functions.mailbox.inc.php 138 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871287228732874287528762877287828792880288128822883288428852886288728882889289028912892289328942895289628972898289929002901290229032904290529062907290829092910291129122913291429152916291729182919292029212922292329242925292629272928292929302931293229332934293529362937293829392940294129422943294429452946294729482949295029512952295329542955295629572958295929602961296229632964296529662967296829692970297129722973297429752976297729782979298029812982298329842985298629872988298929902991299229932994299529962997299829993000300130023003300430053006300730083009301030113012301330143015301630173018301930203021302230233024302530263027302830293030303130323033303430353036303730383039304030413042304330443045304630473048304930503051305230533054305530563057305830593060306130623063306430653066306730683069307030713072307330743075307630773078307930803081308230833084308530863087308830893090309130923093309430953096309730983099310031013102310331043105310631073108310931103111311231133114311531163117311831193120312131223123312431253126312731283129313031313132313331343135313631373138313931403141314231433144314531463147314831493150315131523153315431553156315731583159316031613162316331643165316631673168316931703171317231733174317531763177317831793180318131823183318431853186318731883189319031913192319331943195319631973198319932003201320232033204320532063207320832093210321132123213321432153216321732183219322032213222322332243225322632273228322932303231323232333234323532363237323832393240324132423243324432453246324732483249325032513252325332543255325632573258325932603261326232633264326532663267326832693270327132723273
  1. <?php
  2. function mailbox($_action, $_type, $_data = null) {
  3. global $pdo;
  4. global $redis;
  5. global $lang;
  6. switch ($_action) {
  7. case 'add':
  8. switch ($_type) {
  9. case 'time_limited_alias':
  10. if (!isset($_SESSION['acl']['spam_alias']) || $_SESSION['acl']['spam_alias'] != "1" ) {
  11. $_SESSION['return'] = array(
  12. 'type' => 'danger',
  13. 'msg' => sprintf($lang['danger']['access_denied'])
  14. );
  15. return false;
  16. }
  17. if (isset($_data['username']) && filter_var($_data['username'], FILTER_VALIDATE_EMAIL)) {
  18. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data['username'])) {
  19. $_SESSION['return'] = array(
  20. 'type' => 'danger',
  21. 'msg' => sprintf($lang['danger']['access_denied'])
  22. );
  23. return false;
  24. }
  25. else {
  26. $username = $_data['username'];
  27. }
  28. }
  29. else {
  30. $username = $_SESSION['mailcow_cc_username'];
  31. }
  32. if (!is_numeric($_data["validity"]) || $_data["validity"] > 672) {
  33. $_SESSION['return'] = array(
  34. 'type' => 'danger',
  35. 'msg' => sprintf($lang['danger']['validity_missing'])
  36. );
  37. return false;
  38. }
  39. try {
  40. $stmt = $pdo->prepare("SELECT `domain` FROM `mailbox` WHERE `username` = :username");
  41. $stmt->execute(array(':username' => $_SESSION['mailcow_cc_username']));
  42. $domain = $stmt->fetch(PDO::FETCH_ASSOC)['domain'];
  43. }
  44. catch (PDOException $e) {
  45. $_SESSION['return'] = array(
  46. 'type' => 'danger',
  47. 'msg' => 'MySQL: '.$e
  48. );
  49. return false;
  50. }
  51. $validity = strtotime("+".$_data["validity"]." hour");
  52. $letters = 'abcefghijklmnopqrstuvwxyz1234567890';
  53. $random_name = substr(str_shuffle($letters), 0, 24);
  54. try {
  55. $stmt = $pdo->prepare("INSERT INTO `spamalias` (`address`, `goto`, `validity`) VALUES
  56. (:address, :goto, :validity)");
  57. $stmt->execute(array(
  58. ':address' => $random_name . '@' . $domain,
  59. ':goto' => $username,
  60. ':validity' => $validity
  61. ));
  62. }
  63. catch (PDOException $e) {
  64. $_SESSION['return'] = array(
  65. 'type' => 'danger',
  66. 'msg' => 'MySQL: '.$e
  67. );
  68. return false;
  69. }
  70. $_SESSION['return'] = array(
  71. 'type' => 'success',
  72. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($usernames))
  73. );
  74. break;
  75. case 'syncjob':
  76. if (!isset($_SESSION['acl']['syncjobs']) || $_SESSION['acl']['syncjobs'] != "1" ) {
  77. $_SESSION['return'] = array(
  78. 'type' => 'danger',
  79. 'msg' => sprintf($lang['danger']['access_denied'])
  80. );
  81. return false;
  82. }
  83. if (isset($_data['username']) && filter_var($_data['username'], FILTER_VALIDATE_EMAIL)) {
  84. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data['username'])) {
  85. $_SESSION['return'] = array(
  86. 'type' => 'danger',
  87. 'msg' => sprintf($lang['danger']['access_denied'])
  88. );
  89. return false;
  90. }
  91. else {
  92. $username = $_data['username'];
  93. }
  94. }
  95. elseif ($_SESSION['mailcow_cc_role'] == "user") {
  96. $username = $_SESSION['mailcow_cc_username'];
  97. }
  98. else {
  99. $_SESSION['return'] = array(
  100. 'type' => 'danger',
  101. 'msg' => 'No user defined'
  102. );
  103. return false;
  104. }
  105. $active = intval($_data['active']);
  106. $delete2duplicates = intval($_data['delete2duplicates']);
  107. $delete1 = intval($_data['delete1']);
  108. $port1 = $_data['port1'];
  109. $host1 = strtolower($_data['host1']);
  110. $password1 = $_data['password1'];
  111. $exclude = $_data['exclude'];
  112. $maxage = $_data['maxage'];
  113. $subfolder2 = $_data['subfolder2'];
  114. $user1 = $_data['user1'];
  115. $mins_interval = $_data['mins_interval'];
  116. $enc1 = $_data['enc1'];
  117. if (empty($subfolder2)) {
  118. $subfolder2 = "";
  119. }
  120. if (!isset($maxage) || !filter_var($maxage, FILTER_VALIDATE_INT, array('options' => array('min_range' => 1, 'max_range' => 32767)))) {
  121. $maxage = "0";
  122. }
  123. if (!filter_var($port1, FILTER_VALIDATE_INT, array('options' => array('min_range' => 1, 'max_range' => 65535)))) {
  124. $_SESSION['return'] = array(
  125. 'type' => 'danger',
  126. 'msg' => sprintf($lang['danger']['access_denied'])
  127. );
  128. return false;
  129. }
  130. if (!filter_var($mins_interval, FILTER_VALIDATE_INT, array('options' => array('min_range' => 10, 'max_range' => 3600)))) {
  131. $_SESSION['return'] = array(
  132. 'type' => 'danger',
  133. 'msg' => sprintf($lang['danger']['access_denied'])
  134. );
  135. return false;
  136. }
  137. if (!is_valid_domain_name($host1)) {
  138. $_SESSION['return'] = array(
  139. 'type' => 'danger',
  140. 'msg' => sprintf($lang['danger']['access_denied'])
  141. );
  142. return false;
  143. }
  144. if ($enc1 != "TLS" && $enc1 != "SSL" && $enc1 != "PLAIN") {
  145. $_SESSION['return'] = array(
  146. 'type' => 'danger',
  147. 'msg' => sprintf($lang['danger']['access_denied'])
  148. );
  149. return false;
  150. }
  151. if (@preg_match("/" . $exclude . "/", null) === false) {
  152. $_SESSION['return'] = array(
  153. 'type' => 'danger',
  154. 'msg' => sprintf($lang['danger']['access_denied'])
  155. );
  156. return false;
  157. }
  158. try {
  159. $stmt = $pdo->prepare("SELECT '1' FROM `imapsync`
  160. WHERE `user2` = :user2 AND `user1` = :user1 AND `host1` = :host1");
  161. $stmt->execute(array(':user1' => $user1, ':user2' => $username, ':host1' => $host1));
  162. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  163. }
  164. catch(PDOException $e) {
  165. $_SESSION['return'] = array(
  166. 'type' => 'danger',
  167. 'msg' => 'MySQL: '.$e
  168. );
  169. return false;
  170. }
  171. if ($num_results != 0) {
  172. $_SESSION['return'] = array(
  173. 'type' => 'danger',
  174. 'msg' => sprintf($lang['danger']['object_exists'], htmlspecialchars($host1 . ' / ' . $user1))
  175. );
  176. return false;
  177. }
  178. try {
  179. $stmt = $pdo->prepare("INSERT INTO `imapsync` (`user2`, `exclude`, `delete1`, `maxage`, `subfolder2`, `host1`, `authmech1`, `user1`, `password1`, `mins_interval`, `port1`, `enc1`, `delete2duplicates`, `active`)
  180. VALUES (:user2, :exclude, :maxage, :delete1, :subfolder2, :host1, :authmech1, :user1, :password1, :mins_interval, :port1, :enc1, :delete2duplicates, :active)");
  181. $stmt->execute(array(
  182. ':user2' => $username,
  183. ':exclude' => $exclude,
  184. ':maxage' => $maxage,
  185. ':delete1' => $delete1,
  186. ':subfolder2' => $subfolder2,
  187. ':host1' => $host1,
  188. ':authmech1' => 'PLAIN',
  189. ':user1' => $user1,
  190. ':password1' => $password1,
  191. ':mins_interval' => $mins_interval,
  192. ':port1' => $port1,
  193. ':enc1' => $enc1,
  194. ':delete2duplicates' => $delete2duplicates,
  195. ':active' => $active,
  196. ));
  197. }
  198. catch(PDOException $e) {
  199. $_SESSION['return'] = array(
  200. 'type' => 'danger',
  201. 'msg' => 'MySQL: '.$e
  202. );
  203. return false;
  204. }
  205. $_SESSION['return'] = array(
  206. 'type' => 'success',
  207. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  208. );
  209. return true;
  210. break;
  211. case 'domain':
  212. if ($_SESSION['mailcow_cc_role'] != "admin") {
  213. $_SESSION['return'] = array(
  214. 'type' => 'danger',
  215. 'msg' => sprintf($lang['danger']['access_denied'])
  216. );
  217. return false;
  218. }
  219. $domain = idn_to_ascii(strtolower(trim($_data['domain'])));
  220. $description = $_data['description'];
  221. $aliases = $_data['aliases'];
  222. $mailboxes = $_data['mailboxes'];
  223. $maxquota = $_data['maxquota'];
  224. $quota = $_data['quota'];
  225. if ($maxquota > $quota) {
  226. $_SESSION['return'] = array(
  227. 'type' => 'danger',
  228. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeds_domain_quota'])
  229. );
  230. return false;
  231. }
  232. if ($maxquota == "0" || empty($maxquota)) {
  233. $_SESSION['return'] = array(
  234. 'type' => 'danger',
  235. 'msg' => sprintf($lang['danger']['maxquota_empty'])
  236. );
  237. return false;
  238. }
  239. $active = intval($_data['active']);
  240. $relay_all_recipients = intval($_data['relay_all_recipients']);
  241. $backupmx = intval($_data['backupmx']);
  242. ($relay_all_recipients == 1) ? $backupmx = '1' : null;
  243. if (!is_valid_domain_name($domain)) {
  244. $_SESSION['return'] = array(
  245. 'type' => 'danger',
  246. 'msg' => sprintf($lang['danger']['domain_invalid'])
  247. );
  248. return false;
  249. }
  250. foreach (array($quota, $maxquota, $mailboxes, $aliases) as $data) {
  251. if (!is_numeric($data)) {
  252. $_SESSION['return'] = array(
  253. 'type' => 'danger',
  254. 'msg' => sprintf($lang['danger']['object_is_not_numeric'], htmlspecialchars($data))
  255. );
  256. return false;
  257. }
  258. }
  259. try {
  260. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  261. WHERE `domain` = :domain");
  262. $stmt->execute(array(':domain' => $domain));
  263. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  264. $stmt = $pdo->prepare("SELECT `alias_domain` FROM `alias_domain`
  265. WHERE `alias_domain` = :domain");
  266. $stmt->execute(array(':domain' => $domain));
  267. $num_results = $num_results + count($stmt->fetchAll(PDO::FETCH_ASSOC));
  268. }
  269. catch(PDOException $e) {
  270. $_SESSION['return'] = array(
  271. 'type' => 'danger',
  272. 'msg' => 'MySQL: '.$e
  273. );
  274. return false;
  275. }
  276. if ($num_results != 0) {
  277. $_SESSION['return'] = array(
  278. 'type' => 'danger',
  279. 'msg' => sprintf($lang['danger']['domain_exists'], htmlspecialchars($domain))
  280. );
  281. return false;
  282. }
  283. try {
  284. $stmt = $pdo->prepare("INSERT INTO `domain` (`domain`, `description`, `aliases`, `mailboxes`, `maxquota`, `quota`, `backupmx`, `active`, `relay_all_recipients`)
  285. VALUES (:domain, :description, :aliases, :mailboxes, :maxquota, :quota, :backupmx, :active, :relay_all_recipients)");
  286. $stmt->execute(array(
  287. ':domain' => $domain,
  288. ':description' => $description,
  289. ':aliases' => $aliases,
  290. ':mailboxes' => $mailboxes,
  291. ':maxquota' => $maxquota,
  292. ':quota' => $quota,
  293. ':backupmx' => $backupmx,
  294. ':active' => $active,
  295. ':relay_all_recipients' => $relay_all_recipients
  296. ));
  297. try {
  298. $redis->hSet('DOMAIN_MAP', $domain, 1);
  299. }
  300. catch (RedisException $e) {
  301. $_SESSION['return'] = array(
  302. 'type' => 'danger',
  303. 'msg' => 'Redis: '.$e
  304. );
  305. return false;
  306. }
  307. $_SESSION['return'] = array(
  308. 'type' => 'success',
  309. 'msg' => sprintf($lang['success']['domain_added'], htmlspecialchars($domain))
  310. );
  311. }
  312. catch (PDOException $e) {
  313. mailbox('delete', 'domain', array('domain' => $domain));
  314. $_SESSION['return'] = array(
  315. 'type' => 'danger',
  316. 'msg' => 'MySQL: '.$e
  317. );
  318. return false;
  319. }
  320. break;
  321. case 'alias':
  322. $addresses = array_map('trim', preg_split( "/( |,|;|\n)/", $_data['address']));
  323. $gotos = array_map('trim', preg_split( "/( |,|;|\n)/", $_data['goto']));
  324. $active = intval($_data['active']);
  325. if (empty($addresses[0])) {
  326. $_SESSION['return'] = array(
  327. 'type' => 'danger',
  328. 'msg' => sprintf($lang['danger']['alias_empty'])
  329. );
  330. return false;
  331. }
  332. if (empty($gotos[0])) {
  333. $_SESSION['return'] = array(
  334. 'type' => 'danger',
