functions.inc.php 76 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656
  1. <?php
  2. function hash_password($password) {
  3. $salt_str = bin2hex(openssl_random_pseudo_bytes(8));
  4. if ($GLOBALS['HASHING'] == "SHA512-CRYPT") {
  5. return "{SHA512-CRYPT}".crypt($password, '$6$'.$salt_str.'$');
  6. }
  7. else {
  8. return "{SSHA256}".base64_encode(hash('sha256', $password.$salt_str, true).$salt_str);
  9. }
  10. }
  11. function hasDomainAccess($username, $role, $domain) {
  12. global $pdo;
  13. if (!filter_var($username, FILTER_VALIDATE_EMAIL) && !ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
  14. return false;
  15. }
  16. if (!is_valid_domain_name($domain)) {
  17. return false;
  18. }
  19. try {
  20. $stmt = $pdo->prepare("SELECT `domain` FROM `domain_admins`
  21. WHERE (
  22. `active`='1'
  23. AND `username` = :username
  24. AND `domain` = :domain
  25. )
  26. OR 'admin' = :role");
  27. $stmt->execute(array(':username' => $username, ':domain' => $domain, ':role' => $role));
  28. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  29. } catch(PDOException $e) {
  30. error_log($e);
  31. return false;
  32. }
  33. if ($num_results != 0 && !empty($num_results)) {
  34. return true;
  35. }
  36. return false;
  37. }
  38. function doveadm_authenticate($hash, $algorithm, $password) {
  39. $descr = array(0 => array('pipe', 'r'), 1 => array('pipe', 'w'), 2 => array('pipe', 'w'));
  40. $pipes = array();
  41. $process = proc_open("/usr/bin/doveadm pw -s ".$algorithm." -t '".$hash."'", $descr, $pipes);
  42. if (is_resource($process)) {
  43. fputs($pipes[0], $password);
  44. fclose($pipes[0]);
  45. while ($f = fgets($pipes[1])) {
  46. if (preg_match('/(verified)/', $f)) {
  47. proc_close($process);
  48. return true;
  49. }
  50. return false;
  51. }
  52. fclose($pipes[1]);
  53. while ($f = fgets($pipes[2])) {
  54. proc_close($process);
  55. return false;
  56. }
  57. fclose($pipes[2]);
  58. proc_close($process);
  59. }
  60. return false;
  61. }
  62. function check_login($user, $pass) {
  63. global $pdo;
  64. if (!filter_var($user, FILTER_VALIDATE_EMAIL) && !ctype_alnum(str_replace(array('_', '.', '-'), '', $user))) {
  65. return false;
  66. }
  67. if (!strpos(shell_exec("file --mime-encoding /usr/bin/doveadm"), "binary")) {
  68. return false;
  69. }
  70. $user = strtolower(trim($user));
  71. $stmt = $pdo->prepare("SELECT `password` FROM `admin`
  72. WHERE `superadmin` = '1'
  73. AND `username` = :user");
  74. $stmt->execute(array(':user' => $user));
  75. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  76. foreach ($rows as $row) {
  77. if (doveadm_authenticate($row['password'], $GLOBALS['HASHING'], $pass) !== false) {
  78. unset($_SESSION['ldelay']);
  79. return "admin";
  80. }
  81. }
  82. $stmt = $pdo->prepare("SELECT `password` FROM `admin`
  83. WHERE `superadmin` = '0'
  84. AND `active`='1'
  85. AND `username` = :user");
  86. $stmt->execute(array(':user' => $user));
  87. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  88. foreach ($rows as $row) {
  89. if (doveadm_authenticate($row['password'], $GLOBALS['HASHING'], $pass) !== false) {
  90. unset($_SESSION['ldelay']);
  91. return "domainadmin";
  92. }
  93. }
  94. $stmt = $pdo->prepare("SELECT `password` FROM `mailbox`
  95. WHERE `active`='1'
  96. AND `username` = :user");
  97. $stmt->execute(array(':user' => $user));
  98. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  99. foreach ($rows as $row) {
  100. if (doveadm_authenticate($row['password'], $GLOBALS['HASHING'], $pass) !== false) {
  101. unset($_SESSION['ldelay']);
  102. return "user";
  103. }
  104. }
  105. if (!isset($_SESSION['ldelay'])) {
  106. $_SESSION['ldelay'] = "0";
  107. }
  108. elseif (!isset($_SESSION['mailcow_cc_username'])) {
  109. $_SESSION['ldelay'] = $_SESSION['ldelay']+0.5;
  110. }
  111. sleep($_SESSION['ldelay']);
  112. }
  113. function formatBytes($size, $precision = 2) {
  114. if(!is_numeric($size)) {
  115. return "0";
  116. }
  117. $base = log($size, 1024);
  118. $suffixes = array(' Byte', ' KiB', ' MiB', ' GiB', ' TiB');
  119. if ($size == "0") {
  120. return "0";
  121. }
  122. return round(pow(1024, $base - floor($base)), $precision) . $suffixes[floor($base)];
  123. }
  124. function dkim_table($action, $item) {
  125. global $lang;
  126. switch ($action) {
  127. case "delete":
  128. $domain = preg_replace('/[^A-Za-z0-9._\-]/', '_', $item['dkim']['domain']);
  129. $selector = preg_replace('/[^A-Za-z0-9._\-]/', '_', $item['dkim']['selector']);
  130. if (!ctype_alnum($selector) || !is_valid_domain_name($domain)) {
  131. $_SESSION['return'] = array(
  132. 'type' => 'danger',
  133. 'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid'])
  134. );
  135. break;
  136. }
  137. exec('rm ' . escapeshellarg($GLOBALS['MC_DKIM_TXTS'] . '/' . $selector . '_' . $domain), $out, $return);
  138. if ($return != "0") {
  139. $_SESSION['return'] = array(
  140. 'type' => 'danger',
  141. 'msg' => sprintf($lang['danger']['dkim_remove_failed'])
  142. );
  143. break;
  144. }
  145. exec('rm ' . escapeshellarg($GLOBALS['MC_DKIM_KEYS'] . '/' . $domain . '.' . $selector), $out, $return);
  146. if ($return != "0") {
  147. $_SESSION['return'] = array(
  148. 'type' => 'danger',
  149. 'msg' => sprintf($lang['danger']['dkim_remove_failed'])
  150. );
  151. break;
  152. }
  153. $_SESSION['return'] = array(
  154. 'type' => 'success',
  155. 'msg' => sprintf($lang['success']['dkim_removed'])
  156. );
  157. break;
  158. case "add":
  159. $domain = preg_replace('/[^A-Za-z0-9._\-]/', '_', $item['dkim']['domain']);
  160. $selector = preg_replace('/[^A-Za-z0-9._\-]/', '_', $item['dkim']['selector']);
  161. $key_length = $item['dkim']['key_size'];
  162. if (!ctype_alnum($selector) || !is_valid_domain_name($domain) || !is_numeric($key_length)) {
  163. $_SESSION['return'] = array(
  164. 'type' => 'danger',
  165. 'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid'])
  166. );
  167. break;
  168. }
  169. if (file_exists($GLOBALS['MC_DKIM_TXTS'] . '/' . $selector . '_' . $domain) ||
  170. file_exists($GLOBALS['MC_DKIM_KEYS'] . '/' . $domain . '.' . $selector)) {
  171. $_SESSION['return'] = array(
  172. 'type' => 'danger',
  173. 'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid'])
  174. );
  175. break;
  176. }
  177. // Should be done native in PHP soon
  178. $privKey = shell_exec("openssl genrsa -out /tmp/dkim-private.pem " . escapeshellarg($key_length) . " -outform PEM && cat /tmp/dkim-private.pem");
  179. $pubKey = shell_exec('openssl rsa -in /tmp/dkim-private.pem -pubout -outform PEM 2>/dev/null | sed -e "1d" -e "\$d" | tr -d "\n"');
  180. shell_exec('rm /tmp/dkim-private.pem');
  181. file_put_contents($GLOBALS['MC_DKIM_TXTS'] . '/' . $selector . '_' . $domain, $pubKey);
  182. file_put_contents($GLOBALS['MC_DKIM_KEYS'] . '/' . $domain . '.' . $selector, $privKey);
  183. $_SESSION['return'] = array(
  184. 'type' => 'success',
  185. 'msg' => sprintf($lang['success']['dkim_added'])
  186. );
  187. break;
  188. }
  189. }
  190. function mailbox_add_domain($postarray) {
  191. global $pdo;
  192. global $lang;
  193. if ($_SESSION['mailcow_cc_role'] != "admin") {
  194. $_SESSION['return'] = array(
  195. 'type' => 'danger',
  196. 'msg' => sprintf($lang['danger']['access_denied'])
  197. );
  198. return false;
  199. }
  200. $domain = idn_to_ascii(strtolower(trim($postarray['domain'])));
  201. $description = $postarray['description'];
  202. $aliases = $postarray['aliases'];
  203. $mailboxes = $postarray['mailboxes'];
  204. $maxquota = $postarray['maxquota'];
  205. $quota = $postarray['quota'];
  206. if ($maxquota > $quota) {
  207. $_SESSION['return'] = array(
  208. 'type' => 'danger',
  209. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeds_domain_quota'])
  210. );
  211. return false;
  212. }
  213. isset($postarray['active']) ? $active = '1' : $active = '0';
  214. isset($postarray['relay_all_recipients']) ? $relay_all_recipients = '1' : $relay_all_recipients = '0';
  215. isset($postarray['backupmx']) ? $backupmx = '1' : $backupmx = '0';
  216. isset($postarray['relay_all_recipients']) ? $backupmx = '1' : true;
  217. if (!is_valid_domain_name($domain)) {
  218. $_SESSION['return'] = array(
  219. 'type' => 'danger',
  220. 'msg' => sprintf($lang['danger']['domain_invalid'])
  221. );
  222. return false;
  223. }
  224. foreach (array($quota, $maxquota, $mailboxes, $aliases) as $data) {
  225. if (!is_numeric($data)) {
  226. $_SESSION['return'] = array(
  227. 'type' => 'danger',
  228. 'msg' => sprintf($lang['danger']['object_is_not_numeric'], htmlspecialchars($data))
  229. );
  230. return false;
  231. }
  232. }
  233. try {
  234. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  235. WHERE `domain` = :domain");
  236. $stmt->execute(array(':domain' => $domain));
  237. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  238. }
  239. catch(PDOException $e) {
  240. $_SESSION['return'] = array(
  241. 'type' => 'danger',
  242. 'msg' => 'MySQL: '.$e
  243. );
  244. return false;
  245. }
  246. if ($num_results != 0) {
  247. $_SESSION['return'] = array(
  248. 'type' => 'danger',
  249. 'msg' => sprintf($lang['danger']['domain_exists'], htmlspecialchars($domain))
  250. );
  251. return false;
  252. }
  253. try {
  254. $stmt = $pdo->prepare("INSERT INTO `domain` (`domain`, `description`, `aliases`, `mailboxes`, `maxquota`, `quota`, `transport`, `backupmx`, `created`, `modified`, `active`, `relay_all_recipients`)
  255. VALUES (:domain, :description, :aliases, :mailboxes, :maxquota, :quota, 'virtual', :backupmx, :created, :modified, :active, :relay_all_recipients)");
  256. $stmt->execute(array(
  257. ':domain' => $domain,
  258. ':description' => $description,
  259. ':aliases' => $aliases,
  260. ':mailboxes' => $mailboxes,
  261. ':maxquota' => $maxquota,
  262. ':quota' => $quota,
  263. ':backupmx' => $backupmx,
  264. ':active' => $active,
  265. ':created' => date('Y-m-d H:i:s'),
  266. ':modified' => date('Y-m-d H:i:s'),
  267. ':relay_all_recipients' => $relay_all_recipients
  268. ));
  269. $_SESSION['return'] = array(
  270. 'type' => 'success',
  271. 'msg' => sprintf($lang['success']['domain_added'], htmlspecialchars($domain))
  272. );
  273. }
  274. catch (PDOException $e) {
  275. $_SESSION['return'] = array(
  276. 'type' => 'danger',
  277. 'msg' => 'MySQL: '.$e
  278. );
  279. return false;
  280. }
  281. }
  282. function mailbox_add_alias($postarray) {
  283. global $lang;
  284. global $pdo;
  285. $addresses = array_map('trim', preg_split( "/( |,|;|\n)/", $postarray['address']));
  286. $gotos = array_map('trim', preg_split( "/( |,|;|\n)/", $postarray['goto']));
  287. isset($postarray['active']) ? $active = '1' : $active = '0';
  288. if (empty($addresses[0])) {
