functions.domain_admin.inc.php 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419
  1. <?php
  2. function domain_admin($_action, $_data = null) {
  3. global $pdo;
  4. global $lang;
  5. $_data_log = $_data;
  6. !isset($_data_log['password']) ?: $_data_log['password'] = '*';
  7. !isset($_data_log['password2']) ?: $_data_log['password2'] = '*';
  8. !isset($_data_log['user_old_pass']) ?: $_data_log['user_old_pass'] = '*';
  9. !isset($_data_log['user_new_pass']) ?: $_data_log['user_new_pass'] = '*';
  10. !isset($_data_log['user_new_pass2']) ?: $_data_log['user_new_pass2'] = '*';
  11. switch ($_action) {
  12. case 'add':
  13. $username = strtolower(trim($_data['username']));
  14. $password = $_data['password'];
  15. $password2 = $_data['password2'];
  16. $domains = (array)$_data['domains'];
  17. $active = intval($_data['active']);
  18. if ($_SESSION['mailcow_cc_role'] != "admin") {
  19. $_SESSION['return'][] = array(
  20. 'type' => 'danger',
  21. 'log' => array(__FUNCTION__, $_action, $_data_log),
  22. 'msg' => 'access_denied'
  23. );
  24. return false;
  25. }
  26. if (empty($domains)) {
  27. $_SESSION['return'][] = array(
  28. 'type' => 'danger',
  29. 'log' => array(__FUNCTION__, $_action, $_data_log),
  30. 'msg' => 'domain_invalid'
  31. );
  32. return false;
  33. }
  34. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username)) || empty ($username) || $username == 'API') {
  35. $_SESSION['return'][] = array(
  36. 'type' => 'danger',
  37. 'log' => array(__FUNCTION__, $_action, $_data_log),
  38. 'msg' => array('username_invalid', $username)
  39. );
  40. return false;
  41. }
  42. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox`
  43. WHERE `username` = :username");
  44. $stmt->execute(array(':username' => $username));
  45. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  46. $stmt = $pdo->prepare("SELECT `username` FROM `admin`
  47. WHERE `username` = :username");
  48. $stmt->execute(array(':username' => $username));
  49. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  50. $stmt = $pdo->prepare("SELECT `username` FROM `domain_admins`
  51. WHERE `username` = :username");
  52. $stmt->execute(array(':username' => $username));
  53. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  54. foreach ($num_results as $num_results_each) {
  55. if ($num_results_each != 0) {
  56. $_SESSION['return'][] = array(
  57. 'type' => 'danger',
  58. 'log' => array(__FUNCTION__, $_action, $_data_log),
  59. 'msg' => array('object_exists', htmlspecialchars($username))
  60. );
  61. return false;
  62. }
  63. }
  64. if (password_check($password, $password2) !== true) {
  65. continue;
  66. }
  67. // support pre hashed passwords
  68. if (preg_match('/^{(ARGON2I|ARGON2ID|BLF-CRYPT|CLEAR|CLEARTEXT|CRYPT|DES-CRYPT|LDAP-MD5|MD5|MD5-CRYPT|PBKDF2|PLAIN|PLAIN-MD4|PLAIN-MD5|PLAIN-TRUNC|PLAIN-TRUNC|SHA|SHA1|SHA256|SHA256-CRYPT|SHA512|SHA512-CRYPT|SMD5|SSHA|SSHA256|SSHA512)}/i', $password)) {
  69. $password_hashed = $password;
  70. }
  71. else {
  72. $password_hashed = hash_password($password);
  73. }
  74. $valid_domains = 0;
  75. foreach ($domains as $domain) {
  76. if (!is_valid_domain_name($domain) || mailbox('get', 'domain_details', $domain) === false) {
  77. $_SESSION['return'][] = array(
  78. 'type' => 'danger',
  79. 'log' => array(__FUNCTION__, $_action, $_data_log),
  80. 'msg' => array('domain_invalid', htmlspecialchars($domain))
  81. );
  82. continue;
  83. }
  84. $valid_domains++;
  85. $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
  86. VALUES (:username, :domain, :created, :active)");
  87. $stmt->execute(array(
  88. ':username' => $username,
  89. ':domain' => $domain,
  90. ':created' => date('Y-m-d H:i:s'),
  91. ':active' => $active
  92. ));
  93. }
  94. if ($valid_domains != 0) {
  95. $stmt = $pdo->prepare("INSERT INTO `admin` (`username`, `password`, `superadmin`, `active`)
  96. VALUES (:username, :password_hashed, '0', :active)");
  97. $stmt->execute(array(