  335. 'msg' => sprintf($lang['danger']['goto_empty'])
  336. );
  337. return false;
  338. }
  339. foreach ($gotos as &$goto) {
  340. if (empty($goto)) {
  341. continue;
  342. }
  343. $goto_domain = idn_to_ascii(substr(strstr($goto, '@'), 1));
  344. $goto_local_part = strstr($goto, '@', true);
  345. $goto = $goto_local_part.'@'.$goto_domain;
  346. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox`
  347. WHERE `kind` REGEXP 'location|thing|group'
  348. AND `username`= :goto");
  349. $stmt->execute(array(':goto' => $goto));
  350. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  351. if ($num_results != 0) {
  352. $_SESSION['return'] = array(
  353. 'type' => 'danger',
  354. 'msg' => sprintf($lang['danger']['goto_invalid'])
  355. );
  356. return false;
  357. }
  358. if (!filter_var($goto, FILTER_VALIDATE_EMAIL) === true) {
  359. $_SESSION['return'] = array(
  360. 'type' => 'danger',
  361. 'msg' => sprintf($lang['danger']['goto_invalid'])
  362. );
  363. return false;
  364. }
  365. }
  366. $gotos = array_filter($gotos);
  367. $goto = implode(",", $gotos);
  368. foreach ($addresses as $address) {
  369. if (empty($address)) {
  370. continue;
  371. }
  372. if (in_array($address, $gotos)) {
  373. continue;
  374. }
  375. $stmt = $pdo->prepare("SELECT `address` FROM `alias`
  376. WHERE `address`= :address");
  377. $stmt->execute(array(':address' => $address));
  378. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  379. if ($num_results != 0) {
  380. $_SESSION['return'] = array(
  381. 'type' => 'danger',
  382. 'msg' => sprintf($lang['danger']['is_alias_or_mailbox'], htmlspecialchars($address))
  383. );
  384. return false;
  385. }
  386. $domain = idn_to_ascii(substr(strstr($address, '@'), 1));
  387. $local_part = strstr($address, '@', true);
  388. $address = $local_part.'@'.$domain;
  389. $domaindata = mailbox('get', 'domain_details', $domain);
  390. if (is_array($domaindata) && $domaindata['aliases_left'] == "0") {
  391. $_SESSION['return'] = array(
  392. 'type' => 'danger',
  393. 'msg' => sprintf($lang['danger']['max_alias_exceeded'])
  394. );
  395. return false;
  396. }
  397. try {
  398. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  399. WHERE `domain`= :domain1 OR `domain` = (SELECT `target_domain` FROM `alias_domain` WHERE `alias_domain` = :domain2)");
  400. $stmt->execute(array(':domain1' => $domain, ':domain2' => $domain));
  401. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  402. if ($num_results == 0) {
  403. $_SESSION['return'] = array(
  404. 'type' => 'danger',
  405. 'msg' => sprintf($lang['danger']['domain_not_found'], htmlspecialchars($domain))
  406. );
  407. return false;
  408. }
  409. $stmt = $pdo->prepare("SELECT `address` FROM `alias`
  410. WHERE `address`= :address");
  411. $stmt->execute(array(':address' => $address));
  412. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  413. if ($num_results != 0) {
  414. $_SESSION['return'] = array(
  415. 'type' => 'danger',
  416. 'msg' => sprintf($lang['danger']['is_alias_or_mailbox'], htmlspecialchars($address))
  417. );
  418. return false;
  419. }
  420. $stmt = $pdo->prepare("SELECT `address` FROM `spamalias`
  421. WHERE `address`= :address");
  422. $stmt->execute(array(':address' => $address));
  423. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  424. if ($num_results != 0) {
  425. $_SESSION['return'] = array(
  426. 'type' => 'danger',
  427. 'msg' => sprintf($lang['danger']['is_spam_alias'], htmlspecialchars($address))
  428. );
  429. return false;
  430. }
  431. }
  432. catch(PDOException $e) {
  433. $_SESSION['return'] = array(
  434. 'type' => 'danger',
  435. 'msg' => 'MySQL: '.$e
  436. );
  437. return false;
  438. }
  439. if ((!filter_var($address, FILTER_VALIDATE_EMAIL) === true) && !empty($local_part)) {
  440. $_SESSION['return'] = array(
  441. 'type' => 'danger',
  442. 'msg' => sprintf($lang['danger']['alias_invalid'])
  443. );
  444. return false;
  445. }
  446. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  447. $_SESSION['return'] = array(
  448. 'type' => 'danger',
  449. 'msg' => sprintf($lang['danger']['access_denied'])
  450. );
  451. return false;
  452. }
  453. try {
  454. $stmt = $pdo->prepare("INSERT INTO `alias` (`address`, `goto`, `domain`, `active`)
  455. VALUES (:address, :goto, :domain, :active)");
  456. if (!filter_var($address, FILTER_VALIDATE_EMAIL) === true) {
  457. $stmt->execute(array(
  458. ':address' => '@'.$domain,
  459. ':goto' => $goto,
  460. ':domain' => $domain,
  461. ':active' => $active
  462. ));
  463. }
  464. else {
  465. $stmt->execute(array(
  466. ':address' => $address,
  467. ':goto' => $goto,
  468. ':domain' => $domain,
  469. ':active' => $active
  470. ));
  471. }
  472. $_SESSION['return'] = array(
  473. 'type' => 'success',
  474. 'msg' => sprintf($lang['success']['alias_added'])
  475. );
  476. }
  477. catch (PDOException $e) {
  478. mailbox('delete', 'alias', array('address' => $address));
  479. $_SESSION['return'] = array(
  480. 'type' => 'danger',
  481. 'msg' => 'MySQL: '.$e
  482. );
  483. return false;
  484. }
  485. }
  486. $_SESSION['return'] = array(
  487. 'type' => 'success',
  488. 'msg' => sprintf($lang['success']['alias_added'])
  489. );
  490. break;
  491. case 'alias_domain':
  492. $active = intval($_data['active']);
  493. $alias_domains = array_map('trim', preg_split( "/( |,|;|\n)/", $_data['alias_domain']));
  494. $target_domain = idn_to_ascii(strtolower(trim($_data['target_domain'])));
  495. if (!is_valid_domain_name($target_domain)) {
  496. $_SESSION['return'] = array(
  497. 'type' => 'danger',
  498. 'msg' => sprintf($lang['danger']['target_domain_invalid'])
  499. );
  500. return false;
  501. }
  502. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $target_domain)) {
  503. $_SESSION['return'] = array(
  504. 'type' => 'danger',
  505. 'msg' => sprintf($lang['danger']['access_denied'])
  506. );
  507. return false;
  508. }
  509. foreach ($alias_domains as $alias_domain) {
  510. $alias_domain = idn_to_ascii(strtolower(trim($alias_domain)));
  511. if (!is_valid_domain_name($alias_domain)) {
  512. $_SESSION['return'] = array(
  513. 'type' => 'danger',
  514. 'msg' => sprintf($lang['danger']['alias_domain_invalid'])
  515. );
  516. return false;
  517. }
  518. if ($alias_domain == $target_domain) {
  519. $_SESSION['return'] = array(
  520. 'type' => 'danger',
  521. 'msg' => sprintf($lang['danger']['aliasd_targetd_identical'])
  522. );
  523. return false;
  524. }
  525. try {
  526. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  527. WHERE `domain`= :target_domain");
  528. $stmt->execute(array(':target_domain' => $target_domain));
  529. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  530. if ($num_results == 0) {
  531. $_SESSION['return'] = array(
  532. 'type' => 'danger',
  533. 'msg' => sprintf($lang['danger']['targetd_not_found'])
  534. );
  535. return false;
  536. }
  537. $stmt = $pdo->prepare("SELECT `alias_domain` FROM `alias_domain` WHERE `alias_domain`= :alias_domain
  538. UNION
  539. SELECT `alias_domain` FROM `alias_domain` WHERE `alias_domain`= :alias_domain_in_domain");
  540. $stmt->execute(array(':alias_domain' => $alias_domain, ':alias_domain_in_domain' => $alias_domain));
  541. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  542. if ($num_results != 0) {
  543. $_SESSION['return'] = array(
  544. 'type' => 'danger',
  545. 'msg' => sprintf($lang['danger']['aliasd_exists'])
  546. );
  547. return false;
  548. }
  549. }
  550. catch(PDOException $e) {
  551. $_SESSION['return'] = array(
  552. 'type' => 'danger',
  553. 'msg' => 'MySQL: '.$e
  554. );
  555. return false;
  556. }
  557. try {
  558. $stmt = $pdo->prepare("INSERT INTO `alias_domain` (`alias_domain`, `target_domain`, `active`)
  559. VALUES (:alias_domain, :target_domain, :active)");
  560. $stmt->execute(array(
  561. ':alias_domain' => $alias_domain,
  562. ':target_domain' => $target_domain,
  563. ':active' => $active
  564. ));
  565. }
  566. catch (PDOException $e) {
  567. mailbox('delete', 'alias_domain', array('alias_domain' => $alias_domain));
  568. $_SESSION['return'] = array(
  569. 'type' => 'danger',
  570. 'msg' => 'MySQL: '.$e
  571. );
  572. return false;
  573. }
  574. }
  575. $_SESSION['return'] = array(
  576. 'type' => 'success',
  577. 'msg' => sprintf($lang['success']['aliasd_added'], htmlspecialchars(implode(', ', $alias_domains)))
  578. );
  579. break;
  580. case 'mailbox':
  581. $local_part = strtolower(trim($_data['local_part']));
  582. $domain = idn_to_ascii(strtolower(trim($_data['domain'])));
  583. $username = $local_part . '@' . $domain;
  584. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  585. $_SESSION['return'] = array(
  586. 'type' => 'danger',
  587. 'msg' => sprintf($lang['danger']['mailbox_invalid'])
  588. );
  589. return false;
  590. }
  591. if (empty($_data['local_part'])) {
  592. $_SESSION['return'] = array(
  593. 'type' => 'danger',
  594. 'msg' => sprintf($lang['danger']['mailbox_invalid'])
  595. );
  596. return false;
  597. }
  598. $password = $_data['password'];
  599. $password2 = $_data['password2'];
  600. $name = $_data['name'];
  601. $quota_m = filter_var($_data['quota'], FILTER_SANITIZE_NUMBER_FLOAT);
  602. if (empty($name)) {
  603. $name = $local_part;
  604. }
  605. $active = intval($_data['active']);
  606. $quota_b = ($quota_m * 1048576);
  607. $maildir = $domain."/".$local_part."/";
  608. if (!is_valid_domain_name($domain)) {
  609. $_SESSION['return'] = array(
  610. 'type' => 'danger',
  611. 'msg' => sprintf($lang['danger']['domain_invalid'])
  612. );
  613. return false;
  614. }
  615. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  616. $_SESSION['return'] = array(
  617. 'type' => 'danger',
  618. 'msg' => sprintf($lang['danger']['access_denied'])
  619. );
  620. return false;
  621. }
  622. try {
  623. $stmt = $pdo->prepare("SELECT `mailboxes`, `maxquota`, `quota` FROM `domain`
  624. WHERE `domain` = :domain");
  625. $stmt->execute(array(':domain' => $domain));
  626. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  627. $stmt = $pdo->prepare("SELECT
  628. COUNT(*) as count,
  629. COALESCE(ROUND(SUM(`quota`)/1048576), 0) as `quota`
  630. FROM `mailbox`
  631. WHERE `kind` NOT REGEXP 'location|thing|group'
  632. AND `domain` = :domain");
  633. $stmt->execute(array(':domain' => $domain));
  634. $MailboxData = $stmt->fetch(PDO::FETCH_ASSOC);
  635. $stmt = $pdo->prepare("SELECT `local_part` FROM `mailbox` WHERE `local_part` = :local_part and `domain`= :domain");
  636. $stmt->execute(array(':local_part' => $local_part, ':domain' => $domain));
  637. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  638. if ($num_results != 0) {
  639. $_SESSION['return'] = array(
  640. 'type' => 'danger',
  641. 'msg' => sprintf($lang['danger']['object_exists'], htmlspecialchars($username))
  642. );
  643. return false;
  644. }
  645. $stmt = $pdo->prepare("SELECT `address` FROM `alias` WHERE address= :username");
  646. $stmt->execute(array(':username' => $username));
  647. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  648. if ($num_results != 0) {
  649. $_SESSION['return'] = array(
  650. 'type' => 'danger',
  651. 'msg' => sprintf($lang['danger']['is_alias'], htmlspecialchars($username))
  652. );
  653. return false;
  654. }
  655. $stmt = $pdo->prepare("SELECT `address` FROM `spamalias` WHERE `address`= :username");
  656. $stmt->execute(array(':username' => $username));
  657. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  658. if ($num_results != 0) {
  659. $_SESSION['return'] = array(
  660. 'type' => 'danger',
  661. 'msg' => sprintf($lang['danger']['is_spam_alias'], htmlspecialchars($username))
  662. );
  663. return false;
  664. }
  665. $stmt = $pdo->prepare("SELECT `domain` FROM `domain` WHERE `domain`= :domain");
  666. $stmt->execute(array(':domain' => $domain));
  667. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  668. if ($num_results == 0) {
  669. $_SESSION['return'] = array(
  670. 'type' => 'danger',
  671. 'msg' => sprintf($lang['danger']['domain_not_found'], htmlspecialchars($domain))
  672. );
  673. return false;
  674. }
  675. }
  676. catch(PDOException $e) {
  677. $_SESSION['return'] = array(
  678. 'type' => 'danger',
  679. 'msg' => 'MySQL: '.$e
  680. );
  681. return false;
  682. }
  683. if (!is_numeric($quota_m) || $quota_m == "0") {
  684. $_SESSION['return'] = array(
  685. 'type' => 'danger',
  686. 'msg' => sprintf($lang['danger']['quota_not_0_not_numeric'])
  687. );
  688. return false;
  689. }
  690. if (!empty($password) && !empty($password2)) {
  691. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) {
  692. $_SESSION['return'] = array(
  693. 'type' => 'danger',
  694. 'msg' => sprintf($lang['danger']['password_complexity'])
  695. );
  696. return false;
  697. }
  698. if ($password != $password2) {
  699. $_SESSION['return'] = array(
  700. 'type' => 'danger',
  701. 'msg' => sprintf($lang['danger']['password_mismatch'])
  702. );
  703. return false;
  704. }
  705. $password_hashed = hash_password($password);
