ' MiB', ' GiB', ' TiB');
  119. if ($size == "0") {
  120. return "0";
  121. }
  122. return round(pow(1024, $base - floor($base)), $precision) . $suffixes[floor($base)];
  123. }
  124. function dkim_table($action, $item) {
  125. global $lang;
  126. switch ($action) {
  127. case "delete":
  128. $domain = preg_replace('/[^A-Za-z0-9._\-]/', '_', $item['dkim']['domain']);
  129. $selector = preg_replace('/[^A-Za-z0-9._\-]/', '_', $item['dkim']['selector']);
  130. if (!ctype_alnum($selector) || !is_valid_domain_name($domain)) {
  131. $_SESSION['return'] = array(
  132. 'type' => 'danger',
  133. 'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid'])
  134. );
  135. break;
  136. }
  137. exec('rm ' . escapeshellarg($GLOBALS['MC_DKIM_TXTS'] . '/' . $selector . '_' . $domain), $out, $return);
  138. if ($return != "0") {
  139. $_SESSION['return'] = array(
  140. 'type' => 'danger',
  141. 'msg' => sprintf($lang['danger']['dkim_remove_failed'])
  142. );
  143. break;
  144. }
  145. exec('rm ' . escapeshellarg($GLOBALS['MC_DKIM_KEYS'] . '/' . $domain . '.' . $selector), $out, $return);
  146. if ($return != "0") {
  147. $_SESSION['return'] = array(
  148. 'type' => 'danger',
  149. 'msg' => sprintf($lang['danger']['dkim_remove_failed'])
  150. );
  151. break;
  152. }
  153. $_SESSION['return'] = array(
  154. 'type' => 'success',
  155. 'msg' => sprintf($lang['success']['dkim_removed'])
  156. );
  157. break;
  158. case "add":
  159. $domain = preg_replace('/[^A-Za-z0-9._\-]/', '_', $item['dkim']['domain']);
  160. $selector = preg_replace('/[^A-Za-z0-9._\-]/', '_', $item['dkim']['selector']);
  161. $key_length = intval($item['dkim']['key_size']);
  162. if (!ctype_alnum($selector) || !is_valid_domain_name($domain) || !is_numeric($key_length)) {
  163. $_SESSION['return'] = array(
  164. 'type' => 'danger',
  165. 'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid'])
  166. );
  167. break;
  168. }
  169. if (file_exists($GLOBALS['MC_DKIM_TXTS'] . '/' . $selector . '_' . $domain) ||
  170. file_exists($GLOBALS['MC_DKIM_KEYS'] . '/' . $domain . '.' . $selector)) {
  171. $_SESSION['return'] = array(
  172. 'type' => 'danger',
  173. 'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid'])
  174. );
  175. break;
  176. }
  177. $config = array(
  178. "digest_alg" => "sha256",
  179. "private_key_bits" => $key_length,
  180. "private_key_type" => OPENSSL_KEYTYPE_RSA,
  181. );
  182. $keypair_ressource = openssl_pkey_new($config);
  183. $key_details = openssl_pkey_get_details($keypair_ressource);
  184. $pubKey = implode(array_slice(
  185. array_filter(
  186. explode(PHP_EOL, $key_details['key'])
  187. ), 1, -1)
  188. );
  189. // Save public key to file
  190. file_put_contents($GLOBALS['MC_DKIM_TXTS'] . '/' . $selector . '_' . $domain, $pubKey);
  191. // Save private key to file
  192. openssl_pkey_export_to_file($keypair_ressource, $GLOBALS['MC_DKIM_KEYS'] . '/' . $domain . '.' . $selector);
  193. $_SESSION['return'] = array(
  194. 'type' => 'success',
  195. 'msg' => sprintf($lang['success']['dkim_added'])
  196. );
  197. break;
  198. }
  199. }
  200. function mailbox_add_domain($postarray) {
  201. global $pdo;
  202. global $lang;
  203. if ($_SESSION['mailcow_cc_role'] != "admin") {
  204. $_SESSION['return'] = array(
  205. 'type' => 'danger',
  206. 'msg' => sprintf($lang['danger']['access_denied'])
  207. );
  208. return false;
  209. }
  210. $domain = idn_to_ascii(strtolower(trim($postarray['domain'])));
  211. $description = $postarray['description'];
  212. $aliases = $postarray['aliases'];
  213. $mailboxes = $postarray['mailboxes'];
  214. $maxquota = $postarray['maxquota'];
  215. $quota = $postarray['quota'];
  216. if ($maxquota > $quota) {
  217. $_SESSION['return'] = array(
  218. 'type' => 'danger',
  219. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeds_domain_quota'])
  220. );
  221. return false;
  222. }
  223. isset($postarray['active']) ? $active = '1' : $active = '0';
  224. isset($postarray['relay_all_recipients']) ? $relay_all_recipients = '1' : $relay_all_recipients = '0';
  225. isset($postarray['backupmx']) ? $backupmx = '1' : $backupmx = '0';
  226. isset($postarray['relay_all_recipients']) ? $backupmx = '1' : true;
  227. if (!is_valid_domain_name($domain)) {
  228. $_SESSION['return'] = array(
  229. 'type' => 'danger',
  230. 'msg' => sprintf($lang['danger']['domain_invalid'])
  231. );
  232. return false;
  233. }
  234. foreach (array($quota, $maxquota, $mailboxes, $aliases) as $data) {
  235. if (!is_numeric($data)) {
  236. $_SESSION['return'] = array(
  237. 'type' => 'danger',
  238. 'msg' => sprintf($lang['danger']['object_is_not_numeric'], htmlspecialchars($data))
  239. );
  240. return false;
  241. }
  242. }
  243. try {
  244. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  245. WHERE `domain` = :domain");
  246. $stmt->execute(array(':domain' => $domain));
  247. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  248. }
  249. catch(PDOException $e) {
  250. $_SESSION['return'] = array(
  251. 'type' => 'danger',
  252. 'msg' => 'MySQL: '.$e
  253. );
  254. return false;
  255. }
  256. if ($num_results != 0) {
  257. $_SESSION['return'] = array(
  258. 'type' => 'danger',
  259. 'msg' => sprintf($lang['danger']['domain_exists'], htmlspecialchars($domain))
  260. );
  261. return false;
  262. }
  263. try {
  264. $stmt = $pdo->prepare("INSERT INTO `domain` (`domain`, `description`, `aliases`, `mailboxes`, `maxquota`, `quota`, `transport`, `backupmx`, `created`, `modified`, `active`, `relay_all_recipients`)
  265. VALUES (:domain, :description, :aliases, :mailboxes, :maxquota, :quota, 'virtual', :backupmx, :created, :modified, :active, :relay_all_recipients)");
  266. $stmt->execute(array(
  267. ':domain' => $domain,
  268. ':description' => $description,
  269. ':aliases' => $aliases,
  270. ':mailboxes' => $mailboxes,
  271. ':maxquota' => $maxquota,
  272. ':quota' => $quota,
  273. ':backupmx' => $backupmx,
  274. ':active' => $active,
  275. ':created' => date('Y-m-d H:i:s'),
  276. ':modified' => date('Y-m-d H:i:s'),
  277. ':relay_all_recipients' => $relay_all_recipients
  278. ));
  279. $_SESSION['return'] = array(
  280. 'type' => 'success',
  281. 'msg' => sprintf($lang['success']['domain_added'], htmlspecialchars($domain))
  282. );
  283. }
  284. catch (PDOException $e) {
  285. $_SESSION['return'] = array(
  286. 'type' => 'danger',
  287. 'msg' => 'MySQL: '.$e
  288. );
  289. return false;
  290. }
  291. }
  292. function mailbox_add_alias($postarray) {
  293. global $lang;
  294. global $pdo;
  295. $addresses = array_map('trim', preg_split( "/( |,|;|\n)/", $postarray['address']));
  296. $gotos = array_map('trim', preg_split( "/( |,|;|\n)/", $postarray['goto']));
  297. isset($postarray['active']) ? $active = '1' : $active = '0';
  298. if (empty($addresses[0])) {
  299. $_SESSION['return'] = array(
  300. 'type' => 'danger',
  301. 'msg' => sprintf($lang['danger']['alias_empty'])
  302. );
  303. return false;
  304. }
  305. if (empty($gotos[0])) {
  306. $_SESSION['return'] = array(
  307. 'type' => 'danger',
  308. 'msg' => sprintf($lang['danger']['goto_empty'])
  309. );
  310. return false;
  311. }
  312. foreach ($addresses as $address) {
  313. if (empty($address)) {
  314. continue;
  315. }
  316. $domain = idn_to_ascii(substr(strstr($address, '@'), 1));
  317. $local_part = strstr($address, '@', true);
  318. $address = $local_part.'@'.$domain;
  319. if ((!filter_var($address, FILTER_VALIDATE_EMAIL) === true) && !empty($local_part)) {
  320. $_SESSION['return'] = array(
  321. 'type' => 'danger',
  322. 'msg' => sprintf($lang['danger']['alias_invalid'])
  323. );
  324. return false;
  325. }
  326. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  327. $_SESSION['return'] = array(
  328. 'type' => 'danger',
  329. 'msg' => sprintf($lang['danger']['access_denied'])
  330. );
  331. return false;
  332. }
  333. try {
  334. $stmt = $pdo->prepare("SELECT `address` FROM `alias`
  335. WHERE `address`= :address");
  336. $stmt->execute(array(':address' => $address));
  337. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  338. }
  339. catch(PDOException $e) {
  340. $_SESSION['return'] = array(
  341. 'type' => 'danger',
  342. 'msg' => 'MySQL: '.$e
  343. );
  344. return false;
  345. }
  346. if ($num_results != 0) {
  347. $_SESSION['return'] = array(
  348. 'type' => 'danger',
  349. 'msg' => sprintf($lang['danger']['is_alias_or_mailbox'], htmlspecialchars($address))
  350. );
  351. return false;
  352. }
  353. try {
  354. $stmt = $pdo->prepare("SELECT `address` FROM `spamalias`
  355. WHERE `address`= :address");
  356. $stmt->execute(array(':address' => $address));
  357. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  358. }
  359. catch(PDOException $e) {
  360. $_SESSION['return'] = array(
  361. 'type' => 'danger',
  362. 'msg' => 'MySQL: '.$e
  363. );
  364. return false;
  365. }
  366. if ($num_results != 0) {
  367. $_SESSION['return'] = array(
  368. 'type' => 'danger',
  369. 'msg' => sprintf($lang['danger']['is_spam_alias'], htmlspecialchars($address))
  370. );
  371. return false;
  372. }
  373. foreach ($gotos as &$goto) {
  374. if (empty($goto)) {
  375. continue;
  376. }
  377. $goto_domain = idn_to_ascii(substr(strstr($goto, '@'), 1));
  378. $goto_local_part = strstr($goto, '@', true);
  379. $goto = $goto_local_part.'@'.$goto_domain;
  380. if (!filter_var($goto, FILTER_VALIDATE_EMAIL) === true) {
  381. $_SESSION['return'] = array(
  382. 'type' => 'danger',
  383. 'msg' => sprintf($lang['danger']['goto_invalid'])
  384. );
  385. return false;
  386. }
  387. if ($goto == $address) {
  388. $_SESSION['return'] = array(
  389. 'type' => 'danger',
  390. 'msg' => sprintf($lang['danger']['alias_goto_identical'])
  391. );
  392. return false;
  393. }
  394. }
  395. $gotos = array_filter($gotos);
  396. $goto = implode(",", $gotos);
  397. try {
