functions.inc.php 74 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578
  1. <?php
  2. function hash_password($password) {
  3. $salt_str = bin2hex(openssl_random_pseudo_bytes(8));
  4. return "{SSHA256}".base64_encode(hash('sha256', $password.$salt_str, true).$salt_str);
  5. }
  6. function hasDomainAccess($username, $role, $domain) {
  7. global $pdo;
  8. if (!filter_var($username, FILTER_VALIDATE_EMAIL) && !ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
  9. return false;
  10. }
  11. if (!is_valid_domain_name($domain)) {
  12. return false;
  13. }
  14. try {
  15. $stmt = $pdo->prepare("SELECT `domain` FROM `domain_admins`
  16. WHERE (
  17. `active`='1'
  18. AND `username` = :username
  19. AND `domain` = :domain
  20. )
  21. OR 'admin' = :role");
  22. $stmt->execute(array(':username' => $username, ':domain' => $domain, ':role' => $role));
  23. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  24. } catch(PDOException $e) {
  25. error_log($e);
  26. return false;
  27. }
  28. if ($num_results != 0 && !empty($num_results)) {
  29. return true;
  30. }
  31. return false;
  32. }
  33. function verify_ssha256($password, $hash) {
  34. // Remove tag if any
  35. $hash = ltrim($hash, '{SSHA256}');
  36. // Decode hash
  37. $dhash = base64_decode($hash);
  38. // Get first 32 bytes of binary which equals a SHA256 hash
  39. $ohash = substr($dhash, 0, 32);
  40. // Remove SHA256 hash from decoded hash to get original salt string
  41. $osalt = str_replace($ohash, '', $dhash);
  42. // Check single salted SHA256 hash against extracted hash
  43. if (hash('sha256', $password . $osalt, true) == $ohash) {
  44. return true;
  45. }
  46. else {
  47. return false;
  48. }
  49. }
  50. function doveadm_authenticate($hash, $algorithm, $password) {
  51. $descr = array(0 => array('pipe', 'r'), 1 => array('pipe', 'w'), 2 => array('pipe', 'w'));
  52. $pipes = array();
  53. $process = proc_open("/usr/bin/doveadm pw -s ".$algorithm." -t '".$hash."'", $descr, $pipes);
  54. if (is_resource($process)) {
  55. fputs($pipes[0], $password);
  56. fclose($pipes[0]);
  57. while ($f = fgets($pipes[1])) {
  58. if (preg_match('/(verified)/', $f)) {
  59. proc_close($process);
  60. return true;
  61. }
  62. return false;
  63. }
  64. fclose($pipes[1]);
  65. while ($f = fgets($pipes[2])) {
  66. proc_close($process);
  67. return false;
  68. }
  69. fclose($pipes[2]);
  70. proc_close($process);
  71. }
  72. return false;
  73. }
  74. function check_login($user, $pass) {
  75. global $pdo;
  76. if (!filter_var($user, FILTER_VALIDATE_EMAIL) && !ctype_alnum(str_replace(array('_', '.', '-'), '', $user))) {
  77. return false;
  78. }
  79. if (!strpos(shell_exec("file --mime-encoding /usr/bin/doveadm"), "binary")) {
  80. return false;
  81. }
  82. $user = strtolower(trim($user));
  83. $stmt = $pdo->prepare("SELECT `password` FROM `admin`
  84. WHERE `superadmin` = '1'
  85. AND `username` = :user");
  86. $stmt->execute(array(':user' => $user));
  87. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  88. foreach ($rows as $row) {
  89. if (verify_ssha256($row['password'], $pass) !== false) {
  90. unset($_SESSION['ldelay']);
  91. return "admin";
  92. }
  93. }
  94. $stmt = $pdo->prepare("SELECT `password` FROM `admin`
  95. WHERE `superadmin` = '0'
  96. AND `active`='1'
  97. AND `username` = :user");
  98. $stmt->execute(array(':user' => $user));
  99. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  100. foreach ($rows as $row) {
  101. if (doveadm_authenticate($row['password'], $pass) !== false) {
  102. unset($_SESSION['ldelay']);
  103. return "domainadmin";
  104. }
  105. }
  106. $stmt = $pdo->prepare("SELECT `password` FROM `mailbox`
  107. WHERE `active`='1'
  108. AND `username` = :user");
  109. $stmt->execute(array(':user' => $user));
  110. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  111. foreach ($rows as $row) {
  112. if (doveadm_authenticate($row['password'], $pass) !== false) {
  113. unset($_SESSION['ldelay']);
  114. return "user";
  115. }
  116. }
  117. if (!isset($_SESSION['ldelay'])) {
  118. $_SESSION['ldelay'] = "0";
  119. }
  120. elseif (!isset($_SESSION['mailcow_cc_username'])) {
  121. $_SESSION['ldelay'] = $_SESSION['ldelay']+0.5;
  122. }
  123. sleep($_SESSION['ldelay']);
  124. }
  125. function formatBytes($size, $precision = 2) {
  126. if(!is_numeric($size)) {
  127. return "0";
  128. }
  129. $base = log($size, 1024);
  130. $suffixes = array(' Byte', ' KiB', ' MiB', ' GiB', ' TiB');
  131. if ($size == "0") {
  132. return "0";
  133. }
  134. return round(pow(1024, $base - floor($base)), $precision) . $suffixes[floor($base)];
  135. }
  136. function dkim_table($action, $item) {
  137. global $lang;
  138. switch ($action) {
  139. case "delete":
  140. $domain = preg_replace('/[^A-Za-z0-9._\-]/', '_', $item['dkim']['domain']);
  141. $selector = preg_replace('/[^A-Za-z0-9._\-]/', '_', $item['dkim']['selector']);
  142. if (!ctype_alnum($selector) || !is_valid_domain_name($domain)) {
  143. $_SESSION['return'] = array(
  144. 'type' => 'danger',
  145. 'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid'])
  146. );
  147. break;
  148. }
  149. exec('rm ' . escapeshellarg($GLOBALS['MC_DKIM_TXTS'] . '/' . $selector . '_' . $domain), $out, $return);
  150. if ($return != "0") {
  151. $_SESSION['return'] = array(
  152. 'type' => 'danger',
  153. 'msg' => sprintf($lang['danger']['dkim_remove_failed'])
  154. );
  155. break;
  156. }
  157. exec('rm ' . escapeshellarg($GLOBALS['MC_DKIM_KEYS'] . '/' . $domain . '.' . $selector), $out, $return);
  158. if ($return != "0") {
  159. $_SESSION['return'] = array(
  160. 'type' => 'danger',
  161. 'msg' => sprintf($lang['danger']['dkim_remove_failed'])
  162. );
  163. break;
  164. }
  165. $_SESSION['return'] = array(
  166. 'type' => 'success',
  167. 'msg' => sprintf($lang['success']['dkim_removed'])
  168. );
  169. break;
  170. case "add":
  171. $domain = preg_replace('/[^A-Za-z0-9._\-]/', '_', $item['dkim']['domain']);
  172. $selector = preg_replace('/[^A-Za-z0-9._\-]/', '_', $item['dkim']['selector']);
  173. $key_length = intval($item['dkim']['key_size']);
  174. if (!ctype_alnum($selector) || !is_valid_domain_name($domain) || !is_numeric($key_length)) {
  175. $_SESSION['return'] = array(
  176. 'type' => 'danger',
  177. 'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid'])
  178. );
  179. break;
  180. }
  181. if (file_exists($GLOBALS['MC_DKIM_TXTS'] . '/' . $selector . '_' . $domain) ||
  182. file_exists($GLOBALS['MC_DKIM_KEYS'] . '/' . $domain . '.' . $selector)) {
  183. $_SESSION['return'] = array(
  184. 'type' => 'danger',
  185. 'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid'])
  186. );
  187. break;
  188. }
  189. $config = array(
  190. "digest_alg" => "sha256",
  191. "private_key_bits" => $key_length,
  192. "private_key_type" => OPENSSL_KEYTYPE_RSA,
  193. );
  194. $keypair_ressource = openssl_pkey_new($config);
  195. $key_details = openssl_pkey_get_details($keypair_ressource);
  196. $pubKey = implode(array_slice(
  197. array_filter(
  198. explode(PHP_EOL, $key_details['key'])
  199. ), 1, -1)
  200. );
  201. // Save public key to file
  202. file_put_contents($GLOBALS['MC_DKIM_TXTS'] . '/' . $selector . '_' . $domain, $pubKey);
  203. // Save private key to file
  204. openssl_pkey_export_to_file($keypair_ressource, $GLOBALS['MC_DKIM_KEYS'] . '/' . $domain . '.' . $selector);
  205. $_SESSION['return'] = array(
  206. 'type' => 'success',
  207. 'msg' => sprintf($lang['success']['dkim_added'])
  208. );
  209. break;
  210. }
  211. }
  212. function mailbox_add_domain($postarray) {
  213. global $pdo;
  214. global $lang;
  215. if ($_SESSION['mailcow_cc_role'] != "admin") {
  216. $_SESSION['return'] = array(
  217. 'type' => 'danger',
  218. 'msg' => sprintf($lang['danger']['access_denied'])
  219. );
  220. return false;
  221. }
  222. $domain = idn_to_ascii(strtolower(trim($postarray['domain'])));
  223. $description = $postarray['description'];
  224. $aliases = $postarray['aliases'];
  225. $mailboxes = $postarray['mailboxes'];
  226. $maxquota = $postarray['maxquota'];
  227. $quota = $postarray['quota'];
  228. if ($maxquota > $quota) {
  229. $_SESSION['return'] = array(
  230. 'type' => 'danger',
  231. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeds_domain_quota'])
  232. );
  233. return false;
  234. }
  235. isset($postarray['active']) ? $active = '1' : $active = '0';
  236. isset($postarray['relay_all_recipients']) ? $relay_all_recipients = '1' : $relay_all_recipients = '0';
  237. isset($postarray['backupmx']) ? $backupmx = '1' : $backupmx = '0';
  238. isset($postarray['relay_all_recipients']) ? $backupmx = '1' : true;
  239. if (!is_valid_domain_name($domain)) {
  240. $_SESSION['return'] = array(
  241. 'type' => 'danger',
  242. 'msg' => sprintf($lang['danger']['domain_invalid'])
  243. );
  244. return false;
  245. }
  246. foreach (array($quota, $maxquota, $mailboxes, $aliases) as $data) {
  247. if (!is_numeric($data)) {
  248. $_SESSION['return'] = array(
  249. 'type' => 'danger',
  250. 'msg' => sprintf($lang['danger']['object_is_not_numeric'], htmlspecialchars($data))
  251. );
  252. return false;
  253. }
  254. }
  255. try {
  256. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  257. WHERE `domain` = :domain");
  258. $stmt->execute(array(':domain' => $domain));
  259. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  260. }
  261. catch(PDOException $e) {
  262. $_SESSION['return'] = array(
  263. 'type' => 'danger',
  264. 'msg' => 'MySQL: '.$e
  265. );
  266. return false;
  267. }
  268. if ($num_results != 0) {
  269. $_SESSION['return'] = array(
  270. 'type' => 'danger',
  271. 'msg' => sprintf($lang['danger']['domain_exists'], htmlspecialchars($domain))
  272. );
  273. return false;
  274. }
  275. try {
  276. $stmt = $pdo->prepare("INSERT INTO `domain` (`domain`, `description`, `aliases`, `mailboxes`, `maxquota`, `quota`, `transport`, `backupmx`, `created`, `modified`, `active`, `relay_all_recipients`)
  277. VALUES (:domain, :description, :aliases, :mailboxes, :maxquota, :quota, 'virtual', :backupmx, :created, :modified, :active, :relay_all_recipients)");
  278. $stmt->execute(array(
  279. ':domain' => $domain,
  280. ':description' => $description,
  281. ':aliases' => $aliases,
  282. ':mailboxes' => $mailboxes,
  283. ':maxquota' => $maxquota,
  284. ':quota' => $quota,
  285. ':backupmx' => $backupmx,
  286. ':active' => $active,