  289. $_SESSION['return'] = array(
  290. 'type' => 'danger',
  291. 'msg' => sprintf($lang['danger']['alias_empty'])
  292. );
  293. return false;
  294. }
  295. if (empty($gotos[0])) {
  296. $_SESSION['return'] = array(
  297. 'type' => 'danger',
  298. 'msg' => sprintf($lang['danger']['goto_empty'])
  299. );
  300. return false;
  301. }
  302. foreach ($addresses as $address) {
  303. if (empty($address)) {
  304. continue;
  305. }
  306. $domain = idn_to_ascii(substr(strstr($address, '@'), 1));
  307. $local_part = strstr($address, '@', true);
  308. $address = $local_part.'@'.$domain;
  309. if ((!filter_var($address, FILTER_VALIDATE_EMAIL) === true) && !empty($local_part)) {
  310. $_SESSION['return'] = array(
  311. 'type' => 'danger',
  312. 'msg' => sprintf($lang['danger']['alias_invalid'])
  313. );
  314. return false;
  315. }
  316. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  317. $_SESSION['return'] = array(
  318. 'type' => 'danger',
  319. 'msg' => sprintf($lang['danger']['access_denied'])
  320. );
  321. return false;
  322. }
  323. try {
  324. $stmt = $pdo->prepare("SELECT `address` FROM `alias`
  325. WHERE `address`= :address");
  326. $stmt->execute(array(':address' => $address));
  327. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  328. }
  329. catch(PDOException $e) {
  330. $_SESSION['return'] = array(
  331. 'type' => 'danger',
  332. 'msg' => 'MySQL: '.$e
  333. );
  334. return false;
  335. }
  336. if ($num_results != 0) {
  337. $_SESSION['return'] = array(
  338. 'type' => 'danger',
  339. 'msg' => sprintf($lang['danger']['is_alias_or_mailbox'], htmlspecialchars($address))
  340. );
  341. return false;
  342. }
  343. try {
  344. $stmt = $pdo->prepare("SELECT `address` FROM `spamalias`
  345. WHERE `address`= :address");
  346. $stmt->execute(array(':address' => $address));
  347. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  348. }
  349. catch(PDOException $e) {
  350. $_SESSION['return'] = array(
  351. 'type' => 'danger',
  352. 'msg' => 'MySQL: '.$e
  353. );
  354. return false;
  355. }
  356. if ($num_results != 0) {
  357. $_SESSION['return'] = array(
  358. 'type' => 'danger',
  359. 'msg' => sprintf($lang['danger']['is_spam_alias'], htmlspecialchars($address))
  360. );
  361. return false;
  362. }
  363. foreach ($gotos as &$goto) {
  364. if (empty($goto)) {
  365. continue;
  366. }
  367. $goto_domain = idn_to_ascii(substr(strstr($goto, '@'), 1));
  368. $goto_local_part = strstr($goto, '@', true);
  369. $goto = $goto_local_part.'@'.$goto_domain;
  370. if (!filter_var($goto, FILTER_VALIDATE_EMAIL) === true) {
  371. $_SESSION['return'] = array(
  372. 'type' => 'danger',
  373. 'msg' => sprintf($lang['danger']['goto_invalid'])
  374. );
  375. return false;
  376. }
  377. if ($goto == $address) {
  378. $_SESSION['return'] = array(
  379. 'type' => 'danger',
  380. 'msg' => sprintf($lang['danger']['alias_goto_identical'])
  381. );
  382. return false;
  383. }
  384. }
  385. $gotos = array_filter($gotos);
  386. $goto = implode(",", $gotos);
  387. try {
  388. $stmt = $pdo->prepare("INSERT INTO `alias` (`address`, `goto`, `domain`, `created`, `modified`, `active`)
  389. VALUES (:address, :goto, :domain, :created, :modified, :active)");
  390. if (!filter_var($address, FILTER_VALIDATE_EMAIL) === true) {
  391. $stmt->execute(array(
  392. ':address' => '@'.$domain,
  393. ':goto' => $goto,
  394. ':domain' => $domain,
  395. ':created' => date('Y-m-d H:i:s'),
  396. ':modified' => date('Y-m-d H:i:s'),
  397. ':active' => $active
  398. ));
  399. }
  400. else {
  401. $stmt->execute(array(
  402. ':address' => $address,
  403. ':goto' => $goto,
  404. ':domain' => $domain,
  405. ':created' => date('Y-m-d H:i:s'),
  406. ':modified' => date('Y-m-d H:i:s'),
  407. ':active' => $active
  408. ));
  409. }
  410. $_SESSION['return'] = array(
  411. 'type' => 'success',
  412. 'msg' => sprintf($lang['success']['alias_added'])
  413. );
  414. }
  415. catch (PDOException $e) {
  416. $_SESSION['return'] = array(
  417. 'type' => 'danger',
  418. 'msg' => 'MySQL: '.$e
  419. );
  420. return false;
  421. }
  422. }
  423. $_SESSION['return'] = array(
  424. 'type' => 'success',
  425. 'msg' => sprintf($lang['success']['alias_added'])
  426. );
  427. }
  428. function mailbox_add_alias_domain($postarray) {
  429. global $lang;
  430. global $pdo;
  431. isset($postarray['active']) ? $active = '1' : $active = '0';
  432. if (!is_valid_domain_name($postarray['alias_domain'])) {
  433. $_SESSION['return'] = array(
  434. 'type' => 'danger',
  435. 'msg' => sprintf($lang['danger']['alias_domain_invalid'])
  436. );
  437. return false;
  438. }
  439. if (!is_valid_domain_name($postarray['target_domain'])) {
  440. $_SESSION['return'] = array(
  441. 'type' => 'danger',
  442. 'msg' => sprintf($lang['danger']['target_domain_invalid'])
  443. );
  444. return false;
  445. }
  446. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $postarray['target_domain'])) {
  447. $_SESSION['return'] = array(
  448. 'type' => 'danger',
  449. 'msg' => sprintf($lang['danger']['access_denied'])
  450. );
  451. return false;
  452. }
  453. if ($postarray['alias_domain'] == $postarray['target_domain']) {
  454. $_SESSION['return'] = array(
  455. 'type' => 'danger',
  456. 'msg' => sprintf($lang['danger']['aliasd_targetd_identical'])
  457. );
  458. return false;
  459. }
  460. $alias_domain = strtolower(trim($postarray['alias_domain']));
  461. $target_domain = strtolower(trim($postarray['target_domain']));
  462. try {
  463. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  464. WHERE `domain`= :target_domain");
  465. $stmt->execute(array(':target_domain' => $target_domain));
  466. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  467. }
  468. catch(PDOException $e) {
  469. $_SESSION['return'] = array(
  470. 'type' => 'danger',
  471. 'msg' => 'MySQL: '.$e
  472. );
  473. return false;
  474. }
  475. if ($num_results == 0) {
  476. $_SESSION['return'] = array(
  477. 'type' => 'danger',
  478. 'msg' => sprintf($lang['danger']['targetd_not_found'])
  479. );
  480. return false;
  481. }
  482. try {
  483. $stmt = $pdo->prepare("SELECT `alias_domain` FROM `alias_domain` WHERE `alias_domain`= :alias_domain
  484. UNION
  485. SELECT `alias_domain` FROM `alias_domain` WHERE `alias_domain`= :alias_domain_in_domain");
  486. $stmt->execute(array(':alias_domain' => $alias_domain, ':alias_domain_in_domain' => $alias_domain));
  487. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  488. }
  489. catch(PDOException $e) {
  490. $_SESSION['return'] = array(
  491. 'type' => 'danger',
  492. 'msg' => 'MySQL: '.$e
  493. );
  494. return false;
  495. }
  496. if ($num_results != 0) {
  497. $_SESSION['return'] = array(
  498. 'type' => 'danger',
  499. 'msg' => sprintf($lang['danger']['aliasd_exists'])
  500. );
  501. return false;
  502. }
  503. try {
  504. $stmt = $pdo->prepare("INSERT INTO `alias_domain` (`alias_domain`, `target_domain`, `created`, `modified`, `active`)
  505. VALUES (:alias_domain, :target_domain, :created, :modified, :active)");
  506. $stmt->execute(array(
  507. ':alias_domain' => $alias_domain,
  508. ':target_domain' => $target_domain,
  509. ':created' => date('Y-m-d H:i:s'),
  510. ':modified' => date('Y-m-d H:i:s'),
  511. ':active' => $active
  512. ));
  513. $_SESSION['return'] = array(
  514. 'type' => 'success',
  515. 'msg' => sprintf($lang['success']['aliasd_added'], htmlspecialchars($alias_domain))
  516. );
  517. }
  518. catch (PDOException $e) {
  519. $_SESSION['return'] = array(
  520. 'type' => 'danger',
  521. 'msg' => 'MySQL: '.$e
  522. );
  523. return false;
  524. }
  525. }
  526. function mailbox_edit_alias_domain($postarray) {
  527. global $lang;
  528. global $pdo;
  529. isset($postarray['active']) ? $active = '1' : $active = '0';
  530. $alias_domain = idn_to_ascii($postarray['alias_domain']);
  531. $alias_domain = strtolower(trim($alias_domain));
  532. $alias_domain_now = strtolower(trim($postarray['alias_domain_now']));
  533. if (!is_valid_domain_name($alias_domain)) {
  534. $_SESSION['return'] = array(
  535. 'type' => 'danger',
  536. 'msg' => sprintf($lang['danger']['alias_domain_invalid'])
  537. );
  538. return false;
  539. }
  540. if (!is_valid_domain_name($alias_domain_now)) {
  541. $_SESSION['return'] = array(
  542. 'type' => 'danger',
  543. 'msg' => sprintf($lang['danger']['alias_domain_invalid'])
  544. );
  545. return false;
  546. }
  547. try {
  548. $stmt = $pdo->prepare("SELECT `target_domain` FROM `alias_domain`
  549. WHERE `alias_domain`= :alias_domain_now");
  550. $stmt->execute(array(':alias_domain_now' => $alias_domain_now));
  551. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  552. }
  553. catch(PDOException $e) {
  554. $_SESSION['return'] = array(
  555. 'type' => 'danger',
  556. 'msg' => 'MySQL: '.$e
  557. );
  558. return false;
  559. }
  560. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $DomainData['target_domain'])) {
  561. $_SESSION['return'] = array(
  562. 'type' => 'danger',
  563. 'msg' => sprintf($lang['danger']['access_denied'])
  564. );
  565. return false;
  566. }
  567. try {
  568. $stmt = $pdo->prepare("SELECT `target_domain` FROM `alias_domain`
  569. WHERE `target_domain`= :alias_domain");
  570. $stmt->execute(array(':alias_domain' => $alias_domain));
  571. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  572. }
  573. catch(PDOException $e) {
  574. $_SESSION['return'] = array(
  575. 'type' => 'danger',
  576. 'msg' => 'MySQL: '.$e
  577. );
  578. return false;
  579. }
  580. if ($num_results != 0) {
  581. $_SESSION['return'] = array(
  582. 'type' => 'danger',
  583. 'msg' => sprintf($lang['danger']['aliasd_targetd_identical'])
  584. );
  585. return false;
  586. }
  587. try {
  588. $stmt = $pdo->prepare("UPDATE `alias_domain` SET `alias_domain` = :alias_domain, `active` = :active WHERE `alias_domain` = :alias_domain_now");
  589. $stmt->execute(array(
  590. ':alias_domain' => $alias_domain,
  591. ':alias_domain_now' => $alias_domain_now,
  592. ':active' => $active
  593. ));
  594. }
  595. catch (PDOException $e) {
  596. $_SESSION['return'] = array(
  597. 'type' => 'danger',
  598. 'msg' => 'MySQL: '.$e
  599. );
  600. return false;
  601. }
  602. $_SESSION['return'] = array(
  603. 'type' => 'success',
  604. 'msg' => sprintf($lang['success']['aliasd_modified'], htmlspecialchars($alias_domain))
  605. );
  606. }
  607. function mailbox_add_mailbox($postarray) {
  608. global $pdo;
  609. global $lang;
  610. $username = strtolower(trim($postarray['local_part'])).'@'.strtolower(trim($postarray['domain']));
  611. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  612. $_SESSION['return'] = array(
  613. 'type' => 'danger',
  614. 'msg' => sprintf($lang['danger']['mailbox_invalid'])