  398. $stmt = $pdo->prepare("INSERT INTO `alias` (`address`, `goto`, `domain`, `created`, `modified`, `active`)
  399. VALUES (:address, :goto, :domain, :created, :modified, :active)");
  400. if (!filter_var($address, FILTER_VALIDATE_EMAIL) === true) {
  401. $stmt->execute(array(
  402. ':address' => '@'.$domain,
  403. ':goto' => $goto,
  404. ':domain' => $domain,
  405. ':created' => date('Y-m-d H:i:s'),
  406. ':modified' => date('Y-m-d H:i:s'),
  407. ':active' => $active
  408. ));
  409. }
  410. else {
  411. $stmt->execute(array(
  412. ':address' => $address,
  413. ':goto' => $goto,
  414. ':domain' => $domain,
  415. ':created' => date('Y-m-d H:i:s'),
  416. ':modified' => date('Y-m-d H:i:s'),
  417. ':active' => $active
  418. ));
  419. }
  420. $_SESSION['return'] = array(
  421. 'type' => 'success',
  422. 'msg' => sprintf($lang['success']['alias_added'])
  423. );
  424. }
  425. catch (PDOException $e) {
  426. $_SESSION['return'] = array(
  427. 'type' => 'danger',
  428. 'msg' => 'MySQL: '.$e
  429. );
  430. return false;
  431. }
  432. }
  433. $_SESSION['return'] = array(
  434. 'type' => 'success',
  435. 'msg' => sprintf($lang['success']['alias_added'])
  436. );
  437. }
  438. function mailbox_add_alias_domain($postarray) {
  439. global $lang;
  440. global $pdo;
  441. isset($postarray['active']) ? $active = '1' : $active = '0';
  442. if (!is_valid_domain_name($postarray['alias_domain'])) {
  443. $_SESSION['return'] = array(
  444. 'type' => 'danger',
  445. 'msg' => sprintf($lang['danger']['alias_domain_invalid'])
  446. );
  447. return false;
  448. }
  449. if (!is_valid_domain_name($postarray['target_domain'])) {
  450. $_SESSION['return'] = array(
  451. 'type' => 'danger',
  452. 'msg' => sprintf($lang['danger']['target_domain_invalid'])
  453. );
  454. return false;
  455. }
  456. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $postarray['target_domain'])) {
  457. $_SESSION['return'] = array(
  458. 'type' => 'danger',
  459. 'msg' => sprintf($lang['danger']['access_denied'])
  460. );
  461. return false;
  462. }
  463. if ($postarray['alias_domain'] == $postarray['target_domain']) {
  464. $_SESSION['return'] = array(
  465. 'type' => 'danger',
  466. 'msg' => sprintf($lang['danger']['aliasd_targetd_identical'])
  467. );
  468. return false;
  469. }
  470. $alias_domain = strtolower(trim($postarray['alias_domain']));
  471. $target_domain = strtolower(trim($postarray['target_domain']));
  472. try {
  473. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  474. WHERE `domain`= :target_domain");
  475. $stmt->execute(array(':target_domain' => $target_domain));
  476. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  477. }
  478. catch(PDOException $e) {
  479. $_SESSION['return'] = array(
  480. 'type' => 'danger',
  481. 'msg' => 'MySQL: '.$e
  482. );
  483. return false;
  484. }
  485. if ($num_results == 0) {
  486. $_SESSION['return'] = array(
  487. 'type' => 'danger',
  488. 'msg' => sprintf($lang['danger']['targetd_not_found'])
  489. );
  490. return false;
  491. }
  492. try {
  493. $stmt = $pdo->prepare("SELECT `alias_domain` FROM `alias_domain` WHERE `alias_domain`= :alias_domain
  494. UNION
  495. SELECT `alias_domain` FROM `alias_domain` WHERE `alias_domain`= :alias_domain_in_domain");
  496. $stmt->execute(array(':alias_domain' => $alias_domain, ':alias_domain_in_domain' => $alias_domain));
  497. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  498. }
  499. catch(PDOException $e) {
  500. $_SESSION['return'] = array(
  501. 'type' => 'danger',
  502. 'msg' => 'MySQL: '.$e
  503. );
  504. return false;
  505. }
  506. if ($num_results != 0) {
  507. $_SESSION['return'] = array(
  508. 'type' => 'danger',
  509. 'msg' => sprintf($lang['danger']['aliasd_exists'])
  510. );
  511. return false;
  512. }
  513. try {
  514. $stmt = $pdo->prepare("INSERT INTO `alias_domain` (`alias_domain`, `target_domain`, `created`, `modified`, `active`)
  515. VALUES (:alias_domain, :target_domain, :created, :modified, :active)");
  516. $stmt->execute(array(
  517. ':alias_domain' => $alias_domain,
  518. ':target_domain' => $target_domain,
  519. ':created' => date('Y-m-d H:i:s'),
  520. ':modified' => date('Y-m-d H:i:s'),
  521. ':active' => $active
  522. ));
  523. $_SESSION['return'] = array(
  524. 'type' => 'success',
  525. 'msg' => sprintf($lang['success']['aliasd_added'], htmlspecialchars($alias_domain))
  526. );
  527. }
  528. catch (PDOException $e) {
  529. $_SESSION['return'] = array(
  530. 'type' => 'danger',
  531. 'msg' => 'MySQL: '.$e
  532. );
  533. return false;
  534. }
  535. }
  536. function mailbox_edit_alias_domain($postarray) {
  537. global $lang;
  538. global $pdo;
  539. isset($postarray['active']) ? $active = '1' : $active = '0';
  540. $alias_domain = idn_to_ascii($postarray['alias_domain']);
  541. $alias_domain = strtolower(trim($alias_domain));
  542. $alias_domain_now = strtolower(trim($postarray['alias_domain_now']));
  543. if (!is_valid_domain_name($alias_domain)) {
  544. $_SESSION['return'] = array(
  545. 'type' => 'danger',
  546. 'msg' => sprintf($lang['danger']['alias_domain_invalid'])
  547. );
  548. return false;
  549. }
  550. if (!is_valid_domain_name($alias_domain_now)) {
  551. $_SESSION['return'] = array(
  552. 'type' => 'danger',
  553. 'msg' => sprintf($lang['danger']['alias_domain_invalid'])
  554. );
  555. return false;
  556. }
  557. try {
  558. $stmt = $pdo->prepare("SELECT `target_domain` FROM `alias_domain`
  559. WHERE `alias_domain`= :alias_domain_now");
  560. $stmt->execute(array(':alias_domain_now' => $alias_domain_now));
  561. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  562. }
  563. catch(PDOException $e) {
  564. $_SESSION['return'] = array(
  565. 'type' => 'danger',
  566. 'msg' => 'MySQL: '.$e
  567. );
  568. return false;
  569. }
  570. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $DomainData['target_domain'])) {
  571. $_SESSION['return'] = array(
  572. 'type' => 'danger',
  573. 'msg' => sprintf($lang['danger']['access_denied'])
  574. );
  575. return false;
  576. }
  577. try {
  578. $stmt = $pdo->prepare("SELECT `target_domain` FROM `alias_domain`
  579. WHERE `target_domain`= :alias_domain");
  580. $stmt->execute(array(':alias_domain' => $alias_domain));
  581. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  582. }
  583. catch(PDOException $e) {
  584. $_SESSION['return'] = array(
  585. 'type' => 'danger',
  586. 'msg' => 'MySQL: '.$e
  587. );
  588. return false;
  589. }
  590. if ($num_results != 0) {
  591. $_SESSION['return'] = array(
  592. 'type' => 'danger',
  593. 'msg' => sprintf($lang['danger']['aliasd_targetd_identical'])
  594. );
  595. return false;
  596. }
  597. try {
  598. $stmt = $pdo->prepare("UPDATE `alias_domain` SET `alias_domain` = :alias_domain, `active` = :active WHERE `alias_domain` = :alias_domain_now");
  599. $stmt->execute(array(
  600. ':alias_domain' => $alias_domain,
  601. ':alias_domain_now' => $alias_domain_now,
  602. ':active' => $active
  603. ));
  604. }
  605. catch (PDOException $e) {
  606. $_SESSION['return'] = array(
  607. 'type' => 'danger',
  608. 'msg' => 'MySQL: '.$e
  609. );
  610. return false;
  611. }
  612. $_SESSION['return'] = array(
  613. 'type' => 'success',
  614. 'msg' => sprintf($lang['success']['aliasd_modified'], htmlspecialchars($alias_domain))
  615. );
  616. }
  617. function mailbox_add_mailbox($postarray) {
  618. global $pdo;
  619. global $lang;
  620. $username = strtolower(trim($postarray['local_part'])).'@'.strtolower(trim($postarray['domain']));
  621. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  622. $_SESSION['return'] = array(
  623. 'type' => 'danger',
  624. 'msg' => sprintf($lang['danger']['mailbox_invalid'])
  625. );
  626. return false;
  627. }
  628. if (empty($postarray['local_part'])) {
  629. $_SESSION['return'] = array(
  630. 'type' => 'danger',
  631. 'msg' => sprintf($lang['danger']['mailbox_invalid'])
  632. );
  633. return false;
  634. }
  635. $domain = strtolower(trim($postarray['domain']));
  636. $password = $postarray['password'];
  637. $password2 = $postarray['password2'];
  638. $local_part = strtolower(trim($postarray['local_part']));
  639. $name = $postarray['name'];
  640. $quota_m = $postarray['quota'];
  641. if (empty($name)) {
  642. $name = $local_part;
  643. }
  644. isset($postarray['active']) ? $active = '1' : $active = '0';
  645. $quota_b = ($quota_m * 1048576);
  646. $maildir = $domain."/".$local_part."/";
  647. if (!is_valid_domain_name($domain)) {
  648. $_SESSION['return'] = array(
  649. 'type' => 'danger',
  650. 'msg' => sprintf($lang['danger']['domain_invalid'])
  651. );
  652. return false;
  653. }
  654. try {
  655. $stmt = $pdo->prepare("SELECT `mailboxes`, `maxquota`, `quota` FROM `domain`
  656. WHERE `domain` = :domain");
  657. $stmt->execute(array(':domain' => $domain));
  658. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  659. }
  660. catch(PDOException $e) {
  661. $_SESSION['return'] = array(
  662. 'type' => 'danger',
  663. 'msg' => 'MySQL: '.$e
  664. );
  665. return false;
  666. }
  667. try {
  668. $stmt = $pdo->prepare("SELECT
  669. COUNT(*) as count,
  670. COALESCE(ROUND(SUM(`quota`)/1048576), 0) as `quota`
  671. FROM `mailbox`
  672. WHERE `domain` = :domain");
  673. $stmt->execute(array(':domain' => $domain));
  674. $MailboxData = $stmt->fetch(PDO::FETCH_ASSOC);
  675. }
  676. catch(PDOException $e) {
  677. $_SESSION['return'] = array(
  678. 'type' => 'danger',
  679. 'msg' => 'MySQL: '.$e
  680. );
  681. return false;
  682. }
  683. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  684. $_SESSION['return'] = array(
  685. 'type' => 'danger',
  686. 'msg' => sprintf($lang['danger']['access_denied'])
  687. );
  688. return false;
  689. }
  690. try {
  691. $stmt = $pdo->prepare("SELECT `local_part` FROM `mailbox` WHERE `local_part` = :local_part and `domain`= :domain");