  287. ':created' => date('Y-m-d H:i:s'),
  288. ':modified' => date('Y-m-d H:i:s'),
  289. ':relay_all_recipients' => $relay_all_recipients
  290. ));
  291. $_SESSION['return'] = array(
  292. 'type' => 'success',
  293. 'msg' => sprintf($lang['success']['domain_added'], htmlspecialchars($domain))
  294. );
  295. }
  296. catch (PDOException $e) {
  297. $_SESSION['return'] = array(
  298. 'type' => 'danger',
  299. 'msg' => 'MySQL: '.$e
  300. );
  301. return false;
  302. }
  303. }
  304. function mailbox_add_alias($postarray) {
  305. global $lang;
  306. global $pdo;
  307. $addresses = array_map('trim', preg_split( "/( |,|;|\n)/", $postarray['address']));
  308. $gotos = array_map('trim', preg_split( "/( |,|;|\n)/", $postarray['goto']));
  309. isset($postarray['active']) ? $active = '1' : $active = '0';
  310. if (empty($addresses[0])) {
  311. $_SESSION['return'] = array(
  312. 'type' => 'danger',
  313. 'msg' => sprintf($lang['danger']['alias_empty'])
  314. );
  315. return false;
  316. }
  317. if (empty($gotos[0])) {
  318. $_SESSION['return'] = array(
  319. 'type' => 'danger',
  320. 'msg' => sprintf($lang['danger']['goto_empty'])
  321. );
  322. return false;
  323. }
  324. foreach ($addresses as $address) {
  325. if (empty($address)) {
  326. continue;
  327. }
  328. $domain = idn_to_ascii(substr(strstr($address, '@'), 1));
  329. $local_part = strstr($address, '@', true);
  330. $address = $local_part.'@'.$domain;
  331. if ((!filter_var($address, FILTER_VALIDATE_EMAIL) === true) && !empty($local_part)) {
  332. $_SESSION['return'] = array(
  333. 'type' => 'danger',
  334. 'msg' => sprintf($lang['danger']['alias_invalid'])
  335. );
  336. return false;
  337. }
  338. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  339. $_SESSION['return'] = array(
  340. 'type' => 'danger',
  341. 'msg' => sprintf($lang['danger']['access_denied'])
  342. );
  343. return false;
  344. }
  345. try {
  346. $stmt = $pdo->prepare("SELECT `address` FROM `alias`
  347. WHERE `address`= :address");
  348. $stmt->execute(array(':address' => $address));
  349. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  350. }
  351. catch(PDOException $e) {
  352. $_SESSION['return'] = array(
  353. 'type' => 'danger',
  354. 'msg' => 'MySQL: '.$e
  355. );
  356. return false;
  357. }
  358. if ($num_results != 0) {
  359. $_SESSION['return'] = array(
  360. 'type' => 'danger',
  361. 'msg' => sprintf($lang['danger']['is_alias_or_mailbox'], htmlspecialchars($address))
  362. );
  363. return false;
  364. }
  365. try {
  366. $stmt = $pdo->prepare("SELECT `address` FROM `spamalias`
  367. WHERE `address`= :address");
  368. $stmt->execute(array(':address' => $address));
  369. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  370. }
  371. catch(PDOException $e) {
  372. $_SESSION['return'] = array(
  373. 'type' => 'danger',
  374. 'msg' => 'MySQL: '.$e
  375. );
  376. return false;
  377. }
  378. if ($num_results != 0) {
  379. $_SESSION['return'] = array(
  380. 'type' => 'danger',
  381. 'msg' => sprintf($lang['danger']['is_spam_alias'], htmlspecialchars($address))
  382. );
  383. return false;
  384. }
  385. foreach ($gotos as &$goto) {
  386. if (empty($goto)) {
  387. continue;
  388. }
  389. $goto_domain = idn_to_ascii(substr(strstr($goto, '@'), 1));
  390. $goto_local_part = strstr($goto, '@', true);
  391. $goto = $goto_local_part.'@'.$goto_domain;
  392. if (!filter_var($goto, FILTER_VALIDATE_EMAIL) === true) {
  393. $_SESSION['return'] = array(
  394. 'type' => 'danger',
  395. 'msg' => sprintf($lang['danger']['goto_invalid'])
  396. );
  397. return false;
  398. }
  399. if ($goto == $address) {
  400. $_SESSION['return'] = array(
  401. 'type' => 'danger',
  402. 'msg' => sprintf($lang['danger']['alias_goto_identical'])
  403. );
  404. return false;
  405. }
  406. }
  407. $gotos = array_filter($gotos);
  408. $goto = implode(",", $gotos);
  409. try {
  410. $stmt = $pdo->prepare("INSERT INTO `alias` (`address`, `goto`, `domain`, `created`, `modified`, `active`)
  411. VALUES (:address, :goto, :domain, :created, :modified, :active)");
  412. if (!filter_var($address, FILTER_VALIDATE_EMAIL) === true) {
  413. $stmt->execute(array(
  414. ':address' => '@'.$domain,
  415. ':goto' => $goto,
  416. ':domain' => $domain,
  417. ':created' => date('Y-m-d H:i:s'),
  418. ':modified' => date('Y-m-d H:i:s'),
  419. ':active' => $active
  420. ));
  421. }
  422. else {
  423. $stmt->execute(array(
  424. ':address' => $address,
  425. ':goto' => $goto,
  426. ':domain' => $domain,
  427. ':created' => date('Y-m-d H:i:s'),
  428. ':modified' => date('Y-m-d H:i:s'),
  429. ':active' => $active
  430. ));
  431. }
  432. $_SESSION['return'] = array(
  433. 'type' => 'success',
  434. 'msg' => sprintf($lang['success']['alias_added'])
  435. );
  436. }
  437. catch (PDOException $e) {
  438. $_SESSION['return'] = array(
  439. 'type' => 'danger',
  440. 'msg' => 'MySQL: '.$e
  441. );
  442. return false;
  443. }
  444. }
  445. $_SESSION['return'] = array(
  446. 'type' => 'success',
  447. 'msg' => sprintf($lang['success']['alias_added'])
  448. );
  449. }
  450. function mailbox_add_alias_domain($postarray) {
  451. global $lang;
  452. global $pdo;
  453. isset($postarray['active']) ? $active = '1' : $active = '0';
  454. if (!is_valid_domain_name($postarray['alias_domain'])) {
  455. $_SESSION['return'] = array(
  456. 'type' => 'danger',
  457. 'msg' => sprintf($lang['danger']['alias_domain_invalid'])
  458. );
  459. return false;
  460. }
  461. if (!is_valid_domain_name($postarray['target_domain'])) {
  462. $_SESSION['return'] = array(
  463. 'type' => 'danger',
  464. 'msg' => sprintf($lang['danger']['target_domain_invalid'])
  465. );
  466. return false;
  467. }
  468. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $postarray['target_domain'])) {
  469. $_SESSION['return'] = array(
  470. 'type' => 'danger',
  471. 'msg' => sprintf($lang['danger']['access_denied'])
  472. );
  473. return false;
  474. }
  475. if ($postarray['alias_domain'] == $postarray['target_domain']) {
  476. $_SESSION['return'] = array(
  477. 'type' => 'danger',
  478. 'msg' => sprintf($lang['danger']['aliasd_targetd_identical'])
  479. );
  480. return false;
  481. }
  482. $alias_domain = strtolower(trim($postarray['alias_domain']));
  483. $target_domain = strtolower(trim($postarray['target_domain']));
  484. try {
  485. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  486. WHERE `domain`= :target_domain");
  487. $stmt->execute(array(':target_domain' => $target_domain));
  488. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  489. }
  490. catch(PDOException $e) {
  491. $_SESSION['return'] = array(
  492. 'type' => 'danger',
  493. 'msg' => 'MySQL: '.$e
  494. );
  495. return false;
  496. }
  497. if ($num_results == 0) {
  498. $_SESSION['return'] = array(
  499. 'type' => 'danger',
  500. 'msg' => sprintf($lang['danger']['targetd_not_found'])
  501. );
  502. return false;
  503. }
  504. try {
  505. $stmt = $pdo->prepare("SELECT `alias_domain` FROM `alias_domain` WHERE `alias_domain`= :alias_domain
  506. UNION
  507. SELECT `alias_domain` FROM `alias_domain` WHERE `alias_domain`= :alias_domain_in_domain");
  508. $stmt->execute(array(':alias_domain' => $alias_domain, ':alias_domain_in_domain' => $alias_domain));
  509. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  510. }
  511. catch(PDOException $e) {
  512. $_SESSION['return'] = array(
  513. 'type' => 'danger',
  514. 'msg' => 'MySQL: '.$e
  515. );
  516. return false;
  517. }
  518. if ($num_results != 0) {
  519. $_SESSION['return'] = array(
  520. 'type' => 'danger',
  521. 'msg' => sprintf($lang['danger']['aliasd_exists'])
  522. );
  523. return false;
  524. }
  525. try {
  526. $stmt = $pdo->prepare("INSERT INTO `alias_domain` (`alias_domain`, `target_domain`, `created`, `modified`, `active`)
  527. VALUES (:alias_domain, :target_domain, :created, :modified, :active)");
  528. $stmt->execute(array(
  529. ':alias_domain' => $alias_domain,
  530. ':target_domain' => $target_domain,
  531. ':created' => date('Y-m-d H:i:s'),
  532. ':modified' => date('Y-m-d H:i:s'),
  533. ':active' => $active
  534. ));
  535. $_SESSION['return'] = array(
  536. 'type' => 'success',
  537. 'msg' => sprintf($lang['success']['aliasd_added'], htmlspecialchars($alias_domain))
  538. );
  539. }
  540. catch (PDOException $e) {
  541. $_SESSION['return'] = array(
  542. 'type' => 'danger',
  543. 'msg' => 'MySQL: '.$e
  544. );
  545. return false;
  546. }
  547. }
  548. function mailbox_edit_alias_domain($postarray) {
  549. global $lang;
  550. global $pdo;
  551. isset($postarray['active']) ? $active = '1' : $active = '0';
  552. $alias_domain = idn_to_ascii($postarray['alias_domain']);
  553. $alias_domain = strtolower(trim($alias_domain));
  554. $alias_domain_now = strtolower(trim($postarray['alias_domain_now']));
  555. if (!is_valid_domain_name($alias_domain)) {
  556. $_SESSION['return'] = array(
  557. 'type' => 'danger',
  558. 'msg' => sprintf($lang['danger']['alias_domain_invalid'])
  559. );
  560. return false;
  561. }
  562. if (!is_valid_domain_name($alias_domain_now)) {
  563. $_SESSION['return'] = array(
  564. 'type' => 'danger',
  565. 'msg' => sprintf($lang['danger']['alias_domain_invalid'])
  566. );
  567. return false;
  568. }
  569. try {
  570. $stmt = $pdo->prepare("SELECT `target_domain` FROM `alias_domain`
  571. WHERE `alias_domain`= :alias_domain_now");
  572. $stmt->execute(array(':alias_domain_now' => $alias_domain_now));
  573. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  574. }
  575. catch(PDOException $e) {
  576. $_SESSION['return'] = array(
  577. 'type' => 'danger',
  578. 'msg' => 'MySQL: '.$e
  579. );
  580. return false;
  581. }
  582. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $DomainData['target_domain'])) {
  583. $_SESSION['return'] = array(
  584. 'type' => 'danger',
  585. 'msg' => sprintf($lang['danger']['access_denied'])
  586. );
  587. return false;
  588. }
  589. try {
  590. $stmt = $pdo->prepare("SELECT `target_domain` FROM `alias_domain`
  591. WHERE `target_domain`= :alias_domain");
  592. $stmt->execute(array(':alias_domain' => $alias_domain));
  593. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  594. }
  595. catch(PDOException $e) {
  596. $_SESSION['return'] = array(
  597. 'type' => 'danger',
  598. 'msg' => 'MySQL: '.$e
  599. );
  600. return false;
  601. }
  602. if ($num_results != 0) {
  603. $_SESSION['return'] = array(