  615. );
  616. return false;
  617. }
  618. if (empty($postarray['local_part'])) {
  619. $_SESSION['return'] = array(
  620. 'type' => 'danger',
  621. 'msg' => sprintf($lang['danger']['mailbox_invalid'])
  622. );
  623. return false;
  624. }
  625. $domain = strtolower(trim($postarray['domain']));
  626. $password = $postarray['password'];
  627. $password2 = $postarray['password2'];
  628. $local_part = strtolower(trim($postarray['local_part']));
  629. $name = $postarray['name'];
  630. $quota_m = $postarray['quota'];
  631. if (empty($name)) {
  632. $name = $local_part;
  633. }
  634. isset($postarray['active']) ? $active = '1' : $active = '0';
  635. $quota_b = ($quota_m * 1048576);
  636. $maildir = $domain."/".$local_part."/";
  637. if (!is_valid_domain_name($domain)) {
  638. $_SESSION['return'] = array(
  639. 'type' => 'danger',
  640. 'msg' => sprintf($lang['danger']['domain_invalid'])
  641. );
  642. return false;
  643. }
  644. try {
  645. $stmt = $pdo->prepare("SELECT `mailboxes`, `maxquota`, `quota` FROM `domain`
  646. WHERE `domain` = :domain");
  647. $stmt->execute(array(':domain' => $domain));
  648. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  649. }
  650. catch(PDOException $e) {
  651. $_SESSION['return'] = array(
  652. 'type' => 'danger',
  653. 'msg' => 'MySQL: '.$e
  654. );
  655. return false;
  656. }
  657. try {
  658. $stmt = $pdo->prepare("SELECT
  659. COUNT(*) as count,
  660. COALESCE(ROUND(SUM(`quota`)/1048576), 0) as `quota`
  661. FROM `mailbox`
  662. WHERE `domain` = :domain");
  663. $stmt->execute(array(':domain' => $domain));
  664. $MailboxData = $stmt->fetch(PDO::FETCH_ASSOC);
  665. }
  666. catch(PDOException $e) {
  667. $_SESSION['return'] = array(
  668. 'type' => 'danger',
  669. 'msg' => 'MySQL: '.$e
  670. );
  671. return false;
  672. }
  673. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  674. $_SESSION['return'] = array(
  675. 'type' => 'danger',
  676. 'msg' => sprintf($lang['danger']['access_denied'])
  677. );
  678. return false;
  679. }
  680. try {
  681. $stmt = $pdo->prepare("SELECT `local_part` FROM `mailbox` WHERE `local_part` = :local_part and `domain`= :domain");
  682. $stmt->execute(array(':local_part' => $local_part, ':domain' => $domain));
  683. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  684. }
  685. catch(PDOException $e) {
  686. $_SESSION['return'] = array(
  687. 'type' => 'danger',
  688. 'msg' => 'MySQL: '.$e
  689. );
  690. return false;
  691. }
  692. if ($num_results != 0) {
  693. $_SESSION['return'] = array(
  694. 'type' => 'danger',
  695. 'msg' => sprintf($lang['danger']['object_exists'], htmlspecialchars($username))
  696. );
  697. return false;
  698. }
  699. try {
  700. $stmt = $pdo->prepare("SELECT `address` FROM `alias` WHERE address= :username");
  701. $stmt->execute(array(':username' => $username));
  702. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  703. }
  704. catch(PDOException $e) {
  705. $_SESSION['return'] = array(
  706. 'type' => 'danger',
  707. 'msg' => 'MySQL: '.$e
  708. );
  709. return false;
  710. }
  711. if ($num_results != 0) {
  712. $_SESSION['return'] = array(
  713. 'type' => 'danger',
  714. 'msg' => sprintf($lang['danger']['is_alias'], htmlspecialchars($username))
  715. );
  716. return false;
  717. }
  718. try {
  719. $stmt = $pdo->prepare("SELECT `address` FROM `spamalias` WHERE `address`= :username");
  720. $stmt->execute(array(':username' => $username));
  721. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  722. }
  723. catch(PDOException $e) {
  724. $_SESSION['return'] = array(
  725. 'type' => 'danger',
  726. 'msg' => 'MySQL: '.$e
  727. );
  728. return false;
  729. }
  730. if ($num_results != 0) {
  731. $_SESSION['return'] = array(
  732. 'type' => 'danger',
  733. 'msg' => sprintf($lang['danger']['is_spam_alias'], htmlspecialchars($username))
  734. );
  735. return false;
  736. }
  737. if (!is_numeric($quota_m) || $quota_m == "0") {
  738. $_SESSION['return'] = array(
  739. 'type' => 'danger',
  740. 'msg' => sprintf($lang['danger']['quota_not_0_not_numeric'])
  741. );
  742. return false;
  743. }
  744. if (!empty($password) && !empty($password2)) {
  745. if ($password != $password2) {
  746. $_SESSION['return'] = array(
  747. 'type' => 'danger',
  748. 'msg' => sprintf($lang['danger']['password_mismatch'])
  749. );
  750. return false;
  751. }
  752. $password_hashed = hash_password($password);
  753. }
  754. else {
  755. $_SESSION['return'] = array(
  756. 'type' => 'danger',
  757. 'msg' => sprintf($lang['danger']['password_empty'])
  758. );
  759. return false;
  760. }
  761. if ($MailboxData['count'] >= $DomainData['mailboxes']) {
  762. $_SESSION['return'] = array(
  763. 'type' => 'danger',
  764. 'msg' => sprintf($lang['danger']['max_mailbox_exceeded'], $MailboxData['count'], $DomainData['mailboxes'])
  765. );
  766. return false;
  767. }
  768. try {
  769. $stmt = $pdo->prepare("SELECT `domain` FROM `domain` WHERE `domain`= :domain");
  770. $stmt->execute(array(':domain' => $domain));
  771. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  772. }
  773. catch(PDOException $e) {
  774. $_SESSION['return'] = array(
  775. 'type' => 'danger',
  776. 'msg' => 'MySQL: '.$e
  777. );
  778. return false;
  779. }
  780. if ($num_results == 0) {
  781. $_SESSION['return'] = array(
  782. 'type' => 'danger',
  783. 'msg' => $lang['danger']['domain_not_found']
  784. );
  785. return false;
  786. }
  787. if ($quota_m > $DomainData['maxquota']) {
  788. $_SESSION['return'] = array(
  789. 'type' => 'danger',
  790. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeded'], $DomainData['maxquota'])
  791. );
  792. return false;
  793. }
  794. if (($MailboxData['quota'] + $quota_m) > $DomainData['quota']) {
  795. $quota_left_m = ($DomainData['quota'] - $MailboxData['quota']);
  796. $_SESSION['return'] = array(
  797. 'type' => 'danger',
  798. 'msg' => sprintf($lang['danger']['mailbox_quota_left_exceeded'], $quota_left_m)
  799. );
  800. return false;
  801. }
  802. try {
  803. $stmt = $pdo->prepare("INSERT INTO `mailbox` (`username`, `password`, `name`, `maildir`, `quota`, `local_part`, `domain`, `created`, `modified`, `active`)
  804. VALUES (:username, :password_hashed, :name, :maildir, :quota_b, :local_part, :domain, :created, :modified, :active)");
  805. $stmt->execute(array(
  806. ':username' => $username,
  807. ':password_hashed' => $password_hashed,
  808. ':name' => $name,
  809. ':maildir' => $maildir,
  810. ':quota_b' => $quota_b,
  811. ':local_part' => $local_part,
  812. ':domain' => $domain,
  813. ':created' => date('Y-m-d H:i:s'),
  814. ':modified' => date('Y-m-d H:i:s'),
  815. ':active' => $active
  816. ));
  817. $stmt = $pdo->prepare("INSERT INTO `quota2` (`username`, `bytes`, `messages`)
  818. VALUES (:username, '0', '0')");
  819. $stmt->execute(array(':username' => $username));
  820. $stmt = $pdo->prepare("INSERT INTO `alias` (`address`, `goto`, `domain`, `created`, `modified`, `active`)
  821. VALUES (:username1, :username2, :domain, :created, :modified, :active)");
  822. $stmt->execute(array(
  823. ':username1' => $username,
  824. ':username2' => $username,
  825. ':domain' => $domain,
  826. ':created' => date('Y-m-d H:i:s'),
  827. ':modified' => date('Y-m-d H:i:s'),
  828. ':active' => $active
  829. ));
  830. $_SESSION['return'] = array(
  831. 'type' => 'success',
  832. 'msg' => sprintf($lang['success']['mailbox_added'], htmlspecialchars($username))
  833. );
  834. }
  835. catch (PDOException $e) {
  836. $_SESSION['return'] = array(
  837. 'type' => 'danger',
  838. 'msg' => 'MySQL: '.$e
  839. );
  840. return false;
  841. }
  842. }
  843. function mailbox_edit_alias($postarray) {
  844. global $lang;
  845. global $pdo;
  846. $address = $postarray['address'];
  847. $domain = idn_to_ascii(substr(strstr($address, '@'), 1));
  848. $local_part = strstr($address, '@', true);
  849. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  850. $_SESSION['return'] = array(
  851. 'type' => 'danger',
  852. 'msg' => sprintf($lang['danger']['access_denied'])
  853. );
  854. return false;
  855. }
  856. if (empty($postarray['goto'])) {
  857. $_SESSION['return'] = array(
  858. 'type' => 'danger',
  859. 'msg' => sprintf($lang['danger']['goto_empty'])
  860. );
  861. return false;
  862. }
  863. $gotos = array_map('trim', preg_split( "/( |,|;|\n)/", $postarray['goto']));
  864. foreach ($gotos as &$goto) {
  865. if (empty($goto)) {
  866. continue;
  867. }
  868. if (!filter_var($goto, FILTER_VALIDATE_EMAIL)) {
  869. $_SESSION['return'] = array(
  870. 'type' => 'danger',
  871. 'msg' =>sprintf($lang['danger']['goto_invalid'])
  872. );
  873. return false;
  874. }
  875. if ($goto == $address) {
  876. $_SESSION['return'] = array(
  877. 'type' => 'danger',
  878. 'msg' => sprintf($lang['danger']['alias_goto_identical'])
  879. );
  880. return false;
  881. }
  882. }
  883. $gotos = array_filter($gotos);
  884. $goto = implode(",", $gotos);
  885. isset($postarray['active']) ? $active = '1' : $active = '0';
  886. if ((!filter_var($address, FILTER_VALIDATE_EMAIL) === true) && !empty($local_part)) {
  887. $_SESSION['return'] = array(
  888. 'type' => 'danger',
  889. 'msg' => sprintf($lang['danger']['alias_invalid'])
  890. );
  891. return false;
  892. }
  893. try {
  894. $stmt = $pdo->prepare("UPDATE `alias` SET `goto` = :goto, `active`= :active WHERE `address` = :address");
  895. $stmt->execute(array(
  896. ':goto' => $goto,
  897. ':active' => $active,
  898. ':address' => $address
  899. ));
  900. $_SESSION['return'] = array(
  901. 'type' => 'success',
  902. 'msg' => sprintf($lang['success']['alias_modified'], htmlspecialchars($address))
  903. );
  904. }
  905. catch (PDOException $e) {
  906. $_SESSION['return'] = array(
  907. 'type' => 'danger',
  908. 'msg' => 'MySQL: '.$e
  909. );
  910. return false;
  911. }
  912. }
  913. function mailbox_edit_domain($postarray) {
  914. global $lang;
  915. global $pdo;
  916. $domain = $postarray['domain'];
  917. $description = $postarray['description'];
  918. $aliases = filter_var($postarray['aliases'], FILTER_SANITIZE_NUMBER_FLOAT);
  919. $mailboxes = filter_var($postarray['mailboxes'], FILTER_SANITIZE_NUMBER_FLOAT);
  920. $maxquota = filter_var($postarray['maxquota'], FILTER_SANITIZE_NUMBER_FLOAT);
  921. $quota = filter_var($postarray['quota'], FILTER_SANITIZE_NUMBER_FLOAT);
  922. isset($postarray['relay_all_recipients']) ? $relay_all_recipients = '1' : $relay_all_recipients = '0';
  923. isset($postarray['backupmx']) ? $backupmx = '1' : $backupmx = '0';
  924. isset($postarray['relay_all_recipients']) ? $backupmx = '1' : true;
  925. isset($postarray['active']) ? $active = '1' : $active = '0';
  926. try {
  927. $stmt = $pdo->prepare("SELECT