  692. $stmt->execute(array(':local_part' => $local_part, ':domain' => $domain));
  693. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  694. }
  695. catch(PDOException $e) {
  696. $_SESSION['return'] = array(
  697. 'type' => 'danger',
  698. 'msg' => 'MySQL: '.$e
  699. );
  700. return false;
  701. }
  702. if ($num_results != 0) {
  703. $_SESSION['return'] = array(
  704. 'type' => 'danger',
  705. 'msg' => sprintf($lang['danger']['object_exists'], htmlspecialchars($username))
  706. );
  707. return false;
  708. }
  709. try {
  710. $stmt = $pdo->prepare("SELECT `address` FROM `alias` WHERE address= :username");
  711. $stmt->execute(array(':username' => $username));
  712. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  713. }
  714. catch(PDOException $e) {
  715. $_SESSION['return'] = array(
  716. 'type' => 'danger',
  717. 'msg' => 'MySQL: '.$e
  718. );
  719. return false;
  720. }
  721. if ($num_results != 0) {
  722. $_SESSION['return'] = array(
  723. 'type' => 'danger',
  724. 'msg' => sprintf($lang['danger']['is_alias'], htmlspecialchars($username))
  725. );
  726. return false;
  727. }
  728. try {
  729. $stmt = $pdo->prepare("SELECT `address` FROM `spamalias` WHERE `address`= :username");
  730. $stmt->execute(array(':username' => $username));
  731. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  732. }
  733. catch(PDOException $e) {
  734. $_SESSION['return'] = array(
  735. 'type' => 'danger',
  736. 'msg' => 'MySQL: '.$e
  737. );
  738. return false;
  739. }
  740. if ($num_results != 0) {
  741. $_SESSION['return'] = array(
  742. 'type' => 'danger',
  743. 'msg' => sprintf($lang['danger']['is_spam_alias'], htmlspecialchars($username))
  744. );
  745. return false;
  746. }
  747. if (!is_numeric($quota_m) || $quota_m == "0") {
  748. $_SESSION['return'] = array(
  749. 'type' => 'danger',
  750. 'msg' => sprintf($lang['danger']['quota_not_0_not_numeric'])
  751. );
  752. return false;
  753. }
  754. if (!empty($password) && !empty($password2)) {
  755. if ($password != $password2) {
  756. $_SESSION['return'] = array(
  757. 'type' => 'danger',
  758. 'msg' => sprintf($lang['danger']['password_mismatch'])
  759. );
  760. return false;
  761. }
  762. $password_hashed = hash_password($password);
  763. }
  764. else {
  765. $_SESSION['return'] = array(
  766. 'type' => 'danger',
  767. 'msg' => sprintf($lang['danger']['password_empty'])
  768. );
  769. return false;
  770. }
  771. if ($MailboxData['count'] >= $DomainData['mailboxes']) {
  772. $_SESSION['return'] = array(
  773. 'type' => 'danger',
  774. 'msg' => sprintf($lang['danger']['max_mailbox_exceeded'], $MailboxData['count'], $DomainData['mailboxes'])
  775. );
  776. return false;
  777. }
  778. try {
  779. $stmt = $pdo->prepare("SELECT `domain` FROM `domain` WHERE `domain`= :domain");
  780. $stmt->execute(array(':domain' => $domain));
  781. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  782. }
  783. catch(PDOException $e) {
  784. $_SESSION['return'] = array(
  785. 'type' => 'danger',
  786. 'msg' => 'MySQL: '.$e
  787. );
  788. return false;
  789. }
  790. if ($num_results == 0) {
  791. $_SESSION['return'] = array(
  792. 'type' => 'danger',
  793. 'msg' => $lang['danger']['domain_not_found']
  794. );
  795. return false;
  796. }
  797. if ($quota_m > $DomainData['maxquota']) {
  798. $_SESSION['return'] = array(
  799. 'type' => 'danger',
  800. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeded'], $DomainData['maxquota'])
  801. );
  802. return false;
  803. }
  804. if (($MailboxData['quota'] + $quota_m) > $DomainData['quota']) {
  805. $quota_left_m = ($DomainData['quota'] - $MailboxData['quota']);
  806. $_SESSION['return'] = array(
  807. 'type' => 'danger',
  808. 'msg' => sprintf($lang['danger']['mailbox_quota_left_exceeded'], $quota_left_m)
  809. );
  810. return false;
  811. }
  812. try {
  813. $stmt = $pdo->prepare("INSERT INTO `mailbox` (`username`, `password`, `name`, `maildir`, `quota`, `local_part`, `domain`, `created`, `modified`, `active`)
  814. VALUES (:username, :password_hashed, :name, :maildir, :quota_b, :local_part, :domain, :created, :modified, :active)");
  815. $stmt->execute(array(
  816. ':username' => $username,
  817. ':password_hashed' => $password_hashed,
  818. ':name' => $name,
  819. ':maildir' => $maildir,
  820. ':quota_b' => $quota_b,
  821. ':local_part' => $local_part,
  822. ':domain' => $domain,
  823. ':created' => date('Y-m-d H:i:s'),
  824. ':modified' => date('Y-m-d H:i:s'),
  825. ':active' => $active
  826. ));
  827. $stmt = $pdo->prepare("INSERT INTO `quota2` (`username`, `bytes`, `messages`)
  828. VALUES (:username, '0', '0')");
  829. $stmt->execute(array(':username' => $username));
  830. $stmt = $pdo->prepare("INSERT INTO `alias` (`address`, `goto`, `domain`, `created`, `modified`, `active`)
  831. VALUES (:username1, :username2, :domain, :created, :modified, :active)");
  832. $stmt->execute(array(
  833. ':username1' => $username,
  834. ':username2' => $username,
  835. ':domain' => $domain,
  836. ':created' => date('Y-m-d H:i:s'),
  837. ':modified' => date('Y-m-d H:i:s'),
  838. ':active' => $active
  839. ));
  840. $_SESSION['return'] = array(
  841. 'type' => 'success',
  842. 'msg' => sprintf($lang['success']['mailbox_added'], htmlspecialchars($username))
  843. );
  844. }
  845. catch (PDOException $e) {
  846. $_SESSION['return'] = array(
  847. 'type' => 'danger',
  848. 'msg' => 'MySQL: '.$e
  849. );
  850. return false;
  851. }
  852. }
  853. function mailbox_edit_alias($postarray) {
  854. global $lang;
  855. global $pdo;
  856. $address = $postarray['address'];
  857. $domain = idn_to_ascii(substr(strstr($address, '@'), 1));
  858. $local_part = strstr($address, '@', true);
  859. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  860. $_SESSION['return'] = array(
  861. 'type' => 'danger',
  862. 'msg' => sprintf($lang['danger']['access_denied'])
  863. );
  864. return false;
  865. }
  866. if (empty($postarray['goto'])) {
  867. $_SESSION['return'] = array(
  868. 'type' => 'danger',
  869. 'msg' => sprintf($lang['danger']['goto_empty'])
  870. );
  871. return false;
  872. }
  873. $gotos = array_map('trim', preg_split( "/( |,|;|\n)/", $postarray['goto']));
  874. foreach ($gotos as &$goto) {
  875. if (empty($goto)) {
  876. continue;
  877. }
  878. if (!filter_var($goto, FILTER_VALIDATE_EMAIL)) {
  879. $_SESSION['return'] = array(
  880. 'type' => 'danger',
  881. 'msg' =>sprintf($lang['danger']['goto_invalid'])
  882. );
  883. return false;
  884. }
  885. if ($goto == $address) {
  886. $_SESSION['return'] = array(
  887. 'type' => 'danger',
  888. 'msg' => sprintf($lang['danger']['alias_goto_identical'])
  889. );
  890. return false;
  891. }
  892. }
  893. $gotos = array_filter($gotos);
  894. $goto = implode(",", $gotos);
  895. isset($postarray['active']) ? $active = '1' : $active = '0';
  896. if ((!filter_var($address, FILTER_VALIDATE_EMAIL) === true) && !empty($local_part)) {
  897. $_SESSION['return'] = array(
  898. 'type' => 'danger',
  899. 'msg' => sprintf($lang['danger']['alias_invalid'])
  900. );
  901. return false;
  902. }
  903. try {
  904. $stmt = $pdo->prepare("UPDATE `alias` SET `goto` = :goto, `active`= :active WHERE `address` = :address");
  905. $stmt->execute(array(
  906. ':goto' => $goto,
  907. ':active' => $active,
  908. ':address' => $address
  909. ));
  910. $_SESSION['return'] = array(
  911. 'type' => 'success',
  912. 'msg' => sprintf($lang['success']['alias_modified'], htmlspecialchars($address))
  913. );
  914. }
  915. catch (PDOException $e) {
  916. $_SESSION['return'] = array(
  917. 'type' => 'danger',
  918. 'msg' => 'MySQL: '.$e
  919. );
  920. return false;
  921. }
  922. }
  923. function mailbox_edit_domain($postarray) {
  924. global $lang;
  925. global $pdo;
  926. $domain = $postarray['domain'];
  927. $description = $postarray['description'];
  928. $aliases = filter_var($postarray['aliases'], FILTER_SANITIZE_NUMBER_FLOAT);
  929. $mailboxes = filter_var($postarray['mailboxes'], FILTER_SANITIZE_NUMBER_FLOAT);
  930. $maxquota = filter_var($postarray['maxquota'], FILTER_SANITIZE_NUMBER_FLOAT);
  931. $quota = filter_var($postarray['quota'], FILTER_SANITIZE_NUMBER_FLOAT);
  932. isset($postarray['relay_all_recipients']) ? $relay_all_recipients = '1' : $relay_all_recipients = '0';
  933. isset($postarray['backupmx']) ? $backupmx = '1' : $backupmx = '0';
  934. isset($postarray['relay_all_recipients']) ? $backupmx = '1' : true;
  935. isset($postarray['active']) ? $active = '1' : $active = '0';
  936. try {
  937. $stmt = $pdo->prepare("SELECT
  938. COUNT(*) AS count,
  939. MAX(COALESCE(ROUND(`quota`/1048576), 0)) AS `maxquota`,
  940. COALESCE(ROUND(SUM(`quota`)/1048576), 0) AS `quota`
  941. FROM `mailbox`
  942. WHERE domain= :domain");
  943. $stmt->execute(array(':domain' => $domain));
  944. $MailboxData = $stmt->fetch(PDO::FETCH_ASSOC);
  945. }
  946. catch(PDOException $e) {
  947. $_SESSION['return'] = array(
  948. 'type' => 'danger',
  949. 'msg' => 'MySQL: '.$e
  950. );
  951. return false;
  952. }
  953. try {
  954. $stmt = $pdo->prepare("SELECT COUNT(*) AS `count` FROM `alias`
  955. WHERE domain = :domain
  956. AND address NOT IN (
  957. SELECT `username` FROM `mailbox`
  958. )");
  959. $stmt->execute(array(':domain' => $domain));
  960. $AliasData = $stmt->fetch(PDO::FETCH_ASSOC);
  961. }
  962. catch(PDOException $e) {
  963. $_SESSION['return'] = array(
  964. 'type' => 'danger',
  965. 'msg' => 'MySQL: '.$e
  966. );
  967. return false;
  968. }
  969. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  970. $_SESSION['return'] = array(
  971. 'type' => 'danger',
  972. 'msg' => sprintf($lang['danger']['access_denied'])
  973. );
  974. return false;
  975. }
  976. if ($maxquota > $quota) {
  977. $_SESSION['return'] = array(
  978. 'type' => 'danger',
  979. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeds_domain_quota'])