  604. 'type' => 'danger',
  605. 'msg' => sprintf($lang['danger']['aliasd_targetd_identical'])
  606. );
  607. return false;
  608. }
  609. try {
  610. $stmt = $pdo->prepare("UPDATE `alias_domain` SET `alias_domain` = :alias_domain, `active` = :active WHERE `alias_domain` = :alias_domain_now");
  611. $stmt->execute(array(
  612. ':alias_domain' => $alias_domain,
  613. ':alias_domain_now' => $alias_domain_now,
  614. ':active' => $active
  615. ));
  616. }
  617. catch (PDOException $e) {
  618. $_SESSION['return'] = array(
  619. 'type' => 'danger',
  620. 'msg' => 'MySQL: '.$e
  621. );
  622. return false;
  623. }
  624. $_SESSION['return'] = array(
  625. 'type' => 'success',
  626. 'msg' => sprintf($lang['success']['aliasd_modified'], htmlspecialchars($alias_domain))
  627. );
  628. }
  629. function mailbox_add_mailbox($postarray) {
  630. global $pdo;
  631. global $lang;
  632. $username = strtolower(trim($postarray['local_part'])).'@'.strtolower(trim($postarray['domain']));
  633. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  634. $_SESSION['return'] = array(
  635. 'type' => 'danger',
  636. 'msg' => sprintf($lang['danger']['mailbox_invalid'])
  637. );
  638. return false;
  639. }
  640. if (empty($postarray['local_part'])) {
  641. $_SESSION['return'] = array(
  642. 'type' => 'danger',
  643. 'msg' => sprintf($lang['danger']['mailbox_invalid'])
  644. );
  645. return false;
  646. }
  647. $domain = strtolower(trim($postarray['domain']));
  648. $password = $postarray['password'];
  649. $password2 = $postarray['password2'];
  650. $local_part = strtolower(trim($postarray['local_part']));
  651. $name = $postarray['name'];
  652. $quota_m = $postarray['quota'];
  653. if (empty($name)) {
  654. $name = $local_part;
  655. }
  656. isset($postarray['active']) ? $active = '1' : $active = '0';
  657. $quota_b = ($quota_m * 1048576);
  658. $maildir = $domain."/".$local_part."/";
  659. if (!is_valid_domain_name($domain)) {
  660. $_SESSION['return'] = array(
  661. 'type' => 'danger',
  662. 'msg' => sprintf($lang['danger']['domain_invalid'])
  663. );
  664. return false;
  665. }
  666. try {
  667. $stmt = $pdo->prepare("SELECT `mailboxes`, `maxquota`, `quota` FROM `domain`
  668. WHERE `domain` = :domain");
  669. $stmt->execute(array(':domain' => $domain));
  670. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  671. }
  672. catch(PDOException $e) {
  673. $_SESSION['return'] = array(
  674. 'type' => 'danger',
  675. 'msg' => 'MySQL: '.$e
  676. );
  677. return false;
  678. }
  679. try {
  680. $stmt = $pdo->prepare("SELECT
  681. COUNT(*) as count,
  682. COALESCE(ROUND(SUM(`quota`)/1048576), 0) as `quota`
  683. FROM `mailbox`
  684. WHERE `domain` = :domain");
  685. $stmt->execute(array(':domain' => $domain));
  686. $MailboxData = $stmt->fetch(PDO::FETCH_ASSOC);
  687. }
  688. catch(PDOException $e) {
  689. $_SESSION['return'] = array(
  690. 'type' => 'danger',
  691. 'msg' => 'MySQL: '.$e
  692. );
  693. return false;
  694. }
  695. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  696. $_SESSION['return'] = array(
  697. 'type' => 'danger',
  698. 'msg' => sprintf($lang['danger']['access_denied'])
  699. );
  700. return false;
  701. }
  702. try {
  703. $stmt = $pdo->prepare("SELECT `local_part` FROM `mailbox` WHERE `local_part` = :local_part and `domain`= :domain");
  704. $stmt->execute(array(':local_part' => $local_part, ':domain' => $domain));
  705. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  706. }
  707. catch(PDOException $e) {
  708. $_SESSION['return'] = array(
  709. 'type' => 'danger',
  710. 'msg' => 'MySQL: '.$e
  711. );
  712. return false;
  713. }
  714. if ($num_results != 0) {
  715. $_SESSION['return'] = array(
  716. 'type' => 'danger',
  717. 'msg' => sprintf($lang['danger']['object_exists'], htmlspecialchars($username))
  718. );
  719. return false;
  720. }
  721. try {
  722. $stmt = $pdo->prepare("SELECT `address` FROM `alias` WHERE address= :username");
  723. $stmt->execute(array(':username' => $username));
  724. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  725. }
  726. catch(PDOException $e) {
  727. $_SESSION['return'] = array(
  728. 'type' => 'danger',
  729. 'msg' => 'MySQL: '.$e
  730. );
  731. return false;
  732. }
  733. if ($num_results != 0) {
  734. $_SESSION['return'] = array(
  735. 'type' => 'danger',
  736. 'msg' => sprintf($lang['danger']['is_alias'], htmlspecialchars($username))
  737. );
  738. return false;
  739. }
  740. try {
  741. $stmt = $pdo->prepare("SELECT `address` FROM `spamalias` WHERE `address`= :username");
  742. $stmt->execute(array(':username' => $username));
  743. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  744. }
  745. catch(PDOException $e) {
  746. $_SESSION['return'] = array(
  747. 'type' => 'danger',
  748. 'msg' => 'MySQL: '.$e
  749. );
  750. return false;
  751. }
  752. if ($num_results != 0) {
  753. $_SESSION['return'] = array(
  754. 'type' => 'danger',
  755. 'msg' => sprintf($lang['danger']['is_spam_alias'], htmlspecialchars($username))
  756. );
  757. return false;
  758. }
  759. if (!is_numeric($quota_m) || $quota_m == "0") {
  760. $_SESSION['return'] = array(
  761. 'type' => 'danger',
  762. 'msg' => sprintf($lang['danger']['quota_not_0_not_numeric'])
  763. );
  764. return false;
  765. }
  766. if (!empty($password) && !empty($password2)) {
  767. if ($password != $password2) {
  768. $_SESSION['return'] = array(
  769. 'type' => 'danger',
  770. 'msg' => sprintf($lang['danger']['password_mismatch'])
  771. );
  772. return false;
  773. }
  774. $password_hashed = hash_password($password);
  775. }
  776. else {
  777. $_SESSION['return'] = array(
  778. 'type' => 'danger',
  779. 'msg' => sprintf($lang['danger']['password_empty'])
  780. );
  781. return false;
  782. }
  783. if ($MailboxData['count'] >= $DomainData['mailboxes']) {
  784. $_SESSION['return'] = array(
  785. 'type' => 'danger',
  786. 'msg' => sprintf($lang['danger']['max_mailbox_exceeded'], $MailboxData['count'], $DomainData['mailboxes'])
  787. );
  788. return false;
  789. }
  790. try {
  791. $stmt = $pdo->prepare("SELECT `domain` FROM `domain` WHERE `domain`= :domain");
  792. $stmt->execute(array(':domain' => $domain));
  793. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  794. }
  795. catch(PDOException $e) {
  796. $_SESSION['return'] = array(
  797. 'type' => 'danger',
  798. 'msg' => 'MySQL: '.$e
  799. );
  800. return false;
  801. }
  802. if ($num_results == 0) {
  803. $_SESSION['return'] = array(
  804. 'type' => 'danger',
  805. 'msg' => $lang['danger']['domain_not_found']
  806. );
  807. return false;
  808. }
  809. if ($quota_m > $DomainData['maxquota']) {
  810. $_SESSION['return'] = array(
  811. 'type' => 'danger',
  812. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeded'], $DomainData['maxquota'])
  813. );
  814. return false;
  815. }
  816. if (($MailboxData['quota'] + $quota_m) > $DomainData['quota']) {
  817. $quota_left_m = ($DomainData['quota'] - $MailboxData['quota']);
  818. $_SESSION['return'] = array(
  819. 'type' => 'danger',
  820. 'msg' => sprintf($lang['danger']['mailbox_quota_left_exceeded'], $quota_left_m)
  821. );
  822. return false;
  823. }
  824. try {
  825. $stmt = $pdo->prepare("INSERT INTO `mailbox` (`username`, `password`, `name`, `maildir`, `quota`, `local_part`, `domain`, `created`, `modified`, `active`)
  826. VALUES (:username, :password_hashed, :name, :maildir, :quota_b, :local_part, :domain, :created, :modified, :active)");
  827. $stmt->execute(array(
  828. ':username' => $username,
  829. ':password_hashed' => $password_hashed,
  830. ':name' => $name,
  831. ':maildir' => $maildir,
  832. ':quota_b' => $quota_b,
  833. ':local_part' => $local_part,
  834. ':domain' => $domain,
  835. ':created' => date('Y-m-d H:i:s'),
  836. ':modified' => date('Y-m-d H:i:s'),
  837. ':active' => $active
  838. ));
  839. $stmt = $pdo->prepare("INSERT INTO `quota2` (`username`, `bytes`, `messages`)
  840. VALUES (:username, '0', '0')");
  841. $stmt->execute(array(':username' => $username));
  842. $stmt = $pdo->prepare("INSERT INTO `alias` (`address`, `goto`, `domain`, `created`, `modified`, `active`)
  843. VALUES (:username1, :username2, :domain, :created, :modified, :active)");
  844. $stmt->execute(array(
  845. ':username1' => $username,
  846. ':username2' => $username,
  847. ':domain' => $domain,
  848. ':created' => date('Y-m-d H:i:s'),
  849. ':modified' => date('Y-m-d H:i:s'),
  850. ':active' => $active
  851. ));
  852. $_SESSION['return'] = array(
  853. 'type' => 'success',
  854. 'msg' => sprintf($lang['success']['mailbox_added'], htmlspecialchars($username))
  855. );
  856. }
  857. catch (PDOException $e) {
  858. $_SESSION['return'] = array(
  859. 'type' => 'danger',
  860. 'msg' => 'MySQL: '.$e
  861. );
  862. return false;
  863. }
  864. }
  865. function mailbox_edit_alias($postarray) {
  866. global $lang;
  867. global $pdo;
  868. $address = $postarray['address'];
  869. $domain = idn_to_ascii(substr(strstr($address, '@'), 1));
  870. $local_part = strstr($address, '@', true);
  871. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  872. $_SESSION['return'] = array(
  873. 'type' => 'danger',
  874. 'msg' => sprintf($lang['danger']['access_denied'])
  875. );
  876. return false;
  877. }
  878. if (empty($postarray['goto'])) {
  879. $_SESSION['return'] = array(
  880. 'type' => 'danger',
  881. 'msg' => sprintf($lang['danger']['goto_empty'])
  882. );
  883. return false;
  884. }
  885. $gotos = array_map('trim', preg_split( "/( |,|;|\n)/", $postarray['goto']));
  886. foreach ($gotos as &$goto) {
  887. if (empty($goto)) {
  888. continue;
  889. }
  890. if (!filter_var($goto, FILTER_VALIDATE_EMAIL)) {
  891. $_SESSION['return'] = array(
  892. 'type' => 'danger',
  893. 'msg' =>sprintf($lang['danger']['goto_invalid'])
  894. );
  895. return false;
  896. }
  897. if ($goto == $address) {
  898. $_SESSION['return'] = array(
  899. 'type' => 'danger',
  900. 'msg' => sprintf($lang['danger']['alias_goto_identical'])
  901. );
  902. return false;
  903. }
  904. }
  905. $gotos = array_filter($gotos);
  906. $goto = implode(",", $gotos);
  907. isset($postarray['active']) ? $active = '1' : $active = '0';
  908. if ((!filter_var($address, FILTER_VALIDATE_EMAIL) === true) && !empty($local_part)) {
  909. $_SESSION['return'] = array(
  910. 'type' => 'danger',
  911. 'msg' => sprintf($lang['danger']['alias_invalid'])
  912. );
  913. return false;
  914. }
  915. try {