  706. }
  707. else {
  708. $_SESSION['return'] = array(
  709. 'type' => 'danger',
  710. 'msg' => sprintf($lang['danger']['password_empty'])
  711. );
  712. return false;
  713. }
  714. if ($MailboxData['count'] >= $DomainData['mailboxes']) {
  715. $_SESSION['return'] = array(
  716. 'type' => 'danger',
  717. 'msg' => sprintf($lang['danger']['max_mailbox_exceeded'], $MailboxData['count'], $DomainData['mailboxes'])
  718. );
  719. return false;
  720. }
  721. if ($quota_m > $DomainData['maxquota']) {
  722. $_SESSION['return'] = array(
  723. 'type' => 'danger',
  724. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeded'], $DomainData['maxquota'])
  725. );
  726. return false;
  727. }
  728. if (($MailboxData['quota'] + $quota_m) > $DomainData['quota']) {
  729. $quota_left_m = ($DomainData['quota'] - $MailboxData['quota']);
  730. $_SESSION['return'] = array(
  731. 'type' => 'danger',
  732. 'msg' => sprintf($lang['danger']['mailbox_quota_left_exceeded'], $quota_left_m)
  733. );
  734. return false;
  735. }
  736. try {
  737. $stmt = $pdo->prepare("INSERT INTO `mailbox` (`username`, `password`, `name`, `maildir`, `quota`, `local_part`, `domain`, `active`)
  738. VALUES (:username, :password_hashed, :name, :maildir, :quota_b, :local_part, :domain, :active)");
  739. $stmt->execute(array(
  740. ':username' => $username,
  741. ':password_hashed' => $password_hashed,
  742. ':name' => $name,
  743. ':maildir' => $maildir,
  744. ':quota_b' => $quota_b,
  745. ':local_part' => $local_part,
  746. ':domain' => $domain,
  747. ':active' => $active
  748. ));
  749. $stmt = $pdo->prepare("INSERT INTO `quota2` (`username`, `bytes`, `messages`)
  750. VALUES (:username, '0', '0')");
  751. $stmt->execute(array(':username' => $username));
  752. $stmt = $pdo->prepare("INSERT INTO `alias` (`address`, `goto`, `domain`, `active`)
  753. VALUES (:username1, :username2, :domain, :active)");
  754. $stmt->execute(array(
  755. ':username1' => $username,
  756. ':username2' => $username,
  757. ':domain' => $domain,
  758. ':active' => $active
  759. ));
  760. $stmt = $pdo->prepare("INSERT INTO `user_acl` (`username`) VALUES (:username)");
  761. $stmt->execute(array(
  762. ':username' => $username
  763. ));
  764. $_SESSION['return'] = array(
  765. 'type' => 'success',
  766. 'msg' => sprintf($lang['success']['mailbox_added'], htmlspecialchars($username))
  767. );
  768. }
  769. catch (PDOException $e) {
  770. mailbox('delete', 'mailbox', array('username' => $username));
  771. $_SESSION['return'] = array(
  772. 'type' => 'danger',
  773. 'msg' => 'MySQL: '.$e
  774. );
  775. return false;
  776. }
  777. break;
  778. case 'resource':
  779. $domain = idn_to_ascii(strtolower(trim($_data['domain'])));
  780. $description = $_data['description'];
  781. $local_part = preg_replace('/[^\da-z]/i', '', preg_quote($description, '/'));
  782. $name = $local_part . '@' . $domain;
  783. $kind = $_data['kind'];
  784. $active = intval($_data['active']);
  785. $multiple_bookings = intval($_data['multiple_bookings']);
  786. if (!filter_var($name, FILTER_VALIDATE_EMAIL)) {
  787. $_SESSION['return'] = array(
  788. 'type' => 'danger',
  789. 'msg' => sprintf($lang['danger']['resource_invalid'])
  790. );
  791. return false;
  792. }
  793. if (empty($description)) {
  794. $_SESSION['return'] = array(
  795. 'type' => 'danger',
  796. 'msg' => sprintf($lang['danger']['description_invalid'])
  797. );
  798. return false;
  799. }
  800. if ($kind != 'location' && $kind != 'group' && $kind != 'thing') {
  801. $_SESSION['return'] = array(
  802. 'type' => 'danger',
  803. 'msg' => sprintf($lang['danger']['resource_invalid'])
  804. );
  805. return false;
  806. }
  807. if (!is_valid_domain_name($domain)) {
  808. $_SESSION['return'] = array(
  809. 'type' => 'danger',
  810. 'msg' => sprintf($lang['danger']['domain_invalid'])
  811. );
  812. return false;
  813. }
  814. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  815. $_SESSION['return'] = array(
  816. 'type' => 'danger',
  817. 'msg' => sprintf($lang['danger']['access_denied'])
  818. );
  819. return false;
  820. }
  821. try {
  822. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox` WHERE `username` = :name");
  823. $stmt->execute(array(':name' => $name));
  824. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  825. if ($num_results != 0) {
  826. $_SESSION['return'] = array(
  827. 'type' => 'danger',
  828. 'msg' => sprintf($lang['danger']['object_exists'], htmlspecialchars($name))
  829. );
  830. return false;
  831. }
  832. $stmt = $pdo->prepare("SELECT `address` FROM `alias` WHERE address= :name");
  833. $stmt->execute(array(':name' => $name));
  834. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  835. if ($num_results != 0) {
  836. $_SESSION['return'] = array(
  837. 'type' => 'danger',
  838. 'msg' => sprintf($lang['danger']['is_alias'], htmlspecialchars($name))
  839. );
  840. return false;
  841. }
  842. $stmt = $pdo->prepare("SELECT `address` FROM `spamalias` WHERE `address`= :name");
  843. $stmt->execute(array(':name' => $name));
  844. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  845. if ($num_results != 0) {
  846. $_SESSION['return'] = array(
  847. 'type' => 'danger',
  848. 'msg' => sprintf($lang['danger']['is_spam_alias'], htmlspecialchars($name))
  849. );
  850. return false;
  851. }
  852. $stmt = $pdo->prepare("SELECT `domain` FROM `domain` WHERE `domain`= :domain");
  853. $stmt->execute(array(':domain' => $domain));
  854. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  855. if ($num_results == 0) {
  856. $_SESSION['return'] = array(
  857. 'type' => 'danger',
  858. 'msg' => sprintf($lang['danger']['domain_not_found'], htmlspecialchars($domain))
  859. );
  860. return false;
  861. }
  862. }
  863. catch(PDOException $e) {
  864. $_SESSION['return'] = array(
  865. 'type' => 'danger',
  866. 'msg' => 'MySQL: '.$e
  867. );
  868. return false;
  869. }
  870. try {
  871. $stmt = $pdo->prepare("INSERT INTO `mailbox` (`username`, `password`, `name`, `maildir`, `quota`, `local_part`, `domain`, `active`, `multiple_bookings`, `kind`)
  872. VALUES (:name, 'RESOURCE', :description, 'RESOURCE', 0, :local_part, :domain, :active, :multiple_bookings, :kind)");
  873. $stmt->execute(array(
  874. ':name' => $name,
  875. ':description' => $description,
  876. ':local_part' => $local_part,
  877. ':domain' => $domain,
  878. ':active' => $active,
  879. ':kind' => $kind,
  880. ':multiple_bookings' => $multiple_bookings
  881. ));
  882. $_SESSION['return'] = array(
  883. 'type' => 'success',
  884. 'msg' => sprintf($lang['success']['resource_added'], htmlspecialchars($name))
  885. );
  886. }
  887. catch (PDOException $e) {
  888. mailbox('delete', 'resource', array('name' => $name));
  889. $_SESSION['return'] = array(
  890. 'type' => 'danger',
  891. 'msg' => 'MySQL: '.$e
  892. );
  893. return false;
  894. }
  895. break;
  896. }
  897. break;
  898. case 'edit':
  899. switch ($_type) {
  900. case 'alias_domain':
  901. $alias_domains = (array)$_data['alias_domain'];
  902. foreach ($alias_domains as $alias_domain) {
  903. $alias_domain = idn_to_ascii(strtolower(trim($alias_domain)));
  904. $is_now = mailbox('get', 'alias_domain_details', $alias_domain);
  905. if (!empty($is_now)) {
  906. $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active_int'];
  907. $target_domain = (!empty($_data['target_domain'])) ? idn_to_ascii(strtolower(trim($_data['target_domain']))) : $is_now['target_domain'];
  908. }
  909. else {
  910. $_SESSION['return'] = array(
  911. 'type' => 'danger',
  912. 'msg' => sprintf($lang['danger']['alias_domain_invalid'])
  913. );
  914. return false;
  915. }
  916. if (!is_valid_domain_name($target_domain)) {
  917. $_SESSION['return'] = array(
  918. 'type' => 'danger',
  919. 'msg' => sprintf($lang['danger']['target_domain_invalid'])
  920. );
  921. return false;
  922. }
  923. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $target_domain)) {
  924. $_SESSION['return'] = array(
  925. 'type' => 'danger',
  926. 'msg' => sprintf($lang['danger']['access_denied'])
  927. );
  928. return false;
  929. }
  930. if (empty(mailbox('get', 'domain_details', $target_domain)) || !empty(mailbox('get', 'alias_domain_details', $target_domain))) {
  931. $_SESSION['return'] = array(
  932. 'type' => 'danger',
  933. 'msg' => sprintf($lang['danger']['target_domain_invalid'])
  934. );
  935. return false;
  936. }
  937. try {
  938. $stmt = $pdo->prepare("UPDATE `alias_domain` SET
  939. `target_domain` = :target_domain,
  940. `active` = :active
  941. WHERE `alias_domain` = :alias_domain");
  942. $stmt->execute(array(
  943. ':alias_domain' => $alias_domain,
  944. ':target_domain' => $target_domain,
  945. ':active' => $active
  946. ));
  947. }
  948. catch (PDOException $e) {
  949. $_SESSION['return'] = array(
  950. 'type' => 'danger',
  951. 'msg' => 'MySQL: '.$e
  952. );
  953. return false;
  954. }
  955. }
  956. $_SESSION['return'] = array(
  957. 'type' => 'success',
  958. 'msg' => sprintf($lang['success']['aliasd_modified'], htmlspecialchars(implode(', ', $alias_domains)))
  959. );
  960. break;
  961. case 'tls_policy':
  962. if (!is_array($_data['username'])) {
  963. $usernames = array();
  964. $usernames[] = $_data['username'];
  965. }
  966. else {
  967. $usernames = $_data['username'];
  968. }
  969. if (!isset($_SESSION['acl']['tls_policy']) || $_SESSION['acl']['tls_policy'] != "1" ) {
  970. $_SESSION['return'] = array(
  971. 'type' => 'danger',
  972. 'msg' => sprintf($lang['danger']['access_denied'])
  973. );
  974. return false;
  975. }
  976. foreach ($usernames as $username) {
  977. if (!filter_var($username, FILTER_VALIDATE_EMAIL) || !hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $username)) {
  978. $_SESSION['return'] = array(
  979. 'type' => 'danger',
  980. 'msg' => sprintf($lang['danger']['access_denied'])
  981. );
  982. return false;
  983. }
  984. $is_now = mailbox('get', 'tls_policy', $username);
  985. if (!empty($is_now)) {
  986. $tls_enforce_in = (isset($_data['tls_enforce_in'])) ? intval($_data['tls_enforce_in']) : $is_now['tls_enforce_in'];
  987. $tls_enforce_out = (isset($_data['tls_enforce_out'])) ? intval($_data['tls_enforce_out']) : $is_now['tls_enforce_out'];
  988. }
  989. else {
  990. $_SESSION['return'] = array(
  991. 'type' => 'danger',
  992. 'msg' => sprintf($lang['danger']['access_denied'])
  993. );
  994. return false;
  995. }
  996. try {
  997. $stmt = $pdo->prepare("UPDATE `mailbox` SET `tls_enforce_out` = :tls_out, `tls_enforce_in` = :tls_in WHERE `username` = :username");
  998. $stmt->execute(array(
  999. ':tls_out' => $tls_enforce_out,
  1000. ':tls_in' => $tls_enforce_in,
  1001. ':username' => $username
  1002. ));
  1003. }
  1004. catch (PDOException $e) {
  1005. $_SESSION['return'] = array(
  1006. 'type' => 'danger',
  1007. 'msg' => 'MySQL: '.$e
  1008. );
  1009. return false;
  1010. }
  1011. }
  1012. $_SESSION['return'] = array(
  1013. 'type' => 'success',
  1014. 'msg' => sprintf($lang['success']['mailbox_modified'], implode(', ', $usernames))
  1015. );
  1016. break;
  1017. case 'spam_score':
  1018. if (!is_array($_data['username'])) {
  1019. $usernames = array();
  1020. $usernames[] = $_data['username'];
  1021. }
  1022. else {
  1023. $usernames = $_data['username'];
  1024. }
  1025. if (!isset($_SESSION['acl']['spam_score']) || $_SESSION['acl']['spam_score'] != "1" ) {
  1026. $_SESSION['return'] = array(
  1027. 'type' => 'danger',
  1028. 'msg' => sprintf($lang['danger']['access_denied'])
  1029. );
  1030. return false;
  1031. }
  1032. foreach ($usernames as $username) {
  1033. $lowspamlevel = explode(',', $_data['spam_score'])[0];
  1034. $highspamlevel = explode(',', $_data['spam_score'])[1];
  1035. if (!is_numeric($lowspamlevel) || !is_numeric($highspamlevel)) {
  1036. $_SESSION['return'] = array(
  1037. 'type' => 'danger',
  1038. 'msg' => sprintf($lang['danger']['access_denied'])
  1039. );
  1040. return false;
  1041. }
  1042. try {
  1043. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :username
  1044. AND (`option` = 'lowspamlevel' OR `option` = 'highspamlevel')");
  1045. $stmt->execute(array(
  1046. ':username' => $username
  1047. ));
  1048. $stmt = $pdo->prepare("INSERT INTO `filterconf` (`object`, `option`, `value`)
  1049. VALUES (:username, 'highspamlevel', :highspamlevel)");
  1050. $stmt->execute(array(
  1051. ':username' => $username,
  1052. ':highspamlevel' => $highspamlevel
  1053. ));
  1054. $stmt = $pdo->prepare("INSERT INTO `filterconf` (`object`, `option`, `value`)
  1055. VALUES (:username, 'lowspamlevel', :lowspamlevel)");
  1056. $stmt->execute(array(
  1057. ':username' => $username,
  1058. ':lowspamlevel' => $lowspamlevel
  1059. ));
  1060. }
  1061. catch (PDOException $e) {
  1062. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :username
  1063. AND (`option` = 'lowspamlevel' OR `option` = 'highspamlevel')");
  1064. $stmt->execute(array(
  1065. ':username' => $username
  1066. ));
  1067. $_SESSION['return'] = array(
  1068. 'type' => 'danger',