  980. );
  981. return false;
  982. }
  983. if ($MailboxData['maxquota'] > $maxquota) {
  984. $_SESSION['return'] = array(
  985. 'type' => 'danger',
  986. 'msg' => sprintf($lang['danger']['max_quota_in_use'], $MailboxData['maxquota'])
  987. );
  988. return false;
  989. }
  990. if ($MailboxData['quota'] > $quota) {
  991. $_SESSION['return'] = array(
  992. 'type' => 'danger',
  993. 'msg' => sprintf($lang['danger']['domain_quota_m_in_use'], $MailboxData['quota'])
  994. );
  995. return false;
  996. }
  997. if ($MailboxData['count'] > $mailboxes) {
  998. $_SESSION['return'] = array(
  999. 'type' => 'danger',
  1000. 'msg' => sprintf($lang['danger']['mailboxes_in_use'], $MailboxData['count'])
  1001. );
  1002. return false;
  1003. }
  1004. if ($AliasData['count'] > $aliases) {
  1005. $_SESSION['return'] = array(
  1006. 'type' => 'danger',
  1007. 'msg' => sprintf($lang['danger']['aliases_in_use'], $AliasData['count'])
  1008. );
  1009. return false;
  1010. }
  1011. if (!is_valid_domain_name($domain)) {
  1012. $_SESSION['return'] = array(
  1013. 'type' => 'danger',
  1014. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1015. );
  1016. return false;
  1017. }
  1018. try {
  1019. $stmt = $pdo->prepare("UPDATE `domain` SET
  1020. `modified`= :modified,
  1021. `relay_all_recipients` = :relay_all_recipients,
  1022. `backupmx` = :backupmx,
  1023. `active` = :active,
  1024. `quota` = :quota,
  1025. `maxquota` = :maxquota,
  1026. `mailboxes` = :mailboxes,
  1027. `aliases` = :aliases,
  1028. `description` = :description
  1029. WHERE `domain` = :domain");
  1030. $stmt->execute(array(
  1031. ':relay_all_recipients' => $relay_all_recipients,
  1032. ':backupmx' => $backupmx,
  1033. ':active' => $active,
  1034. ':quota' => $quota,
  1035. ':maxquota' => $maxquota,
  1036. ':mailboxes' => $mailboxes,
  1037. ':aliases' => $aliases,
  1038. ':modified' => date('Y-m-d H:i:s'),
  1039. ':description' => $description,
  1040. ':domain' => $domain
  1041. ));
  1042. $_SESSION['return'] = array(
  1043. 'type' => 'success',
  1044. 'msg' => sprintf($lang['success']['domain_modified'], htmlspecialchars($domain))
  1045. );
  1046. }
  1047. catch (PDOException $e) {
  1048. $_SESSION['return'] = array(
  1049. 'type' => 'danger',
  1050. 'msg' => 'MySQL: '.$e
  1051. );
  1052. return false;
  1053. }
  1054. }
  1055. function edit_domain_admin($postarray) {
  1056. global $lang;
  1057. global $pdo;
  1058. $username = $postarray['username'];
  1059. $password = $postarray['password'];
  1060. $password2 = $postarray['password2'];
  1061. isset($postarray['active']) ? $active = '1' : $active = '0';
  1062. if ($_SESSION['mailcow_cc_role'] != "admin") {
  1063. $_SESSION['return'] = array(
  1064. 'type' => 'danger',
  1065. 'msg' => sprintf($lang['danger']['access_denied'])
  1066. );
  1067. return false;
  1068. }
  1069. foreach ($postarray['domain'] as $domain) {
  1070. if (!is_valid_domain_name($domain)) {
  1071. $_SESSION['return'] = array(
  1072. 'type' => 'danger',
  1073. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1074. );
  1075. return false;
  1076. }
  1077. }
  1078. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
  1079. $_SESSION['return'] = array(
  1080. 'type' => 'danger',
  1081. 'msg' => sprintf($lang['danger']['username_invalid'])
  1082. );
  1083. return false;
  1084. }
  1085. try {
  1086. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
  1087. $stmt->execute(array(
  1088. ':username' => $username,
  1089. ));
  1090. }
  1091. catch (PDOException $e) {
  1092. $_SESSION['return'] = array(
  1093. 'type' => 'danger',
  1094. 'msg' => 'MySQL: '.$e
  1095. );
  1096. return false;
  1097. }
  1098. foreach ($postarray['domain'] as $domain) {
  1099. try {
  1100. $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
  1101. VALUES (:username, :domain, :created, :active)");
  1102. $stmt->execute(array(
  1103. ':username' => $username,
  1104. ':domain' => $domain,
  1105. ':created' => date('Y-m-d H:i:s'),
  1106. ':active' => $active
  1107. ));
  1108. }
  1109. catch (PDOException $e) {
  1110. $_SESSION['return'] = array(
  1111. 'type' => 'danger',
  1112. 'msg' => 'MySQL: '.$e
  1113. );
  1114. return false;
  1115. }
  1116. }
  1117. if (!empty($password) && !empty($password2)) {
  1118. if ($password != $password2) {
  1119. $_SESSION['return'] = array(
  1120. 'type' => 'danger',
  1121. 'msg' => sprintf($lang['danger']['password_mismatch'])
  1122. );
  1123. return false;
  1124. }
  1125. $password_hashed = hash_password($password);
  1126. try {
  1127. $stmt = $pdo->prepare("UPDATE `admin` SET `modified` = :modified, `active` = :active, `password` = :password_hashed WHERE `username` = :username");
  1128. $stmt->execute(array(
  1129. ':password_hashed' => $password_hashed,
  1130. ':username' => $username,
  1131. ':modified' => date('Y-m-d H:i:s'),
  1132. ':active' => $active
  1133. ));
  1134. }
  1135. catch (PDOException $e) {
  1136. $_SESSION['return'] = array(
  1137. 'type' => 'danger',
  1138. 'msg' => 'MySQL: '.$e
  1139. );
  1140. return false;
  1141. }
  1142. }
  1143. else {
  1144. try {
  1145. $stmt = $pdo->prepare("UPDATE `admin` SET `modified` = :modified, `active` = :active WHERE `username` = :username");
  1146. $stmt->execute(array(
  1147. ':username' => $username,
  1148. ':modified' => date('Y-m-d H:i:s'),
  1149. ':active' => $active
  1150. ));
  1151. }
  1152. catch (PDOException $e) {
  1153. $_SESSION['return'] = array(
  1154. 'type' => 'danger',
  1155. 'msg' => 'MySQL: '.$e
  1156. );
  1157. return false;
  1158. }
  1159. }
  1160. $_SESSION['return'] = array(
  1161. 'type' => 'success',
  1162. 'msg' => sprintf($lang['success']['domain_admin_modified'], htmlspecialchars($username))
  1163. );
  1164. }
  1165. function mailbox_edit_mailbox($postarray) {
  1166. global $lang;
  1167. global $pdo;
  1168. isset($postarray['active']) ? $active = '1' : $active = '0';
  1169. if (!filter_var($postarray['username'], FILTER_VALIDATE_EMAIL)) {
  1170. $_SESSION['return'] = array(
  1171. 'type' => 'danger',
  1172. 'msg' => sprintf($lang['danger']['username_invalid'])
  1173. );
  1174. return false;
  1175. }
  1176. $quota_m = $postarray['quota'];
  1177. $quota_b = $quota_m*1048576;
  1178. $username = $postarray['username'];
  1179. $name = $postarray['name'];
  1180. $password = $postarray['password'];
  1181. $password2 = $postarray['password2'];
  1182. try {
  1183. $stmt = $pdo->prepare("SELECT `domain`
  1184. FROM `mailbox`
  1185. WHERE username = :username");
  1186. $stmt->execute(array(':username' => $username));
  1187. $MailboxData1 = $stmt->fetch(PDO::FETCH_ASSOC);
  1188. $stmt = $pdo->prepare("SELECT
  1189. COALESCE(ROUND(SUM(`quota`)/1048576), 0) as `quota_m_now`
  1190. FROM `mailbox`
  1191. WHERE `username` = :username");
  1192. $stmt->execute(array(':username' => $username));
  1193. $MailboxData2 = $stmt->fetch(PDO::FETCH_ASSOC);
  1194. $stmt = $pdo->prepare("SELECT
  1195. COALESCE(ROUND(SUM(`quota`)/1048576), 0) as `quota_m_in_use`
  1196. FROM `mailbox`
  1197. WHERE `domain` = :domain");
  1198. $stmt->execute(array(':domain' => $MailboxData1['domain']));
  1199. $MailboxData3 = $stmt->fetch(PDO::FETCH_ASSOC);
  1200. $stmt = $pdo->prepare("SELECT `quota`, `maxquota`
  1201. FROM `domain`
  1202. WHERE `domain` = :domain");
  1203. $stmt->execute(array(':domain' => $MailboxData1['domain']));
  1204. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  1205. }
  1206. catch(PDOException $e) {
  1207. $_SESSION['return'] = array(
  1208. 'type' => 'danger',
  1209. 'msg' => 'MySQL: '.$e
  1210. );
  1211. return false;
  1212. }
  1213. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $MailboxData1['domain'])) {
  1214. $_SESSION['return'] = array(
  1215. 'type' => 'danger',
  1216. 'msg' => sprintf($lang['danger']['access_denied'])
  1217. );
  1218. return false;
  1219. }
  1220. if (!is_numeric($quota_m) || $quota_m == "0") {
  1221. $_SESSION['return'] = array(
  1222. 'type' => 'danger',
  1223. 'msg' => sprintf($lang['danger']['quota_not_0_not_numeric'], htmlspecialchars($quota_m))
  1224. );
  1225. return false;
  1226. }
  1227. if ($quota_m > $DomainData['maxquota']) {
  1228. $_SESSION['return'] = array(
  1229. 'type' => 'danger',
  1230. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeded'], $DomainData['maxquota'])
  1231. );
  1232. return false;
  1233. }
  1234. if (($MailboxData3['quota_m_in_use'] - $MailboxData2['quota_m_now'] + $quota_m) > $DomainData['quota']) {
  1235. $quota_left_m = ($DomainData['quota'] - $MailboxData3['quota_m_in_use'] + $MailboxData2['quota_m_now']);
  1236. $_SESSION['return'] = array(
  1237. 'type' => 'danger',
  1238. 'msg' => sprintf($lang['danger']['mailbox_quota_left_exceeded'], $quota_left_m)
  1239. );
  1240. return false;
  1241. }
  1242. try {
  1243. $stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` = :username");
  1244. $stmt->execute(array(
  1245. ':username' => $username
  1246. ));
  1247. }
  1248. catch (PDOException $e) {
  1249. $_SESSION['return'] = array(
  1250. 'type' => 'danger',
  1251. 'msg' => 'MySQL: '.$e
  1252. );
  1253. return false;
  1254. }
  1255. if (isset($postarray['sender_acl']) && is_array($postarray['sender_acl'])) {
  1256. foreach ($postarray['sender_acl'] as $sender_acl) {
  1257. if (!filter_var($sender_acl, FILTER_VALIDATE_EMAIL) &&
  1258. !is_valid_domain_name(str_replace('@', '', $sender_acl))) {
  1259. $_SESSION['return'] = array(
  1260. 'type' => 'danger',
  1261. 'msg' => sprintf($lang['danger']['sender_acl_invalid'])
  1262. );
  1263. return false;
  1264. }
  1265. }
  1266. foreach ($postarray['sender_acl'] as $sender_acl) {
  1267. try {
  1268. $stmt = $pdo->prepare("INSERT INTO `sender_acl` (`send_as`, `logged_in_as`)
  1269. VALUES (:sender_acl, :username)");
  1270. $stmt->execute(array(
  1271. ':sender_acl' => $sender_acl,
  1272. ':username' => $username
  1273. ));