  916. $stmt = $pdo->prepare("UPDATE `alias` SET `goto` = :goto, `active`= :active WHERE `address` = :address");
  917. $stmt->execute(array(
  918. ':goto' => $goto,
  919. ':active' => $active,
  920. ':address' => $address
  921. ));
  922. $_SESSION['return'] = array(
  923. 'type' => 'success',
  924. 'msg' => sprintf($lang['success']['alias_modified'], htmlspecialchars($address))
  925. );
  926. }
  927. catch (PDOException $e) {
  928. $_SESSION['return'] = array(
  929. 'type' => 'danger',
  930. 'msg' => 'MySQL: '.$e
  931. );
  932. return false;
  933. }
  934. }
  935. function mailbox_edit_domain($postarray) {
  936. global $lang;
  937. global $pdo;
  938. $domain = $postarray['domain'];
  939. $description = $postarray['description'];
  940. $aliases = filter_var($postarray['aliases'], FILTER_SANITIZE_NUMBER_FLOAT);
  941. $mailboxes = filter_var($postarray['mailboxes'], FILTER_SANITIZE_NUMBER_FLOAT);
  942. $maxquota = filter_var($postarray['maxquota'], FILTER_SANITIZE_NUMBER_FLOAT);
  943. $quota = filter_var($postarray['quota'], FILTER_SANITIZE_NUMBER_FLOAT);
  944. isset($postarray['relay_all_recipients']) ? $relay_all_recipients = '1' : $relay_all_recipients = '0';
  945. isset($postarray['backupmx']) ? $backupmx = '1' : $backupmx = '0';
  946. isset($postarray['relay_all_recipients']) ? $backupmx = '1' : true;
  947. isset($postarray['active']) ? $active = '1' : $active = '0';
  948. try {
  949. $stmt = $pdo->prepare("SELECT
  950. COUNT(*) AS count,
  951. MAX(COALESCE(ROUND(`quota`/1048576), 0)) AS `maxquota`,
  952. COALESCE(ROUND(SUM(`quota`)/1048576), 0) AS `quota`
  953. FROM `mailbox`
  954. WHERE domain= :domain");
  955. $stmt->execute(array(':domain' => $domain));
  956. $MailboxData = $stmt->fetch(PDO::FETCH_ASSOC);
  957. }
  958. catch(PDOException $e) {
  959. $_SESSION['return'] = array(
  960. 'type' => 'danger',
  961. 'msg' => 'MySQL: '.$e
  962. );
  963. return false;
  964. }
  965. try {
  966. $stmt = $pdo->prepare("SELECT COUNT(*) AS `count` FROM `alias`
  967. WHERE domain = :domain
  968. AND address NOT IN (
  969. SELECT `username` FROM `mailbox`
  970. )");
  971. $stmt->execute(array(':domain' => $domain));
  972. $AliasData = $stmt->fetch(PDO::FETCH_ASSOC);
  973. }
  974. catch(PDOException $e) {
  975. $_SESSION['return'] = array(
  976. 'type' => 'danger',
  977. 'msg' => 'MySQL: '.$e
  978. );
  979. return false;
  980. }
  981. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  982. $_SESSION['return'] = array(
  983. 'type' => 'danger',
  984. 'msg' => sprintf($lang['danger']['access_denied'])
  985. );
  986. return false;
  987. }
  988. if ($maxquota > $quota) {
  989. $_SESSION['return'] = array(
  990. 'type' => 'danger',
  991. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeds_domain_quota'])
  992. );
  993. return false;
  994. }
  995. if ($MailboxData['maxquota'] > $maxquota) {
  996. $_SESSION['return'] = array(
  997. 'type' => 'danger',
  998. 'msg' => sprintf($lang['danger']['max_quota_in_use'], $MailboxData['maxquota'])
  999. );
  1000. return false;
  1001. }
  1002. if ($MailboxData['quota'] > $quota) {
  1003. $_SESSION['return'] = array(
  1004. 'type' => 'danger',
  1005. 'msg' => sprintf($lang['danger']['domain_quota_m_in_use'], $MailboxData['quota'])
  1006. );
  1007. return false;
  1008. }
  1009. if ($MailboxData['count'] > $mailboxes) {
  1010. $_SESSION['return'] = array(
  1011. 'type' => 'danger',
  1012. 'msg' => sprintf($lang['danger']['mailboxes_in_use'], $MailboxData['count'])
  1013. );
  1014. return false;
  1015. }
  1016. if ($AliasData['count'] > $aliases) {
  1017. $_SESSION['return'] = array(
  1018. 'type' => 'danger',
  1019. 'msg' => sprintf($lang['danger']['aliases_in_use'], $AliasData['count'])
  1020. );
  1021. return false;
  1022. }
  1023. if (!is_valid_domain_name($domain)) {
  1024. $_SESSION['return'] = array(
  1025. 'type' => 'danger',
  1026. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1027. );
  1028. return false;
  1029. }
  1030. try {
  1031. $stmt = $pdo->prepare("UPDATE `domain` SET
  1032. `modified`= :modified,
  1033. `relay_all_recipients` = :relay_all_recipients,
  1034. `backupmx` = :backupmx,
  1035. `active` = :active,
  1036. `quota` = :quota,
  1037. `maxquota` = :maxquota,
  1038. `mailboxes` = :mailboxes,
  1039. `aliases` = :aliases,
  1040. `description` = :description
  1041. WHERE `domain` = :domain");
  1042. $stmt->execute(array(
  1043. ':relay_all_recipients' => $relay_all_recipients,
  1044. ':backupmx' => $backupmx,
  1045. ':active' => $active,
  1046. ':quota' => $quota,
  1047. ':maxquota' => $maxquota,
  1048. ':mailboxes' => $mailboxes,
  1049. ':aliases' => $aliases,
  1050. ':modified' => date('Y-m-d H:i:s'),
  1051. ':description' => $description,
  1052. ':domain' => $domain
  1053. ));
  1054. $_SESSION['return'] = array(
  1055. 'type' => 'success',
  1056. 'msg' => sprintf($lang['success']['domain_modified'], htmlspecialchars($domain))
  1057. );
  1058. }
  1059. catch (PDOException $e) {
  1060. $_SESSION['return'] = array(
  1061. 'type' => 'danger',
  1062. 'msg' => 'MySQL: '.$e
  1063. );
  1064. return false;
  1065. }
  1066. }
  1067. function edit_domain_admin($postarray) {
  1068. global $lang;
  1069. global $pdo;
  1070. $username = $postarray['username'];
  1071. $password = $postarray['password'];
  1072. $password2 = $postarray['password2'];
  1073. isset($postarray['active']) ? $active = '1' : $active = '0';
  1074. if ($_SESSION['mailcow_cc_role'] != "admin") {
  1075. $_SESSION['return'] = array(
  1076. 'type' => 'danger',
  1077. 'msg' => sprintf($lang['danger']['access_denied'])
  1078. );
  1079. return false;
  1080. }
  1081. foreach ($postarray['domain'] as $domain) {
  1082. if (!is_valid_domain_name($domain)) {
  1083. $_SESSION['return'] = array(
  1084. 'type' => 'danger',
  1085. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1086. );
  1087. return false;
  1088. }
  1089. }
  1090. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
  1091. $_SESSION['return'] = array(
  1092. 'type' => 'danger',
  1093. 'msg' => sprintf($lang['danger']['username_invalid'])
  1094. );
  1095. return false;
  1096. }
  1097. try {
  1098. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
  1099. $stmt->execute(array(
  1100. ':username' => $username,
  1101. ));
  1102. }
  1103. catch (PDOException $e) {
  1104. $_SESSION['return'] = array(
  1105. 'type' => 'danger',
  1106. 'msg' => 'MySQL: '.$e
  1107. );
  1108. return false;
  1109. }
  1110. foreach ($postarray['domain'] as $domain) {
  1111. try {
  1112. $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
  1113. VALUES (:username, :domain, :created, :active)");
  1114. $stmt->execute(array(
  1115. ':username' => $username,
  1116. ':domain' => $domain,
  1117. ':created' => date('Y-m-d H:i:s'),
  1118. ':active' => $active
  1119. ));
  1120. }
  1121. catch (PDOException $e) {
  1122. $_SESSION['return'] = array(
  1123. 'type' => 'danger',
  1124. 'msg' => 'MySQL: '.$e
  1125. );
  1126. return false;
  1127. }
  1128. }
  1129. if (!empty($password) && !empty($password2)) {
  1130. if ($password != $password2) {
  1131. $_SESSION['return'] = array(
  1132. 'type' => 'danger',
  1133. 'msg' => sprintf($lang['danger']['password_mismatch'])
  1134. );
  1135. return false;
  1136. }
  1137. $password_hashed = hash_password($password);
  1138. try {
  1139. $stmt = $pdo->prepare("UPDATE `admin` SET `modified` = :modified, `active` = :active, `password` = :password_hashed WHERE `username` = :username");
  1140. $stmt->execute(array(
  1141. ':password_hashed' => $password_hashed,
  1142. ':username' => $username,
  1143. ':modified' => date('Y-m-d H:i:s'),
  1144. ':active' => $active
  1145. ));
  1146. }
  1147. catch (PDOException $e) {
  1148. $_SESSION['return'] = array(
  1149. 'type' => 'danger',
  1150. 'msg' => 'MySQL: '.$e
  1151. );
  1152. return false;
  1153. }
  1154. }
  1155. else {
  1156. try {
  1157. $stmt = $pdo->prepare("UPDATE `admin` SET `modified` = :modified, `active` = :active WHERE `username` = :username");
  1158. $stmt->execute(array(
  1159. ':username' => $username,
  1160. ':modified' => date('Y-m-d H:i:s'),
  1161. ':active' => $active
  1162. ));
  1163. }
  1164. catch (PDOException $e) {
  1165. $_SESSION['return'] = array(
  1166. 'type' => 'danger',
  1167. 'msg' => 'MySQL: '.$e
  1168. );
  1169. return false;
  1170. }
  1171. }
  1172. $_SESSION['return'] = array(
  1173. 'type' => 'success',
  1174. 'msg' => sprintf($lang['success']['domain_admin_modified'], htmlspecialchars($username))
  1175. );
  1176. }
  1177. function mailbox_edit_mailbox($postarray) {
  1178. global $lang;
  1179. global $pdo;
  1180. isset($postarray['active']) ? $active = '1' : $active = '0';
  1181. if (!filter_var($postarray['username'], FILTER_VALIDATE_EMAIL)) {
  1182. $_SESSION['return'] = array(
  1183. 'type' => 'danger',
  1184. 'msg' => sprintf($lang['danger']['username_invalid'])
  1185. );
  1186. return false;
  1187. }
  1188. $quota_m = $postarray['quota'];
  1189. $quota_b = $quota_m*1048576;
  1190. $username = $postarray['username'];
  1191. $name = $postarray['name'];
  1192. $password = $postarray['password'];
  1193. $password2 = $postarray['password2'];
  1194. try {
  1195. $stmt = $pdo->prepare("SELECT `domain`
  1196. FROM `mailbox`
  1197. WHERE username = :username");
  1198. $stmt->execute(array(':username' => $username));
  1199. $MailboxData1 = $stmt->fetch(PDO::FETCH_ASSOC);
  1200. $stmt = $pdo->prepare("SELECT
  1201. COALESCE(ROUND(SUM(`quota`)/1048576), 0) as `quota_m_now`
  1202. FROM `mailbox`
  1203. WHERE `username` = :username");
  1204. $stmt->execute(array(':username' => $username));
  1205. $MailboxData2 = $stmt->fetch(PDO::FETCH_ASSOC);
  1206. $stmt = $pdo->prepare("SELECT
  1207. COALESCE(ROUND(SUM(`quota`)/1048576), 0) as `quota_m_in_use`
  1208. FROM `mailbox`
  1209. WHERE `domain` = :domain");
  1210. $stmt->execute(array(':domain' => $MailboxData1['domain']));
  1211. $MailboxData3 = $stmt->fetch(PDO::FETCH_ASSOC);
  1212. $stmt = $pdo->prepare("SELECT `quota`, `maxquota`
  1213. FROM `domain`
  1214. WHERE `domain` = :domain");
  1215. $stmt->execute(array(':domain' => $MailboxData1['domain']));
  1216. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  1217. }
  1218. catch(PDOException $e) {
  1219. $_SESSION['return'] = array(
  1220. 'type' => 'danger',
  1221. 'msg' => 'MySQL: '.$e
  1222. );
  1223. return false;
  1224. }