  98. ':username' => $username,
  99. ':password_hashed' => $password_hashed,
  100. ':active' => $active
  101. ));
  102. }
  103. $stmt = $pdo->prepare("INSERT INTO `da_acl` (`username`) VALUES (:username)");
  104. $stmt->execute(array(
  105. ':username' => $username
  106. ));
  107. $_SESSION['return'][] = array(
  108. 'type' => 'success',
  109. 'log' => array(__FUNCTION__, $_action, $_data_log),
  110. 'msg' => array('domain_admin_added', htmlspecialchars($username))
  111. );
  112. break;
  113. case 'edit':
  114. if ($_SESSION['mailcow_cc_role'] != "admin" && $_SESSION['mailcow_cc_role'] != "domainadmin") {
  115. $_SESSION['return'][] = array(
  116. 'type' => 'danger',
  117. 'log' => array(__FUNCTION__, $_action, $_data_log),
  118. 'msg' => 'access_denied'
  119. );
  120. return false;
  121. }
  122. // Administrator
  123. if ($_SESSION['mailcow_cc_role'] == "admin") {
  124. if (!is_array($_data['username'])) {
  125. $usernames = array();
  126. $usernames[] = $_data['username'];
  127. }
  128. else {
  129. $usernames = $_data['username'];
  130. }
  131. foreach ($usernames as $username) {
  132. $is_now = domain_admin('details', $username);
  133. $domains = (isset($_data['domains'])) ? (array)$_data['domains'] : null;
  134. if (!empty($is_now)) {
  135. $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active'];
  136. $domains = (!empty($domains)) ? $domains : $is_now['selected_domains'];
  137. $username_new = (!empty($_data['username_new'])) ? $_data['username_new'] : $is_now['username'];
  138. }
  139. else {
  140. $_SESSION['return'][] = array(
  141. 'type' => 'danger',
  142. 'log' => array(__FUNCTION__, $_action, $_data_log),
  143. 'msg' => 'access_denied'
  144. );
  145. continue;
  146. }
  147. $password = $_data['password'];
  148. $password2 = $_data['password2'];
  149. if (!empty($domains)) {
  150. foreach ($domains as $domain) {
  151. if (!is_valid_domain_name($domain) || mailbox('get', 'domain_details', $domain) === false) {
  152. $_SESSION['return'][] = array(
  153. 'type' => 'danger',
  154. 'log' => array(__FUNCTION__, $_action, $_data_log),
  155. 'msg' => array('domain_invalid', htmlspecialchars($domain))
  156. );
  157. continue 2;
  158. }
  159. }
  160. }
  161. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username_new))) {
  162. $_SESSION['return'][] = array(
  163. 'type' => 'danger',
  164. 'log' => array(__FUNCTION__, $_action, $_data_log),
  165. 'msg' => array('username_invalid', $username_new)
  166. );
  167. continue;
  168. }
  169. if ($username_new != $username) {
  170. if (!empty(domain_admin('details', $username_new)['username'])) {
  171. $_SESSION['return'][] = array(
  172. 'type' => 'danger',
  173. 'log' => array(__FUNCTION__, $_action, $_data_log),
  174. 'msg' => array('username_invalid', $username_new)
  175. );
  176. continue;
  177. }
  178. }
  179. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
  180. $stmt->execute(array(
  181. ':username' => $username,
  182. ));
  183. $stmt = $pdo->prepare("UPDATE `da_acl` SET `username` = :username_new WHERE `username` = :username");
  184. $stmt->execute(array(
  185. ':username_new' => $username_new,
  186. ':username' => $username
  187. ));
  188. if (!empty($domains)) {
  189. foreach ($domains as $domain) {
  190. $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
  191. VALUES (:username_new, :domain, :created, :active)");
  192. $stmt->execute(array(
  193. ':username_new' => $username_new,
  194. ':domain' => $domain,
  195. ':created' => date('Y-m-d H:i:s'),
  196. ':active' => $active
  197. ));
  198. }
  199. }
  200. if (!empty($password) && !empty($password2)) {
  201. if (password_check($password, $password2) !== true) {
  202. return false;
  203. }
  204. // support pre hashed passwords
  205. if (preg_match('/^{(ARGON2I|ARGON2ID|BLF-CRYPT|CLEAR|CLEARTEXT|CRYPT|DES-CRYPT|LDAP-MD5|MD5|MD5-CRYPT|PBKDF2|PLAIN|PLAIN-MD4|PLAIN-MD5|PLAIN-TRUNC|PLAIN-TRUNC|SHA|SHA1|SHA256|SHA256-CRYPT|SHA512|SHA512-CRYPT|SMD5|SSHA|SSHA256|SSHA512)}/i', $password)) {