  928. COUNT(*) AS count,
  929. MAX(COALESCE(ROUND(`quota`/1048576), 0)) AS `maxquota`,
  930. COALESCE(ROUND(SUM(`quota`)/1048576), 0) AS `quota`
  931. FROM `mailbox`
  932. WHERE domain= :domain");
  933. $stmt->execute(array(':domain' => $domain));
  934. $MailboxData = $stmt->fetch(PDO::FETCH_ASSOC);
  935. }
  936. catch(PDOException $e) {
  937. $_SESSION['return'] = array(
  938. 'type' => 'danger',
  939. 'msg' => 'MySQL: '.$e
  940. );
  941. return false;
  942. }
  943. try {
  944. $stmt = $pdo->prepare("SELECT COUNT(*) AS `count` FROM `alias`
  945. WHERE domain = :domain
  946. AND address NOT IN (
  947. SELECT `username` FROM `mailbox`
  948. )");
  949. $stmt->execute(array(':domain' => $domain));
  950. $AliasData = $stmt->fetch(PDO::FETCH_ASSOC);
  951. }
  952. catch(PDOException $e) {
  953. $_SESSION['return'] = array(
  954. 'type' => 'danger',
  955. 'msg' => 'MySQL: '.$e
  956. );
  957. return false;
  958. }
  959. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  960. $_SESSION['return'] = array(
  961. 'type' => 'danger',
  962. 'msg' => sprintf($lang['danger']['access_denied'])
  963. );
  964. return false;
  965. }
  966. if ($maxquota > $quota) {
  967. $_SESSION['return'] = array(
  968. 'type' => 'danger',
  969. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeds_domain_quota'])
  970. );
  971. return false;
  972. }
  973. if ($MailboxData['maxquota'] > $maxquota) {
  974. $_SESSION['return'] = array(
  975. 'type' => 'danger',
  976. 'msg' => sprintf($lang['danger']['max_quota_in_use'], $MailboxData['maxquota'])
  977. );
  978. return false;
  979. }
  980. if ($MailboxData['quota'] > $quota) {
  981. $_SESSION['return'] = array(
  982. 'type' => 'danger',
  983. 'msg' => sprintf($lang['danger']['domain_quota_m_in_use'], $MailboxData['quota'])
  984. );
  985. return false;
  986. }
  987. if ($MailboxData['count'] > $mailboxes) {
  988. $_SESSION['return'] = array(
  989. 'type' => 'danger',
  990. 'msg' => sprintf($lang['danger']['mailboxes_in_use'], $MailboxData['count'])
  991. );
  992. return false;
  993. }
  994. if ($AliasData['count'] > $aliases) {
  995. $_SESSION['return'] = array(
  996. 'type' => 'danger',
  997. 'msg' => sprintf($lang['danger']['aliases_in_use'], $AliasData['count'])
  998. );
  999. return false;
  1000. }
  1001. if (!is_valid_domain_name($domain)) {
  1002. $_SESSION['return'] = array(
  1003. 'type' => 'danger',
  1004. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1005. );
  1006. return false;
  1007. }
  1008. try {
  1009. $stmt = $pdo->prepare("UPDATE `domain` SET
  1010. `modified`= :modified,
  1011. `relay_all_recipients` = :relay_all_recipients,
  1012. `backupmx` = :backupmx,
  1013. `active` = :active,
  1014. `quota` = :quota,
  1015. `maxquota` = :maxquota,
  1016. `mailboxes` = :mailboxes,
  1017. `aliases` = :aliases,
  1018. `description` = :description
  1019. WHERE `domain` = :domain");
  1020. $stmt->execute(array(
  1021. ':relay_all_recipients' => $relay_all_recipients,
  1022. ':backupmx' => $backupmx,
  1023. ':active' => $active,
  1024. ':quota' => $quota,
  1025. ':maxquota' => $maxquota,
  1026. ':mailboxes' => $mailboxes,
  1027. ':aliases' => $aliases,
  1028. ':modified' => date('Y-m-d H:i:s'),
  1029. ':description' => $description,
  1030. ':domain' => $domain
  1031. ));
  1032. $_SESSION['return'] = array(
  1033. 'type' => 'success',
  1034. 'msg' => sprintf($lang['success']['domain_modified'], htmlspecialchars($domain))
  1035. );
  1036. }
  1037. catch (PDOException $e) {
  1038. $_SESSION['return'] = array(
  1039. 'type' => 'danger',
  1040. 'msg' => 'MySQL: '.$e
  1041. );
  1042. return false;
  1043. }
  1044. }
  1045. function edit_domain_admin($postarray) {
  1046. global $lang;
  1047. global $pdo;
  1048. $username = $postarray['username'];
  1049. $password = $postarray['password'];
  1050. $password2 = $postarray['password2'];
  1051. isset($postarray['active']) ? $active = '1' : $active = '0';
  1052. if ($_SESSION['mailcow_cc_role'] != "admin") {
  1053. $_SESSION['return'] = array(
  1054. 'type' => 'danger',
  1055. 'msg' => sprintf($lang['danger']['access_denied'])
  1056. );
  1057. return false;
  1058. }
  1059. foreach ($postarray['domain'] as $domain) {
  1060. if (!is_valid_domain_name($domain)) {
  1061. $_SESSION['return'] = array(
  1062. 'type' => 'danger',
  1063. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1064. );
  1065. return false;
  1066. }
  1067. }
  1068. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
  1069. $_SESSION['return'] = array(
  1070. 'type' => 'danger',
  1071. 'msg' => sprintf($lang['danger']['username_invalid'])
  1072. );
  1073. return false;
  1074. }
  1075. try {
  1076. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
  1077. $stmt->execute(array(
  1078. ':username' => $username,
  1079. ));
  1080. }
  1081. catch (PDOException $e) {
  1082. $_SESSION['return'] = array(
  1083. 'type' => 'danger',
  1084. 'msg' => 'MySQL: '.$e
  1085. );
  1086. return false;
  1087. }
  1088. foreach ($postarray['domain'] as $domain) {
  1089. try {
  1090. $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
  1091. VALUES (:username, :domain, :created, :active)");
  1092. $stmt->execute(array(
  1093. ':username' => $username,
  1094. ':domain' => $domain,
  1095. ':created' => date('Y-m-d H:i:s'),
  1096. ':active' => $active
  1097. ));
  1098. }
  1099. catch (PDOException $e) {
  1100. $_SESSION['return'] = array(
  1101. 'type' => 'danger',
  1102. 'msg' => 'MySQL: '.$e
  1103. );
  1104. return false;
  1105. }
  1106. }
  1107. if (!empty($password) && !empty($password2)) {
  1108. if ($password != $password2) {
  1109. $_SESSION['return'] = array(
  1110. 'type' => 'danger',
  1111. 'msg' => sprintf($lang['danger']['password_mismatch'])
  1112. );
  1113. return false;
  1114. }
  1115. $password_hashed = hash_password($password);
  1116. try {
  1117. $stmt = $pdo->prepare("UPDATE `admin` SET `modified` = :modified, `active` = :active, `password` = :password_hashed WHERE `username` = :username");
  1118. $stmt->execute(array(
  1119. ':password_hashed' => $password_hashed,
  1120. ':username' => $username,
  1121. ':modified' => date('Y-m-d H:i:s'),
  1122. ':active' => $active
  1123. ));
  1124. }
  1125. catch (PDOException $e) {
  1126. $_SESSION['return'] = array(
  1127. 'type' => 'danger',
  1128. 'msg' => 'MySQL: '.$e
  1129. );
  1130. return false;
  1131. }
  1132. }
  1133. else {
  1134. try {
  1135. $stmt = $pdo->prepare("UPDATE `admin` SET `modified` = :modified, `active` = :active WHERE `username` = :username");
  1136. $stmt->execute(array(
  1137. ':username' => $username,
  1138. ':modified' => date('Y-m-d H:i:s'),
  1139. ':active' => $active
  1140. ));
  1141. }
  1142. catch (PDOException $e) {
  1143. $_SESSION['return'] = array(
  1144. 'type' => 'danger',
  1145. 'msg' => 'MySQL: '.$e
  1146. );
  1147. return false;
  1148. }
  1149. }
  1150. $_SESSION['return'] = array(
  1151. 'type' => 'success',
  1152. 'msg' => sprintf($lang['success']['domain_admin_modified'], htmlspecialchars($username))
  1153. );
  1154. }
  1155. function mailbox_edit_mailbox($postarray) {
  1156. global $lang;
  1157. global $pdo;
  1158. isset($postarray['active']) ? $active = '1' : $active = '0';
  1159. if (!filter_var($postarray['username'], FILTER_VALIDATE_EMAIL)) {
  1160. $_SESSION['return'] = array(
  1161. 'type' => 'danger',
  1162. 'msg' => sprintf($lang['danger']['username_invalid'])
  1163. );
  1164. return false;
  1165. }
  1166. $quota_m = $postarray['quota'];
  1167. $quota_b = $quota_m*1048576;
  1168. $username = $postarray['username'];
  1169. $name = $postarray['name'];
  1170. $password = $postarray['password'];
  1171. $password2 = $postarray['password2'];
  1172. try {
  1173. $stmt = $pdo->prepare("SELECT `domain`
  1174. FROM `mailbox`
  1175. WHERE username = :username");
  1176. $stmt->execute(array(':username' => $username));
  1177. $MailboxData1 = $stmt->fetch(PDO::FETCH_ASSOC);
  1178. $stmt = $pdo->prepare("SELECT
  1179. COALESCE(ROUND(SUM(`quota`)/1048576), 0) as `quota_m_now`
  1180. FROM `mailbox`
  1181. WHERE `username` = :username");
  1182. $stmt->execute(array(':username' => $username));
  1183. $MailboxData2 = $stmt->fetch(PDO::FETCH_ASSOC);
  1184. $stmt = $pdo->prepare("SELECT
  1185. COALESCE(ROUND(SUM(`quota`)/1048576), 0) as `quota_m_in_use`
  1186. FROM `mailbox`
  1187. WHERE `domain` = :domain");
  1188. $stmt->execute(array(':domain' => $MailboxData1['domain']));
  1189. $MailboxData3 = $stmt->fetch(PDO::FETCH_ASSOC);
  1190. $stmt = $pdo->prepare("SELECT `quota`, `maxquota`
  1191. FROM `domain`
  1192. WHERE `domain` = :domain");
  1193. $stmt->execute(array(':domain' => $MailboxData1['domain']));
  1194. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  1195. }
  1196. catch(PDOException $e) {
  1197. $_SESSION['return'] = array(
  1198. 'type' => 'danger',
  1199. 'msg' => 'MySQL: '.$e
  1200. );
  1201. return false;
  1202. }
  1203. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $MailboxData1['domain'])) {
  1204. $_SESSION['return'] = array(
  1205. 'type' => 'danger',
  1206. 'msg' => sprintf($lang['danger']['access_denied'])
  1207. );
  1208. return false;
  1209. }
  1210. if (!is_numeric($quota_m) || $quota_m == "0") {
  1211. $_SESSION['return'] = array(
  1212. 'type' => 'danger',
  1213. 'msg' => sprintf($lang['danger']['quota_not_0_not_numeric'], htmlspecialchars($quota_m))
  1214. );
  1215. return false;
  1216. }
  1217. if ($quota_m > $DomainData['maxquota']) {
  1218. $_SESSION['return'] = array(
  1219. 'type' => 'danger',
  1220. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeded'], $DomainData['maxquota'])
  1221. );
  1222. return false;
  1223. }
  1224. if (($MailboxData3['quota_m_in_use'] - $MailboxData2['quota_m_now'] + $quota_m) > $DomainData['quota']) {
  1225. $quota_left_m = ($DomainData['quota'] - $MailboxData3['quota_m_in_use'] + $MailboxData2['quota_m_now']);
  1226. $_SESSION['return'] = array(
  1227. 'type' => 'danger',
  1228. 'msg' => sprintf($lang['danger']['mailbox_quota_left_exceeded'], $quota_left_m)
  1229. );
  1230. return false;
  1231. }
  1232. try {
  1233. $stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` = :username");
  1234. $stmt->execute(array(
  1235. ':username' => $username
  1236. ));
  1237. }
  1238. catch (PDOException $e) {
  1239. $_SESSION['return'] = array(
  1240. 'type' => 'danger',
  1241. 'msg' => 'MySQL: '.$e
  1242. );
  1243. return false;
  1244. }
  1245. if (isset($postarray['sender_acl']) && is_array($postarray['sender_acl'])) {
  1246. foreach ($postarray['sender_acl'] as $sender_acl) {
  1247. if (!filter_var($sender_acl, FILTER_VALIDATE_EMAIL) &&
  1248. !is_valid_domain_name(str_replace('@', '', $sender_acl))) {
  1249. $_SESSION['return'] = array(