  1225. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $MailboxData1['domain'])) {
  1226. $_SESSION['return'] = array(
  1227. 'type' => 'danger',
  1228. 'msg' => sprintf($lang['danger']['access_denied'])
  1229. );
  1230. return false;
  1231. }
  1232. if (!is_numeric($quota_m) || $quota_m == "0") {
  1233. $_SESSION['return'] = array(
  1234. 'type' => 'danger',
  1235. 'msg' => sprintf($lang['danger']['quota_not_0_not_numeric'], htmlspecialchars($quota_m))
  1236. );
  1237. return false;
  1238. }
  1239. if ($quota_m > $DomainData['maxquota']) {
  1240. $_SESSION['return'] = array(
  1241. 'type' => 'danger',
  1242. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeded'], $DomainData['maxquota'])
  1243. );
  1244. return false;
  1245. }
  1246. if (($MailboxData3['quota_m_in_use'] - $MailboxData2['quota_m_now'] + $quota_m) > $DomainData['quota']) {
  1247. $quota_left_m = ($DomainData['quota'] - $MailboxData3['quota_m_in_use'] + $MailboxData2['quota_m_now']);
  1248. $_SESSION['return'] = array(
  1249. 'type' => 'danger',
  1250. 'msg' => sprintf($lang['danger']['mailbox_quota_left_exceeded'], $quota_left_m)
  1251. );
  1252. return false;
  1253. }
  1254. try {
  1255. $stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` = :username");
  1256. $stmt->execute(array(
  1257. ':username' => $username
  1258. ));
  1259. }
  1260. catch (PDOException $e) {
  1261. $_SESSION['return'] = array(
  1262. 'type' => 'danger',
  1263. 'msg' => 'MySQL: '.$e
  1264. );
  1265. return false;
  1266. }
  1267. if (isset($postarray['sender_acl']) && is_array($postarray['sender_acl'])) {
  1268. foreach ($postarray['sender_acl'] as $sender_acl) {
  1269. if (!filter_var($sender_acl, FILTER_VALIDATE_EMAIL) &&
  1270. !is_valid_domain_name(str_replace('@', '', $sender_acl))) {
  1271. $_SESSION['return'] = array(
  1272. 'type' => 'danger',
  1273. 'msg' => sprintf($lang['danger']['sender_acl_invalid'])
  1274. );
  1275. return false;
  1276. }
  1277. }
  1278. foreach ($postarray['sender_acl'] as $sender_acl) {
  1279. try {
  1280. $stmt = $pdo->prepare("INSERT INTO `sender_acl` (`send_as`, `logged_in_as`)
  1281. VALUES (:sender_acl, :username)");
  1282. $stmt->execute(array(
  1283. ':sender_acl' => $sender_acl,
  1284. ':username' => $username
  1285. ));
  1286. }
  1287. catch (PDOException $e) {
  1288. $_SESSION['return'] = array(
  1289. 'type' => 'danger',
  1290. 'msg' => 'MySQL: '.$e
  1291. );
  1292. return false;
  1293. }
  1294. }
  1295. }
  1296. if (!empty($password) && !empty($password2)) {
  1297. if ($password != $password2) {
  1298. $_SESSION['return'] = array(
  1299. 'type' => 'danger',
  1300. 'msg' => sprintf($lang['danger']['password_mismatch'])
  1301. );
  1302. return false;
  1303. }
  1304. $password_hashed = hash_password($password);
  1305. try {
  1306. $stmt = $pdo->prepare("UPDATE `alias` SET
  1307. `modified` = :modified,
  1308. `active` = :active
  1309. WHERE `address` = :address");
  1310. $stmt->execute(array(
  1311. ':address' => $username,
  1312. ':modified' => date('Y-m-d H:i:s'),
  1313. ':active' => $active
  1314. ));
  1315. $stmt = $pdo->prepare("UPDATE `mailbox` SET
  1316. `modified` = :modified,
  1317. `active` = :active,
  1318. `password` = :password_hashed,
  1319. `name`= :name,
  1320. `quota` = :quota_b
  1321. WHERE `username` = :username");
  1322. $stmt->execute(array(
  1323. ':modified' => date('Y-m-d H:i:s'),
  1324. ':password_hashed' => $password_hashed,
  1325. ':active' => $active,
  1326. ':name' => $name,
  1327. ':quota_b' => $quota_b,
  1328. ':username' => $username
  1329. ));
  1330. $_SESSION['return'] = array(
  1331. 'type' => 'success',
  1332. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  1333. );
  1334. return true;
  1335. }
  1336. catch (PDOException $e) {
  1337. $_SESSION['return'] = array(
  1338. 'type' => 'danger',
  1339. 'msg' => 'MySQL: '.$e
  1340. );
  1341. return false;
  1342. }
  1343. }
  1344. try {
  1345. $stmt = $pdo->prepare("UPDATE `alias` SET
  1346. `modified` = :modified,
  1347. `active` = :active
  1348. WHERE `address` = :address");
  1349. $stmt->execute(array(
  1350. ':address' => $username,
  1351. ':modified' => date('Y-m-d H:i:s'),
  1352. ':active' => $active
  1353. ));
  1354. $stmt = $pdo->prepare("UPDATE `mailbox` SET
  1355. `modified` = :modified,
  1356. `active` = :active,
  1357. `name`= :name,
  1358. `quota` = :quota_b
  1359. WHERE `username` = :username");
  1360. $stmt->execute(array(
  1361. ':active' => $active,
  1362. ':modified' => date('Y-m-d H:i:s'),
  1363. ':name' => $name,
  1364. ':quota_b' => $quota_b,
  1365. ':username' => $username
  1366. ));
  1367. $_SESSION['return'] = array(
  1368. 'type' => 'success',
  1369. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  1370. );
  1371. return true;
  1372. }
  1373. catch (PDOException $e) {
  1374. $_SESSION['return'] = array(
  1375. 'type' => 'danger',
  1376. 'msg' => 'MySQL: '.$e
  1377. );
  1378. return false;
  1379. }
  1380. }
  1381. function mailbox_delete_domain($postarray) {
  1382. global $lang;
  1383. global $pdo;
  1384. $domain = $postarray['domain'];
  1385. if ($_SESSION['mailcow_cc_role'] != "admin") {
  1386. $_SESSION['return'] = array(
  1387. 'type' => 'danger',
  1388. 'msg' => sprintf($lang['danger']['access_denied'])
  1389. );
  1390. return false;
  1391. }
  1392. if (!is_valid_domain_name($domain)) {
  1393. $_SESSION['return'] = array(
  1394. 'type' => 'danger',
  1395. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1396. );
  1397. return false;
  1398. }
  1399. $domain = strtolower(trim($domain));
  1400. try {
  1401. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox`
  1402. WHERE `domain` = :domain");
  1403. $stmt->execute(array(':domain' => $domain));
  1404. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  1405. }
  1406. catch(PDOException $e) {
  1407. $_SESSION['return'] = array(
  1408. 'type' => 'danger',
  1409. 'msg' => 'MySQL: '.$e
  1410. );
  1411. return false;
  1412. }
  1413. if ($num_results != 0 || !empty($num_results)) {
  1414. $_SESSION['return'] = array(
  1415. 'type' => 'danger',
  1416. 'msg' => sprintf($lang['danger']['domain_not_empty'])
  1417. );
  1418. return false;
  1419. }
  1420. try {
  1421. $stmt = $pdo->prepare("DELETE FROM `domain` WHERE `domain` = :domain");
  1422. $stmt->execute(array(
  1423. ':domain' => $domain,
  1424. ));
  1425. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `domain` = :domain");
  1426. $stmt->execute(array(
  1427. ':domain' => $domain,
  1428. ));
  1429. $stmt = $pdo->prepare("DELETE FROM `alias` WHERE `domain` = :domain");
  1430. $stmt->execute(array(
  1431. ':domain' => $domain,
  1432. ));
  1433. $stmt = $pdo->prepare("DELETE FROM `alias_domain` WHERE `target_domain` = :domain");
  1434. $stmt->execute(array(
  1435. ':domain' => $domain,
  1436. ));
  1437. $stmt = $pdo->prepare("DELETE FROM `mailbox` WHERE `domain` = :domain");
  1438. $stmt->execute(array(
  1439. ':domain' => $domain,
  1440. ));
  1441. $stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` LIKE :domain");
  1442. $stmt->execute(array(
  1443. ':domain' => '%@'.$domain,
  1444. ));
  1445. $stmt = $pdo->prepare("DELETE FROM `quota2` WHERE `username` = :domain");
  1446. $stmt->execute(array(
  1447. ':domain' => '%@'.$domain,
  1448. ));
  1449. $stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `address` = :domain");
  1450. $stmt->execute(array(
  1451. ':domain' => '%@'.$domain,
  1452. ));
  1453. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :domain");
  1454. $stmt->execute(array(
  1455. ':domain' => '%@'.$domain,
  1456. ));
  1457. }
  1458. catch (PDOException $e) {
  1459. $_SESSION['return'] = array(
  1460. 'type' => 'danger',
  1461. 'msg' => 'MySQL: '.$e
  1462. );
  1463. return false;
  1464. }
  1465. $_SESSION['return'] = array(
  1466. 'type' => 'success',
  1467. 'msg' => sprintf($lang['success']['domain_removed'], htmlspecialchars($domain))
  1468. );
  1469. return true;
  1470. }
  1471. function mailbox_delete_alias($postarray) {
  1472. global $lang;
  1473. global $pdo;
  1474. $address = $postarray['address'];
  1475. $local_part = strstr($address, '@', true);
  1476. $domain = substr(strrchr($address, "@"), 1);
  1477. try {
  1478. $stmt = $pdo->prepare("SELECT `goto` FROM `alias` WHERE `address` = :address");
  1479. $stmt->execute(array(':address' => $address));
  1480. $gotos = $stmt->fetch(PDO::FETCH_ASSOC);
  1481. }
  1482. catch(PDOException $e) {
  1483. $_SESSION['return'] = array(
  1484. 'type' => 'danger',
  1485. 'msg' => 'MySQL: '.$e
  1486. );
  1487. return false;
  1488. }
  1489. $goto_array = explode(',', $gotos['goto']);
  1490. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  1491. $_SESSION['return'] = array(
  1492. 'type' => 'danger',
  1493. 'msg' => sprintf($lang['danger']['access_denied'])
  1494. );
  1495. return false;
  1496. }
  1497. try {
  1498. $stmt = $pdo->prepare("DELETE FROM `alias` WHERE `address` = :address AND `address` NOT IN (SELECT `username` FROM `mailbox`)");
  1499. $stmt->execute(array(
  1500. ':address' => $address
  1501. ));
  1502. }
  1503. catch (PDOException $e) {
  1504. $_SESSION['return'] = array(
  1505. 'type' => 'danger',
  1506. 'msg' => 'MySQL: '.$e
  1507. );
  1508. return false;
  1509. }
  1510. $_SESSION['return'] = array(
  1511. 'type' => 'success',
  1512. 'msg' => sprintf($lang['success']['alias_removed'], htmlspecialchars($address))
  1513. );
  1514. }
  1515. function mailbox_delete_alias_domain($postarray) {
  1516. global $lang;
  1517. global $pdo;
  1518. if (!is_valid_domain_name($postarray['alias_domain'])) {
  1519. $_SESSION['return'] = array(
  1520. 'type' => 'danger',
  1521. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1522. );
  1523. return false;
  1524. }
  1525. $alias_domain = $postarray['alias_domain'];
  1526. try {
  1527. $stmt = $pdo->prepare("SELECT `target_domain` FROM `alias_domain`
  1528. WHERE `alias_domain`= :alias_domain");
  1529. $stmt->execute(array(':alias_domain' => $alias_domain));
  1530. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  1531. }
  1532. catch(PDOException $e) {
  1533. $_SESSION['return'] = array(
  1534. 'type' => 'danger',
  1535. 'msg' => 'MySQL: '.$e
  1536. );
  1537. return false;
  1538. }
  1539. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $DomainData['target_domain'])) {
  1540. $_SESSION['return'] = array(
  1541. 'type' => 'danger',
  1542. 'msg' => sprintf($lang['danger']['access_denied'])
  1543. );