  1274. }
  1275. catch (PDOException $e) {
  1276. $_SESSION['return'] = array(
  1277. 'type' => 'danger',
  1278. 'msg' => 'MySQL: '.$e
  1279. );
  1280. return false;
  1281. }
  1282. }
  1283. }
  1284. if (!empty($password) && !empty($password2)) {
  1285. if ($password != $password2) {
  1286. $_SESSION['return'] = array(
  1287. 'type' => 'danger',
  1288. 'msg' => sprintf($lang['danger']['password_mismatch'])
  1289. );
  1290. return false;
  1291. }
  1292. $password_hashed = hash_password($password);
  1293. try {
  1294. $stmt = $pdo->prepare("UPDATE `alias` SET
  1295. `modified` = :modified,
  1296. `active` = :active
  1297. WHERE `address` = :address");
  1298. $stmt->execute(array(
  1299. ':address' => $username,
  1300. ':modified' => date('Y-m-d H:i:s'),
  1301. ':active' => $active
  1302. ));
  1303. $stmt = $pdo->prepare("UPDATE `mailbox` SET
  1304. `modified` = :modified,
  1305. `active` = :active,
  1306. `password` = :password_hashed,
  1307. `name`= :name,
  1308. `quota` = :quota_b
  1309. WHERE `username` = :username");
  1310. $stmt->execute(array(
  1311. ':modified' => date('Y-m-d H:i:s'),
  1312. ':password_hashed' => $password_hashed,
  1313. ':active' => $active,
  1314. ':name' => $name,
  1315. ':quota_b' => $quota_b,
  1316. ':username' => $username
  1317. ));
  1318. $_SESSION['return'] = array(
  1319. 'type' => 'success',
  1320. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  1321. );
  1322. return true;
  1323. }
  1324. catch (PDOException $e) {
  1325. $_SESSION['return'] = array(
  1326. 'type' => 'danger',
  1327. 'msg' => 'MySQL: '.$e
  1328. );
  1329. return false;
  1330. }
  1331. }
  1332. try {
  1333. $stmt = $pdo->prepare("UPDATE `alias` SET
  1334. `modified` = :modified,
  1335. `active` = :active
  1336. WHERE `address` = :address");
  1337. $stmt->execute(array(
  1338. ':address' => $username,
  1339. ':modified' => date('Y-m-d H:i:s'),
  1340. ':active' => $active
  1341. ));
  1342. $stmt = $pdo->prepare("UPDATE `mailbox` SET
  1343. `modified` = :modified,
  1344. `active` = :active,
  1345. `name`= :name,
  1346. `quota` = :quota_b
  1347. WHERE `username` = :username");
  1348. $stmt->execute(array(
  1349. ':active' => $active,
  1350. ':modified' => date('Y-m-d H:i:s'),
  1351. ':name' => $name,
  1352. ':quota_b' => $quota_b,
  1353. ':username' => $username
  1354. ));
  1355. $_SESSION['return'] = array(
  1356. 'type' => 'success',
  1357. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  1358. );
  1359. return true;
  1360. }
  1361. catch (PDOException $e) {
  1362. $_SESSION['return'] = array(
  1363. 'type' => 'danger',
  1364. 'msg' => 'MySQL: '.$e
  1365. );
  1366. return false;
  1367. }
  1368. }
  1369. function mailbox_delete_domain($postarray) {
  1370. global $lang;
  1371. global $pdo;
  1372. $domain = $postarray['domain'];
  1373. if ($_SESSION['mailcow_cc_role'] != "admin") {
  1374. $_SESSION['return'] = array(
  1375. 'type' => 'danger',
  1376. 'msg' => sprintf($lang['danger']['access_denied'])
  1377. );
  1378. return false;
  1379. }
  1380. if (!is_valid_domain_name($domain)) {
  1381. $_SESSION['return'] = array(
  1382. 'type' => 'danger',
  1383. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1384. );
  1385. return false;
  1386. }
  1387. $domain = strtolower(trim($domain));
  1388. try {
  1389. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox`
  1390. WHERE `domain` = :domain");
  1391. $stmt->execute(array(':domain' => $domain));
  1392. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  1393. }
  1394. catch(PDOException $e) {
  1395. $_SESSION['return'] = array(
  1396. 'type' => 'danger',
  1397. 'msg' => 'MySQL: '.$e
  1398. );
  1399. return false;
  1400. }
  1401. if ($num_results != 0 || !empty($num_results)) {
  1402. $_SESSION['return'] = array(
  1403. 'type' => 'danger',
  1404. 'msg' => sprintf($lang['danger']['domain_not_empty'])
  1405. );
  1406. return false;
  1407. }
  1408. try {
  1409. $stmt = $pdo->prepare("DELETE FROM `domain` WHERE `domain` = :domain");
  1410. $stmt->execute(array(
  1411. ':domain' => $domain,
  1412. ));
  1413. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `domain` = :domain");
  1414. $stmt->execute(array(
  1415. ':domain' => $domain,
  1416. ));
  1417. $stmt = $pdo->prepare("DELETE FROM `alias` WHERE `domain` = :domain");
  1418. $stmt->execute(array(
  1419. ':domain' => $domain,
  1420. ));
  1421. $stmt = $pdo->prepare("DELETE FROM `alias_domain` WHERE `target_domain` = :domain");
  1422. $stmt->execute(array(
  1423. ':domain' => $domain,
  1424. ));
  1425. $stmt = $pdo->prepare("DELETE FROM `mailbox` WHERE `domain` = :domain");
  1426. $stmt->execute(array(
  1427. ':domain' => $domain,
  1428. ));
  1429. $stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` LIKE :domain");
  1430. $stmt->execute(array(
  1431. ':domain' => '%@'.$domain,
  1432. ));
  1433. $stmt = $pdo->prepare("DELETE FROM `quota2` WHERE `username` = :domain");
  1434. $stmt->execute(array(
  1435. ':domain' => '%@'.$domain,
  1436. ));
  1437. $stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `address` = :domain");
  1438. $stmt->execute(array(
  1439. ':domain' => '%@'.$domain,
  1440. ));
  1441. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :domain");
  1442. $stmt->execute(array(
  1443. ':domain' => '%@'.$domain,
  1444. ));
  1445. }
  1446. catch (PDOException $e) {
  1447. $_SESSION['return'] = array(
  1448. 'type' => 'danger',
  1449. 'msg' => 'MySQL: '.$e
  1450. );
  1451. return false;
  1452. }
  1453. $_SESSION['return'] = array(
  1454. 'type' => 'success',
  1455. 'msg' => sprintf($lang['success']['domain_removed'], htmlspecialchars($domain))
  1456. );
  1457. return true;
  1458. }
  1459. function mailbox_delete_alias($postarray) {
  1460. global $lang;
  1461. global $pdo;
  1462. $address = $postarray['address'];
  1463. $local_part = strstr($address, '@', true);
  1464. $domain = substr(strrchr($address, "@"), 1);
  1465. try {
  1466. $stmt = $pdo->prepare("SELECT `goto` FROM `alias` WHERE `address` = :address");
  1467. $stmt->execute(array(':address' => $address));
  1468. $gotos = $stmt->fetch(PDO::FETCH_ASSOC);
  1469. }
  1470. catch(PDOException $e) {
  1471. $_SESSION['return'] = array(
  1472. 'type' => 'danger',
  1473. 'msg' => 'MySQL: '.$e
  1474. );
  1475. return false;
  1476. }
  1477. $goto_array = explode(',', $gotos['goto']);
  1478. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  1479. $_SESSION['return'] = array(
  1480. 'type' => 'danger',
  1481. 'msg' => sprintf($lang['danger']['access_denied'])
  1482. );
  1483. return false;
  1484. }
  1485. try {
  1486. $stmt = $pdo->prepare("DELETE FROM `alias` WHERE `address` = :address AND `address` NOT IN (SELECT `username` FROM `mailbox`)");
  1487. $stmt->execute(array(
  1488. ':address' => $address
  1489. ));
  1490. }
  1491. catch (PDOException $e) {
  1492. $_SESSION['return'] = array(
  1493. 'type' => 'danger',
  1494. 'msg' => 'MySQL: '.$e
  1495. );
  1496. return false;
  1497. }
  1498. $_SESSION['return'] = array(
  1499. 'type' => 'success',
  1500. 'msg' => sprintf($lang['success']['alias_removed'], htmlspecialchars($address))
  1501. );
  1502. }
  1503. function mailbox_delete_alias_domain($postarray) {
  1504. global $lang;
  1505. global $pdo;
  1506. if (!is_valid_domain_name($postarray['alias_domain'])) {
  1507. $_SESSION['return'] = array(
  1508. 'type' => 'danger',
  1509. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1510. );
  1511. return false;
  1512. }
  1513. $alias_domain = $postarray['alias_domain'];
  1514. try {
  1515. $stmt = $pdo->prepare("SELECT `target_domain` FROM `alias_domain`
  1516. WHERE `alias_domain`= :alias_domain");
  1517. $stmt->execute(array(':alias_domain' => $alias_domain));
  1518. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  1519. }
  1520. catch(PDOException $e) {
  1521. $_SESSION['return'] = array(
  1522. 'type' => 'danger',
  1523. 'msg' => 'MySQL: '.$e
  1524. );
  1525. return false;
  1526. }
  1527. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $DomainData['target_domain'])) {
  1528. $_SESSION['return'] = array(
  1529. 'type' => 'danger',
  1530. 'msg' => sprintf($lang['danger']['access_denied'])
  1531. );
  1532. return false;
  1533. }
  1534. try {
  1535. $stmt = $pdo->prepare("DELETE FROM `alias_domain` WHERE `alias_domain` = :alias_domain");
  1536. $stmt->execute(array(
  1537. ':alias_domain' => $alias_domain,
  1538. ));
  1539. }
  1540. catch (PDOException $e) {
  1541. $_SESSION['return'] = array(
  1542. 'type' => 'danger',
  1543. 'msg' => 'MySQL: '.$e
  1544. );
  1545. return false;
  1546. }
  1547. $_SESSION['return'] = array(
  1548. 'type' => 'success',
  1549. 'msg' => sprintf($lang['success']['alias_domain_removed'], htmlspecialchars($alias_domain))
  1550. );
  1551. }
  1552. function mailbox_delete_mailbox($postarray) {
  1553. global $lang;
  1554. global $pdo;
  1555. $domain = substr(strrchr($postarray['username'], "@"), 1);
  1556. $username = $postarray['username'];
  1557. if (!filter_var($postarray['username'], FILTER_VALIDATE_EMAIL)) {
  1558. $_SESSION['return'] = array(
  1559. 'type' => 'danger',
  1560. 'msg' => sprintf($lang['danger']['access_denied'])
  1561. );
  1562. return false;
  1563. }
  1564. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  1565. $_SESSION['return'] = array(
  1566. 'type' => 'danger',
  1567. 'msg' => sprintf($lang['danger']['access_denied'])
  1568. );
  1569. return false;
  1570. }
  1571. try {
  1572. $stmt = $pdo->prepare("DELETE FROM `alias` WHERE `goto` = :username");
  1573. $stmt->execute(array(
  1574. ':username' => $username
  1575. ));
  1576. $stmt = $pdo->prepare("DELETE FROM `quota2` WHERE `username` = :username");
  1577. $stmt->execute(array(
  1578. ':username' => $username
  1579. ));
  1580. $stmt = $pdo->prepare("DELETE FROM `mailbox` WHERE `username` = :username");
  1581. $stmt->execute(array(