  1069. 'msg' => 'MySQL: '.$e
  1070. );
  1071. return false;
  1072. }
  1073. }
  1074. $_SESSION['return'] = array(
  1075. 'type' => 'success',
  1076. 'msg' => sprintf($lang['success']['mailbox_modified'], implode(', ', $usernames))
  1077. );
  1078. break;
  1079. case 'time_limited_alias':
  1080. if (!isset($_SESSION['acl']['spam_alias']) || $_SESSION['acl']['spam_alias'] != "1" ) {
  1081. $_SESSION['return'] = array(
  1082. 'type' => 'danger',
  1083. 'msg' => sprintf($lang['danger']['access_denied'])
  1084. );
  1085. return false;
  1086. }
  1087. if (!is_array($_data['address'])) {
  1088. $addresses = array();
  1089. $addresses[] = $_data['address'];
  1090. }
  1091. else {
  1092. $addresses = $_data['address'];
  1093. }
  1094. foreach ($addresses as $address) {
  1095. try {
  1096. $stmt = $pdo->prepare("SELECT `goto` FROM `spamalias` WHERE `address` = :address");
  1097. $stmt->execute(array(':address' => $address));
  1098. $goto = $stmt->fetch(PDO::FETCH_ASSOC)['goto'];
  1099. }
  1100. catch (PDOException $e) {
  1101. $_SESSION['return'] = array(
  1102. 'type' => 'danger',
  1103. 'msg' => 'MySQL: '.$e
  1104. );
  1105. return false;
  1106. }
  1107. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $goto)) {
  1108. $_SESSION['return'] = array(
  1109. 'type' => 'danger',
  1110. 'msg' => sprintf($lang['danger']['access_denied'])
  1111. );
  1112. return false;
  1113. }
  1114. try {
  1115. $stmt = $pdo->prepare("UPDATE `spamalias` SET `validity` = (`validity` + 3600) WHERE
  1116. `address` = :address AND
  1117. `validity` >= :validity");
  1118. $stmt->execute(array(
  1119. ':address' => $address,
  1120. ':validity' => time()
  1121. ));
  1122. }
  1123. catch (PDOException $e) {
  1124. $_SESSION['return'] = array(
  1125. 'type' => 'danger',
  1126. 'msg' => 'MySQL: '.$e
  1127. );
  1128. return false;
  1129. }
  1130. }
  1131. $_SESSION['return'] = array(
  1132. 'type' => 'success',
  1133. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars(implode(', ', $usernames)))
  1134. );
  1135. break;
  1136. case 'delimiter_action':
  1137. if (!is_array($_data['username'])) {
  1138. $usernames = array();
  1139. $usernames[] = $_data['username'];
  1140. }
  1141. else {
  1142. $usernames = $_data['username'];
  1143. }
  1144. if (!isset($_SESSION['acl']['delimiter_action']) || $_SESSION['acl']['delimiter_action'] != "1" ) {
  1145. $_SESSION['return'] = array(
  1146. 'type' => 'danger',
  1147. 'msg' => sprintf($lang['danger']['access_denied'])
  1148. );
  1149. return false;
  1150. }
  1151. foreach ($usernames as $username) {
  1152. if (!filter_var($username, FILTER_VALIDATE_EMAIL) || !hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $username)) {
  1153. $_SESSION['return'] = array(
  1154. 'type' => 'danger',
  1155. 'msg' => sprintf($lang['danger']['access_denied'])
  1156. );
  1157. return false;
  1158. }
  1159. if (isset($_data['tagged_mail_handler']) && $_data['tagged_mail_handler'] == "subject") {
  1160. try {
  1161. $redis->hSet('RCPT_WANTS_SUBJECT_TAG', $username, 1);
  1162. }
  1163. catch (RedisException $e) {
  1164. $_SESSION['return'] = array(
  1165. 'type' => 'danger',
  1166. 'msg' => 'Redis: '.$e
  1167. );
  1168. return false;
  1169. }
  1170. }
  1171. else {
  1172. try {
  1173. $redis->hDel('RCPT_WANTS_SUBJECT_TAG', $username);
  1174. }
  1175. catch (RedisException $e) {
  1176. $_SESSION['return'] = array(
  1177. 'type' => 'danger',
  1178. 'msg' => 'Redis: '.$e
  1179. );
  1180. return false;
  1181. }
  1182. }
  1183. }
  1184. $_SESSION['return'] = array(
  1185. 'type' => 'success',
  1186. 'msg' => sprintf($lang['success']['mailbox_modified'], implode(', ', $usernames))
  1187. );
  1188. break;
  1189. case 'domain_ratelimit':
  1190. $rl_value = intval($_data['rl_value']);
  1191. $rl_frame = $_data['rl_frame'];
  1192. if (!in_array($rl_frame, array('s', 'm', 'h'))) {
  1193. $_SESSION['return'] = array(
  1194. 'type' => 'danger',
  1195. 'msg' => 'Ratelimit time frame is incorrect'
  1196. );
  1197. return false;
  1198. }
  1199. if (!is_array($_data['domain'])) {
  1200. $domains = array();
  1201. $domains[] = $_data['domain'];
  1202. }
  1203. else {
  1204. $domains = $_data['domain'];
  1205. }
  1206. foreach ($domains as $domain) {
  1207. if (!is_valid_domain_name($domain) || !hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  1208. $_SESSION['return'] = array(
  1209. 'type' => 'danger',
  1210. 'msg' => sprintf($lang['danger']['access_denied'])
  1211. );
  1212. return false;
  1213. }
  1214. if (empty($rl_value)) {
  1215. try {
  1216. $redis->hDel('RL_OBJECT', $domain);
  1217. $redis->hDel('RL_VALUE', $domain);
  1218. }
  1219. catch (RedisException $e) {
  1220. $_SESSION['return'] = array(
  1221. 'type' => 'danger',
  1222. 'msg' => 'Redis: '.$e
  1223. );
  1224. return false;
  1225. }
  1226. }
  1227. else {
  1228. try {
  1229. $redis->hSet('RL_OBJECT', $domain, '1');
  1230. $redis->hSet('RL_VALUE', $domain, $rl_value . ' / 1' . $rl_frame);
  1231. }
  1232. catch (RedisException $e) {
  1233. $_SESSION['return'] = array(
  1234. 'type' => 'danger',
  1235. 'msg' => 'Redis: '.$e
  1236. );
  1237. return false;
  1238. }
  1239. }
  1240. }
  1241. $_SESSION['return'] = array(
  1242. 'type' => 'success',
  1243. 'msg' => sprintf($lang['success']['domain_modified'], implode(', ', $domains))
  1244. );
  1245. break;
  1246. case 'syncjob':
  1247. if (!is_array($_data['id'])) {
  1248. $ids = array();
  1249. $ids[] = $_data['id'];
  1250. }
  1251. else {
  1252. $ids = $_data['id'];
  1253. }
  1254. if (!isset($_SESSION['acl']['syncjobs']) || $_SESSION['acl']['syncjobs'] != "1" ) {
  1255. $_SESSION['return'] = array(
  1256. 'type' => 'danger',
  1257. 'msg' => sprintf($lang['danger']['access_denied'])
  1258. );
  1259. return false;
  1260. }
  1261. foreach ($ids as $id) {
  1262. $is_now = mailbox('get', 'syncjob_details', $id);
  1263. if (!empty($is_now)) {
  1264. $username = $is_now['user2'];
  1265. $user1 = (!empty($_data['user1'])) ? $_data['user1'] : $is_now['user1'];
  1266. $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active_int'];
  1267. $delete2duplicates = (isset($_data['delete2duplicates'])) ? intval($_data['delete2duplicates']) : $is_now['delete2duplicates'];
  1268. $delete1 = (isset($_data['delete1'])) ? intval($_data['delete1']) : $is_now['delete1'];
  1269. $port1 = (!empty($_data['port1'])) ? $_data['port1'] : $is_now['port1'];
  1270. $password1 = (!empty($_data['password1'])) ? $_data['password1'] : $is_now['password1'];
  1271. $host1 = (!empty($_data['host1'])) ? $_data['host1'] : $is_now['host1'];
  1272. $subfolder2 = (!empty($_data['subfolder2'])) ? $_data['subfolder2'] : $is_now['subfolder2'];
  1273. $enc1 = (!empty($_data['enc1'])) ? $_data['enc1'] : $is_now['enc1'];
  1274. $mins_interval = (!empty($_data['mins_interval'])) ? $_data['mins_interval'] : $is_now['mins_interval'];
  1275. $exclude = (!empty($_data['exclude'])) ? $_data['exclude'] : $is_now['exclude'];
  1276. $maxage = (!empty($_data['maxage'])) ? $_data['maxage'] : $is_now['maxage'];
  1277. }
  1278. else {
  1279. $_SESSION['return'] = array(
  1280. 'type' => 'danger',
  1281. 'msg' => sprintf($lang['danger']['access_denied'])
  1282. );
  1283. return false;
  1284. }
  1285. if (empty($subfolder2)) {
  1286. $subfolder2 = "";
  1287. }
  1288. if (!isset($maxage) || !filter_var($maxage, FILTER_VALIDATE_INT, array('options' => array('min_range' => 1, 'max_range' => 32767)))) {
  1289. $maxage = "0";
  1290. }
  1291. if (!filter_var($port1, FILTER_VALIDATE_INT, array('options' => array('min_range' => 1, 'max_range' => 65535)))) {
  1292. $_SESSION['return'] = array(
  1293. 'type' => 'danger',
  1294. 'msg' => sprintf($lang['danger']['access_denied'])
  1295. );
  1296. return false;
  1297. }
  1298. if (!filter_var($mins_interval, FILTER_VALIDATE_INT, array('options' => array('min_range' => 10, 'max_range' => 3600)))) {
  1299. $_SESSION['return'] = array(
  1300. 'type' => 'danger',
  1301. 'msg' => sprintf($lang['danger']['access_denied'])
  1302. );
  1303. return false;
  1304. }
  1305. if (!is_valid_domain_name($host1)) {
  1306. $_SESSION['return'] = array(
  1307. 'type' => 'danger',
  1308. 'msg' => sprintf($lang['danger']['access_denied'])
  1309. );
  1310. return false;
  1311. }
  1312. if ($enc1 != "TLS" && $enc1 != "SSL" && $enc1 != "PLAIN") {
  1313. $_SESSION['return'] = array(
  1314. 'type' => 'danger',
  1315. 'msg' => sprintf($lang['danger']['access_denied'])
  1316. );
  1317. return false;
  1318. }
  1319. if (@preg_match("/" . $exclude . "/", null) === false) {
  1320. $_SESSION['return'] = array(
  1321. 'type' => 'danger',
  1322. 'msg' => sprintf($lang['danger']['access_denied'])
  1323. );
  1324. return false;
  1325. }
  1326. try {
  1327. $stmt = $pdo->prepare("UPDATE `imapsync` SET `delete1` = :delete1, `maxage` = :maxage, `subfolder2` = :subfolder2, `exclude` = :exclude, `host1` = :host1, `user1` = :user1, `password1` = :password1, `mins_interval` = :mins_interval, `port1` = :port1, `enc1` = :enc1, `delete2duplicates` = :delete2duplicates, `active` = :active
  1328. WHERE `id` = :id");
  1329. $stmt->execute(array(
  1330. ':delete1' => $delete1,
  1331. ':id' => $id,
  1332. ':exclude' => $exclude,
  1333. ':maxage' => $maxage,
  1334. ':subfolder2' => $subfolder2,
  1335. ':host1' => $host1,
  1336. ':user1' => $user1,
  1337. ':password1' => $password1,
  1338. ':mins_interval' => $mins_interval,
  1339. ':port1' => $port1,
  1340. ':enc1' => $enc1,
  1341. ':delete2duplicates' => $delete2duplicates,
  1342. ':active' => $active,
  1343. ));
  1344. }
  1345. catch(PDOException $e) {
  1346. $_SESSION['return'] = array(
  1347. 'type' => 'danger',
  1348. 'msg' => 'MySQL: '.$e
  1349. );
  1350. return false;
  1351. }
  1352. }
  1353. $_SESSION['return'] = array(
  1354. 'type' => 'success',
  1355. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  1356. );
  1357. return true;
  1358. break;
  1359. case 'alias':
  1360. if (!is_array($_data['address'])) {
  1361. $addresses = array();
  1362. $addresses[] = $_data['address'];
  1363. }
  1364. else {
  1365. $addresses = $_data['address'];
  1366. }
  1367. foreach ($addresses as $address) {
  1368. $is_now = mailbox('get', 'alias_details', $address);
  1369. if (!empty($is_now)) {
  1370. $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active_int'];
  1371. $goto = (!empty($_data['goto'])) ? $_data['goto'] : $is_now['goto'];
  1372. }
  1373. else {
  1374. $_SESSION['return'] = array(
  1375. 'type' => 'danger',
  1376. 'msg' => sprintf($lang['danger']['alias_invalid'])
  1377. );
  1378. return false;
  1379. }
  1380. $gotos = array_map('trim', preg_split( "/( |,|;|\n)/", $_data['goto']));
  1381. foreach ($gotos as &$goto) {
  1382. if (empty($goto)) {
  1383. continue;
  1384. }
  1385. if (!filter_var($goto, FILTER_VALIDATE_EMAIL)) {
  1386. $_SESSION['return'] = array(
  1387. 'type' => 'danger',
  1388. 'msg' =>sprintf($lang['danger']['goto_invalid'])
  1389. );
  1390. return false;
  1391. }
  1392. if ($goto == $address) {
  1393. $_SESSION['return'] = array(
  1394. 'type' => 'danger',
  1395. 'msg' => sprintf($lang['danger']['alias_goto_identical'])
  1396. );
  1397. return false;
  1398. }
  1399. }
  1400. $gotos = array_filter($gotos);
  1401. $goto = implode(",", $gotos);
  1402. $domain = idn_to_ascii(substr(strstr($address, '@'), 1));
  1403. $local_part = strstr($address, '@', true);
  1404. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  1405. $_SESSION['return'] = array(
  1406. 'type' => 'danger',
  1407. 'msg' => sprintf($lang['danger']['access_denied'])
  1408. );
  1409. return false;
  1410. }
  1411. if ((!filter_var($address, FILTER_VALIDATE_EMAIL) === true) && !empty($local_part)) {
  1412. $_SESSION['return'] = array(
  1413. 'type' => 'danger',
  1414. 'msg' => sprintf($lang['danger']['alias_invalid'])
  1415. );
  1416. return false;
  1417. }
  1418. try {
  1419. if (!empty($goto)) {
  1420. $stmt = $pdo->prepare("UPDATE `alias` SET
  1421. `goto` = :goto,
  1422. `active`= :active
  1423. WHERE `address` = :address");
  1424. $stmt->execute(array(
  1425. ':goto' => $goto,
  1426. ':active' => $active,
  1427. ':address' => $address
  1428. ));
  1429. }
  1430. else {
  1431. $stmt = $pdo->prepare("UPDATE `alias` SET
  1432. `active`= :active
  1433. WHERE `address` = :address");
  1434. $stmt->execute(array(
  1435. ':active' => $active,
  1436. ':address' => $address
  1437. ));
  1438. }
  1439. }
  1440. catch (PDOException $e) {
  1441. $_SESSION['return'] = array(
  1442. 'type' => 'danger',
  1443. 'msg' => 'MySQL: '.$e
  1444. );
  1445. return false;
  1446. }
  1447. }
  1448. $_SESSION['return'] = array(
  1449. 'type' => 'success',
  1450. 'msg' => sprintf($lang['success']['alias_modified'], htmlspecialchars(implode(', ', $addresses)))
  1451. );
  1452. break;
  1453. case 'domain':
  1454. if (!is_array($_data['domain'])) {
  1455. $domains = array();
  1456. $domains[] = $_data['domain'];
  1457. }
  1458. else {
  1459. $domains = $_data['domain'];
  1460. }
  1461. foreach ($domains as $domain) {