  1250. 'type' => 'danger',
  1251. 'msg' => sprintf($lang['danger']['sender_acl_invalid'])
  1252. );
  1253. return false;
  1254. }
  1255. }
  1256. foreach ($postarray['sender_acl'] as $sender_acl) {
  1257. try {
  1258. $stmt = $pdo->prepare("INSERT INTO `sender_acl` (`send_as`, `logged_in_as`)
  1259. VALUES (:sender_acl, :username)");
  1260. $stmt->execute(array(
  1261. ':sender_acl' => $sender_acl,
  1262. ':username' => $username
  1263. ));
  1264. }
  1265. catch (PDOException $e) {
  1266. $_SESSION['return'] = array(
  1267. 'type' => 'danger',
  1268. 'msg' => 'MySQL: '.$e
  1269. );
  1270. return false;
  1271. }
  1272. }
  1273. }
  1274. if (!empty($password) && !empty($password2)) {
  1275. if ($password != $password2) {
  1276. $_SESSION['return'] = array(
  1277. 'type' => 'danger',
  1278. 'msg' => sprintf($lang['danger']['password_mismatch'])
  1279. );
  1280. return false;
  1281. }
  1282. $password_hashed = hash_password($password);
  1283. try {
  1284. $stmt = $pdo->prepare("UPDATE `alias` SET
  1285. `modified` = :modified,
  1286. `active` = :active
  1287. WHERE `address` = :address");
  1288. $stmt->execute(array(
  1289. ':address' => $username,
  1290. ':modified' => date('Y-m-d H:i:s'),
  1291. ':active' => $active
  1292. ));
  1293. $stmt = $pdo->prepare("UPDATE `mailbox` SET
  1294. `modified` = :modified,
  1295. `active` = :active,
  1296. `password` = :password_hashed,
  1297. `name`= :name,
  1298. `quota` = :quota_b
  1299. WHERE `username` = :username");
  1300. $stmt->execute(array(
  1301. ':modified' => date('Y-m-d H:i:s'),
  1302. ':password_hashed' => $password_hashed,
  1303. ':active' => $active,
  1304. ':name' => $name,
  1305. ':quota_b' => $quota_b,
  1306. ':username' => $username
  1307. ));
  1308. $_SESSION['return'] = array(
  1309. 'type' => 'success',
  1310. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  1311. );
  1312. return true;
  1313. }
  1314. catch (PDOException $e) {
  1315. $_SESSION['return'] = array(
  1316. 'type' => 'danger',
  1317. 'msg' => 'MySQL: '.$e
  1318. );
  1319. return false;
  1320. }
  1321. }
  1322. try {
  1323. $stmt = $pdo->prepare("UPDATE `alias` SET
  1324. `modified` = :modified,
  1325. `active` = :active
  1326. WHERE `address` = :address");
  1327. $stmt->execute(array(
  1328. ':address' => $username,
  1329. ':modified' => date('Y-m-d H:i:s'),
  1330. ':active' => $active
  1331. ));
  1332. $stmt = $pdo->prepare("UPDATE `mailbox` SET
  1333. `modified` = :modified,
  1334. `active` = :active,
  1335. `name`= :name,
  1336. `quota` = :quota_b
  1337. WHERE `username` = :username");
  1338. $stmt->execute(array(
  1339. ':active' => $active,
  1340. ':modified' => date('Y-m-d H:i:s'),
  1341. ':name' => $name,
  1342. ':quota_b' => $quota_b,
  1343. ':username' => $username
  1344. ));
  1345. $_SESSION['return'] = array(
  1346. 'type' => 'success',
  1347. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  1348. );
  1349. return true;
  1350. }
  1351. catch (PDOException $e) {
  1352. $_SESSION['return'] = array(
  1353. 'type' => 'danger',
  1354. 'msg' => 'MySQL: '.$e
  1355. );
  1356. return false;
  1357. }
  1358. }
  1359. function mailbox_delete_domain($postarray) {
  1360. global $lang;
  1361. global $pdo;
  1362. $domain = $postarray['domain'];
  1363. if ($_SESSION['mailcow_cc_role'] != "admin") {
  1364. $_SESSION['return'] = array(
  1365. 'type' => 'danger',
  1366. 'msg' => sprintf($lang['danger']['access_denied'])
  1367. );
  1368. return false;
  1369. }
  1370. if (!is_valid_domain_name($domain)) {
  1371. $_SESSION['return'] = array(
  1372. 'type' => 'danger',
  1373. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1374. );
  1375. return false;
  1376. }
  1377. $domain = strtolower(trim($domain));
  1378. try {
  1379. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox`
  1380. WHERE `domain` = :domain");
  1381. $stmt->execute(array(':domain' => $domain));
  1382. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  1383. }
  1384. catch(PDOException $e) {
  1385. $_SESSION['return'] = array(
  1386. 'type' => 'danger',
  1387. 'msg' => 'MySQL: '.$e
  1388. );
  1389. return false;
  1390. }
  1391. if ($num_results != 0 || !empty($num_results)) {
  1392. $_SESSION['return'] = array(
  1393. 'type' => 'danger',
  1394. 'msg' => sprintf($lang['danger']['domain_not_empty'])
  1395. );
  1396. return false;
  1397. }
  1398. try {
  1399. $stmt = $pdo->prepare("DELETE FROM `domain` WHERE `domain` = :domain");
  1400. $stmt->execute(array(
  1401. ':domain' => $domain,
  1402. ));
  1403. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `domain` = :domain");
  1404. $stmt->execute(array(
  1405. ':domain' => $domain,
  1406. ));
  1407. $stmt = $pdo->prepare("DELETE FROM `alias` WHERE `domain` = :domain");
  1408. $stmt->execute(array(
  1409. ':domain' => $domain,
  1410. ));
  1411. $stmt = $pdo->prepare("DELETE FROM `alias_domain` WHERE `target_domain` = :domain");
  1412. $stmt->execute(array(
  1413. ':domain' => $domain,
  1414. ));
  1415. $stmt = $pdo->prepare("DELETE FROM `mailbox` WHERE `domain` = :domain");
  1416. $stmt->execute(array(
  1417. ':domain' => $domain,
  1418. ));
  1419. $stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` LIKE :domain");
  1420. $stmt->execute(array(
  1421. ':domain' => '%@'.$domain,
  1422. ));
  1423. $stmt = $pdo->prepare("DELETE FROM `quota2` WHERE `username` = :domain");
  1424. $stmt->execute(array(
  1425. ':domain' => '%@'.$domain,
  1426. ));
  1427. $stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `address` = :domain");
  1428. $stmt->execute(array(
  1429. ':domain' => '%@'.$domain,
  1430. ));
  1431. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :domain");
  1432. $stmt->execute(array(
  1433. ':domain' => '%@'.$domain,
  1434. ));
  1435. }
  1436. catch (PDOException $e) {
  1437. $_SESSION['return'] = array(
  1438. 'type' => 'danger',
  1439. 'msg' => 'MySQL: '.$e
  1440. );
  1441. return false;
  1442. }
  1443. $_SESSION['return'] = array(
  1444. 'type' => 'success',
  1445. 'msg' => sprintf($lang['success']['domain_removed'], htmlspecialchars($domain))
  1446. );
  1447. return true;
  1448. }
  1449. function mailbox_delete_alias($postarray) {
  1450. global $lang;
  1451. global $pdo;
  1452. $address = $postarray['address'];
  1453. $local_part = strstr($address, '@', true);
  1454. $domain = substr(strrchr($address, "@"), 1);
  1455. try {
  1456. $stmt = $pdo->prepare("SELECT `goto` FROM `alias` WHERE `address` = :address");
  1457. $stmt->execute(array(':address' => $address));
  1458. $gotos = $stmt->fetch(PDO::FETCH_ASSOC);
  1459. }
  1460. catch(PDOException $e) {
  1461. $_SESSION['return'] = array(
  1462. 'type' => 'danger',
  1463. 'msg' => 'MySQL: '.$e
  1464. );
  1465. return false;
  1466. }
  1467. $goto_array = explode(',', $gotos['goto']);
  1468. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  1469. $_SESSION['return'] = array(
  1470. 'type' => 'danger',
  1471. 'msg' => sprintf($lang['danger']['access_denied'])
  1472. );
  1473. return false;
  1474. }
  1475. try {
  1476. $stmt = $pdo->prepare("DELETE FROM `alias` WHERE `address` = :address AND `address` NOT IN (SELECT `username` FROM `mailbox`)");
  1477. $stmt->execute(array(
  1478. ':address' => $address
  1479. ));
  1480. }
  1481. catch (PDOException $e) {
  1482. $_SESSION['return'] = array(
  1483. 'type' => 'danger',
  1484. 'msg' => 'MySQL: '.$e
  1485. );
  1486. return false;
  1487. }
  1488. $_SESSION['return'] = array(
  1489. 'type' => 'success',
  1490. 'msg' => sprintf($lang['success']['alias_removed'], htmlspecialchars($address))
  1491. );
  1492. }
  1493. function mailbox_delete_alias_domain($postarray) {
  1494. global $lang;
  1495. global $pdo;
  1496. if (!is_valid_domain_name($postarray['alias_domain'])) {
  1497. $_SESSION['return'] = array(
  1498. 'type' => 'danger',
  1499. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1500. );
  1501. return false;
  1502. }
  1503. $alias_domain = $postarray['alias_domain'];
  1504. try {
  1505. $stmt = $pdo->prepare("SELECT `target_domain` FROM `alias_domain`
  1506. WHERE `alias_domain`= :alias_domain");
  1507. $stmt->execute(array(':alias_domain' => $alias_domain));
  1508. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  1509. }
  1510. catch(PDOException $e) {
  1511. $_SESSION['return'] = array(
  1512. 'type' => 'danger',
  1513. 'msg' => 'MySQL: '.$e
  1514. );
  1515. return false;
  1516. }
  1517. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $DomainData['target_domain'])) {
  1518. $_SESSION['return'] = array(
  1519. 'type' => 'danger',
  1520. 'msg' => sprintf($lang['danger']['access_denied'])
  1521. );
  1522. return false;
  1523. }
  1524. try {
  1525. $stmt = $pdo->prepare("DELETE FROM `alias_domain` WHERE `alias_domain` = :alias_domain");
  1526. $stmt->execute(array(
  1527. ':alias_domain' => $alias_domain,
  1528. ));
  1529. }
  1530. catch (PDOException $e) {
  1531. $_SESSION['return'] = array(
  1532. 'type' => 'danger',
  1533. 'msg' => 'MySQL: '.$e
  1534. );
  1535. return false;
  1536. }
  1537. $_SESSION['return'] = array(
  1538. 'type' => 'success',
  1539. 'msg' => sprintf($lang['success']['alias_domain_removed'], htmlspecialchars($alias_domain))
  1540. );
  1541. }
  1542. function mailbox_delete_mailbox($postarray) {
  1543. global $lang;
  1544. global $pdo;
  1545. $domain = substr(strrchr($postarray['username'], "@"), 1);
  1546. $username = $postarray['username'];
  1547. if (!filter_var($postarray['username'], FILTER_VALIDATE_EMAIL)) {
  1548. $_SESSION['return'] = array(
  1549. 'type' => 'danger',
  1550. 'msg' => sprintf($lang['danger']['access_denied'])
  1551. );
  1552. return false;
  1553. }
  1554. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  1555. $_SESSION['return'] = array(
  1556. 'type' => 'danger',
  1557. 'msg' => sprintf($lang['danger']['access_denied'])
  1558. );
  1559. return false;
  1560. }
  1561. try {
  1562. $stmt = $pdo->prepare("DELETE FROM `alias` WHERE `goto` = :username");
  1563. $stmt->execute(array(
  1564. ':username' => $username
  1565. ));
  1566. $stmt = $pdo->prepare("DELETE FROM `quota2` WHERE `username` = :username");
  1567. $stmt->execute(array(
  1568. ':username' => $username
  1569. ));
  1570. $stmt = $pdo->prepare("DELETE FROM `mailbox` WHERE `username` = :username");
  1571. $stmt->execute(array(
  1572. ':username' => $username
  1573. ));
  1574. $stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` = :username");
  1575. $stmt->execute(array(
  1576. ':username' => $username
  1577. ));
  1578. $stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `goto` = :username");
  1579. $stmt->execute(array(
  1580. ':username' => $username
  1581. ));
  1582. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :username");