  1544. return false;
  1545. }
  1546. try {
  1547. $stmt = $pdo->prepare("DELETE FROM `alias_domain` WHERE `alias_domain` = :alias_domain");
  1548. $stmt->execute(array(
  1549. ':alias_domain' => $alias_domain,
  1550. ));
  1551. }
  1552. catch (PDOException $e) {
  1553. $_SESSION['return'] = array(
  1554. 'type' => 'danger',
  1555. 'msg' => 'MySQL: '.$e
  1556. );
  1557. return false;
  1558. }
  1559. $_SESSION['return'] = array(
  1560. 'type' => 'success',
  1561. 'msg' => sprintf($lang['success']['alias_domain_removed'], htmlspecialchars($alias_domain))
  1562. );
  1563. }
  1564. function mailbox_delete_mailbox($postarray) {
  1565. global $lang;
  1566. global $pdo;
  1567. $domain = substr(strrchr($postarray['username'], "@"), 1);
  1568. $username = $postarray['username'];
  1569. if (!filter_var($postarray['username'], FILTER_VALIDATE_EMAIL)) {
  1570. $_SESSION['return'] = array(
  1571. 'type' => 'danger',
  1572. 'msg' => sprintf($lang['danger']['access_denied'])
  1573. );
  1574. return false;
  1575. }
  1576. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  1577. $_SESSION['return'] = array(
  1578. 'type' => 'danger',
  1579. 'msg' => sprintf($lang['danger']['access_denied'])
  1580. );
  1581. return false;
  1582. }
  1583. try {
  1584. $stmt = $pdo->prepare("DELETE FROM `alias` WHERE `goto` = :username");
  1585. $stmt->execute(array(
  1586. ':username' => $username
  1587. ));
  1588. $stmt = $pdo->prepare("DELETE FROM `quota2` WHERE `username` = :username");
  1589. $stmt->execute(array(
  1590. ':username' => $username
  1591. ));
  1592. $stmt = $pdo->prepare("DELETE FROM `mailbox` WHERE `username` = :username");
  1593. $stmt->execute(array(
  1594. ':username' => $username
  1595. ));
  1596. $stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` = :username");
  1597. $stmt->execute(array(
  1598. ':username' => $username
  1599. ));
  1600. $stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `goto` = :username");
  1601. $stmt->execute(array(
  1602. ':username' => $username
  1603. ));
  1604. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :username");
  1605. $stmt->execute(array(
  1606. ':username' => $username
  1607. ));
  1608. $stmt = $pdo->prepare("SELECT `address`, `goto` FROM `alias`
  1609. WHERE `goto` LIKE :username");
  1610. $stmt->execute(array(':username' => '%'.$username.'%'));
  1611. $GotoData = $stmt->fetchAll(PDO::FETCH_ASSOC);
  1612. foreach ($GotoData as $gotos) {
  1613. $goto_exploded = explode(',', $gotos['goto']);
  1614. if (($key = array_search($username, $goto_exploded)) !== false) {
  1615. unset($goto_exploded[$key]);
  1616. }
  1617. $gotos_rebuild = implode(',', $goto_exploded);
  1618. $stmt = $pdo->prepare("UPDATE `alias` SET `goto` = :goto WHERE `address` = :address");
  1619. $stmt->execute(array(
  1620. ':goto' => $gotos_rebuild,
  1621. ':address' => $gotos['address']
  1622. ));
  1623. }
  1624. }
  1625. catch (PDOException $e) {
  1626. $_SESSION['return'] = array(
  1627. 'type' => 'danger',
  1628. 'msg' => 'MySQL: '.$e
  1629. );
  1630. return false;
  1631. }
  1632. $_SESSION['return'] = array(
  1633. 'type' => 'success',
  1634. 'msg' => sprintf($lang['success']['mailbox_removed'], htmlspecialchars($username))
  1635. );
  1636. }
  1637. function set_admin_account($postarray) {
  1638. global $lang;
  1639. global $pdo;
  1640. if ($_SESSION['mailcow_cc_role'] != "admin") {
  1641. $_SESSION['return'] = array(
  1642. 'type' => 'danger',
  1643. 'msg' => sprintf($lang['danger']['access_denied'])
  1644. );
  1645. return false;
  1646. }
  1647. $name = $postarray['admin_user'];
  1648. $name_now = $postarray['admin_user_now'];
  1649. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $name)) || empty ($name)) {
  1650. $_SESSION['return'] = array(
  1651. 'type' => 'danger',
  1652. 'msg' => sprintf($lang['danger']['username_invalid'])
  1653. );
  1654. return false;
  1655. }
  1656. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $name_now)) || empty ($name_now)) {
  1657. $_SESSION['return'] = array(
  1658. 'type' => 'danger',
  1659. 'msg' => sprintf($lang['danger']['username_invalid'])
  1660. );
  1661. return false;
  1662. }
  1663. if (!empty($postarray['admin_pass']) && !empty($postarray['admin_pass2'])) {
  1664. if ($postarray['admin_pass'] != $postarray['admin_pass2']) {
  1665. $_SESSION['return'] = array(
  1666. 'type' => 'danger',
  1667. 'msg' => sprintf($lang['danger']['password_mismatch'])
  1668. );
  1669. return false;
  1670. }
  1671. $password_hashed = hash_password($postarray['admin_pass']);
  1672. try {
  1673. $stmt = $pdo->prepare("UPDATE `admin` SET
  1674. `modified` = :modified,
  1675. `password` = :password_hashed,
  1676. `username` = :name
  1677. WHERE `username` = :username");
  1678. $stmt->execute(array(
  1679. ':password_hashed' => $password_hashed,
  1680. ':modified' => date('Y-m-d H:i:s'),
  1681. ':name' => $name,
  1682. ':username' => $name_now
  1683. ));
  1684. }
  1685. catch (PDOException $e) {
  1686. $_SESSION['return'] = array(
  1687. 'type' => 'danger',
  1688. 'msg' => 'MySQL: '.$e
  1689. );
  1690. return false;
  1691. }
  1692. }
  1693. else {
  1694. try {
  1695. $stmt = $pdo->prepare("UPDATE `admin` SET
  1696. `modified` = :modified,
  1697. `username` = :name
  1698. WHERE `username` = :name_now");
  1699. $stmt->execute(array(
  1700. ':name' => $name,
  1701. ':modified' => date('Y-m-d H:i:s'),
  1702. ':name_now' => $name_now
  1703. ));
  1704. }
  1705. catch (PDOException $e) {
  1706. $_SESSION['return'] = array(
  1707. 'type' => 'danger',
  1708. 'msg' => 'MySQL: '.$e
  1709. );
  1710. return false;
  1711. }
  1712. }
  1713. try {
  1714. $stmt = $pdo->prepare("UPDATE `domain_admins` SET
  1715. `domain` = :domain,
  1716. `username` = :name
  1717. WHERE `username` = :name_now");
  1718. $stmt->execute(array(
  1719. ':domain' => 'ALL',
  1720. ':name' => $name,
  1721. ':name_now' => $name_now
  1722. ));
  1723. }
  1724. catch (PDOException $e) {
  1725. $_SESSION['return'] = array(
  1726. 'type' => 'danger',
  1727. 'msg' => 'MySQL: '.$e
  1728. );
  1729. return false;
  1730. }
  1731. $_SESSION['return'] = array(
  1732. 'type' => 'success',
  1733. 'msg' => sprintf($lang['success']['admin_modified'])
  1734. );
  1735. }
  1736. function set_time_limited_aliases($postarray) {
  1737. global $lang;
  1738. global $pdo;
  1739. $username = $_SESSION['mailcow_cc_username'];
  1740. $domain = substr($username, strpos($username, '@'));
  1741. if (($_SESSION['mailcow_cc_role'] != "user" &&
  1742. $_SESSION['mailcow_cc_role'] != "domainadmin") ||
  1743. empty($username) ||
  1744. empty($domain)) {
  1745. $_SESSION['return'] = array(
  1746. 'type' => 'danger',
  1747. 'msg' => sprintf($lang['danger']['access_denied'])
  1748. );
  1749. return false;
  1750. }
  1751. switch ($postarray["trigger_set_time_limited_aliases"]) {
  1752. case "generate":
  1753. if (!is_numeric($postarray["validity"]) || $postarray["validity"] > 672) {
  1754. $_SESSION['return'] = array(
  1755. 'type' => 'danger',
  1756. 'msg' => sprintf($lang['danger']['validity_missing'])
  1757. );
  1758. return false;
  1759. }
  1760. $validity = strtotime("+".$postarray["validity"]." hour");
  1761. $letters = 'abcefghijklmnopqrstuvwxyz1234567890';
  1762. $random_name = substr(str_shuffle($letters), 0, 24);
  1763. try {
  1764. $stmt = $pdo->prepare("INSERT INTO `spamalias` (`address`, `goto`, `validity`) VALUES
  1765. (:address, :goto, :validity)");
  1766. $stmt->execute(array(
  1767. ':address' => $random_name.$domain,
  1768. ':goto' => $username,
  1769. ':validity' => $validity
  1770. ));
  1771. }
  1772. catch (PDOException $e) {
  1773. $_SESSION['return'] = array(
  1774. 'type' => 'danger',
  1775. 'msg' => 'MySQL: '.$e
  1776. );
  1777. return false;
  1778. }
  1779. $_SESSION['return'] = array(
  1780. 'type' => 'success',
  1781. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username))
  1782. );
  1783. break;
  1784. case "delete":
  1785. try {
  1786. $stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `goto` = :username");
  1787. $stmt->execute(array(
  1788. ':username' => $username
  1789. ));
  1790. }
  1791. catch (PDOException $e) {
  1792. $_SESSION['return'] = array(
  1793. 'type' => 'danger',
  1794. 'msg' => 'MySQL: '.$e
  1795. );
  1796. return false;
  1797. }
  1798. $_SESSION['return'] = array(
  1799. 'type' => 'success',
  1800. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username))
  1801. );
  1802. break;
  1803. case "extend":
  1804. try {
  1805. $stmt = $pdo->prepare("UPDATE `spamalias` SET `validity` = (`validity` + 3600)
  1806. WHERE `goto` = :username
  1807. AND `validity` >= :validity");
  1808. $stmt->execute(array(
  1809. ':username' => $username,
  1810. ':validity' => time(),
  1811. ));
  1812. }
  1813. catch (PDOException $e) {
  1814. $_SESSION['return'] = array(
  1815. 'type' => 'danger',
  1816. 'msg' => 'MySQL: '.$e
  1817. );
  1818. return false;
  1819. }
  1820. $_SESSION['return'] = array(
  1821. 'type' => 'success',
  1822. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username))
  1823. );
  1824. break;
  1825. }
  1826. }
  1827. function set_user_account($postarray) {
  1828. global $lang;
  1829. global $pdo;
  1830. $username = $_SESSION['mailcow_cc_username'];
  1831. $password_old = $postarray['user_old_pass'];
  1832. isset($postarray['togglePwNew']) ? $pwnew_active = '1' : $pwnew_active = '0';
  1833. if (isset($pwnew_active) && $pwnew_active == "1") {
  1834. $password_new = $postarray['user_new_pass'];
  1835. $password_new2 = $postarray['user_new_pass2'];
  1836. }
  1837. if (!check_login($username, $password_old) == "user") {
  1838. $_SESSION['return'] = array(
  1839. 'type' => 'danger',
  1840. 'msg' => sprintf($lang['danger']['access_denied'])
  1841. );
  1842. return false;
  1843. }
  1844. if ($_SESSION['mailcow_cc_role'] != "user" &&
  1845. $_SESSION['mailcow_cc_role'] != "domainadmin") {
  1846. $_SESSION['return'] = array(
  1847. 'type' => 'danger',
  1848. 'msg' => sprintf($lang['danger']['access_denied'])
  1849. );
  1850. return false;
  1851. }
  1852. if (isset($password_new) && isset($password_new2)) {
  1853. if (!empty($password_new2) && !empty($password_new)) {
  1854. if ($password_new2 != $password_new) {
  1855. $_SESSION['return'] = array(
  1856. 'type' => 'danger',
  1857. 'msg' => sprintf($lang['danger']['password_mismatch'])
  1858. );
  1859. return false;
  1860. }