  1582. ':username' => $username
  1583. ));
  1584. $stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` = :username");
  1585. $stmt->execute(array(
  1586. ':username' => $username
  1587. ));
  1588. $stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `goto` = :username");
  1589. $stmt->execute(array(
  1590. ':username' => $username
  1591. ));
  1592. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :username");
  1593. $stmt->execute(array(
  1594. ':username' => $username
  1595. ));
  1596. $stmt = $pdo->prepare("SELECT `address`, `goto` FROM `alias`
  1597. WHERE `goto` LIKE :username");
  1598. $stmt->execute(array(':username' => '%'.$username.'%'));
  1599. $GotoData = $stmt->fetchAll(PDO::FETCH_ASSOC);
  1600. foreach ($GotoData as $gotos) {
  1601. $goto_exploded = explode(',', $gotos['goto']);
  1602. if (($key = array_search($username, $goto_exploded)) !== false) {
  1603. unset($goto_exploded[$key]);
  1604. }
  1605. $gotos_rebuild = implode(',', $goto_exploded);
  1606. $stmt = $pdo->prepare("UPDATE `alias` SET `goto` = :goto WHERE `address` = :address");
  1607. $stmt->execute(array(
  1608. ':goto' => $gotos_rebuild,
  1609. ':address' => $gotos['address']
  1610. ));
  1611. }
  1612. }
  1613. catch (PDOException $e) {
  1614. $_SESSION['return'] = array(
  1615. 'type' => 'danger',
  1616. 'msg' => 'MySQL: '.$e
  1617. );
  1618. return false;
  1619. }
  1620. $_SESSION['return'] = array(
  1621. 'type' => 'success',
  1622. 'msg' => sprintf($lang['success']['mailbox_removed'], htmlspecialchars($username))
  1623. );
  1624. }
  1625. function set_admin_account($postarray) {
  1626. global $lang;
  1627. global $pdo;
  1628. if ($_SESSION['mailcow_cc_role'] != "admin") {
  1629. $_SESSION['return'] = array(
  1630. 'type' => 'danger',
  1631. 'msg' => sprintf($lang['danger']['access_denied'])
  1632. );
  1633. return false;
  1634. }
  1635. $name = $postarray['admin_user'];
  1636. $name_now = $postarray['admin_user_now'];
  1637. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $name)) || empty ($name)) {
  1638. $_SESSION['return'] = array(
  1639. 'type' => 'danger',
  1640. 'msg' => sprintf($lang['danger']['username_invalid'])
  1641. );
  1642. return false;
  1643. }
  1644. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $name_now)) || empty ($name_now)) {
  1645. $_SESSION['return'] = array(
  1646. 'type' => 'danger',
  1647. 'msg' => sprintf($lang['danger']['username_invalid'])
  1648. );
  1649. return false;
  1650. }
  1651. if (!empty($postarray['admin_pass']) && !empty($postarray['admin_pass2'])) {
  1652. if ($postarray['admin_pass'] != $postarray['admin_pass2']) {
  1653. $_SESSION['return'] = array(
  1654. 'type' => 'danger',
  1655. 'msg' => sprintf($lang['danger']['password_mismatch'])
  1656. );
  1657. return false;
  1658. }
  1659. $password_hashed = hash_password($postarray['admin_pass']);
  1660. try {
  1661. $stmt = $pdo->prepare("UPDATE `admin` SET
  1662. `modified` = :modified,
  1663. `password` = :password_hashed,
  1664. `username` = :name
  1665. WHERE `username` = :username");
  1666. $stmt->execute(array(
  1667. ':password_hashed' => $password_hashed,
  1668. ':modified' => date('Y-m-d H:i:s'),
  1669. ':name' => $name,
  1670. ':username' => $name_now
  1671. ));
  1672. }
  1673. catch (PDOException $e) {
  1674. $_SESSION['return'] = array(
  1675. 'type' => 'danger',
  1676. 'msg' => 'MySQL: '.$e
  1677. );
  1678. return false;
  1679. }
  1680. }
  1681. else {
  1682. try {
  1683. $stmt = $pdo->prepare("UPDATE `admin` SET
  1684. `modified` = :modified,
  1685. `username` = :name
  1686. WHERE `username` = :name_now");
  1687. $stmt->execute(array(
  1688. ':name' => $name,
  1689. ':modified' => date('Y-m-d H:i:s'),
  1690. ':name_now' => $name_now
  1691. ));
  1692. }
  1693. catch (PDOException $e) {
  1694. $_SESSION['return'] = array(
  1695. 'type' => 'danger',
  1696. 'msg' => 'MySQL: '.$e
  1697. );
  1698. return false;
  1699. }
  1700. }
  1701. try {
  1702. $stmt = $pdo->prepare("UPDATE `domain_admins` SET
  1703. `domain` = :domain,
  1704. `username` = :name
  1705. WHERE `username` = :name_now");
  1706. $stmt->execute(array(
  1707. ':domain' => 'ALL',
  1708. ':name' => $name,
  1709. ':name_now' => $name_now
  1710. ));
  1711. }
  1712. catch (PDOException $e) {
  1713. $_SESSION['return'] = array(
  1714. 'type' => 'danger',
  1715. 'msg' => 'MySQL: '.$e
  1716. );
  1717. return false;
  1718. }
  1719. $_SESSION['return'] = array(
  1720. 'type' => 'success',
  1721. 'msg' => sprintf($lang['success']['admin_modified'])
  1722. );
  1723. }
  1724. function set_time_limited_aliases($postarray) {
  1725. global $lang;
  1726. global $pdo;
  1727. $username = $_SESSION['mailcow_cc_username'];
  1728. $domain = substr($username, strpos($username, '@'));
  1729. if (($_SESSION['mailcow_cc_role'] != "user" &&
  1730. $_SESSION['mailcow_cc_role'] != "domainadmin") ||
  1731. empty($username) ||
  1732. empty($domain)) {
  1733. $_SESSION['return'] = array(
  1734. 'type' => 'danger',
  1735. 'msg' => sprintf($lang['danger']['access_denied'])
  1736. );
  1737. return false;
  1738. }
  1739. switch ($postarray["trigger_set_time_limited_aliases"]) {
  1740. case "generate":
  1741. if (!is_numeric($postarray["validity"]) || $postarray["validity"] > 672) {
  1742. $_SESSION['return'] = array(
  1743. 'type' => 'danger',
  1744. 'msg' => sprintf($lang['danger']['validity_missing'])
  1745. );
  1746. return false;
  1747. }
  1748. $validity = strtotime("+".$postarray["validity"]." hour");
  1749. $letters = 'abcefghijklmnopqrstuvwxyz1234567890';
  1750. $random_name = substr(str_shuffle($letters), 0, 24);
  1751. try {
  1752. $stmt = $pdo->prepare("INSERT INTO `spamalias` (`address`, `goto`, `validity`) VALUES
  1753. (:address, :goto, :validity)");
  1754. $stmt->execute(array(
  1755. ':address' => $random_name.$domain,
  1756. ':goto' => $username,
  1757. ':validity' => $validity
  1758. ));
  1759. }
  1760. catch (PDOException $e) {
  1761. $_SESSION['return'] = array(
  1762. 'type' => 'danger',
  1763. 'msg' => 'MySQL: '.$e
  1764. );
  1765. return false;
  1766. }
  1767. $_SESSION['return'] = array(
  1768. 'type' => 'success',
  1769. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username))
  1770. );
  1771. break;
  1772. case "delete":
  1773. try {
  1774. $stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `goto` = :username");
  1775. $stmt->execute(array(
  1776. ':username' => $username
  1777. ));
  1778. }
  1779. catch (PDOException $e) {
  1780. $_SESSION['return'] = array(
  1781. 'type' => 'danger',
  1782. 'msg' => 'MySQL: '.$e
  1783. );
  1784. return false;
  1785. }
  1786. $_SESSION['return'] = array(
  1787. 'type' => 'success',
  1788. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username))
  1789. );
  1790. break;
  1791. case "extend":
  1792. try {
  1793. $stmt = $pdo->prepare("UPDATE `spamalias` SET `validity` = (`validity` + 3600)
  1794. WHERE `goto` = :username
  1795. AND `validity` >= :validity");
  1796. $stmt->execute(array(
  1797. ':username' => $username,
  1798. ':validity' => time(),
  1799. ));
  1800. }
  1801. catch (PDOException $e) {
  1802. $_SESSION['return'] = array(
  1803. 'type' => 'danger',
  1804. 'msg' => 'MySQL: '.$e
  1805. );
  1806. return false;
  1807. }
  1808. $_SESSION['return'] = array(
  1809. 'type' => 'success',
  1810. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username))
  1811. );
  1812. break;
  1813. }
  1814. }
  1815. function set_user_account($postarray) {
  1816. global $lang;
  1817. global $pdo;
  1818. $username = $_SESSION['mailcow_cc_username'];
  1819. $password_old = $postarray['user_old_pass'];
  1820. isset($postarray['togglePwNew']) ? $pwnew_active = '1' : $pwnew_active = '0';
  1821. if (isset($pwnew_active) && $pwnew_active == "1") {
  1822. $password_new = $postarray['user_new_pass'];
  1823. $password_new2 = $postarray['user_new_pass2'];
  1824. }
  1825. if (!check_login($username, $password_old) == "user") {
  1826. $_SESSION['return'] = array(
  1827. 'type' => 'danger',
  1828. 'msg' => sprintf($lang['danger']['access_denied'])
  1829. );
  1830. return false;
  1831. }
  1832. if ($_SESSION['mailcow_cc_role'] != "user" &&
  1833. $_SESSION['mailcow_cc_role'] != "domainadmin") {
  1834. $_SESSION['return'] = array(
  1835. 'type' => 'danger',
  1836. 'msg' => sprintf($lang['danger']['access_denied'])
  1837. );
  1838. return false;
  1839. }
  1840. if (isset($password_new) && isset($password_new2)) {
  1841. if (!empty($password_new2) && !empty($password_new)) {
  1842. if ($password_new2 != $password_new) {
  1843. $_SESSION['return'] = array(
  1844. 'type' => 'danger',
  1845. 'msg' => sprintf($lang['danger']['password_mismatch'])
  1846. );
  1847. return false;
  1848. }
  1849. if (strlen($password_new) < "6" ||
  1850. !preg_match('/[A-Za-z]/', $password_new) ||
  1851. !preg_match('/[0-9]/', $password_new)) {
  1852. $_SESSION['return'] = array(
  1853. 'type' => 'danger',
  1854. 'msg' => sprintf($lang['danger']['password_complexity'])
  1855. );
  1856. return false;
  1857. }
  1858. $password_hashed = hash_password($password_new);
  1859. try {
  1860. $stmt = $pdo->prepare("UPDATE `mailbox` SET `modified` = :modified, `password` = :password_hashed WHERE `username` = :username");
  1861. $stmt->execute(array(
  1862. ':password_hashed' => $password_hashed,
  1863. ':modified' => date('Y-m-d H:i:s'),
  1864. ':username' => $username
  1865. ));
  1866. }
  1867. catch (PDOException $e) {
  1868. $_SESSION['return'] = array(
  1869. 'type' => 'danger',
  1870. 'msg' => 'MySQL: '.$e
  1871. );
  1872. return false;
  1873. }
  1874. }
  1875. }
  1876. $_SESSION['return'] = array(
  1877. 'type' => 'success',
  1878. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  1879. );
  1880. }
  1881. function add_domain_admin($postarray) {
  1882. global $lang;
  1883. global $pdo;