  1462. $domain = idn_to_ascii($domain);
  1463. if (!is_valid_domain_name($domain)) {
  1464. $_SESSION['return'] = array(
  1465. 'type' => 'danger',
  1466. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1467. );
  1468. return false;
  1469. }
  1470. if ($_SESSION['mailcow_cc_role'] == "domainadmin" &&
  1471. hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  1472. $description = $_data['description'];
  1473. $active = intval($_data['active']);
  1474. try {
  1475. $stmt = $pdo->prepare("UPDATE `domain` SET
  1476. `description` = :description
  1477. WHERE `domain` = :domain");
  1478. $stmt->execute(array(
  1479. ':description' => $description,
  1480. ':domain' => $domain
  1481. ));
  1482. $_SESSION['return'] = array(
  1483. 'type' => 'success',
  1484. 'msg' => sprintf($lang['success']['domain_modified'], htmlspecialchars($domain))
  1485. );
  1486. }
  1487. catch (PDOException $e) {
  1488. $_SESSION['return'] = array(
  1489. 'type' => 'danger',
  1490. 'msg' => 'MySQL: '.$e
  1491. );
  1492. return false;
  1493. }
  1494. }
  1495. elseif ($_SESSION['mailcow_cc_role'] == "admin") {
  1496. $is_now = mailbox('get', 'domain_details', $domain);
  1497. if (!empty($is_now)) {
  1498. $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active_int'];
  1499. $backupmx = (isset($_data['backupmx'])) ? intval($_data['backupmx']) : $is_now['backupmx_int'];
  1500. $relay_all_recipients = (isset($_data['relay_all_recipients'])) ? intval($_data['relay_all_recipients']) : $is_now['relay_all_recipients_int'];
  1501. $relayhost = (isset($_data['relayhost'])) ? intval($_data['relayhost']) : $is_now['relayhost'];
  1502. $aliases = (!empty($_data['aliases'])) ? $_data['aliases'] : $is_now['max_num_aliases_for_domain'];
  1503. $mailboxes = (!empty($_data['mailboxes'])) ? $_data['mailboxes'] : $is_now['max_num_mboxes_for_domain'];
  1504. $maxquota = (!empty($_data['maxquota'])) ? $_data['maxquota'] : ($is_now['max_quota_for_mbox'] / 1048576);
  1505. $quota = (!empty($_data['quota'])) ? $_data['quota'] : ($is_now['max_quota_for_domain'] / 1048576);
  1506. $description = (!empty($_data['description'])) ? $_data['description'] : $is_now['description'];
  1507. ($relay_all_recipients == '1') ? $backupmx = '1' : null;
  1508. }
  1509. else {
  1510. $_SESSION['return'] = array(
  1511. 'type' => 'danger',
  1512. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1513. );
  1514. return false;
  1515. }
  1516. try {
  1517. // todo: should be using api here
  1518. $stmt = $pdo->prepare("SELECT
  1519. COUNT(*) AS count,
  1520. MAX(COALESCE(ROUND(`quota`/1048576), 0)) AS `biggest_mailbox`,
  1521. COALESCE(ROUND(SUM(`quota`)/1048576), 0) AS `quota_all`
  1522. FROM `mailbox`
  1523. WHERE `kind` NOT REGEXP 'location|thing|group'
  1524. AND domain = :domain");
  1525. $stmt->execute(array(':domain' => $domain));
  1526. $MailboxData = $stmt->fetch(PDO::FETCH_ASSOC);
  1527. // todo: should be using api here
  1528. $stmt = $pdo->prepare("SELECT COUNT(*) AS `count` FROM `alias`
  1529. WHERE domain = :domain
  1530. AND address NOT IN (
  1531. SELECT `username` FROM `mailbox`
  1532. )");
  1533. $stmt->execute(array(':domain' => $domain));
  1534. $AliasData = $stmt->fetch(PDO::FETCH_ASSOC);
  1535. }
  1536. catch(PDOException $e) {
  1537. $_SESSION['return'] = array(
  1538. 'type' => 'danger',
  1539. 'msg' => 'MySQL: '.$e
  1540. );
  1541. return false;
  1542. }
  1543. if ($maxquota > $quota) {
  1544. $_SESSION['return'] = array(
  1545. 'type' => 'danger',
  1546. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeds_domain_quota'])
  1547. );
  1548. return false;
  1549. }
  1550. if ($maxquota == "0" || empty($maxquota)) {
  1551. $_SESSION['return'] = array(
  1552. 'type' => 'danger',
  1553. 'msg' => sprintf($lang['danger']['maxquota_empty'])
  1554. );
  1555. return false;
  1556. }
  1557. if ($MailboxData['biggest_mailbox'] > $maxquota) {
  1558. $_SESSION['return'] = array(
  1559. 'type' => 'danger',
  1560. 'msg' => sprintf($lang['danger']['max_quota_in_use'], $MailboxData['biggest_mailbox'])
  1561. );
  1562. return false;
  1563. }
  1564. if ($MailboxData['quota_all'] > $quota) {
  1565. $_SESSION['return'] = array(
  1566. 'type' => 'danger',
  1567. 'msg' => sprintf($lang['danger']['domain_quota_m_in_use'], $MailboxData['quota_all'])
  1568. );
  1569. return false;
  1570. }
  1571. if ($MailboxData['count'] > $mailboxes) {
  1572. $_SESSION['return'] = array(
  1573. 'type' => 'danger',
  1574. 'msg' => sprintf($lang['danger']['mailboxes_in_use'], $MailboxData['count'])
  1575. );
  1576. return false;
  1577. }
  1578. if ($AliasData['count'] > $aliases) {
  1579. $_SESSION['return'] = array(
  1580. 'type' => 'danger',
  1581. 'msg' => sprintf($lang['danger']['aliases_in_use'], $AliasData['count'])
  1582. );
  1583. return false;
  1584. }
  1585. try {
  1586. $stmt = $pdo->prepare("UPDATE `domain` SET
  1587. `relay_all_recipients` = :relay_all_recipients,
  1588. `backupmx` = :backupmx,
  1589. `active` = :active,
  1590. `quota` = :quota,
  1591. `maxquota` = :maxquota,
  1592. `relayhost` = :relayhost,
  1593. `mailboxes` = :mailboxes,
  1594. `aliases` = :aliases,
  1595. `description` = :description
  1596. WHERE `domain` = :domain");
  1597. $stmt->execute(array(
  1598. ':relay_all_recipients' => $relay_all_recipients,
  1599. ':backupmx' => $backupmx,
  1600. ':active' => $active,
  1601. ':quota' => $quota,
  1602. ':maxquota' => $maxquota,
  1603. ':relayhost' => $relayhost,
  1604. ':mailboxes' => $mailboxes,
  1605. ':aliases' => $aliases,
  1606. ':description' => $description,
  1607. ':domain' => $domain
  1608. ));
  1609. }
  1610. catch (PDOException $e) {
  1611. $_SESSION['return'] = array(
  1612. 'type' => 'danger',
  1613. 'msg' => 'MySQL: '.$e
  1614. );
  1615. return false;
  1616. }
  1617. }
  1618. }
  1619. $_SESSION['return'] = array(
  1620. 'type' => 'success',
  1621. 'msg' => sprintf($lang['success']['domain_modified'], htmlspecialchars(implode(', ', $domains)))
  1622. );
  1623. break;
  1624. case 'mailbox':
  1625. if (!is_array($_data['username'])) {
  1626. $usernames = array();
  1627. $usernames[] = $_data['username'];
  1628. }
  1629. else {
  1630. $usernames = $_data['username'];
  1631. }
  1632. foreach ($usernames as $username) {
  1633. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  1634. $_SESSION['return'] = array(
  1635. 'type' => 'danger',
  1636. 'msg' => sprintf($lang['danger']['username_invalid'])
  1637. );
  1638. return false;
  1639. }
  1640. $is_now = mailbox('get', 'mailbox_details', $username);
  1641. if (!empty($is_now)) {
  1642. $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active_int'];
  1643. $name = (!empty($_data['name'])) ? $_data['name'] : $is_now['name'];
  1644. $domain = $is_now['domain'];
  1645. $quota_m = (!empty($_data['quota'])) ? $_data['quota'] : ($is_now['quota'] / 1048576);
  1646. $quota_b = $quota_m * 1048576;
  1647. $password = (!empty($_data['password'])) ? $_data['password'] : null;
  1648. $password2 = (!empty($_data['password2'])) ? $_data['password2'] : null;
  1649. }
  1650. else {
  1651. $_SESSION['return'] = array(
  1652. 'type' => 'danger',
  1653. 'msg' => sprintf($lang['danger']['access_denied'])
  1654. );
  1655. return false;
  1656. }
  1657. try {
  1658. $stmt = $pdo->prepare("SELECT `quota`, `maxquota`
  1659. FROM `domain`
  1660. WHERE `domain` = :domain");
  1661. $stmt->execute(array(':domain' => $domain));
  1662. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  1663. }
  1664. catch(PDOException $e) {
  1665. $_SESSION['return'] = array(
  1666. 'type' => 'danger',
  1667. 'msg' => 'MySQL: '.$e
  1668. );
  1669. return false;
  1670. }
  1671. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  1672. $_SESSION['return'] = array(
  1673. 'type' => 'danger',
  1674. 'msg' => sprintf($lang['danger']['access_denied'])
  1675. );
  1676. return false;
  1677. }
  1678. if (!is_numeric($quota_m) || $quota_m == "0") {
  1679. $_SESSION['return'] = array(
  1680. 'type' => 'danger',
  1681. 'msg' => sprintf($lang['danger']['quota_not_0_not_numeric'], htmlspecialchars($quota_m))
  1682. );
  1683. return false;
  1684. }
  1685. if ($quota_m > $DomainData['maxquota']) {
  1686. $_SESSION['return'] = array(
  1687. 'type' => 'danger',
  1688. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeded'], $DomainData['maxquota'])
  1689. );
  1690. return false;
  1691. }
  1692. if (((($is_now['quota_used'] / 1048576) - $quota_m) + $quota_m) > $DomainData['quota']) {
  1693. $_SESSION['return'] = array(
  1694. 'type' => 'danger',
  1695. 'msg' => sprintf($lang['danger']['mailbox_quota_left_exceeded'], ($is_now['max_new_quota'] / 1048576))
  1696. );
  1697. return false;
  1698. }
  1699. if (isset($_data['sender_acl'])) {
  1700. // Get sender_acl items set by admin
  1701. $sender_acl_admin = array_merge(
  1702. mailbox('get', 'sender_acl_handles', $username)['sender_acl_domains']['ro'],
  1703. mailbox('get', 'sender_acl_handles', $username)['sender_acl_addresses']['ro']
  1704. );
  1705. // Get sender_acl items from POST array
  1706. $sender_acl_domain_admin = ($_data['sender_acl'] == "0") ? array() : (array)$_data['sender_acl'];
  1707. if (!empty($sender_acl_domain_admin) || !empty($sender_acl_admin)) {
  1708. // Check items in POST array and skip invalid
  1709. foreach ($sender_acl_domain_admin as $key => $val) {
  1710. if (!filter_var($val, FILTER_VALIDATE_EMAIL) && !is_valid_domain_name(ltrim($val, '@'))) {
  1711. unset($sender_acl_domain_admin[$key]);
  1712. }
  1713. if (is_valid_domain_name(ltrim($val, '@'))) {
  1714. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], ltrim($val, '@'))) {
  1715. $_SESSION['return'] = array(
  1716. 'type' => 'danger',
  1717. 'msg' => sprintf($lang['danger']['sender_acl_invalid'])
  1718. );
  1719. return false;
  1720. }
  1721. }
  1722. if (filter_var($val, FILTER_VALIDATE_EMAIL)) {
  1723. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $val)) {
  1724. $_SESSION['return'] = array(
  1725. 'type' => 'danger',
  1726. 'msg' => sprintf($lang['danger']['sender_acl_invalid'])
  1727. );
  1728. return false;
  1729. }
  1730. }
  1731. }
  1732. // Merge both arrays
  1733. $sender_acl_merged = array_merge($sender_acl_domain_admin, $sender_acl_admin);
  1734. try {
  1735. $stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` = :username");
  1736. $stmt->execute(array(
  1737. ':username' => $username
  1738. ));
  1739. }
  1740. catch (PDOException $e) {
  1741. $_SESSION['return'] = array(
  1742. 'type' => 'danger',
  1743. 'msg' => 'MySQL: '.$e
  1744. );
  1745. return false;
  1746. }
  1747. foreach ($sender_acl_merged as $sender_acl) {
  1748. $domain = ltrim($sender_acl, '@');
  1749. if (is_valid_domain_name($domain)) {
  1750. $sender_acl = '@' . $domain;
  1751. }
  1752. try {
  1753. $stmt = $pdo->prepare("INSERT INTO `sender_acl` (`send_as`, `logged_in_as`)
  1754. VALUES (:sender_acl, :username)");
  1755. $stmt->execute(array(
  1756. ':sender_acl' => $sender_acl,
  1757. ':username' => $username
  1758. ));
  1759. }
  1760. catch (PDOException $e) {
  1761. $_SESSION['return'] = array(
  1762. 'type' => 'danger',
  1763. 'msg' => 'MySQL: '.$e
  1764. );
  1765. return false;
  1766. }
  1767. }
  1768. }
  1769. else {
  1770. try {
  1771. $stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` = :username");
  1772. $stmt->execute(array(
  1773. ':username' => $username
  1774. ));
  1775. }
  1776. catch (PDOException $e) {
  1777. $_SESSION['return'] = array(
  1778. 'type' => 'danger',
  1779. 'msg' => 'MySQL: '.$e
  1780. );
  1781. return false;
  1782. }
  1783. }
  1784. }
  1785. if (!empty($password) && !empty($password2)) {
  1786. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) {
  1787. $_SESSION['return'] = array(
  1788. 'type' => 'danger',
  1789. 'msg' => sprintf($lang['danger']['password_complexity'])
  1790. );
  1791. return false;
  1792. }
  1793. if ($password != $password2) {
  1794. $_SESSION['return'] = array(
  1795. 'type' => 'danger',
  1796. 'msg' => sprintf($lang['danger']['password_mismatch'])
  1797. );
  1798. return false;
  1799. }
  1800. $password_hashed = hash_password($password);
  1801. try {
  1802. $stmt = $pdo->prepare("UPDATE `alias` SET
  1803. `active` = :active
  1804. WHERE `address` = :address");
  1805. $stmt->execute(array(
  1806. ':address' => $username,
  1807. ':active' => $active
  1808. ));
  1809. $stmt = $pdo->prepare("UPDATE `mailbox` SET
  1810. `active` = :active,
  1811. `password` = :password_hashed,
  1812. `name`= :name,
  1813. `quota` = :quota_b
  1814. WHERE `username` = :username");
  1815. $stmt->execute(array(
  1816. ':password_hashed' => $password_hashed,
  1817. ':active' => $active,
  1818. ':name' => $name,
  1819. ':quota_b' => $quota_b,
  1820. ':username' => $username
  1821. ));
  1822. }
  1823. catch (PDOException $e) {
  1824. $_SESSION['return'] = array(
  1825. 'type' => 'danger',
  1826. 'msg' => 'MySQL: '.$e
  1827. );
  1828. return false;
  1829. }
  1830. }
  1831. try {
  1832. $stmt = $pdo->prepare("UPDATE `alias` SET