  1861. if (strlen($password_new) < "6" ||
  1862. !preg_match('/[A-Za-z]/', $password_new) ||
  1863. !preg_match('/[0-9]/', $password_new)) {
  1864. $_SESSION['return'] = array(
  1865. 'type' => 'danger',
  1866. 'msg' => sprintf($lang['danger']['password_complexity'])
  1867. );
  1868. return false;
  1869. }
  1870. $password_hashed = hash_password($password_new);
  1871. try {
  1872. $stmt = $pdo->prepare("UPDATE `mailbox` SET `modified` = :modified, `password` = :password_hashed WHERE `username` = :username");
  1873. $stmt->execute(array(
  1874. ':password_hashed' => $password_hashed,
  1875. ':modified' => date('Y-m-d H:i:s'),
  1876. ':username' => $username
  1877. ));
  1878. }
  1879. catch (PDOException $e) {
  1880. $_SESSION['return'] = array(
  1881. 'type' => 'danger',
  1882. 'msg' => 'MySQL: '.$e
  1883. );
  1884. return false;
  1885. }
  1886. }
  1887. }
  1888. $_SESSION['return'] = array(
  1889. 'type' => 'success',
  1890. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  1891. );
  1892. }
  1893. function add_domain_admin($postarray) {
  1894. global $lang;
  1895. global $pdo;
  1896. $username = strtolower(trim($postarray['username']));
  1897. $password = $postarray['password'];
  1898. $password2 = $postarray['password2'];
  1899. isset($postarray['active']) ? $active = '1' : $active = '0';
  1900. if ($_SESSION['mailcow_cc_role'] != "admin") {
  1901. $_SESSION['return'] = array(
  1902. 'type' => 'danger',
  1903. 'msg' => sprintf($lang['danger']['access_denied'])
  1904. );
  1905. return false;
  1906. }
  1907. if (empty($postarray['domain'])) {
  1908. $_SESSION['return'] = array(
  1909. 'type' => 'danger',
  1910. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1911. );
  1912. return false;
  1913. }
  1914. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username)) || empty ($username)) {
  1915. $_SESSION['return'] = array(
  1916. 'type' => 'danger',
  1917. 'msg' => sprintf($lang['danger']['username_invalid'])
  1918. );
  1919. return false;
  1920. }
  1921. try {
  1922. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox`
  1923. WHERE `username` = :username");
  1924. $stmt->execute(array(':username' => $username));
  1925. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  1926. $stmt = $pdo->prepare("SELECT `username` FROM `admin`
  1927. WHERE `username` = :username");
  1928. $stmt->execute(array(':username' => $username));
  1929. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  1930. $stmt = $pdo->prepare("SELECT `username` FROM `domain_admins`
  1931. WHERE `username` = :username");
  1932. $stmt->execute(array(':username' => $username));
  1933. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  1934. }
  1935. catch(PDOException $e) {
  1936. $_SESSION['return'] = array(
  1937. 'type' => 'danger',
  1938. 'msg' => 'MySQL: '.$e
  1939. );
  1940. return false;
  1941. }
  1942. foreach ($num_results as $num_results_each) {
  1943. if ($num_results_each != 0) {
  1944. $_SESSION['return'] = array(
  1945. 'type' => 'danger',
  1946. 'msg' => sprintf($lang['danger']['object_exists'], htmlspecialchars($username))
  1947. );
  1948. return false;
  1949. }
  1950. }
  1951. if (!empty($password) && !empty($password2)) {
  1952. if ($password != $password2) {
  1953. $_SESSION['return'] = array(
  1954. 'type' => 'danger',
  1955. 'msg' => sprintf($lang['danger']['password_mismatch'])
  1956. );
  1957. return false;
  1958. }
  1959. $password_hashed = hash_password($password);
  1960. foreach ($postarray['domain'] as $domain) {
  1961. if (!is_valid_domain_name($domain)) {
  1962. $_SESSION['return'] = array(
  1963. 'type' => 'danger',
  1964. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1965. );
  1966. return false;
  1967. }
  1968. try {
  1969. $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
  1970. VALUES (:username, :domain, :created, :active)");
  1971. $stmt->execute(array(
  1972. ':username' => $username,
  1973. ':domain' => $domain,
  1974. ':created' => date('Y-m-d H:i:s'),
  1975. ':active' => $active
  1976. ));
  1977. }
  1978. catch (PDOException $e) {
  1979. $_SESSION['return'] = array(
  1980. 'type' => 'danger',
  1981. 'msg' => 'MySQL: '.$e
  1982. );
  1983. return false;
  1984. }
  1985. }
  1986. try {
  1987. $stmt = $pdo->prepare("INSERT INTO `admin` (`username`, `password`, `superadmin`, `created`, `modified`, `active`)
  1988. VALUES (:username, :password_hashed, '0', :created, :modified, :active)");
  1989. $stmt->execute(array(
  1990. ':username' => $username,
  1991. ':password_hashed' => $password_hashed,
  1992. ':created' => date('Y-m-d H:i:s'),
  1993. ':modified' => date('Y-m-d H:i:s'),
  1994. ':active' => $active
  1995. ));
  1996. }
  1997. catch (PDOException $e) {
  1998. $_SESSION['return'] = array(
  1999. 'type' => 'danger',
  2000. 'msg' => 'MySQL: '.$e
  2001. );
  2002. return false;
  2003. }
  2004. }
  2005. else {
  2006. $_SESSION['return'] = array(
  2007. 'type' => 'danger',
  2008. 'msg' => sprintf($lang['danger']['password_empty'])
  2009. );
  2010. return false;
  2011. }
  2012. $_SESSION['return'] = array(
  2013. 'type' => 'success',
  2014. 'msg' => sprintf($lang['success']['domain_admin_added'], htmlspecialchars($username))
  2015. );
  2016. }
  2017. function delete_domain_admin($postarray) {
  2018. global $pdo;
  2019. global $lang;
  2020. if ($_SESSION['mailcow_cc_role'] != "admin") {
  2021. $_SESSION['return'] = array(
  2022. 'type' => 'danger',
  2023. 'msg' => sprintf($lang['danger']['access_denied'])
  2024. );
  2025. return false;
  2026. }
  2027. $username = $postarray['username'];
  2028. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
  2029. $_SESSION['return'] = array(
  2030. 'type' => 'danger',
  2031. 'msg' => sprintf($lang['danger']['username_invalid'])
  2032. );
  2033. return false;
  2034. }
  2035. try {
  2036. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
  2037. $stmt->execute(array(
  2038. ':username' => $username,
  2039. ));
  2040. $stmt = $pdo->prepare("DELETE FROM `admin` WHERE `username` = :username");
  2041. $stmt->execute(array(
  2042. ':username' => $username,
  2043. ));
  2044. }
  2045. catch (PDOException $e) {
  2046. $_SESSION['return'] = array(
  2047. 'type' => 'danger',
  2048. 'msg' => 'MySQL: '.$e
  2049. );
  2050. return false;
  2051. }
  2052. $_SESSION['return'] = array(
  2053. 'type' => 'success',
  2054. 'msg' => sprintf($lang['success']['domain_admin_removed'], htmlspecialchars($username))
  2055. );
  2056. }
  2057. function get_spam_score($username) {
  2058. global $pdo;
  2059. $default = "5, 15";
  2060. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  2061. return $default;
  2062. }
  2063. try {
  2064. $stmt = $pdo->prepare("SELECT `value` FROM `filterconf` WHERE `object` = :username AND
  2065. (`option` = 'lowspamlevel' OR `option` = 'highspamlevel')");
  2066. $stmt->execute(array(':username' => $username));
  2067. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  2068. }
  2069. catch(PDOException $e) {
  2070. $_SESSION['return'] = array(
  2071. 'type' => 'danger',
  2072. 'msg' => 'MySQL: '.$e
  2073. );
  2074. return false;
  2075. }
  2076. if ($num_results == 0 || empty ($num_results)) {
  2077. return $default;
  2078. }
  2079. else {
  2080. try {
  2081. $stmt = $pdo->prepare("SELECT `value` FROM `filterconf` WHERE `option` = 'highspamlevel' AND `object` = :username");
  2082. $stmt->execute(array(':username' => $username));
  2083. $highspamlevel = $stmt->fetch(PDO::FETCH_ASSOC);
  2084. $stmt = $pdo->prepare("SELECT `value` FROM `filterconf` WHERE `option` = 'lowspamlevel' AND `object` = :username");
  2085. $stmt->execute(array(':username' => $username));
  2086. $lowspamlevel = $stmt->fetch(PDO::FETCH_ASSOC);
  2087. return $lowspamlevel['value'].', '.$highspamlevel['value'];
  2088. }
  2089. catch(PDOException $e) {
  2090. $_SESSION['return'] = array(
  2091. 'type' => 'danger',
  2092. 'msg' => 'MySQL: '.$e
  2093. );
  2094. return false;
  2095. }
  2096. }
  2097. }
  2098. function set_spam_score($postarray) {
  2099. global $lang;
  2100. global $pdo;
  2101. $username = $_SESSION['mailcow_cc_username'];
  2102. $lowspamlevel = explode(',', $postarray['score'])[0];
  2103. $highspamlevel = explode(',', $postarray['score'])[1];
  2104. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  2105. $_SESSION['return'] = array(
  2106. 'type' => 'danger',
  2107. 'msg' => sprintf($lang['danger']['username_invalid'])
  2108. );
  2109. return false;
  2110. }
  2111. if (!is_numeric($lowspamlevel) || !is_numeric($highspamlevel)) {
  2112. $_SESSION['return'] = array(
  2113. 'type' => 'danger',
  2114. 'msg' => sprintf($lang['danger']['access_denied'])
  2115. );
  2116. return false;
  2117. }
  2118. try {
  2119. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :username
  2120. AND (`option` = 'lowspamlevel' OR `option` = 'highspamlevel')");
  2121. $stmt->execute(array(
  2122. ':username' => $username
  2123. ));
  2124. $stmt = $pdo->prepare("INSERT INTO `filterconf` (`object`, `option`, `value`)
  2125. VALUES (:username, 'highspamlevel', :highspamlevel)");
  2126. $stmt->execute(array(
  2127. ':username' => $username,
  2128. ':highspamlevel' => $highspamlevel
  2129. ));
  2130. $stmt = $pdo->prepare("INSERT INTO `filterconf` (`object`, `option`, `value`)
  2131. VALUES (:username, 'lowspamlevel', :lowspamlevel)");
  2132. $stmt->execute(array(
  2133. ':username' => $username,
  2134. ':lowspamlevel' => $lowspamlevel
  2135. ));
  2136. }
  2137. catch (PDOException $e) {
  2138. $_SESSION['return'] = array(
  2139. 'type' => 'danger',
  2140. 'msg' => 'MySQL: '.$e
  2141. );
  2142. return false;
  2143. }
  2144. $_SESSION['return'] = array(
  2145. 'type' => 'success',
  2146. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  2147. );
  2148. }
  2149. function set_policy_list($postarray) {
  2150. global $lang;
  2151. global $pdo;
  2152. (isset($postarray['domain'])) ? $object = $postarray['domain'] : $object = $_SESSION['mailcow_cc_username'];
  2153. ($postarray['object_list'] == "bl") ? $object_list = "blacklist_from" : $object_list = "whitelist_from";
  2154. $object_from = preg_replace('/\.+/', '.', rtrim(preg_replace("/\.\*/", "*", trim(strtolower($postarray['object_from']))), '.'));
  2155. if (!filter_var($object, FILTER_VALIDATE_EMAIL) && !is_valid_domain_name($object)) {
  2156. $_SESSION['return'] = array(
  2157. 'type' => 'danger',
  2158. 'msg' => sprintf($lang['danger']['username_invalid'])