  1884. $username = strtolower(trim($postarray['username']));
  1885. $password = $postarray['password'];
  1886. $password2 = $postarray['password2'];
  1887. isset($postarray['active']) ? $active = '1' : $active = '0';
  1888. if ($_SESSION['mailcow_cc_role'] != "admin") {
  1889. $_SESSION['return'] = array(
  1890. 'type' => 'danger',
  1891. 'msg' => sprintf($lang['danger']['access_denied'])
  1892. );
  1893. return false;
  1894. }
  1895. if (empty($postarray['domain'])) {
  1896. $_SESSION['return'] = array(
  1897. 'type' => 'danger',
  1898. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1899. );
  1900. return false;
  1901. }
  1902. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username)) || empty ($username)) {
  1903. $_SESSION['return'] = array(
  1904. 'type' => 'danger',
  1905. 'msg' => sprintf($lang['danger']['username_invalid'])
  1906. );
  1907. return false;
  1908. }
  1909. try {
  1910. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox`
  1911. WHERE `username` = :username");
  1912. $stmt->execute(array(':username' => $username));
  1913. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  1914. $stmt = $pdo->prepare("SELECT `username` FROM `admin`
  1915. WHERE `username` = :username");
  1916. $stmt->execute(array(':username' => $username));
  1917. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  1918. $stmt = $pdo->prepare("SELECT `username` FROM `domain_admins`
  1919. WHERE `username` = :username");
  1920. $stmt->execute(array(':username' => $username));
  1921. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  1922. }
  1923. catch(PDOException $e) {
  1924. $_SESSION['return'] = array(
  1925. 'type' => 'danger',
  1926. 'msg' => 'MySQL: '.$e
  1927. );
  1928. return false;
  1929. }
  1930. foreach ($num_results as $num_results_each) {
  1931. if ($num_results_each != 0) {
  1932. $_SESSION['return'] = array(
  1933. 'type' => 'danger',
  1934. 'msg' => sprintf($lang['danger']['object_exists'], htmlspecialchars($username))
  1935. );
  1936. return false;
  1937. }
  1938. }
  1939. if (!empty($password) && !empty($password2)) {
  1940. if ($password != $password2) {
  1941. $_SESSION['return'] = array(
  1942. 'type' => 'danger',
  1943. 'msg' => sprintf($lang['danger']['password_mismatch'])
  1944. );
  1945. return false;
  1946. }
  1947. $password_hashed = hash_password($password);
  1948. foreach ($postarray['domain'] as $domain) {
  1949. if (!is_valid_domain_name($domain)) {
  1950. $_SESSION['return'] = array(
  1951. 'type' => 'danger',
  1952. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1953. );
  1954. return false;
  1955. }
  1956. try {
  1957. $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
  1958. VALUES (:username, :domain, :created, :active)");
  1959. $stmt->execute(array(
  1960. ':username' => $username,
  1961. ':domain' => $domain,
  1962. ':created' => date('Y-m-d H:i:s'),
  1963. ':active' => $active
  1964. ));
  1965. }
  1966. catch (PDOException $e) {
  1967. $_SESSION['return'] = array(
  1968. 'type' => 'danger',
  1969. 'msg' => 'MySQL: '.$e
  1970. );
  1971. return false;
  1972. }
  1973. }
  1974. try {
  1975. $stmt = $pdo->prepare("INSERT INTO `admin` (`username`, `password`, `superadmin`, `created`, `modified`, `active`)
  1976. VALUES (:username, :password_hashed, '0', :created, :modified, :active)");
  1977. $stmt->execute(array(
  1978. ':username' => $username,
  1979. ':password_hashed' => $password_hashed,
  1980. ':created' => date('Y-m-d H:i:s'),
  1981. ':modified' => date('Y-m-d H:i:s'),
  1982. ':active' => $active
  1983. ));
  1984. }
  1985. catch (PDOException $e) {
  1986. $_SESSION['return'] = array(
  1987. 'type' => 'danger',
  1988. 'msg' => 'MySQL: '.$e
  1989. );
  1990. return false;
  1991. }
  1992. }
  1993. else {
  1994. $_SESSION['return'] = array(
  1995. 'type' => 'danger',
  1996. 'msg' => sprintf($lang['danger']['password_empty'])
  1997. );
  1998. return false;
  1999. }
  2000. $_SESSION['return'] = array(
  2001. 'type' => 'success',
  2002. 'msg' => sprintf($lang['success']['domain_admin_added'], htmlspecialchars($username))
  2003. );
  2004. }
  2005. function delete_domain_admin($postarray) {
  2006. global $pdo;
  2007. global $lang;
  2008. if ($_SESSION['mailcow_cc_role'] != "admin") {
  2009. $_SESSION['return'] = array(
  2010. 'type' => 'danger',
  2011. 'msg' => sprintf($lang['danger']['access_denied'])
  2012. );
  2013. return false;
  2014. }
  2015. $username = $postarray['username'];
  2016. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
  2017. $_SESSION['return'] = array(
  2018. 'type' => 'danger',
  2019. 'msg' => sprintf($lang['danger']['username_invalid'])
  2020. );
  2021. return false;
  2022. }
  2023. try {
  2024. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
  2025. $stmt->execute(array(
  2026. ':username' => $username,
  2027. ));
  2028. $stmt = $pdo->prepare("DELETE FROM `admin` WHERE `username` = :username");
  2029. $stmt->execute(array(
  2030. ':username' => $username,
  2031. ));
  2032. }
  2033. catch (PDOException $e) {
  2034. $_SESSION['return'] = array(
  2035. 'type' => 'danger',
  2036. 'msg' => 'MySQL: '.$e
  2037. );
  2038. return false;
  2039. }
  2040. $_SESSION['return'] = array(
  2041. 'type' => 'success',
  2042. 'msg' => sprintf($lang['success']['domain_admin_removed'], htmlspecialchars($username))
  2043. );
  2044. }
  2045. function get_spam_score($username) {
  2046. global $pdo;
  2047. $default = "5, 15";
  2048. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  2049. return $default;
  2050. }
  2051. try {
  2052. $stmt = $pdo->prepare("SELECT `value` FROM `filterconf` WHERE `object` = :username AND
  2053. (`option` = 'lowspamlevel' OR `option` = 'highspamlevel')");
  2054. $stmt->execute(array(':username' => $username));
  2055. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  2056. }
  2057. catch(PDOException $e) {
  2058. $_SESSION['return'] = array(
  2059. 'type' => 'danger',
  2060. 'msg' => 'MySQL: '.$e
  2061. );
  2062. return false;
  2063. }
  2064. if ($num_results == 0 || empty ($num_results)) {
  2065. return $default;
  2066. }
  2067. else {
  2068. try {
  2069. $stmt = $pdo->prepare("SELECT `value` FROM `filterconf` WHERE `option` = 'highspamlevel' AND `object` = :username");
  2070. $stmt->execute(array(':username' => $username));
  2071. $highspamlevel = $stmt->fetch(PDO::FETCH_ASSOC);
  2072. $stmt = $pdo->prepare("SELECT `value` FROM `filterconf` WHERE `option` = 'lowspamlevel' AND `object` = :username");
  2073. $stmt->execute(array(':username' => $username));
  2074. $lowspamlevel = $stmt->fetch(PDO::FETCH_ASSOC);
  2075. return $lowspamlevel['value'].', '.$highspamlevel['value'];
  2076. }
  2077. catch(PDOException $e) {
  2078. $_SESSION['return'] = array(
  2079. 'type' => 'danger',
  2080. 'msg' => 'MySQL: '.$e
  2081. );
  2082. return false;
  2083. }
  2084. }
  2085. }
  2086. function set_spam_score($postarray) {
  2087. global $lang;
  2088. global $pdo;
  2089. $username = $_SESSION['mailcow_cc_username'];
  2090. $lowspamlevel = explode(',', $postarray['score'])[0];
  2091. $highspamlevel = explode(',', $postarray['score'])[1];
  2092. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  2093. $_SESSION['return'] = array(
  2094. 'type' => 'danger',
  2095. 'msg' => sprintf($lang['danger']['username_invalid'])
  2096. );
  2097. return false;
  2098. }
  2099. if (!is_numeric($lowspamlevel) || !is_numeric($highspamlevel)) {
  2100. $_SESSION['return'] = array(
  2101. 'type' => 'danger',
  2102. 'msg' => sprintf($lang['danger']['access_denied'])
  2103. );
  2104. return false;
  2105. }
  2106. try {
  2107. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :username
  2108. AND (`option` = 'lowspamlevel' OR `option` = 'highspamlevel')");
  2109. $stmt->execute(array(
  2110. ':username' => $username
  2111. ));
  2112. $stmt = $pdo->prepare("INSERT INTO `filterconf` (`object`, `option`, `value`)
  2113. VALUES (:username, 'highspamlevel', :highspamlevel)");
  2114. $stmt->execute(array(
  2115. ':username' => $username,
  2116. ':highspamlevel' => $highspamlevel
  2117. ));
  2118. $stmt = $pdo->prepare("INSERT INTO `filterconf` (`object`, `option`, `value`)
  2119. VALUES (:username, 'lowspamlevel', :lowspamlevel)");
  2120. $stmt->execute(array(
  2121. ':username' => $username,
  2122. ':lowspamlevel' => $lowspamlevel
  2123. ));
  2124. }
  2125. catch (PDOException $e) {
  2126. $_SESSION['return'] = array(
  2127. 'type' => 'danger',
  2128. 'msg' => 'MySQL: '.$e
  2129. );
  2130. return false;
  2131. }
  2132. $_SESSION['return'] = array(
  2133. 'type' => 'success',
  2134. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  2135. );
  2136. }
  2137. function set_policy_list($postarray) {
  2138. global $lang;
  2139. global $pdo;
  2140. (isset($postarray['domain'])) ? $object = $postarray['domain'] : $object = $_SESSION['mailcow_cc_username'];
  2141. ($postarray['object_list'] == "bl") ? $object_list = "blacklist_from" : $object_list = "whitelist_from";
  2142. $object_from = preg_replace('/\.+/', '.', rtrim(preg_replace("/\.\*/", "*", trim(strtolower($postarray['object_from']))), '.'));
  2143. if (!filter_var($object, FILTER_VALIDATE_EMAIL) && !is_valid_domain_name($object)) {
  2144. $_SESSION['return'] = array(
  2145. 'type' => 'danger',
  2146. 'msg' => sprintf($lang['danger']['username_invalid'])
  2147. );
  2148. return false;
  2149. }
  2150. if (is_valid_domain_name($object)) {
  2151. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $object)) {
  2152. $_SESSION['return'] = array(
  2153. 'type' => 'danger',
  2154. 'msg' => sprintf($lang['danger']['access_denied'])
  2155. );
  2156. return false;
  2157. }
  2158. }
  2159. if (isset($postarray['prefid'])) {
  2160. if (!is_numeric($postarray['prefid'])) {
  2161. $_SESSION['return'] = array(
  2162. 'type' => 'danger',
  2163. 'msg' => sprintf($lang['danger']['access_denied'])
  2164. );