  1833. `active` = :active
  1834. WHERE `address` = :address");
  1835. $stmt->execute(array(
  1836. ':address' => $username,
  1837. ':active' => $active
  1838. ));
  1839. $stmt = $pdo->prepare("UPDATE `mailbox` SET
  1840. `active` = :active,
  1841. `name`= :name,
  1842. `quota` = :quota_b
  1843. WHERE `username` = :username");
  1844. $stmt->execute(array(
  1845. ':active' => $active,
  1846. ':name' => $name,
  1847. ':quota_b' => $quota_b,
  1848. ':username' => $username
  1849. ));
  1850. }
  1851. catch (PDOException $e) {
  1852. $_SESSION['return'] = array(
  1853. 'type' => 'danger',
  1854. 'msg' => 'MySQL: '.$e
  1855. );
  1856. return false;
  1857. }
  1858. }
  1859. $_SESSION['return'] = array(
  1860. 'type' => 'success',
  1861. 'msg' => sprintf($lang['success']['mailbox_modified'], implode(', ', $usernames))
  1862. );
  1863. break;
  1864. case 'resource':
  1865. if (!is_array($_data['name'])) {
  1866. $names = array();
  1867. $names[] = $_data['name'];
  1868. }
  1869. else {
  1870. $names = $_data['name'];
  1871. }
  1872. foreach ($names as $name) {
  1873. $is_now = mailbox('get', 'resource_details', $name);
  1874. if (!empty($is_now)) {
  1875. $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active_int'];
  1876. $multiple_bookings = (isset($_data['multiple_bookings'])) ? intval($_data['multiple_bookings']) : $is_now['multiple_bookings_int'];
  1877. $description = (!empty($_data['description'])) ? $_data['description'] : $is_now['description'];
  1878. $kind = (!empty($_data['kind'])) ? $_data['kind'] : $is_now['kind'];
  1879. }
  1880. else {
  1881. $_SESSION['return'] = array(
  1882. 'type' => 'danger',
  1883. 'msg' => sprintf($lang['danger']['resource_invalid'])
  1884. );
  1885. return false;
  1886. }
  1887. if (!filter_var($name, FILTER_VALIDATE_EMAIL)) {
  1888. $_SESSION['return'] = array(
  1889. 'type' => 'danger',
  1890. 'msg' => sprintf($lang['danger']['resource_invalid'])
  1891. );
  1892. return false;
  1893. }
  1894. if (empty($description)) {
  1895. $_SESSION['return'] = array(
  1896. 'type' => 'danger',
  1897. 'msg' => sprintf($lang['danger']['description_invalid'])
  1898. );
  1899. return false;
  1900. }
  1901. if ($kind != 'location' && $kind != 'group' && $kind != 'thing') {
  1902. $_SESSION['return'] = array(
  1903. 'type' => 'danger',
  1904. 'msg' => sprintf($lang['danger']['resource_invalid'])
  1905. );
  1906. return false;
  1907. }
  1908. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $name)) {
  1909. $_SESSION['return'] = array(
  1910. 'type' => 'danger',
  1911. 'msg' => sprintf($lang['danger']['access_denied'])
  1912. );
  1913. return false;
  1914. }
  1915. try {
  1916. $stmt = $pdo->prepare("UPDATE `mailbox` SET
  1917. `active` = :active,
  1918. `name`= :description,
  1919. `kind`= :kind,
  1920. `multiple_bookings`= :multiple_bookings
  1921. WHERE `username` = :name");
  1922. $stmt->execute(array(
  1923. ':active' => $active,
  1924. ':description' => $description,
  1925. ':multiple_bookings' => $multiple_bookings,
  1926. ':kind' => $kind,
  1927. ':name' => $name
  1928. ));
  1929. }
  1930. catch (PDOException $e) {
  1931. $_SESSION['return'] = array(
  1932. 'type' => 'danger',
  1933. 'msg' => 'MySQL: '.$e
  1934. );
  1935. return false;
  1936. }
  1937. }
  1938. $_SESSION['return'] = array(
  1939. 'type' => 'success',
  1940. 'msg' => sprintf($lang['success']['resource_modified'], implode(', ', $names))
  1941. );
  1942. break;
  1943. }
  1944. break;
  1945. case 'get':
  1946. switch ($_type) {
  1947. case 'sender_acl_handles':
  1948. if ($_SESSION['mailcow_cc_role'] != "admin" && $_SESSION['mailcow_cc_role'] != "domainadmin") {
  1949. return false;
  1950. }
  1951. $data['sender_acl_domains']['ro'] = array();
  1952. $data['sender_acl_domains']['rw'] = array();
  1953. $data['sender_acl_domains']['selectable'] = array();
  1954. $data['sender_acl_addresses']['ro'] = array();
  1955. $data['sender_acl_addresses']['rw'] = array();
  1956. $data['sender_acl_addresses']['selectable'] = array();
  1957. $data['fixed_sender_aliases'] = array();
  1958. try {
  1959. // Fixed addresses
  1960. $stmt = $pdo->prepare("SELECT `address` FROM `alias` WHERE `goto` REGEXP :goto AND `address` NOT LIKE '@%'");
  1961. $stmt->execute(array(':goto' => '(^|,)'.$_data.'($|,)'));
  1962. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  1963. while ($row = array_shift($rows)) {
  1964. $data['fixed_sender_aliases'][] = $row['address'];
  1965. }
  1966. $stmt = $pdo->prepare("SELECT CONCAT(`local_part`, '@', `alias_domain`.`alias_domain`) AS `alias_domain_alias` FROM `mailbox`, `alias_domain`
  1967. WHERE `alias_domain`.`target_domain` = `mailbox`.`domain`
  1968. AND `mailbox`.`username` = :username");
  1969. $stmt->execute(array(':username' => $_data));
  1970. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  1971. while ($row = array_shift($rows)) {
  1972. if (!empty($row['alias_domain_alias'])) {
  1973. $data['fixed_sender_aliases'][] = $row['alias_domain_alias'];
  1974. }
  1975. }
  1976. // Return array $data['sender_acl_domains/addresses']['ro'] with read-only objects
  1977. // Return array $data['sender_acl_domains/addresses']['rw'] with read-write objects (can be deleted)
  1978. $stmt = $pdo->prepare("SELECT REPLACE(`send_as`, '@', '') AS `send_as` FROM `sender_acl` WHERE `logged_in_as` = :logged_in_as AND `send_as` LIKE '@%'");
  1979. $stmt->execute(array(':logged_in_as' => $_data));
  1980. $domain_rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  1981. while ($domain_row = array_shift($domain_rows)) {
  1982. if (is_valid_domain_name($domain_row['send_as']) && !hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain_row['send_as'])) {
  1983. $data['sender_acl_domains']['ro'][] = $domain_row['send_as'];
  1984. continue;
  1985. }
  1986. if (is_valid_domain_name($domain_row['send_as']) && hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain_row['send_as'])) {
  1987. $data['sender_acl_domains']['rw'][] = $domain_row['send_as'];
  1988. continue;
  1989. }
  1990. }
  1991. $stmt = $pdo->prepare("SELECT `send_as` FROM `sender_acl` WHERE `logged_in_as` = :logged_in_as AND `send_as` NOT LIKE '@%'");
  1992. $stmt->execute(array(':logged_in_as' => $_data));
  1993. $address_rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  1994. while ($address_row = array_shift($address_rows)) {
  1995. if (filter_var($address_row['send_as'], FILTER_VALIDATE_EMAIL) && !hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $address_row['send_as'])) {
  1996. $data['sender_acl_addresses']['ro'][] = $address_row['send_as'];
  1997. continue;
  1998. }
  1999. if (filter_var($address_row['send_as'], FILTER_VALIDATE_EMAIL) && hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $address_row['send_as'])) {
  2000. $data['sender_acl_addresses']['rw'][] = $address_row['send_as'];
  2001. continue;
  2002. }
  2003. }
  2004. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  2005. WHERE `domain` NOT IN (
  2006. SELECT REPLACE(`send_as`, '@', '') FROM `sender_acl`
  2007. WHERE `logged_in_as` = :logged_in_as
  2008. AND `send_as` LIKE '@%')");
  2009. $stmt->execute(array(
  2010. ':logged_in_as' => $_data,
  2011. ));
  2012. $rows_domain = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2013. while ($row_domain = array_shift($rows_domain)) {
  2014. if (is_valid_domain_name($row_domain['domain']) && hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $row_domain['domain'])) {
  2015. $data['sender_acl_domains']['selectable'][] = $row_domain['domain'];
  2016. }
  2017. }
  2018. $stmt = $pdo->prepare("SELECT `address` FROM `alias`
  2019. WHERE `goto` != :goto
  2020. AND `address` NOT IN (
  2021. SELECT `send_as` FROM `sender_acl`
  2022. WHERE `logged_in_as` = :logged_in_as
  2023. AND `send_as` NOT LIKE '@%')");
  2024. $stmt->execute(array(
  2025. ':logged_in_as' => $_data,
  2026. ':goto' => $_data
  2027. ));
  2028. $rows_mbox = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2029. while ($row = array_shift($rows_mbox)) {
  2030. if (filter_var($row['address'], FILTER_VALIDATE_EMAIL) && hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $row['address'])) {
  2031. $data['sender_acl_addresses']['selectable'][] = $row['address'];
  2032. }
  2033. }
  2034. }
  2035. catch(PDOException $e) {
  2036. $_SESSION['return'] = array(
  2037. 'type' => 'danger',
  2038. 'msg' => 'MySQL: '.$e
  2039. );
  2040. return false;
  2041. }
  2042. return $data;
  2043. break;
  2044. case 'mailboxes':
  2045. $mailboxes = array();
  2046. if (isset($_data) && !hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2047. return false;
  2048. }
  2049. elseif (isset($_data) && hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2050. try {
  2051. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox` WHERE `kind` NOT REGEXP 'location|thing|group' AND `domain` != 'ALL' AND `domain` = :domain");
  2052. $stmt->execute(array(
  2053. ':domain' => $_data,
  2054. ));
  2055. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2056. while($row = array_shift($rows)) {
  2057. $mailboxes[] = $row['username'];
  2058. }
  2059. }
  2060. catch (PDOException $e) {
  2061. $_SESSION['return'] = array(
  2062. 'type' => 'danger',
  2063. 'msg' => 'MySQL: '.$e
  2064. );
  2065. return false;
  2066. }
  2067. }
  2068. else {
  2069. try {
  2070. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox` WHERE `kind` NOT REGEXP 'location|thing|group' AND `domain` IN (SELECT `domain` FROM `domain_admins` WHERE `active` = '1' AND `username` = :username) OR 'admin' = :role");
  2071. $stmt->execute(array(
  2072. ':username' => $_SESSION['mailcow_cc_username'],
  2073. ':role' => $_SESSION['mailcow_cc_role'],
  2074. ));
  2075. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2076. while($row = array_shift($rows)) {
  2077. $mailboxes[] = $row['username'];
  2078. }
  2079. }
  2080. catch (PDOException $e) {
  2081. $_SESSION['return'] = array(
  2082. 'type' => 'danger',
  2083. 'msg' => 'MySQL: '.$e
  2084. );
  2085. return false;
  2086. }
  2087. }
  2088. return $mailboxes;
  2089. break;
  2090. case 'tls_policy':
  2091. $policydata = array();
  2092. if (isset($_data) && filter_var($_data, FILTER_VALIDATE_EMAIL)) {
  2093. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2094. return false;
  2095. }
  2096. }
  2097. else {
  2098. $_data = $_SESSION['mailcow_cc_username'];
  2099. }
  2100. try {
  2101. $stmt = $pdo->prepare("SELECT `tls_enforce_out`, `tls_enforce_in` FROM `mailbox` WHERE `username` = :username");
  2102. $stmt->execute(array(':username' => $_data));
  2103. $policydata = $stmt->fetch(PDO::FETCH_ASSOC);
  2104. }
  2105. catch(PDOException $e) {
  2106. $_SESSION['return'] = array(
  2107. 'type' => 'danger',
  2108. 'msg' => 'MySQL: '.$e
  2109. );
  2110. return false;
  2111. }
  2112. return $policydata;
  2113. break;
  2114. case 'syncjob_details':
  2115. $syncjobdetails = array();
  2116. if (!is_numeric($_data)) {
  2117. return false;
  2118. }
  2119. try {
  2120. $stmt = $pdo->prepare("SELECT *,
  2121. CONCAT(LEFT(`password1`, 3), '...') AS `password1_short`,
  2122. `active` AS `active_int`,
  2123. CASE `active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`
  2124. FROM `imapsync` WHERE id = :id");
  2125. $stmt->execute(array(':id' => $_data));
  2126. $syncjobdetails = $stmt->fetch(PDO::FETCH_ASSOC);
  2127. }
  2128. catch(PDOException $e) {
  2129. $_SESSION['return'] = array(
  2130. 'type' => 'danger',
  2131. 'msg' => 'MySQL: '.$e
  2132. );
  2133. }
  2134. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $syncjobdetails['user2'])) {
  2135. return false;
  2136. }
  2137. return $syncjobdetails;
  2138. break;
  2139. case 'syncjobs':
  2140. $syncjobdata = array();
  2141. if (isset($_data) && filter_var($_data, FILTER_VALIDATE_EMAIL)) {
  2142. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2143. return false;
  2144. }
  2145. }
  2146. else {
  2147. $_data = $_SESSION['mailcow_cc_username'];
  2148. }
  2149. try {
  2150. $stmt = $pdo->prepare("SELECT `id` FROM `imapsync` WHERE `user2` = :username");
  2151. $stmt->execute(array(':username' => $_data));
  2152. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2153. while($row = array_shift($rows)) {
  2154. $syncjobdata[] = $row['id'];
  2155. }
  2156. }
  2157. catch(PDOException $e) {
  2158. $_SESSION['return'] = array(
  2159. 'type' => 'danger',
  2160. 'msg' => 'MySQL: '.$e
  2161. );
  2162. }
  2163. return $syncjobdata;
  2164. break;
  2165. case 'spam_score':
  2166. $default = "5, 15";
  2167. $policydata = array();
  2168. if (isset($_data) && filter_var($_data, FILTER_VALIDATE_EMAIL)) {
  2169. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2170. return false;
  2171. }
  2172. }
  2173. else {
  2174. $_data = $_SESSION['mailcow_cc_username'];
  2175. }
  2176. try {
  2177. $stmt = $pdo->prepare("SELECT `value` FROM `filterconf` WHERE `object` = :username AND
  2178. (`option` = 'lowspamlevel' OR `option` = 'highspamlevel')");
  2179. $stmt->execute(array(':username' => $_data));