  206. $password_hashed = $password;
  207. }
  208. else {
  209. $password_hashed = hash_password($password);
  210. }
  211. $stmt = $pdo->prepare("UPDATE `admin` SET `username` = :username_new, `active` = :active, `password` = :password_hashed WHERE `username` = :username");
  212. $stmt->execute(array(
  213. ':password_hashed' => $password_hashed,
  214. ':username_new' => $username_new,
  215. ':username' => $username,
  216. ':active' => $active
  217. ));
  218. if (isset($_data['disable_tfa'])) {
  219. $stmt = $pdo->prepare("UPDATE `tfa` SET `active` = '0' WHERE `username` = :username");
  220. $stmt->execute(array(':username' => $username));
  221. }
  222. else {
  223. $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username_new WHERE `username` = :username");
  224. $stmt->execute(array(':username_new' => $username_new, ':username' => $username));
  225. }
  226. }
  227. else {
  228. $stmt = $pdo->prepare("UPDATE `admin` SET `username` = :username_new, `active` = :active WHERE `username` = :username");
  229. $stmt->execute(array(
  230. ':username_new' => $username_new,
  231. ':username' => $username,
  232. ':active' => $active
  233. ));
  234. if (isset($_data['disable_tfa'])) {
  235. $stmt = $pdo->prepare("UPDATE `tfa` SET `active` = '0' WHERE `username` = :username");
  236. $stmt->execute(array(':username' => $username));
  237. }
  238. else {
  239. $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username_new WHERE `username` = :username");
  240. $stmt->execute(array(':username_new' => $username_new, ':username' => $username));
  241. }
  242. }
  243. $_SESSION['return'][] = array(
  244. 'type' => 'success',
  245. 'log' => array(__FUNCTION__, $_action, $_data_log),
  246. 'msg' => array('domain_admin_modified', htmlspecialchars($username))
  247. );
  248. }
  249. return true;
  250. }
  251. // Domain administrator
  252. // Can only edit itself
  253. elseif ($_SESSION['mailcow_cc_role'] == "domainadmin") {
  254. $username = $_SESSION['mailcow_cc_username'];
  255. $password_old = $_data['user_old_pass'];
  256. $password_new = $_data['user_new_pass'];
  257. $password_new2 = $_data['user_new_pass2'];
  258. $stmt = $pdo->prepare("SELECT `password` FROM `admin`
  259. WHERE `username` = :user");
  260. $stmt->execute(array(':user' => $username));
  261. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  262. if (!verify_hash($row['password'], $password_old)) {
  263. $_SESSION['return'][] = array(
  264. 'type' => 'danger',
  265. 'log' => array(__FUNCTION__, $_action, $_data_log),
  266. 'msg' => 'access_denied'
  267. );
  268. return false;
  269. }
  270. if (password_check($password_new, $password_new2) !== true) {
  271. return false;
  272. }
  273. $password_hashed = hash_password($password_new);
  274. $stmt = $pdo->prepare("UPDATE `admin` SET `password` = :password_hashed WHERE `username` = :username");
  275. $stmt->execute(array(
  276. ':password_hashed' => $password_hashed,
  277. ':username' => $username
  278. ));
  279. $_SESSION['return'][] = array(
  280. 'type' => 'success',
  281. 'log' => array(__FUNCTION__, $_action, $_data_log),
  282. 'msg' => array('domain_admin_modified', htmlspecialchars($username))
  283. );
  284. }
  285. break;
  286. case 'delete':
  287. if ($_SESSION['mailcow_cc_role'] != "admin") {
  288. $_SESSION['return'][] = array(
  289. 'type' => 'danger',
  290. 'log' => array(__FUNCTION__, $_action, $_data_log),
  291. 'msg' => 'access_denied'
  292. );
  293. return false;
  294. }
  295. $usernames = (array)$_data['username'];
  296. foreach ($usernames as $username) {
  297. if (empty(domain_admin('details', $username))) {
  298. $_SESSION['return'][] = array(
  299. 'type' => 'danger',
  300. 'log' => array(__FUNCTION__, $_action, $_data_log),
  301. 'msg' => array('username_invalid', $username)
  302. );
  303. continue;
  304. }
  305. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