  1583. $stmt->execute(array(
  1584. ':username' => $username
  1585. ));
  1586. $stmt = $pdo->prepare("SELECT `address`, `goto` FROM `alias`
  1587. WHERE `goto` LIKE :username");
  1588. $stmt->execute(array(':username' => '%'.$username.'%'));
  1589. $GotoData = $stmt->fetchAll(PDO::FETCH_ASSOC);
  1590. foreach ($GotoData as $gotos) {
  1591. $goto_exploded = explode(',', $gotos['goto']);
  1592. if (($key = array_search($username, $goto_exploded)) !== false) {
  1593. unset($goto_exploded[$key]);
  1594. }
  1595. $gotos_rebuild = implode(',', $goto_exploded);
  1596. $stmt = $pdo->prepare("UPDATE `alias` SET `goto` = :goto WHERE `address` = :address");
  1597. $stmt->execute(array(
  1598. ':goto' => $gotos_rebuild,
  1599. ':address' => $gotos['address']
  1600. ));
  1601. }
  1602. }
  1603. catch (PDOException $e) {
  1604. $_SESSION['return'] = array(
  1605. 'type' => 'danger',
  1606. 'msg' => 'MySQL: '.$e
  1607. );
  1608. return false;
  1609. }
  1610. $_SESSION['return'] = array(
  1611. 'type' => 'success',
  1612. 'msg' => sprintf($lang['success']['mailbox_removed'], htmlspecialchars($username))
  1613. );
  1614. }
  1615. function set_admin_account($postarray) {
  1616. global $lang;
  1617. global $pdo;
  1618. if ($_SESSION['mailcow_cc_role'] != "admin") {
  1619. $_SESSION['return'] = array(
  1620. 'type' => 'danger',
  1621. 'msg' => sprintf($lang['danger']['access_denied'])
  1622. );
  1623. return false;
  1624. }
  1625. $name = $postarray['admin_user'];
  1626. $name_now = $postarray['admin_user_now'];
  1627. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $name)) || empty ($name)) {
  1628. $_SESSION['return'] = array(
  1629. 'type' => 'danger',
  1630. 'msg' => sprintf($lang['danger']['username_invalid'])
  1631. );
  1632. return false;
  1633. }
  1634. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $name_now)) || empty ($name_now)) {
  1635. $_SESSION['return'] = array(
  1636. 'type' => 'danger',
  1637. 'msg' => sprintf($lang['danger']['username_invalid'])
  1638. );
  1639. return false;
  1640. }
  1641. if (!empty($postarray['admin_pass']) && !empty($postarray['admin_pass2'])) {
  1642. if ($postarray['admin_pass'] != $postarray['admin_pass2']) {
  1643. $_SESSION['return'] = array(
  1644. 'type' => 'danger',
  1645. 'msg' => sprintf($lang['danger']['password_mismatch'])
  1646. );
  1647. return false;
  1648. }
  1649. $password_hashed = hash_password($postarray['admin_pass']);
  1650. try {
  1651. $stmt = $pdo->prepare("UPDATE `admin` SET
  1652. `modified` = :modified,
  1653. `password` = :password_hashed,
  1654. `username` = :name
  1655. WHERE `username` = :username");
  1656. $stmt->execute(array(
  1657. ':password_hashed' => $password_hashed,
  1658. ':modified' => date('Y-m-d H:i:s'),
  1659. ':name' => $name,
  1660. ':username' => $name_now
  1661. ));
  1662. }
  1663. catch (PDOException $e) {
  1664. $_SESSION['return'] = array(
  1665. 'type' => 'danger',
  1666. 'msg' => 'MySQL: '.$e
  1667. );
  1668. return false;
  1669. }
  1670. }
  1671. else {
  1672. try {
  1673. $stmt = $pdo->prepare("UPDATE `admin` SET
  1674. `modified` = :modified,
  1675. `username` = :name
  1676. WHERE `username` = :name_now");
  1677. $stmt->execute(array(
  1678. ':name' => $name,
  1679. ':modified' => date('Y-m-d H:i:s'),
  1680. ':name_now' => $name_now
  1681. ));
  1682. }
  1683. catch (PDOException $e) {
  1684. $_SESSION['return'] = array(
  1685. 'type' => 'danger',
  1686. 'msg' => 'MySQL: '.$e
  1687. );
  1688. return false;
  1689. }
  1690. }
  1691. try {
  1692. $stmt = $pdo->prepare("UPDATE `domain_admins` SET
  1693. `domain` = :domain,
  1694. `username` = :name
  1695. WHERE `username` = :name_now");
  1696. $stmt->execute(array(
  1697. ':domain' => 'ALL',
  1698. ':name' => $name,
  1699. ':name_now' => $name_now
  1700. ));
  1701. }
  1702. catch (PDOException $e) {
  1703. $_SESSION['return'] = array(
  1704. 'type' => 'danger',
  1705. 'msg' => 'MySQL: '.$e
  1706. );
  1707. return false;
  1708. }
  1709. $_SESSION['return'] = array(
  1710. 'type' => 'success',
  1711. 'msg' => sprintf($lang['success']['admin_modified'])
  1712. );
  1713. }
  1714. function set_time_limited_aliases($postarray) {
  1715. global $lang;
  1716. global $pdo;
  1717. $username = $_SESSION['mailcow_cc_username'];
  1718. $domain = substr($username, strpos($username, '@'));
  1719. if (($_SESSION['mailcow_cc_role'] != "user" &&
  1720. $_SESSION['mailcow_cc_role'] != "domainadmin") ||
  1721. empty($username) ||
  1722. empty($domain)) {
  1723. $_SESSION['return'] = array(
  1724. 'type' => 'danger',
  1725. 'msg' => sprintf($lang['danger']['access_denied'])
  1726. );
  1727. return false;
  1728. }
  1729. switch ($postarray["trigger_set_time_limited_aliases"]) {
  1730. case "generate":
  1731. if (!is_numeric($postarray["validity"]) || $postarray["validity"] > 672) {
  1732. $_SESSION['return'] = array(
  1733. 'type' => 'danger',
  1734. 'msg' => sprintf($lang['danger']['validity_missing'])
  1735. );
  1736. return false;
  1737. }
  1738. $validity = strtotime("+".$postarray["validity"]." hour");
  1739. $letters = 'abcefghijklmnopqrstuvwxyz1234567890';
  1740. $random_name = substr(str_shuffle($letters), 0, 24);
  1741. try {
  1742. $stmt = $pdo->prepare("INSERT INTO `spamalias` (`address`, `goto`, `validity`) VALUES
  1743. (:address, :goto, :validity)");
  1744. $stmt->execute(array(
  1745. ':address' => $random_name.$domain,
  1746. ':goto' => $username,
  1747. ':validity' => $validity
  1748. ));
  1749. }
  1750. catch (PDOException $e) {
  1751. $_SESSION['return'] = array(
  1752. 'type' => 'danger',
  1753. 'msg' => 'MySQL: '.$e
  1754. );
  1755. return false;
  1756. }
  1757. $_SESSION['return'] = array(
  1758. 'type' => 'success',
  1759. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username))
  1760. );
  1761. break;
  1762. case "delete":
  1763. try {
  1764. $stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `goto` = :username");
  1765. $stmt->execute(array(
  1766. ':username' => $username
  1767. ));
  1768. }
  1769. catch (PDOException $e) {
  1770. $_SESSION['return'] = array(
  1771. 'type' => 'danger',
  1772. 'msg' => 'MySQL: '.$e
  1773. );
  1774. return false;
  1775. }
  1776. $_SESSION['return'] = array(
  1777. 'type' => 'success',
  1778. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username))
  1779. );
  1780. break;
  1781. case "extend":
  1782. try {
  1783. $stmt = $pdo->prepare("UPDATE `spamalias` SET `validity` = (`validity` + 3600)
  1784. WHERE `goto` = :username
  1785. AND `validity` >= :validity");
  1786. $stmt->execute(array(
  1787. ':username' => $username,
  1788. ':validity' => time(),
  1789. ));
  1790. }
  1791. catch (PDOException $e) {
  1792. $_SESSION['return'] = array(
  1793. 'type' => 'danger',
  1794. 'msg' => 'MySQL: '.$e
  1795. );
  1796. return false;
  1797. }
  1798. $_SESSION['return'] = array(
  1799. 'type' => 'success',
  1800. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username))
  1801. );
  1802. break;
  1803. }
  1804. }
  1805. function set_user_account($postarray) {
  1806. global $lang;
  1807. global $pdo;
  1808. $username = $_SESSION['mailcow_cc_username'];
  1809. $password_old = $postarray['user_old_pass'];
  1810. isset($postarray['togglePwNew']) ? $pwnew_active = '1' : $pwnew_active = '0';
  1811. if (isset($pwnew_active) && $pwnew_active == "1") {
  1812. $password_new = $postarray['user_new_pass'];
  1813. $password_new2 = $postarray['user_new_pass2'];
  1814. }
  1815. if (!check_login($username, $password_old) == "user") {
  1816. $_SESSION['return'] = array(
  1817. 'type' => 'danger',
  1818. 'msg' => sprintf($lang['danger']['access_denied'])
  1819. );
  1820. return false;
  1821. }
  1822. if ($_SESSION['mailcow_cc_role'] != "user" &&
  1823. $_SESSION['mailcow_cc_role'] != "domainadmin") {
  1824. $_SESSION['return'] = array(
  1825. 'type' => 'danger',
  1826. 'msg' => sprintf($lang['danger']['access_denied'])
  1827. );
  1828. return false;
  1829. }
  1830. if (isset($password_new) && isset($password_new2)) {
  1831. if (!empty($password_new2) && !empty($password_new)) {
  1832. if ($password_new2 != $password_new) {
  1833. $_SESSION['return'] = array(
  1834. 'type' => 'danger',
  1835. 'msg' => sprintf($lang['danger']['password_mismatch'])
  1836. );
  1837. return false;
  1838. }
  1839. if (strlen($password_new) < "6" ||
  1840. !preg_match('/[A-Za-z]/', $password_new) ||
  1841. !preg_match('/[0-9]/', $password_new)) {
  1842. $_SESSION['return'] = array(
  1843. 'type' => 'danger',
  1844. 'msg' => sprintf($lang['danger']['password_complexity'])
  1845. );
  1846. return false;
  1847. }
  1848. $password_hashed = hash_password($password_new);
  1849. try {
  1850. $stmt = $pdo->prepare("UPDATE `mailbox` SET `modified` = :modified, `password` = :password_hashed WHERE `username` = :username");
  1851. $stmt->execute(array(
  1852. ':password_hashed' => $password_hashed,
  1853. ':modified' => date('Y-m-d H:i:s'),
  1854. ':username' => $username
  1855. ));
  1856. }
  1857. catch (PDOException $e) {
  1858. $_SESSION['return'] = array(
  1859. 'type' => 'danger',
  1860. 'msg' => 'MySQL: '.$e
  1861. );
  1862. return false;
  1863. }
  1864. }
  1865. }
  1866. $_SESSION['return'] = array(
  1867. 'type' => 'success',
  1868. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  1869. );
  1870. }
  1871. function add_domain_admin($postarray) {
  1872. global $lang;
  1873. global $pdo;
  1874. $username = strtolower(trim($postarray['username']));
  1875. $password = $postarray['password'];
  1876. $password2 = $postarray['password2'];
  1877. isset($postarray['active']) ? $active = '1' : $active = '0';
  1878. if ($_SESSION['mailcow_cc_role'] != "admin") {
  1879. $_SESSION['return'] = array(
  1880. 'type' => 'danger',
  1881. 'msg' => sprintf($lang['danger']['access_denied'])
  1882. );
  1883. return false;
  1884. }
  1885. if (empty($postarray['domain'])) {
  1886. $_SESSION['return'] = array(
  1887. 'type' => 'danger',
  1888. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1889. );
  1890. return false;
  1891. }
  1892. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username)) || empty ($username)) {
  1893. $_SESSION['return'] = array(
  1894. 'type' => 'danger',
  1895. 'msg' => sprintf($lang['danger']['username_invalid'])
  1896. );
  1897. return false;
  1898. }
  1899. try {
  1900. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox`
  1901. WHERE `username` = :username");
  1902. $stmt->execute(array(':username' => $username));
  1903. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  1904. $stmt = $pdo->prepare("SELECT `username` FROM `admin`
  1905. WHERE `username` = :username");
  1906. $stmt->execute(array(':username' => $username));