  2180. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  2181. }
  2182. catch(PDOException $e) {
  2183. $_SESSION['return'] = array(
  2184. 'type' => 'danger',
  2185. 'msg' => 'MySQL: '.$e
  2186. );
  2187. return false;
  2188. }
  2189. if (empty($num_results)) {
  2190. return $default;
  2191. }
  2192. else {
  2193. try {
  2194. $stmt = $pdo->prepare("SELECT `value` FROM `filterconf` WHERE `option` = 'highspamlevel' AND `object` = :username");
  2195. $stmt->execute(array(':username' => $_data));
  2196. $highspamlevel = $stmt->fetch(PDO::FETCH_ASSOC);
  2197. $stmt = $pdo->prepare("SELECT `value` FROM `filterconf` WHERE `option` = 'lowspamlevel' AND `object` = :username");
  2198. $stmt->execute(array(':username' => $_data));
  2199. $lowspamlevel = $stmt->fetch(PDO::FETCH_ASSOC);
  2200. return $lowspamlevel['value'].', '.$highspamlevel['value'];
  2201. }
  2202. catch(PDOException $e) {
  2203. $_SESSION['return'] = array(
  2204. 'type' => 'danger',
  2205. 'msg' => 'MySQL: '.$e
  2206. );
  2207. return false;
  2208. }
  2209. }
  2210. break;
  2211. case 'time_limited_aliases':
  2212. $tladata = array();
  2213. if (isset($_data) && filter_var($_data, FILTER_VALIDATE_EMAIL)) {
  2214. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2215. return false;
  2216. }
  2217. }
  2218. else {
  2219. $_data = $_SESSION['mailcow_cc_username'];
  2220. }
  2221. try {
  2222. $stmt = $pdo->prepare("SELECT `address`,
  2223. `goto`,
  2224. `validity`
  2225. FROM `spamalias`
  2226. WHERE `goto` = :username
  2227. AND `validity` >= :unixnow");
  2228. $stmt->execute(array(':username' => $_data, ':unixnow' => time()));
  2229. $tladata = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2230. }
  2231. catch(PDOException $e) {
  2232. $_SESSION['return'] = array(
  2233. 'type' => 'danger',
  2234. 'msg' => 'MySQL: '.$e
  2235. );
  2236. }
  2237. return $tladata;
  2238. break;
  2239. case 'delimiter_action':
  2240. $policydata = array();
  2241. if (isset($_data) && filter_var($_data, FILTER_VALIDATE_EMAIL)) {
  2242. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2243. return false;
  2244. }
  2245. }
  2246. else {
  2247. $_data = $_SESSION['mailcow_cc_username'];
  2248. }
  2249. try {
  2250. if ($redis->hGet('RCPT_WANTS_SUBJECT_TAG', $_data)) {
  2251. return "subject";
  2252. }
  2253. else {
  2254. return "subfolder";
  2255. }
  2256. }
  2257. catch (RedisException $e) {
  2258. $_SESSION['return'] = array(
  2259. 'type' => 'danger',
  2260. 'msg' => 'Redis: '.$e
  2261. );
  2262. return false;
  2263. }
  2264. break;
  2265. case 'resources':
  2266. $resources = array();
  2267. if (isset($_data) && !hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2268. return false;
  2269. }
  2270. elseif (isset($_data) && hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2271. try {
  2272. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox` WHERE `kind` REGEXP 'location|thing|group' AND `domain` != 'ALL' AND `domain` = :domain");
  2273. $stmt->execute(array(
  2274. ':domain' => $_data,
  2275. ));
  2276. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2277. while($row = array_shift($rows)) {
  2278. $resources[] = $row['username'];
  2279. }
  2280. }
  2281. catch (PDOException $e) {
  2282. $_SESSION['return'] = array(
  2283. 'type' => 'danger',
  2284. 'msg' => 'MySQL: '.$e
  2285. );
  2286. return false;
  2287. }
  2288. }
  2289. else {
  2290. try {
  2291. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox` WHERE `kind` REGEXP 'location|thing|group' AND `domain` IN (SELECT `domain` FROM `domain_admins` WHERE `active` = '1' AND `username` = :username) OR 'admin' = :role");
  2292. $stmt->execute(array(
  2293. ':username' => $_SESSION['mailcow_cc_username'],
  2294. ':role' => $_SESSION['mailcow_cc_role'],
  2295. ));
  2296. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2297. while($row = array_shift($rows)) {
  2298. $resources[] = $row['username'];
  2299. }
  2300. }
  2301. catch (PDOException $e) {
  2302. $_SESSION['return'] = array(
  2303. 'type' => 'danger',
  2304. 'msg' => 'MySQL: '.$e
  2305. );
  2306. return false;
  2307. }
  2308. }
  2309. return $resources;
  2310. break;
  2311. case 'alias_domains':
  2312. $aliasdomains = array();
  2313. if (isset($_data) && !hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2314. return false;
  2315. }
  2316. elseif (isset($_data) && hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2317. try {
  2318. $stmt = $pdo->prepare("SELECT `alias_domain` FROM `alias_domain` WHERE `target_domain` = :domain");
  2319. $stmt->execute(array(
  2320. ':domain' => $_data,
  2321. ));
  2322. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2323. while($row = array_shift($rows)) {
  2324. $aliasdomains[] = $row['alias_domain'];
  2325. }
  2326. }
  2327. catch (PDOException $e) {
  2328. $_SESSION['return'] = array(
  2329. 'type' => 'danger',
  2330. 'msg' => 'MySQL: '.$e
  2331. );
  2332. return false;
  2333. }
  2334. }
  2335. else {
  2336. try {
  2337. $stmt = $pdo->prepare("SELECT `alias_domain` FROM `alias_domain` WHERE `target_domain` IN (SELECT `domain` FROM `domain_admins` WHERE `active` = '1' AND `username` = :username) OR 'admin' = :role");
  2338. $stmt->execute(array(
  2339. ':username' => $_SESSION['mailcow_cc_username'],
  2340. ':role' => $_SESSION['mailcow_cc_role'],
  2341. ));
  2342. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2343. while($row = array_shift($rows)) {
  2344. $aliasdomains[] = $row['alias_domain'];
  2345. }
  2346. }
  2347. catch (PDOException $e) {
  2348. $_SESSION['return'] = array(
  2349. 'type' => 'danger',
  2350. 'msg' => 'MySQL: '.$e
  2351. );
  2352. return false;
  2353. }
  2354. }
  2355. return $aliasdomains;
  2356. break;
  2357. case 'aliases':
  2358. $aliases = array();
  2359. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2360. return false;
  2361. }
  2362. try {
  2363. $stmt = $pdo->prepare("SELECT `address` FROM `alias` WHERE `address` != `goto` AND `domain` = :domain");
  2364. $stmt->execute(array(
  2365. ':domain' => $_data,
  2366. ));
  2367. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2368. while($row = array_shift($rows)) {
  2369. $aliases[] = $row['address'];
  2370. }
  2371. }
  2372. catch (PDOException $e) {
  2373. $_SESSION['return'] = array(
  2374. 'type' => 'danger',
  2375. 'msg' => 'MySQL: '.$e
  2376. );
  2377. return false;
  2378. }
  2379. return $aliases;
  2380. break;
  2381. case 'domain_ratelimit':
  2382. $aliases = array();
  2383. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2384. return false;
  2385. }
  2386. try {
  2387. if (($rl_value = $redis->hGet('RL_VALUE', $_data)) && $redis->hGet('RL_OBJECT', $_data)) {
  2388. $rl = explode(' / 1', $rl_value);
  2389. $data['value'] = $rl[0];
  2390. $data['frame'] = $rl[1];
  2391. return $data;
  2392. }
  2393. else {
  2394. return false;
  2395. }
  2396. }
  2397. catch (RedisException $e) {
  2398. $_SESSION['return'] = array(
  2399. 'type' => 'danger',
  2400. 'msg' => 'Redis: '.$e
  2401. );
  2402. return false;
  2403. }
  2404. return false;
  2405. break;
  2406. case 'alias_details':
  2407. $aliasdata = array();
  2408. try {
  2409. $stmt = $pdo->prepare("SELECT
  2410. `domain`,
  2411. `goto`,
  2412. `address`,
  2413. `active` as `active_int`,
  2414. CASE `active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`,
  2415. `created`,
  2416. `modified`
  2417. FROM `alias`
  2418. WHERE `address` = :address AND `address` != `goto`");
  2419. $stmt->execute(array(
  2420. ':address' => $_data,
  2421. ));
  2422. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  2423. $stmt = $pdo->prepare("SELECT `target_domain` FROM `alias_domain` WHERE `alias_domain` = :domain");
  2424. $stmt->execute(array(
  2425. ':domain' => $row['domain'],
  2426. ));
  2427. $row_alias_domain = $stmt->fetch(PDO::FETCH_ASSOC);
  2428. if (isset($row_alias_domain['target_domain']) && !empty($row_alias_domain['target_domain'])) {
  2429. $aliasdata['in_primary_domain'] = $row_alias_domain['target_domain'];
  2430. }
  2431. else {
  2432. $aliasdata['in_primary_domain'] = "";
  2433. }
  2434. $aliasdata['domain'] = $row['domain'];
  2435. $aliasdata['goto'] = $row['goto'];
  2436. $aliasdata['address'] = $row['address'];
  2437. (!filter_var($aliasdata['address'], FILTER_VALIDATE_EMAIL)) ? $aliasdata['is_catch_all'] = 1 : $aliasdata['is_catch_all'] = 0;
  2438. $aliasdata['active'] = $row['active'];
  2439. $aliasdata['active_int'] = $row['active_int'];
  2440. $aliasdata['created'] = $row['created'];
  2441. $aliasdata['modified'] = $row['modified'];
  2442. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $aliasdata['domain'])) {
  2443. return false;
  2444. }
  2445. }
  2446. catch (PDOException $e) {
  2447. $_SESSION['return'] = array(
  2448. 'type' => 'danger',
  2449. 'msg' => 'MySQL: '.$e
  2450. );
  2451. return false;
  2452. }
  2453. return $aliasdata;
  2454. break;
  2455. case 'alias_domain_details':
  2456. $aliasdomaindata = array();
  2457. try {
  2458. $stmt = $pdo->prepare("SELECT
  2459. `alias_domain`,
  2460. `target_domain`,
  2461. `active` AS `active_int`,
  2462. CASE `active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`,
  2463. `created`,
  2464. `modified`
  2465. FROM `alias_domain`
  2466. WHERE `alias_domain` = :aliasdomain");
  2467. $stmt->execute(array(
  2468. ':aliasdomain' => $_data,
  2469. ));
  2470. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  2471. $aliasdomaindata['alias_domain'] = $row['alias_domain'];
  2472. $aliasdomaindata['target_domain'] = $row['target_domain'];
  2473. $aliasdomaindata['active'] = $row['active'];
  2474. $aliasdomaindata['active_int'] = $row['active_int'];
  2475. $aliasdomaindata['created'] = $row['created'];
  2476. $aliasdomaindata['modified'] = $row['modified'];
  2477. }
  2478. catch (PDOException $e) {
  2479. $_SESSION['return'] = array(
  2480. 'type' => 'danger',
  2481. 'msg' => 'MySQL: '.$e
  2482. );
  2483. return false;
  2484. }
  2485. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $aliasdomaindata['target_domain'])) {
  2486. return false;
  2487. }
  2488. return $aliasdomaindata;
  2489. break;
  2490. case 'domains':
  2491. $domains = array();
  2492. if ($_SESSION['mailcow_cc_role'] != "admin" && $_SESSION['mailcow_cc_role'] != "domainadmin") {
  2493. return false;
  2494. }
  2495. try {
  2496. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  2497. WHERE (`domain` IN (
  2498. SELECT `domain` from `domain_admins`
  2499. WHERE (`active`='1' AND `username` = :username))
  2500. )
  2501. OR ('admin'= :role)
  2502. AND `domain` != 'ALL'");
  2503. $stmt->execute(array(
  2504. ':username' => $_SESSION['mailcow_cc_username'],
  2505. ':role' => $_SESSION['mailcow_cc_role'],
  2506. ));
  2507. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2508. while($row = array_shift($rows)) {
  2509. $domains[] = $row['domain'];
  2510. }
  2511. }
  2512. catch (PDOException $e) {
  2513. $_SESSION['return'] = array(
  2514. 'type' => 'danger',
  2515. 'msg' => 'MySQL: '.$e
  2516. );
  2517. return false;
  2518. }
  2519. return $domains;
  2520. break;
  2521. case 'domain_details':
  2522. $domaindata = array();
  2523. $_data = idn_to_ascii(strtolower(trim($_data)));
  2524. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2525. return false;
  2526. }
  2527. try {
  2528. $stmt = $pdo->prepare("SELECT `target_domain` FROM `alias_domain` WHERE `alias_domain` = :domain");
  2529. $stmt->execute(array(
  2530. ':domain' => $_data
  2531. ));
  2532. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  2533. if (!empty($row)) {
  2534. $_data = $row['target_domain'];
  2535. }
  2536. $stmt = $pdo->prepare("SELECT
  2537. `domain`,
  2538. `description`,
  2539. `aliases`,
  2540. `mailboxes`,
  2541. `maxquota`,
  2542. `quota`,
  2543. `relayhost`,
  2544. `relay_all_recipients` as `relay_all_recipients_int`,
  2545. `backupmx` as `backupmx_int`,
  2546. `active` as `active_int`,
  2547. CASE `relay_all_recipients` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `relay_all_recipients`,
  2548. CASE `backupmx` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `backupmx`,
  2549. CASE `active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`
  2550. FROM `domain` WHERE `domain`= :domain");
  2551. $stmt->execute(array(
  2552. ':domain' => $_data
  2553. ));
  2554. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  2555. if (empty($row)) {
  2556. return false;
  2557. }
  2558. $stmt = $pdo->prepare("SELECT COUNT(*) AS `count`,
  2559. COALESCE(SUM(`quota`), 0) AS `in_use`
  2560. FROM `mailbox`
  2561. WHERE `kind` NOT REGEXP 'location|thing|group'
  2562. AND `domain` = :domain");
  2563. $stmt->execute(array(':domain' => $row['domain']));
  2564. $MailboxDataDomain = $stmt->fetch(PDO::FETCH_ASSOC);
  2565. $domaindata['max_new_mailbox_quota'] = ($row['quota'] * 1048576) - $MailboxDataDomain['in_use'];
  2566. if ($domaindata['max_new_mailbox_quota'] > ($row['maxquota'] * 1048576)) {
  2567. $domaindata['max_new_mailbox_quota'] = ($row['maxquota'] * 1048576);
  2568. }