  306. $stmt->execute(array(
  307. ':username' => $username,
  308. ));
  309. $stmt = $pdo->prepare("DELETE FROM `admin` WHERE `username` = :username");
  310. $stmt->execute(array(
  311. ':username' => $username,
  312. ));
  313. $stmt = $pdo->prepare("DELETE FROM `da_acl` WHERE `username` = :username");
  314. $stmt->execute(array(
  315. ':username' => $username,
  316. ));
  317. $stmt = $pdo->prepare("DELETE FROM `tfa` WHERE `username` = :username");
  318. $stmt->execute(array(
  319. ':username' => $username,
  320. ));
  321. $stmt = $pdo->prepare("DELETE FROM `fido2` WHERE `username` = :username");
  322. $stmt->execute(array(
  323. ':username' => $username,
  324. ));
  325. $_SESSION['return'][] = array(
  326. 'type' => 'success',
  327. 'log' => array(__FUNCTION__, $_action, $_data_log),
  328. 'msg' => array('domain_admin_removed', htmlspecialchars($username))
  329. );
  330. }
  331. break;
  332. case 'get':
  333. $domainadmins = array();
  334. if ($_SESSION['mailcow_cc_role'] != "admin") {
  335. $_SESSION['return'][] = array(
  336. 'type' => 'danger',
  337. 'log' => array(__FUNCTION__, $_action, $_data_log),
  338. 'msg' => 'access_denied'
  339. );
  340. return false;
  341. }
  342. $stmt = $pdo->query("SELECT DISTINCT
  343. `username`
  344. FROM `domain_admins`
  345. WHERE `username` IN (
  346. SELECT `username` FROM `admin`
  347. WHERE `superadmin`!='1'
  348. )");
  349. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  350. while ($row = array_shift($rows)) {
  351. $domainadmins[] = $row['username'];
  352. }
  353. return $domainadmins;
  354. break;
  355. case 'details':
  356. $domainadmindata = array();
  357. if ($_SESSION['mailcow_cc_role'] == "domainadmin" && $_data != $_SESSION['mailcow_cc_username']) {
  358. return false;
  359. }
  360. elseif ($_SESSION['mailcow_cc_role'] != "admin" || !isset($_data)) {
  361. return false;
  362. }
  363. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $_data))) {
  364. return false;
  365. }
  366. $stmt = $pdo->prepare("SELECT
  367. `tfa`.`active` AS `tfa_active`,
  368. `domain_admins`.`username`,
  369. `domain_admins`.`created`,
  370. `domain_admins`.`active` AS `active`
  371. FROM `domain_admins`
  372. LEFT OUTER JOIN `tfa` ON `tfa`.`username`=`domain_admins`.`username`
  373. WHERE `domain_admins`.`username`= :domain_admin");
  374. $stmt->execute(array(
  375. ':domain_admin' => $_data
  376. ));
  377. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  378. if (empty($row)) {
  379. return false;
  380. }
  381. $domainadmindata['username'] = $row['username'];
  382. $domainadmindata['tfa_active'] = (is_null($row['tfa_active'])) ? 0 : $row['tfa_active'];
  383. $domainadmindata['tfa_active_int'] = (is_null($row['tfa_active'])) ? 0 : $row['tfa_active'];
  384. $domainadmindata['active'] = $row['active'];
  385. $domainadmindata['active_int'] = $row['active'];
  386. $domainadmindata['created'] = $row['created'];
  387. // GET SELECTED
  388. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  389. WHERE `domain` IN (
  390. SELECT `domain` FROM `domain_admins`
  391. WHERE `username`= :domain_admin)");
  392. $stmt->execute(array(':domain_admin' => $_data));
  393. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  394. while($row = array_shift($rows)) {
  395. $domainadmindata['selected_domains'][] = $row['domain'];
  396. }
  397. // GET UNSELECTED
  398. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  399. WHERE `domain` NOT IN (
  400. SELECT `domain` FROM `domain_admins`
  401. WHERE `username`= :domain_admin)");
  402. $stmt->execute(array(':domain_admin' => $_data));
  403. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  404. while($row = array_shift($rows)) {
  405. $domainadmindata['unselected_domains'][] = $row['domain'];
  406. }
  407. if (!isset($domainadmindata['unselected_domains'])) {
  408. $domainadmindata['unselected_domains'] = "";
  409. }
  410. return $domainadmindata;
  411. break;
  412. }
  413. }