  1907. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  1908. $stmt = $pdo->prepare("SELECT `username` FROM `domain_admins`
  1909. WHERE `username` = :username");
  1910. $stmt->execute(array(':username' => $username));
  1911. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  1912. }
  1913. catch(PDOException $e) {
  1914. $_SESSION['return'] = array(
  1915. 'type' => 'danger',
  1916. 'msg' => 'MySQL: '.$e
  1917. );
  1918. return false;
  1919. }
  1920. foreach ($num_results as $num_results_each) {
  1921. if ($num_results_each != 0) {
  1922. $_SESSION['return'] = array(
  1923. 'type' => 'danger',
  1924. 'msg' => sprintf($lang['danger']['object_exists'], htmlspecialchars($username))
  1925. );
  1926. return false;
  1927. }
  1928. }
  1929. if (!empty($password) && !empty($password2)) {
  1930. if ($password != $password2) {
  1931. $_SESSION['return'] = array(
  1932. 'type' => 'danger',
  1933. 'msg' => sprintf($lang['danger']['password_mismatch'])
  1934. );
  1935. return false;
  1936. }
  1937. $password_hashed = hash_password($password);
  1938. foreach ($postarray['domain'] as $domain) {
  1939. if (!is_valid_domain_name($domain)) {
  1940. $_SESSION['return'] = array(
  1941. 'type' => 'danger',
  1942. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1943. );
  1944. return false;
  1945. }
  1946. try {
  1947. $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
  1948. VALUES (:username, :domain, :created, :active)");
  1949. $stmt->execute(array(
  1950. ':username' => $username,
  1951. ':domain' => $domain,
  1952. ':created' => date('Y-m-d H:i:s'),
  1953. ':active' => $active
  1954. ));
  1955. }
  1956. catch (PDOException $e) {
  1957. $_SESSION['return'] = array(
  1958. 'type' => 'danger',
  1959. 'msg' => 'MySQL: '.$e
  1960. );
  1961. return false;
  1962. }
  1963. }
  1964. try {
  1965. $stmt = $pdo->prepare("INSERT INTO `admin` (`username`, `password`, `superadmin`, `created`, `modified`, `active`)
  1966. VALUES (:username, :password_hashed, '0', :created, :modified, :active)");
  1967. $stmt->execute(array(
  1968. ':username' => $username,
  1969. ':password_hashed' => $password_hashed,
  1970. ':created' => date('Y-m-d H:i:s'),
  1971. ':modified' => date('Y-m-d H:i:s'),
  1972. ':active' => $active
  1973. ));
  1974. }
  1975. catch (PDOException $e) {
  1976. $_SESSION['return'] = array(
  1977. 'type' => 'danger',
  1978. 'msg' => 'MySQL: '.$e
  1979. );
  1980. return false;
  1981. }
  1982. }
  1983. else {
  1984. $_SESSION['return'] = array(
  1985. 'type' => 'danger',
  1986. 'msg' => sprintf($lang['danger']['password_empty'])
  1987. );
  1988. return false;
  1989. }
  1990. $_SESSION['return'] = array(
  1991. 'type' => 'success',
  1992. 'msg' => sprintf($lang['success']['domain_admin_added'], htmlspecialchars($username))
  1993. );
  1994. }
  1995. function delete_domain_admin($postarray) {
  1996. global $pdo;
  1997. global $lang;
  1998. if ($_SESSION['mailcow_cc_role'] != "admin") {
  1999. $_SESSION['return'] = array(
  2000. 'type' => 'danger',
  2001. 'msg' => sprintf($lang['danger']['access_denied'])
  2002. );
  2003. return false;
  2004. }
  2005. $username = $postarray['username'];
  2006. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
  2007. $_SESSION['return'] = array(
  2008. 'type' => 'danger',
  2009. 'msg' => sprintf($lang['danger']['username_invalid'])
  2010. );
  2011. return false;
  2012. }
  2013. try {
  2014. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
  2015. $stmt->execute(array(
  2016. ':username' => $username,
  2017. ));
  2018. $stmt = $pdo->prepare("DELETE FROM `admin` WHERE `username` = :username");
  2019. $stmt->execute(array(
  2020. ':username' => $username,
  2021. ));
  2022. }
  2023. catch (PDOException $e) {
  2024. $_SESSION['return'] = array(
  2025. 'type' => 'danger',
  2026. 'msg' => 'MySQL: '.$e
  2027. );
  2028. return false;
  2029. }
  2030. $_SESSION['return'] = array(
  2031. 'type' => 'success',
  2032. 'msg' => sprintf($lang['success']['domain_admin_removed'], htmlspecialchars($username))
  2033. );
  2034. }
  2035. function get_spam_score($username) {
  2036. global $pdo;
  2037. $default = "5, 15";
  2038. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  2039. return $default;
  2040. }
  2041. try {
  2042. $stmt = $pdo->prepare("SELECT `value` FROM `filterconf` WHERE `object` = :username AND
  2043. (`option` = 'lowspamlevel' OR `option` = 'highspamlevel')");
  2044. $stmt->execute(array(':username' => $username));
  2045. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  2046. }
  2047. catch(PDOException $e) {
  2048. $_SESSION['return'] = array(
  2049. 'type' => 'danger',
  2050. 'msg' => 'MySQL: '.$e
  2051. );
  2052. return false;
  2053. }
  2054. if ($num_results == 0 || empty ($num_results)) {
  2055. return $default;
  2056. }
  2057. else {
  2058. try {
  2059. $stmt = $pdo->prepare("SELECT `value` FROM `filterconf` WHERE `option` = 'highspamlevel' AND `object` = :username");
  2060. $stmt->execute(array(':username' => $username));
  2061. $highspamlevel = $stmt->fetch(PDO::FETCH_ASSOC);
  2062. $stmt = $pdo->prepare("SELECT `value` FROM `filterconf` WHERE `option` = 'lowspamlevel' AND `object` = :username");
  2063. $stmt->execute(array(':username' => $username));
  2064. $lowspamlevel = $stmt->fetch(PDO::FETCH_ASSOC);
  2065. return $lowspamlevel['value'].', '.$highspamlevel['value'];
  2066. }
  2067. catch(PDOException $e) {
  2068. $_SESSION['return'] = array(
  2069. 'type' => 'danger',
  2070. 'msg' => 'MySQL: '.$e
  2071. );
  2072. return false;
  2073. }
  2074. }
  2075. }
  2076. function set_whitelist($postarray) {
  2077. global $lang;
  2078. global $pdo;
  2079. $username = $_SESSION['mailcow_cc_username'];
  2080. $whitelist_from = trim(strtolower($postarray['whitelist_from']));
  2081. $whitelist_from = preg_replace("/\.\*/", "*", $whitelist_from);
  2082. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  2083. $_SESSION['return'] = array(
  2084. 'type' => 'danger',
  2085. 'msg' => sprintf($lang['danger']['username_invalid'])
  2086. );
  2087. return false;
  2088. }
  2089. if (!ctype_alnum(str_replace(array('@', '.', '-', '*'), '', $whitelist_from))) {
  2090. $_SESSION['return'] = array(
  2091. 'type' => 'danger',
  2092. 'msg' => sprintf($lang['danger']['whitelist_from_invalid'])
  2093. );
  2094. return false;
  2095. }
  2096. try {
  2097. $stmt = $pdo->prepare("SELECT `object` FROM `filterconf`
  2098. WHERE `option` = 'whitelist_from'
  2099. AND `object` = :username
  2100. AND `value` = :whitelist_from");
  2101. $stmt->execute(array(':username' => $username, ':whitelist_from' => $whitelist_from));
  2102. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  2103. }
  2104. catch(PDOException $e) {
  2105. $_SESSION['return'] = array(
  2106. 'type' => 'danger',
  2107. 'msg' => 'MySQL: '.$e
  2108. );
  2109. return false;
  2110. }
  2111. if ($num_results != 0) {
  2112. $_SESSION['return'] = array(
  2113. 'type' => 'danger',
  2114. 'msg' => sprintf($lang['danger']['whitelist_exists'])
  2115. );
  2116. return false;
  2117. }
  2118. try {
  2119. $stmt = $pdo->prepare("INSERT INTO `filterconf` (`object`, `option` ,`value`)
  2120. VALUES (:username, 'whitelist_from', :whitelist_from)");
  2121. $stmt->execute(array(
  2122. ':username' => $username,
  2123. ':whitelist_from' => $whitelist_from
  2124. ));
  2125. }
  2126. catch (PDOException $e) {
  2127. $_SESSION['return'] = array(
  2128. 'type' => 'danger',
  2129. 'msg' => 'MySQL: '.$e
  2130. );
  2131. return false;
  2132. }
  2133. $_SESSION['return'] = array(
  2134. 'type' => 'success',
  2135. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  2136. );
  2137. }
  2138. function delete_whitelist($postarray) {
  2139. global $lang;
  2140. global $pdo;
  2141. $username = $_SESSION['mailcow_cc_username'];
  2142. $prefid = $postarray['wlid'];
  2143. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  2144. $_SESSION['return'] = array(
  2145. 'type' => 'danger',
  2146. 'msg' => sprintf($lang['danger']['username_invalid'])
  2147. );
  2148. return false;
  2149. }
  2150. if (!is_numeric($prefid)) {
  2151. $_SESSION['return'] = array(
  2152. 'type' => 'danger',
  2153. 'msg' => sprintf($lang['danger']['whitelist_from_invalid'])
  2154. );
  2155. return false;
  2156. }
  2157. try {
  2158. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :username AND `prefid` = :prefid");
  2159. $stmt->execute(array(
  2160. ':username' => $username,
  2161. ':prefid' => $prefid
  2162. ));
  2163. }
  2164. catch (PDOException $e) {
  2165. $_SESSION['return'] = array(
  2166. 'type' => 'danger',
  2167. 'msg' => 'MySQL: '.$e
  2168. );
  2169. return false;
  2170. }
  2171. $_SESSION['return'] = array(
  2172. 'type' => 'success',
  2173. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  2174. );
  2175. }
  2176. function set_blacklist($postarray) {
  2177. global $lang;
  2178. global $pdo;
  2179. $username = $_SESSION['mailcow_cc_username'];
  2180. $blacklist_from = trim(strtolower($postarray['blacklist_from']));
  2181. $blacklist_from = preg_replace("/\.\*/", "*", $blacklist_from);
  2182. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  2183. $_SESSION['return'] = array(
  2184. 'type' => 'danger',
  2185. 'msg' => sprintf($lang['danger']['username_invalid'])
  2186. );
  2187. return false;
  2188. }
  2189. if (!ctype_alnum(str_replace(array('@', '.', '-', '*'), '', $blacklist_from))) {
  2190. $_SESSION['return'] = array(
  2191. 'type' => 'danger',
  2192. 'msg' => sprintf($lang['danger']['blacklist_from_invalid'])
  2193. );
  2194. return false;
  2195. }
  2196. try {
  2197. $stmt = $pdo->prepare("SELECT `object` FROM `filterconf`
  2198. WHERE `option` = 'blacklist_from'
  2199. AND `object` = :username
  2200. AND `value` = :blacklist_from");
  2201. $stmt->execute(array(':username' => $username, ':blacklist_from' => $blacklist_from));
  2202. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  2203. }
  2204. catch(PDOException $e) {
  2205. $_SESSION['return'] = array(
  2206. 'type' => 'danger',
  2207. 'msg' => 'MySQL: '.$e
  2208. );
  2209. return false;
  2210. }
  2211. if ($num_results != 0) {
  2212. $_SESSION['return'] = array(
  2213. 'type' => 'danger',
  2214. 'msg' => sprintf($lang['danger']['blacklist_exists'])
  2215. );
  2216. return false;
  2217. }
  2218. try {
  2219. $stmt = $pdo->prepare("INSERT INTO `filterconf` (`object`, `option` ,`value`)
  2220. VALUES (:username, 'blacklist_from', :blacklist_from)");
  2221. $stmt->execute(array(
  2222. ':username' => $username,
  2223. ':blacklist_from' => $blacklist_from
  2224. ));
  2225. }
  2226. catch (PDOException $e) {
  2227. $_SESSION['return'] = array(
  2228. 'type' => 'danger',
  2229. 'msg' => 'MySQL: '.$e
  2230. );