  2165. return false;
  2166. }
  2167. try {
  2168. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :object AND `prefid` = :prefid");
  2169. $stmt->execute(array(
  2170. ':object' => $object,
  2171. ':prefid' => $postarray['prefid']
  2172. ));
  2173. }
  2174. catch (PDOException $e) {
  2175. $_SESSION['return'] = array(
  2176. 'type' => 'danger',
  2177. 'msg' => 'MySQL: '.$e
  2178. );
  2179. return false;
  2180. }
  2181. $_SESSION['return'] = array(
  2182. 'type' => 'success',
  2183. 'msg' => sprintf($lang['success']['mailbox_modified'], $object)
  2184. );
  2185. return true;
  2186. }
  2187. if (!ctype_alnum(str_replace(array('@', '.', '-', '*'), '', $object_from))) {
  2188. $_SESSION['return'] = array(
  2189. 'type' => 'danger',
  2190. 'msg' => sprintf($lang['danger']['policy_list_from_invalid'])
  2191. );
  2192. return false;
  2193. }
  2194. try {
  2195. $stmt = $pdo->prepare("SELECT `object` FROM `filterconf`
  2196. WHERE (`option` = 'whitelist_from' OR `option` = 'blacklist_from')
  2197. AND `object` = :object
  2198. AND `value` = :object_from");
  2199. $stmt->execute(array(':object' => $object, ':object_from' => $object_from));
  2200. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  2201. }
  2202. catch(PDOException $e) {
  2203. $_SESSION['return'] = array(
  2204. 'type' => 'danger',
  2205. 'msg' => 'MySQL: '.$e
  2206. );
  2207. return false;
  2208. }
  2209. if ($num_results != 0) {
  2210. $_SESSION['return'] = array(
  2211. 'type' => 'danger',
  2212. 'msg' => sprintf($lang['danger']['policy_list_from_exists'])
  2213. );
  2214. return false;
  2215. }
  2216. try {
  2217. $stmt = $pdo->prepare("INSERT INTO `filterconf` (`object`, `option` ,`value`)
  2218. VALUES (:object, :object_list, :object_from)");
  2219. $stmt->execute(array(
  2220. ':object' => $object,
  2221. ':object_list' => $object_list,
  2222. ':object_from' => $object_from
  2223. ));
  2224. }
  2225. catch (PDOException $e) {
  2226. $_SESSION['return'] = array(
  2227. 'type' => 'danger',
  2228. 'msg' => 'MySQL: '.$e
  2229. );
  2230. return false;
  2231. }
  2232. $_SESSION['return'] = array(
  2233. 'type' => 'success',
  2234. 'msg' => sprintf($lang['success']['mailbox_modified'], $object)
  2235. );
  2236. }
  2237. function set_tls_policy($postarray) {
  2238. global $lang;
  2239. global $pdo;
  2240. isset($postarray['tls_in']) ? $tls_in = '1' : $tls_in = '0';
  2241. isset($postarray['tls_out']) ? $tls_out = '1' : $tls_out = '0';
  2242. $username = $_SESSION['mailcow_cc_username'];
  2243. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  2244. $_SESSION['return'] = array(
  2245. 'type' => 'danger',
  2246. 'msg' => sprintf($lang['danger']['username_invalid'])
  2247. );
  2248. return false;
  2249. }
  2250. try {
  2251. $stmt = $pdo->prepare("UPDATE `mailbox` SET `tls_enforce_out` = :tls_out, `tls_enforce_in` = :tls_in WHERE `username` = :username");
  2252. $stmt->execute(array(
  2253. ':tls_out' => $tls_out,
  2254. ':tls_in' => $tls_in,
  2255. ':username' => $username
  2256. ));
  2257. }
  2258. catch (PDOException $e) {
  2259. $_SESSION['return'] = array(
  2260. 'type' => 'danger',
  2261. 'msg' => 'MySQL: '.$e
  2262. );
  2263. return false;
  2264. }
  2265. $_SESSION['return'] = array(
  2266. 'type' => 'success',
  2267. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  2268. );
  2269. }
  2270. function get_tls_policy($username) {
  2271. global $lang;
  2272. global $pdo;
  2273. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  2274. $_SESSION['return'] = array(
  2275. 'type' => 'danger',
  2276. 'msg' => sprintf($lang['danger']['username_invalid'])
  2277. );
  2278. return false;
  2279. }
  2280. try {
  2281. $stmt = $pdo->prepare("SELECT `tls_enforce_out`, `tls_enforce_in` FROM `mailbox` WHERE `username` = :username");
  2282. $stmt->execute(array(':username' => $username));
  2283. $TLSData = $stmt->fetch(PDO::FETCH_ASSOC);
  2284. }
  2285. catch(PDOException $e) {
  2286. $_SESSION['return'] = array(
  2287. 'type' => 'danger',
  2288. 'msg' => 'MySQL: '.$e
  2289. );
  2290. return false;
  2291. }
  2292. return $TLSData;
  2293. }
  2294. function remaining_specs($domain, $object = null, $js = null) {
  2295. // left_m without object given = MiB left in domain
  2296. // left_m with object given = Max. MiB we can assign to given object
  2297. // limit_m = Domain limit in MiB
  2298. // left_c = Mailboxes we can create depending on domain quota
  2299. global $pdo;
  2300. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  2301. return false;
  2302. }
  2303. try {
  2304. $stmt = $pdo->prepare("SELECT `mailboxes`, `maxquota`, `quota` FROM `domain` WHERE `domain` = :domain");
  2305. $stmt->execute(array(':domain' => $domain));
  2306. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  2307. $stmt = $pdo->prepare("SELECT COUNT(*) AS `count`, COALESCE(ROUND(SUM(`quota`)/1048576), 0) as `in_use_m` FROM `mailbox` WHERE `domain` = :domain AND `username` != :object");
  2308. $stmt->execute(array(':domain' => $domain, ':object' => $object));
  2309. $MailboxDataDomain = $stmt->fetch(PDO::FETCH_ASSOC);
  2310. $quota_left_m = $DomainData['quota'] - $MailboxDataDomain['in_use_m'];
  2311. $mboxs_left = $DomainData['mailboxes'] - $MailboxDataDomain['count'];
  2312. if ($quota_left_m > $DomainData['maxquota']) {
  2313. $quota_left_m = $DomainData['maxquota'];
  2314. }
  2315. }
  2316. catch (PDOException $e) {
  2317. return false;
  2318. }
  2319. if (is_numeric($quota_left_m)) {
  2320. $spec['left_m'] = $quota_left_m;
  2321. $spec['limit_m'] = $DomainData['maxquota'];
  2322. }
  2323. if (is_numeric($mboxs_left)) {
  2324. $spec['left_c'] = $mboxs_left;
  2325. }
  2326. if (!empty($js)) {
  2327. echo $quota_left_m;
  2328. exit;
  2329. }
  2330. return $spec;
  2331. }
  2332. function get_sender_acl_handles($mailbox, $which) {
  2333. global $pdo;
  2334. if ($_SESSION['mailcow_cc_role'] != "admin" && $_SESSION['mailcow_cc_role'] != "domainadmin") {
  2335. return false;
  2336. }
  2337. switch ($which) {
  2338. case "preselected":
  2339. try {
  2340. $stmt = $pdo->prepare("SELECT `address` FROM `alias` WHERE `goto` = :goto AND `address` NOT LIKE '@%'");
  2341. $stmt->execute(array(':goto' => $mailbox));
  2342. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2343. return $rows;
  2344. }
  2345. catch(PDOException $e) {
  2346. $_SESSION['return'] = array(
  2347. 'type' => 'danger',
  2348. 'msg' => 'MySQL: '.$e
  2349. );
  2350. return false;
  2351. }
  2352. break;
  2353. case "selected":
  2354. try {
  2355. $stmt = $pdo->prepare("SELECT `send_as` FROM `sender_acl` WHERE `logged_in_as` = :logged_in_as");
  2356. $stmt->execute(array(':logged_in_as' => $mailbox));
  2357. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2358. return $rows;
  2359. }
  2360. catch(PDOException $e) {
  2361. $_SESSION['return'] = array(
  2362. 'type' => 'danger',
  2363. 'msg' => 'MySQL: '.$e
  2364. );
  2365. return false;
  2366. }
  2367. break;
  2368. case "unselected-domains":
  2369. try {
  2370. if ($_SESSION['mailcow_cc_role'] == "admin" ) {
  2371. $stmt = $pdo->prepare("SELECT DISTINCT `domain` FROM `domain`
  2372. WHERE `domain` NOT IN (
  2373. SELECT REPLACE(`send_as`, '@', '') FROM `sender_acl`
  2374. WHERE `logged_in_as` = :logged_in_as)
  2375. AND `domain` NOT IN (
  2376. SELECT REPLACE(`address`, '@', '') FROM `alias`
  2377. WHERE `goto` = :goto)");
  2378. $stmt->execute(array(
  2379. ':logged_in_as' => $mailbox,
  2380. ':goto' => $mailbox,
  2381. ));
  2382. }
  2383. else {
  2384. $stmt = $pdo->prepare("SELECT DISTINCT `domain` FROM `domain_admins`
  2385. WHERE `username` = :username
  2386. AND `domain` != 'ALL'
  2387. AND `domain` NOT IN (
  2388. SELECT REPLACE(`send_as`, '@', '') FROM `sender_acl`
  2389. WHERE `logged_in_as` = :logged_in_as)");
  2390. $stmt->execute(array(
  2391. ':logged_in_as' => $mailbox,
  2392. ':username' => $_SESSION['mailcow_cc_username']
  2393. ));
  2394. }
  2395. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2396. return $rows;
  2397. }
  2398. catch(PDOException $e) {
  2399. $_SESSION['return'] = array(
  2400. 'type' => 'danger',
  2401. 'msg' => 'MySQL: '.$e
  2402. );
  2403. return false;
  2404. }
  2405. break;
  2406. case "unselected-addresses":
  2407. try {
  2408. if ($_SESSION['mailcow_cc_role'] == "admin" ) {
  2409. $stmt = $pdo->prepare("SELECT `address` FROM `alias`
  2410. WHERE `goto` != :goto
  2411. AND `address` NOT IN (
  2412. SELECT `send_as` FROM `sender_acl`
  2413. WHERE `logged_in_as` = :logged_in_as)");
  2414. $stmt->execute(array(
  2415. ':logged_in_as' => $mailbox,
  2416. ':goto' => $mailbox
  2417. ));
  2418. }
  2419. else {
  2420. $stmt = $pdo->prepare("SELECT `address` FROM `alias`
  2421. WHERE `goto` != :goto
  2422. AND `domain` IN (
  2423. SELECT `domain` FROM `domain_admins`
  2424. WHERE `username` = :username)
  2425. AND `address` NOT IN (
  2426. SELECT `send_as` FROM `sender_acl`
  2427. WHERE `logged_in_as` = :logged_in_as)");
  2428. $stmt->execute(array(
  2429. ':logged_in_as' => $mailbox,
  2430. ':goto' => $mailbox,
  2431. ':username' => $_SESSION['mailcow_cc_username']
  2432. ));
  2433. }
  2434. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2435. return $rows;
  2436. }
  2437. catch(PDOException $e) {
  2438. $_SESSION['return'] = array(
  2439. 'type' => 'danger',
  2440. 'msg' => 'MySQL: '.$e
  2441. );
  2442. return false;
  2443. }
  2444. break;
  2445. }
  2446. return false;
  2447. }
  2448. function is_valid_domain_name($domain_name) {
  2449. if (empty($domain_name)) {
  2450. return false;
  2451. }
  2452. $domain_name = idn_to_ascii($domain_name);
  2453. return (preg_match("/^([a-z\d](-*[a-z\d])*)(\.([a-z\d](-*[a-z\d])*))*$/i", $domain_name)
  2454. && preg_match("/^.{1,253}$/", $domain_name)
  2455. && preg_match("/^[^\.]{1,63}(\.[^\.]{1,63})*$/", $domain_name));
  2456. }
  2457. ?>