  2159. );
  2160. return false;
  2161. }
  2162. if (is_valid_domain_name($object)) {
  2163. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $object)) {
  2164. $_SESSION['return'] = array(
  2165. 'type' => 'danger',
  2166. 'msg' => sprintf($lang['danger']['access_denied'])
  2167. );
  2168. return false;
  2169. }
  2170. }
  2171. if (isset($postarray['prefid'])) {
  2172. if (!is_numeric($postarray['prefid'])) {
  2173. $_SESSION['return'] = array(
  2174. 'type' => 'danger',
  2175. 'msg' => sprintf($lang['danger']['access_denied'])
  2176. );
  2177. return false;
  2178. }
  2179. try {
  2180. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :object AND `prefid` = :prefid");
  2181. $stmt->execute(array(
  2182. ':object' => $object,
  2183. ':prefid' => $postarray['prefid']
  2184. ));
  2185. }
  2186. catch (PDOException $e) {
  2187. $_SESSION['return'] = array(
  2188. 'type' => 'danger',
  2189. 'msg' => 'MySQL: '.$e
  2190. );
  2191. return false;
  2192. }
  2193. $_SESSION['return'] = array(
  2194. 'type' => 'success',
  2195. 'msg' => sprintf($lang['success']['mailbox_modified'], $object)
  2196. );
  2197. return true;
  2198. }
  2199. if (!ctype_alnum(str_replace(array('@', '.', '-', '*'), '', $object_from))) {
  2200. $_SESSION['return'] = array(
  2201. 'type' => 'danger',
  2202. 'msg' => sprintf($lang['danger']['policy_list_from_invalid'])
  2203. );
  2204. return false;
  2205. }
  2206. try {
  2207. $stmt = $pdo->prepare("SELECT `object` FROM `filterconf`
  2208. WHERE (`option` = 'whitelist_from' OR `option` = 'blacklist_from')
  2209. AND `object` = :object
  2210. AND `value` = :object_from");
  2211. $stmt->execute(array(':object' => $object, ':object_from' => $object_from));
  2212. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  2213. }
  2214. catch(PDOException $e) {
  2215. $_SESSION['return'] = array(
  2216. 'type' => 'danger',
  2217. 'msg' => 'MySQL: '.$e
  2218. );
  2219. return false;
  2220. }
  2221. if ($num_results != 0) {
  2222. $_SESSION['return'] = array(
  2223. 'type' => 'danger',
  2224. 'msg' => sprintf($lang['danger']['policy_list_from_exists'])
  2225. );
  2226. return false;
  2227. }
  2228. try {
  2229. $stmt = $pdo->prepare("INSERT INTO `filterconf` (`object`, `option` ,`value`)
  2230. VALUES (:object, :object_list, :object_from)");
  2231. $stmt->execute(array(
  2232. ':object' => $object,
  2233. ':object_list' => $object_list,
  2234. ':object_from' => $object_from
  2235. ));
  2236. }
  2237. catch (PDOException $e) {
  2238. $_SESSION['return'] = array(
  2239. 'type' => 'danger',
  2240. 'msg' => 'MySQL: '.$e
  2241. );
  2242. return false;
  2243. }
  2244. $_SESSION['return'] = array(
  2245. 'type' => 'success',
  2246. 'msg' => sprintf($lang['success']['mailbox_modified'], $object)
  2247. );
  2248. }
  2249. function set_tls_policy($postarray) {
  2250. global $lang;
  2251. global $pdo;
  2252. isset($postarray['tls_in']) ? $tls_in = '1' : $tls_in = '0';
  2253. isset($postarray['tls_out']) ? $tls_out = '1' : $tls_out = '0';
  2254. $username = $_SESSION['mailcow_cc_username'];
  2255. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  2256. $_SESSION['return'] = array(
  2257. 'type' => 'danger',
  2258. 'msg' => sprintf($lang['danger']['username_invalid'])
  2259. );
  2260. return false;
  2261. }
  2262. try {
  2263. $stmt = $pdo->prepare("UPDATE `mailbox` SET `tls_enforce_out` = :tls_out, `tls_enforce_in` = :tls_in WHERE `username` = :username");
  2264. $stmt->execute(array(
  2265. ':tls_out' => $tls_out,
  2266. ':tls_in' => $tls_in,
  2267. ':username' => $username
  2268. ));
  2269. }
  2270. catch (PDOException $e) {
  2271. $_SESSION['return'] = array(
  2272. 'type' => 'danger',
  2273. 'msg' => 'MySQL: '.$e
  2274. );
  2275. return false;
  2276. }
  2277. $_SESSION['return'] = array(
  2278. 'type' => 'success',
  2279. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  2280. );
  2281. }
  2282. function get_tls_policy($username) {
  2283. global $lang;
  2284. global $pdo;
  2285. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  2286. $_SESSION['return'] = array(
  2287. 'type' => 'danger',
  2288. 'msg' => sprintf($lang['danger']['username_invalid'])
  2289. );
  2290. return false;
  2291. }
  2292. try {
  2293. $stmt = $pdo->prepare("SELECT `tls_enforce_out`, `tls_enforce_in` FROM `mailbox` WHERE `username` = :username");
  2294. $stmt->execute(array(':username' => $username));
  2295. $TLSData = $stmt->fetch(PDO::FETCH_ASSOC);
  2296. }
  2297. catch(PDOException $e) {
  2298. $_SESSION['return'] = array(
  2299. 'type' => 'danger',
  2300. 'msg' => 'MySQL: '.$e
  2301. );
  2302. return false;
  2303. }
  2304. return $TLSData;
  2305. }
  2306. function remaining_specs($domain, $object = null, $js = null) {
  2307. // left_m without object given = MiB left in domain
  2308. // left_m with object given = Max. MiB we can assign to given object
  2309. // limit_m = Domain limit in MiB
  2310. // left_c = Mailboxes we can create depending on domain quota
  2311. global $pdo;
  2312. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  2313. return false;
  2314. }
  2315. try {
  2316. $stmt = $pdo->prepare("SELECT `mailboxes`, `maxquota`, `quota` FROM `domain` WHERE `domain` = :domain");
  2317. $stmt->execute(array(':domain' => $domain));
  2318. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  2319. $stmt = $pdo->prepare("SELECT COUNT(*) AS `count`, COALESCE(ROUND(SUM(`quota`)/1048576), 0) as `in_use_m` FROM `mailbox` WHERE `domain` = :domain AND `username` != :object");
  2320. $stmt->execute(array(':domain' => $domain, ':object' => $object));
  2321. $MailboxDataDomain = $stmt->fetch(PDO::FETCH_ASSOC);
  2322. $quota_left_m = $DomainData['quota'] - $MailboxDataDomain['in_use_m'];
  2323. $mboxs_left = $DomainData['mailboxes'] - $MailboxDataDomain['count'];
  2324. if ($quota_left_m > $DomainData['maxquota']) {
  2325. $quota_left_m = $DomainData['maxquota'];
  2326. }
  2327. }
  2328. catch (PDOException $e) {
  2329. return false;
  2330. }
  2331. if (is_numeric($quota_left_m)) {
  2332. $spec['left_m'] = $quota_left_m;
  2333. $spec['limit_m'] = $DomainData['maxquota'];
  2334. }
  2335. if (is_numeric($mboxs_left)) {
  2336. $spec['left_c'] = $mboxs_left;
  2337. }
  2338. if (!empty($js)) {
  2339. echo $quota_left_m;
  2340. exit;
  2341. }
  2342. return $spec;
  2343. }
  2344. function get_sender_acl_handles($mailbox, $which) {
  2345. global $pdo;
  2346. if ($_SESSION['mailcow_cc_role'] != "admin" && $_SESSION['mailcow_cc_role'] != "domainadmin") {
  2347. return false;
  2348. }
  2349. switch ($which) {
  2350. case "preselected":
  2351. try {
  2352. $stmt = $pdo->prepare("SELECT `address` FROM `alias` WHERE `goto` = :goto AND `address` NOT LIKE '@%'");
  2353. $stmt->execute(array(':goto' => $mailbox));
  2354. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2355. return $rows;
  2356. }
  2357. catch(PDOException $e) {
  2358. $_SESSION['return'] = array(
  2359. 'type' => 'danger',
  2360. 'msg' => 'MySQL: '.$e
  2361. );
  2362. return false;
  2363. }
  2364. break;
  2365. case "selected":
  2366. try {
  2367. $stmt = $pdo->prepare("SELECT `send_as` FROM `sender_acl` WHERE `logged_in_as` = :logged_in_as");
  2368. $stmt->execute(array(':logged_in_as' => $mailbox));
  2369. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2370. return $rows;
  2371. }
  2372. catch(PDOException $e) {
  2373. $_SESSION['return'] = array(
  2374. 'type' => 'danger',
  2375. 'msg' => 'MySQL: '.$e
  2376. );
  2377. return false;
  2378. }
  2379. break;
  2380. case "unselected-domains":
  2381. try {
  2382. if ($_SESSION['mailcow_cc_role'] == "admin" ) {
  2383. $stmt = $pdo->prepare("SELECT DISTINCT `domain` FROM `domain`
  2384. WHERE `domain` NOT IN (
  2385. SELECT REPLACE(`send_as`, '@', '') FROM `sender_acl`
  2386. WHERE `logged_in_as` = :logged_in_as)
  2387. AND `domain` NOT IN (
  2388. SELECT REPLACE(`address`, '@', '') FROM `alias`
  2389. WHERE `goto` = :goto)");
  2390. $stmt->execute(array(
  2391. ':logged_in_as' => $mailbox,
  2392. ':goto' => $mailbox,
  2393. ));
  2394. }
  2395. else {
  2396. $stmt = $pdo->prepare("SELECT DISTINCT `domain` FROM `domain_admins`
  2397. WHERE `username` = :username
  2398. AND `domain` != 'ALL'
  2399. AND `domain` NOT IN (
  2400. SELECT REPLACE(`send_as`, '@', '') FROM `sender_acl`
  2401. WHERE `logged_in_as` = :logged_in_as)");
  2402. $stmt->execute(array(
  2403. ':logged_in_as' => $mailbox,
  2404. ':username' => $_SESSION['mailcow_cc_username']
  2405. ));
  2406. }
  2407. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2408. return $rows;
  2409. }
  2410. catch(PDOException $e) {
  2411. $_SESSION['return'] = array(
  2412. 'type' => 'danger',
  2413. 'msg' => 'MySQL: '.$e
  2414. );
  2415. return false;
  2416. }
  2417. break;
  2418. case "unselected-addresses":
  2419. try {
  2420. if ($_SESSION['mailcow_cc_role'] == "admin" ) {
  2421. $stmt = $pdo->prepare("SELECT `address` FROM `alias`
  2422. WHERE `goto` != :goto
  2423. AND `address` NOT IN (
  2424. SELECT `send_as` FROM `sender_acl`
  2425. WHERE `logged_in_as` = :logged_in_as)");
  2426. $stmt->execute(array(
  2427. ':logged_in_as' => $mailbox,
  2428. ':goto' => $mailbox
  2429. ));
  2430. }
  2431. else {
  2432. $stmt = $pdo->prepare("SELECT `address` FROM `alias`
  2433. WHERE `goto` != :goto
  2434. AND `domain` IN (
  2435. SELECT `domain` FROM `domain_admins`
  2436. WHERE `username` = :username)
  2437. AND `address` NOT IN (
  2438. SELECT `send_as` FROM `sender_acl`
  2439. WHERE `logged_in_as` = :logged_in_as)");
  2440. $stmt->execute(array(
  2441. ':logged_in_as' => $mailbox,
  2442. ':goto' => $mailbox,
  2443. ':username' => $_SESSION['mailcow_cc_username']
  2444. ));
  2445. }
  2446. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2447. return $rows;
  2448. }
  2449. catch(PDOException $e) {
  2450. $_SESSION['return'] = array(
  2451. 'type' => 'danger',
  2452. 'msg' => 'MySQL: '.$e
  2453. );
  2454. return false;
  2455. }
  2456. break;
  2457. }
  2458. return false;
  2459. }
  2460. function is_valid_domain_name($domain_name) {
  2461. if (empty($domain_name)) {
  2462. return false;
  2463. }
  2464. $domain_name = idn_to_ascii($domain_name);
  2465. return (preg_match("/^([a-z\d](-*[a-z\d])*)(\.([a-z\d](-*[a-z\d])*))*$/i", $domain_name)
  2466. && preg_match("/^.{1,253}$/", $domain_name)
  2467. && preg_match("/^[^\.]{1,63}(\.[^\.]{1,63})*$/", $domain_name));
  2468. }
  2469. ?>