  2231. return false;
  2232. }
  2233. $_SESSION['return'] = array(
  2234. 'type' => 'success',
  2235. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  2236. );
  2237. }
  2238. function delete_blacklist($postarray) {
  2239. global $lang;
  2240. global $pdo;
  2241. $username = $_SESSION['mailcow_cc_username'];
  2242. $prefid = $postarray['blid'];
  2243. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  2244. $_SESSION['return'] = array(
  2245. 'type' => 'danger',
  2246. 'msg' => sprintf($lang['danger']['username_invalid'])
  2247. );
  2248. return false;
  2249. }
  2250. if (!is_numeric($prefid)) {
  2251. $_SESSION['return'] = array(
  2252. 'type' => 'danger',
  2253. 'msg' => sprintf($lang['danger']['blacklist_from_invalid'])
  2254. );
  2255. return false;
  2256. }
  2257. try {
  2258. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :username AND `prefid` = :prefid");
  2259. $stmt->execute(array(
  2260. ':username' => $username,
  2261. ':prefid' => $prefid
  2262. ));
  2263. }
  2264. catch (PDOException $e) {
  2265. $_SESSION['return'] = array(
  2266. 'type' => 'danger',
  2267. 'msg' => 'MySQL: '.$e
  2268. );
  2269. return false;
  2270. }
  2271. $_SESSION['return'] = array(
  2272. 'type' => 'success',
  2273. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  2274. );
  2275. }
  2276. function set_spam_score($postarray) {
  2277. global $lang;
  2278. global $pdo;
  2279. $username = $_SESSION['mailcow_cc_username'];
  2280. $lowspamlevel = explode(',', $postarray['score'])[0];
  2281. $highspamlevel = explode(',', $postarray['score'])[1];
  2282. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  2283. $_SESSION['return'] = array(
  2284. 'type' => 'danger',
  2285. 'msg' => sprintf($lang['danger']['username_invalid'])
  2286. );
  2287. return false;
  2288. }
  2289. if (!is_numeric($lowspamlevel) || !is_numeric($highspamlevel)) {
  2290. $_SESSION['return'] = array(
  2291. 'type' => 'danger',
  2292. 'msg' => sprintf($lang['danger']['access_denied'])
  2293. );
  2294. return false;
  2295. }
  2296. try {
  2297. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :username
  2298. AND (`option` = 'lowspamlevel' OR `option` = 'highspamlevel')");
  2299. $stmt->execute(array(
  2300. ':username' => $username
  2301. ));
  2302. $stmt = $pdo->prepare("INSERT INTO `filterconf` (`object`, `option`, `value`)
  2303. VALUES (:username, 'highspamlevel', :highspamlevel)");
  2304. $stmt->execute(array(
  2305. ':username' => $username,
  2306. ':highspamlevel' => $highspamlevel
  2307. ));
  2308. $stmt = $pdo->prepare("INSERT INTO `filterconf` (`object`, `option`, `value`)
  2309. VALUES (:username, 'lowspamlevel', :lowspamlevel)");
  2310. $stmt->execute(array(
  2311. ':username' => $username,
  2312. ':lowspamlevel' => $lowspamlevel
  2313. ));
  2314. }
  2315. catch (PDOException $e) {
  2316. $_SESSION['return'] = array(
  2317. 'type' => 'danger',
  2318. 'msg' => 'MySQL: '.$e
  2319. );
  2320. return false;
  2321. }
  2322. $_SESSION['return'] = array(
  2323. 'type' => 'success',
  2324. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  2325. );
  2326. }
  2327. function set_tls_policy($postarray) {
  2328. global $lang;
  2329. global $pdo;
  2330. isset($postarray['tls_in']) ? $tls_in = '1' : $tls_in = '0';
  2331. isset($postarray['tls_out']) ? $tls_out = '1' : $tls_out = '0';
  2332. $username = $_SESSION['mailcow_cc_username'];
  2333. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  2334. $_SESSION['return'] = array(
  2335. 'type' => 'danger',
  2336. 'msg' => sprintf($lang['danger']['username_invalid'])
  2337. );
  2338. return false;
  2339. }
  2340. try {
  2341. $stmt = $pdo->prepare("UPDATE `mailbox` SET `tls_enforce_out` = :tls_out, `tls_enforce_in` = :tls_in WHERE `username` = :username");
  2342. $stmt->execute(array(
  2343. ':tls_out' => $tls_out,
  2344. ':tls_in' => $tls_in,
  2345. ':username' => $username
  2346. ));
  2347. }
  2348. catch (PDOException $e) {
  2349. $_SESSION['return'] = array(
  2350. 'type' => 'danger',
  2351. 'msg' => 'MySQL: '.$e
  2352. );
  2353. return false;
  2354. }
  2355. $_SESSION['return'] = array(
  2356. 'type' => 'success',
  2357. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  2358. );
  2359. }
  2360. function get_tls_policy($username) {
  2361. global $lang;
  2362. global $pdo;
  2363. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  2364. $_SESSION['return'] = array(
  2365. 'type' => 'danger',
  2366. 'msg' => sprintf($lang['danger']['username_invalid'])
  2367. );
  2368. return false;
  2369. }
  2370. try {
  2371. $stmt = $pdo->prepare("SELECT `tls_enforce_out`, `tls_enforce_in` FROM `mailbox` WHERE `username` = :username");
  2372. $stmt->execute(array(':username' => $username));
  2373. $TLSData = $stmt->fetch(PDO::FETCH_ASSOC);
  2374. }
  2375. catch(PDOException $e) {
  2376. $_SESSION['return'] = array(
  2377. 'type' => 'danger',
  2378. 'msg' => 'MySQL: '.$e
  2379. );
  2380. return false;
  2381. }
  2382. return $TLSData;
  2383. }
  2384. function remaining_specs($domain, $object = null, $js = null) {
  2385. // left_m without object given = MiB left in domain
  2386. // left_m with object given = Max. MiB we can assign to given object
  2387. // limit_m = Domain limit in MiB
  2388. // left_c = Mailboxes we can create depending on domain quota
  2389. global $pdo;
  2390. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  2391. return false;
  2392. }
  2393. try {
  2394. $stmt = $pdo->prepare("SELECT `mailboxes`, `maxquota`, `quota` FROM `domain` WHERE `domain` = :domain");
  2395. $stmt->execute(array(':domain' => $domain));
  2396. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  2397. $stmt = $pdo->prepare("SELECT COUNT(*) AS `count`, COALESCE(ROUND(SUM(`quota`)/1048576), 0) as `in_use_m` FROM `mailbox` WHERE `domain` = :domain AND `username` != :object");
  2398. $stmt->execute(array(':domain' => $domain, ':object' => $object));
  2399. $MailboxDataDomain = $stmt->fetch(PDO::FETCH_ASSOC);
  2400. $quota_left_m = $DomainData['quota'] - $MailboxDataDomain['in_use_m'];
  2401. $mboxs_left = $DomainData['mailboxes'] - $MailboxDataDomain['count'];
  2402. if ($quota_left_m > $DomainData['maxquota']) {
  2403. $quota_left_m = $DomainData['maxquota'];
  2404. }
  2405. }
  2406. catch (PDOException $e) {
  2407. return false;
  2408. }
  2409. if (is_numeric($quota_left_m)) {
  2410. $spec['left_m'] = $quota_left_m;
  2411. $spec['limit_m'] = $DomainData['maxquota'];
  2412. }
  2413. if (is_numeric($mboxs_left)) {
  2414. $spec['left_c'] = $mboxs_left;
  2415. }
  2416. if (!empty($js)) {
  2417. echo $quota_left_m;
  2418. exit;
  2419. }
  2420. return $spec;
  2421. }
  2422. function get_sender_acl_handles($mailbox, $which) {
  2423. global $pdo;
  2424. if ($_SESSION['mailcow_cc_role'] != "admin" && $_SESSION['mailcow_cc_role'] != "domainadmin") {
  2425. return false;
  2426. }
  2427. switch ($which) {
  2428. case "preselected":
  2429. try {
  2430. $stmt = $pdo->prepare("SELECT `address` FROM `alias` WHERE `goto` = :goto AND `address` NOT LIKE '@%'");
  2431. $stmt->execute(array(':goto' => $mailbox));
  2432. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2433. return $rows;
  2434. }
  2435. catch(PDOException $e) {
  2436. $_SESSION['return'] = array(
  2437. 'type' => 'danger',
  2438. 'msg' => 'MySQL: '.$e
  2439. );
  2440. return false;
  2441. }
  2442. break;
  2443. case "selected":
  2444. try {
  2445. $stmt = $pdo->prepare("SELECT `send_as` FROM `sender_acl` WHERE `logged_in_as` = :logged_in_as");
  2446. $stmt->execute(array(':logged_in_as' => $mailbox));
  2447. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2448. return $rows;
  2449. }
  2450. catch(PDOException $e) {
  2451. $_SESSION['return'] = array(
  2452. 'type' => 'danger',
  2453. 'msg' => 'MySQL: '.$e
  2454. );
  2455. return false;
  2456. }
  2457. break;
  2458. case "unselected-domains":
  2459. try {
  2460. if ($_SESSION['mailcow_cc_role'] == "admin" ) {
  2461. $stmt = $pdo->prepare("SELECT DISTINCT `domain` FROM `domain`
  2462. WHERE `domain` NOT IN (
  2463. SELECT REPLACE(`send_as`, '@', '') FROM `sender_acl`
  2464. WHERE `logged_in_as` = :logged_in_as)
  2465. AND `domain` NOT IN (
  2466. SELECT REPLACE(`address`, '@', '') FROM `alias`
  2467. WHERE `goto` = :goto)");
  2468. $stmt->execute(array(
  2469. ':logged_in_as' => $mailbox,
  2470. ':goto' => $mailbox,
  2471. ));
  2472. }
  2473. else {
  2474. $stmt = $pdo->prepare("SELECT DISTINCT `domain` FROM `domain_admins`
  2475. WHERE `username` = :username
  2476. AND `domain` != 'ALL'
  2477. AND `domain` NOT IN (
  2478. SELECT REPLACE(`send_as`, '@', '') FROM `sender_acl`
  2479. WHERE `logged_in_as` = :logged_in_as)");
  2480. $stmt->execute(array(
  2481. ':logged_in_as' => $mailbox,
  2482. ':username' => $_SESSION['mailcow_cc_username']
  2483. ));
  2484. }
  2485. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2486. return $rows;
  2487. }
  2488. catch(PDOException $e) {
  2489. $_SESSION['return'] = array(
  2490. 'type' => 'danger',
  2491. 'msg' => 'MySQL: '.$e
  2492. );
  2493. return false;
  2494. }
  2495. break;
  2496. case "unselected-addresses":
  2497. try {
  2498. if ($_SESSION['mailcow_cc_role'] == "admin" ) {
  2499. $stmt = $pdo->prepare("SELECT `address` FROM `alias`
  2500. WHERE `goto` != :goto
  2501. AND `address` NOT IN (
  2502. SELECT `send_as` FROM `sender_acl`
  2503. WHERE `logged_in_as` = :logged_in_as)");
  2504. $stmt->execute(array(
  2505. ':logged_in_as' => $mailbox,
  2506. ':goto' => $mailbox
  2507. ));
  2508. }
  2509. else {
  2510. $stmt = $pdo->prepare("SELECT `address` FROM `alias`
  2511. WHERE `goto` != :goto
  2512. AND `domain` IN (
  2513. SELECT `domain` FROM `domain_admins`
  2514. WHERE `username` = :username)
  2515. AND `address` NOT IN (
  2516. SELECT `send_as` FROM `sender_acl`
  2517. WHERE `logged_in_as` = :logged_in_as)");
  2518. $stmt->execute(array(
  2519. ':logged_in_as' => $mailbox,
  2520. ':goto' => $mailbox,
  2521. ':username' => $_SESSION['mailcow_cc_username']
  2522. ));
  2523. }
  2524. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2525. return $rows;
  2526. }
  2527. catch(PDOException $e) {
  2528. $_SESSION['return'] = array(
  2529. 'type' => 'danger',
  2530. 'msg' => 'MySQL: '.$e
  2531. );
  2532. return false;
  2533. }
  2534. break;
  2535. }
  2536. return false;
  2537. }
  2538. function is_valid_domain_name($domain_name) {
  2539. if (empty($domain_name)) {
  2540. return false;
  2541. }
  2542. $domain_name = idn_to_ascii($domain_name);
  2543. return (preg_match("/^([a-z\d](-*[a-z\d])*)(\.([a-z\d](-*[a-z\d])*))*$/i", $domain_name)
  2544. && preg_match("/^.{1,253}$/", $domain_name)
  2545. && preg_match("/^[^\.]{1,63}(\.[^\.]{1,63})*$/", $domain_name));
  2546. }
  2547. ?>