  2569. $domaindata['quota_used_in_domain'] = $MailboxDataDomain['in_use'];
  2570. $domaindata['mboxes_in_domain'] = $MailboxDataDomain['count'];
  2571. $domaindata['mboxes_left'] = $row['mailboxes'] - $MailboxDataDomain['count'];
  2572. $domaindata['domain_name'] = $row['domain'];
  2573. $domaindata['description'] = $row['description'];
  2574. $domaindata['max_num_aliases_for_domain'] = $row['aliases'];
  2575. $domaindata['max_num_mboxes_for_domain'] = $row['mailboxes'];
  2576. $domaindata['max_quota_for_mbox'] = $row['maxquota'] * 1048576;
  2577. $domaindata['max_quota_for_domain'] = $row['quota'] * 1048576;
  2578. $domaindata['relayhost'] = $row['relayhost'];
  2579. $domaindata['backupmx'] = $row['backupmx'];
  2580. $domaindata['backupmx_int'] = $row['backupmx_int'];
  2581. $domaindata['active'] = $row['active'];
  2582. $domaindata['active_int'] = $row['active_int'];
  2583. $domaindata['relay_all_recipients'] = $row['relay_all_recipients'];
  2584. $domaindata['relay_all_recipients_int'] = $row['relay_all_recipients_int'];
  2585. $stmt = $pdo->prepare("SELECT COUNT(*) AS `alias_count` FROM `alias`
  2586. WHERE (`domain`= :domain OR `domain` IN (SELECT `alias_domain` FROM `alias_domain` WHERE `target_domain` = :domain2))
  2587. AND `address` NOT IN (
  2588. SELECT `username` FROM `mailbox`
  2589. )");
  2590. $stmt->execute(array(
  2591. ':domain' => $_data,
  2592. ':domain2' => $_data
  2593. ));
  2594. $AliasDataDomain = $stmt->fetch(PDO::FETCH_ASSOC);
  2595. (isset($AliasDataDomain['alias_count'])) ? $domaindata['aliases_in_domain'] = $AliasDataDomain['alias_count'] : $domaindata['aliases_in_domain'] = "0";
  2596. $domaindata['aliases_left'] = $row['aliases'] - $AliasDataDomain['alias_count'];
  2597. }
  2598. catch (PDOException $e) {
  2599. $_SESSION['return'] = array(
  2600. 'type' => 'danger',
  2601. 'msg' => 'MySQL: '.$e
  2602. );
  2603. return false;
  2604. }
  2605. return $domaindata;
  2606. break;
  2607. case 'mailbox_details':
  2608. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2609. return false;
  2610. }
  2611. $mailboxdata = array();
  2612. try {
  2613. $stmt = $pdo->prepare("SELECT
  2614. `domain`.`backupmx`,
  2615. `mailbox`.`username`,
  2616. `mailbox`.`name`,
  2617. `mailbox`.`active` AS `active_int`,
  2618. CASE `mailbox`.`active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`,
  2619. `mailbox`.`domain`,
  2620. `mailbox`.`quota`,
  2621. `quota2`.`bytes`,
  2622. `quota2`.`messages`
  2623. FROM `mailbox`, `quota2`, `domain`
  2624. WHERE `mailbox`.`kind` NOT REGEXP 'location|thing|group' AND `mailbox`.`username` = `quota2`.`username` AND `domain`.`domain` = `mailbox`.`domain` AND `mailbox`.`username` = :mailbox");
  2625. $stmt->execute(array(
  2626. ':mailbox' => $_data,
  2627. ));
  2628. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  2629. $stmt = $pdo->prepare("SELECT `maxquota`, `quota` FROM `domain` WHERE `domain` = :domain");
  2630. $stmt->execute(array(':domain' => $row['domain']));
  2631. $DomainQuota = $stmt->fetch(PDO::FETCH_ASSOC);
  2632. $stmt = $pdo->prepare("SELECT COALESCE(SUM(`quota`), 0) as `in_use` FROM `mailbox` WHERE `kind` NOT REGEXP 'location|thing|group' AND `domain` = :domain AND `username` != :username");
  2633. $stmt->execute(array(':domain' => $row['domain'], ':username' => $_data));
  2634. $MailboxUsage = $stmt->fetch(PDO::FETCH_ASSOC);
  2635. $stmt = $pdo->prepare("SELECT IFNULL(COUNT(`address`), 0) AS `sa_count` FROM `spamalias` WHERE `goto` = :address AND `validity` >= :unixnow");
  2636. $stmt->execute(array(':address' => $_data, ':unixnow' => time()));
  2637. $SpamaliasUsage = $stmt->fetch(PDO::FETCH_ASSOC);
  2638. $mailboxdata['max_new_quota'] = ($DomainQuota['quota'] * 1048576) - $MailboxUsage['in_use'];
  2639. if ($mailboxdata['max_new_quota'] > ($DomainQuota['maxquota'] * 1048576)) {
  2640. $mailboxdata['max_new_quota'] = ($DomainQuota['maxquota'] * 1048576);
  2641. }
  2642. $mailboxdata['username'] = $row['username'];
  2643. $mailboxdata['is_relayed'] = $row['backupmx'];
  2644. $mailboxdata['name'] = $row['name'];
  2645. $mailboxdata['active'] = $row['active'];
  2646. $mailboxdata['active_int'] = $row['active_int'];
  2647. $mailboxdata['domain'] = $row['domain'];
  2648. $mailboxdata['quota'] = $row['quota'];
  2649. $mailboxdata['quota_used'] = intval($row['bytes']);
  2650. $mailboxdata['percent_in_use'] = round((intval($row['bytes']) / intval($row['quota'])) * 100);
  2651. $mailboxdata['messages'] = $row['messages'];
  2652. $mailboxdata['spam_aliases'] = $SpamaliasUsage['sa_count'];
  2653. if ($mailboxdata['percent_in_use'] >= 90) {
  2654. $mailboxdata['percent_class'] = "danger";
  2655. }
  2656. elseif ($mailboxdata['percent_in_use'] >= 75) {
  2657. $mailboxdata['percent_class'] = "warning";
  2658. }
  2659. else {
  2660. $mailboxdata['percent_class'] = "success";
  2661. }
  2662. }
  2663. catch (PDOException $e) {
  2664. $_SESSION['return'] = array(
  2665. 'type' => 'danger',
  2666. 'msg' => 'MySQL: '.$e
  2667. );
  2668. return false;
  2669. }
  2670. return $mailboxdata;
  2671. break;
  2672. case 'resource_details':
  2673. $resourcedata = array();
  2674. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2675. return false;
  2676. }
  2677. try {
  2678. $stmt = $pdo->prepare("SELECT
  2679. `username`,
  2680. `name`,
  2681. `kind`,
  2682. `multiple_bookings` AS `multiple_bookings_int`,
  2683. `local_part`,
  2684. `active` AS `active_int`,
  2685. CASE `multiple_bookings` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `multiple_bookings`,
  2686. CASE `active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`,
  2687. `domain`
  2688. FROM `mailbox` WHERE `kind` REGEXP 'location|thing|group' AND `username` = :resource");
  2689. $stmt->execute(array(
  2690. ':resource' => $_data,
  2691. ));
  2692. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  2693. $resourcedata['name'] = $row['username'];
  2694. $resourcedata['kind'] = $row['kind'];
  2695. $resourcedata['multiple_bookings'] = $row['multiple_bookings'];
  2696. $resourcedata['multiple_bookings_int'] = $row['multiple_bookings_int'];
  2697. $resourcedata['description'] = $row['name'];
  2698. $resourcedata['active'] = $row['active'];
  2699. $resourcedata['active_int'] = $row['active_int'];
  2700. $resourcedata['domain'] = $row['domain'];
  2701. $resourcedata['local_part'] = $row['local_part'];
  2702. }
  2703. catch (PDOException $e) {
  2704. $_SESSION['return'] = array(
  2705. 'type' => 'danger',
  2706. 'msg' => 'MySQL: '.$e
  2707. );
  2708. return false;
  2709. }
  2710. if (!isset($resourcedata['domain']) ||
  2711. (isset($resourcedata['domain']) && !hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $resourcedata['domain']))) {
  2712. return false;
  2713. }
  2714. return $resourcedata;
  2715. break;
  2716. }
  2717. break;
  2718. case 'delete':
  2719. switch ($_type) {
  2720. case 'syncjob':
  2721. if (!is_array($_data['id'])) {
  2722. $ids = array();
  2723. $ids[] = $_data['id'];
  2724. }
  2725. else {
  2726. $ids = $_data['id'];
  2727. }
  2728. if (!isset($_SESSION['acl']['syncjobs']) || $_SESSION['acl']['syncjobs'] != "1" ) {
  2729. $_SESSION['return'] = array(
  2730. 'type' => 'danger',
  2731. 'msg' => sprintf($lang['danger']['access_denied'])
  2732. );
  2733. return false;
  2734. }
  2735. foreach ($ids as $id) {
  2736. if (!is_numeric($id)) {
  2737. $_SESSION['return'] = array(
  2738. 'type' => 'danger',
  2739. 'msg' => $id
  2740. );
  2741. return false;
  2742. }
  2743. try {
  2744. $stmt = $pdo->prepare("SELECT `user2` FROM `imapsync` WHERE id = :id");
  2745. $stmt->execute(array(':id' => $id));
  2746. $user2 = $stmt->fetch(PDO::FETCH_ASSOC)['user2'];
  2747. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $user2)) {
  2748. $_SESSION['return'] = array(
  2749. 'type' => 'danger',
  2750. 'msg' => sprintf($lang['danger']['access_denied'])
  2751. );
  2752. return false;
  2753. }
  2754. $stmt = $pdo->prepare("DELETE FROM `imapsync` WHERE `id`= :id");
  2755. $stmt->execute(array(':id' => $id));
  2756. }
  2757. catch (PDOException $e) {
  2758. $_SESSION['return'] = array(
  2759. 'type' => 'danger',
  2760. 'msg' => 'MySQL: '.$e
  2761. );
  2762. return false;
  2763. }
  2764. }
  2765. $_SESSION['return'] = array(
  2766. 'type' => 'success',
  2767. 'msg' => 'Deleted syncjob id/s ' . implode(', ', $ids)
  2768. );
  2769. return true;
  2770. break;
  2771. case 'time_limited_alias':
  2772. if (!is_array($_data['address'])) {
  2773. $addresses = array();
  2774. $addresses[] = $_data['address'];
  2775. }
  2776. else {
  2777. $addresses = $_data['address'];
  2778. }
  2779. if (!isset($_SESSION['acl']['spam_alias']) || $_SESSION['acl']['spam_alias'] != "1" ) {
  2780. $_SESSION['return'] = array(
  2781. 'type' => 'danger',
  2782. 'msg' => sprintf($lang['danger']['access_denied'])
  2783. );
  2784. return false;
  2785. }
  2786. foreach ($addresses as $address) {
  2787. try {
  2788. $stmt = $pdo->prepare("SELECT `goto` FROM `spamalias` WHERE `address` = :address");
  2789. $stmt->execute(array(':address' => $address));
  2790. $goto = $stmt->fetch(PDO::FETCH_ASSOC)['goto'];
  2791. }
  2792. catch (PDOException $e) {
  2793. $_SESSION['return'] = array(
  2794. 'type' => 'danger',
  2795. 'msg' => 'MySQL: '.$e
  2796. );
  2797. return false;
  2798. }
  2799. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $goto)) {
  2800. $_SESSION['return'] = array(
  2801. 'type' => 'danger',
  2802. 'msg' => sprintf($lang['danger']['access_denied'])
  2803. );
  2804. return false;
  2805. }
  2806. try {
  2807. $stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `goto` = :username AND `address` = :item");
  2808. $stmt->execute(array(
  2809. ':username' => $goto,
  2810. ':item' => $address
  2811. ));
  2812. }
  2813. catch (PDOException $e) {
  2814. $_SESSION['return'] = array(
  2815. 'type' => 'danger',
  2816. 'msg' => 'MySQL: '.$e
  2817. );
  2818. return false;
  2819. }
  2820. }
  2821. $_SESSION['return'] = array(
  2822. 'type' => 'success',
  2823. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($usernames))
  2824. );
  2825. break;
  2826. case 'eas_cache':
  2827. if (!is_array($_data['username'])) {
  2828. $usernames = array();
  2829. $usernames[] = $_data['username'];
  2830. }
  2831. else {
  2832. $usernames = $_data['username'];
  2833. }
  2834. if (!isset($_SESSION['acl']['eas_reset']) || $_SESSION['acl']['eas_reset'] != "1" ) {
  2835. $_SESSION['return'] = array(
  2836. 'type' => 'danger',
  2837. 'msg' => sprintf($lang['danger']['access_denied'])
  2838. );
  2839. return false;
  2840. }
  2841. foreach ($usernames as $username) {
  2842. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $username)) {
  2843. $_SESSION['return'] = array(
  2844. 'type' => 'danger',
  2845. 'msg' => sprintf($lang['danger']['access_denied'])
  2846. );
  2847. return false;
  2848. }
  2849. try {
  2850. $stmt = $pdo->prepare("DELETE FROM `sogo_cache_folder` WHERE `c_uid` = :username");
  2851. $stmt->execute(array(
  2852. ':username' => $username
  2853. ));
  2854. }
  2855. catch (PDOException $e) {
  2856. $_SESSION['return'] = array(
  2857. 'type' => 'danger',
  2858. 'msg' => 'MySQL: '.$e
  2859. );
  2860. return false;
  2861. }
  2862. }
  2863. $_SESSION['return'] = array(
  2864. 'type' => 'success',
  2865. 'msg' => sprintf($lang['success']['eas_reset'], htmlspecialchars(implode(', ', $usernames)))
  2866. );
  2867. break;
  2868. case 'domain':
  2869. if (!is_array($_data['domain'])) {
  2870. $domains = array();
  2871. $domains[] = $_data['domain'];
  2872. }
  2873. else {
  2874. $domains = $_data['domain'];
  2875. }
  2876. if ($_SESSION['mailcow_cc_role'] != "admin") {
  2877. $_SESSION['return'] = array(
  2878. 'type' => 'danger',
  2879. 'msg' => sprintf($lang['danger']['access_denied'])
  2880. );
  2881. return false;
  2882. }
  2883. foreach ($domains as $domain) {
  2884. if (!is_valid_domain_name($domain)) {
  2885. $_SESSION['return'] = array(
  2886. 'type' => 'danger',
  2887. 'msg' => sprintf($lang['danger']['domain_invalid'])
  2888. );
  2889. return false;
  2890. }
  2891. $domain = idn_to_ascii(strtolower(trim($domain)));
  2892. try {
  2893. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox`
  2894. WHERE `domain` = :domain");
  2895. $stmt->execute(array(':domain' => $domain));
  2896. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  2897. }
  2898. catch(PDOException $e) {
  2899. $_SESSION['return'] = array(
  2900. 'type' => 'danger',
  2901. 'msg' => 'MySQL: '.$e
  2902. );
  2903. return false;
  2904. }
  2905. if ($num_results != 0 || !empty($num_results)) {
  2906. $_SESSION['return'] = array(
  2907. 'type' => 'danger',
  2908. 'msg' => sprintf($lang['danger']['domain_not_empty'])
  2909. );
  2910. return false;
  2911. }
  2912. try {
  2913. $stmt = $pdo->prepare("DELETE FROM `domain` WHERE `domain` = :domain");
  2914. $stmt->execute(array(
  2915. ':domain' => $domain,
  2916. ));
  2917. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `domain` = :domain");
  2918. $stmt->execute(array(
  2919. ':domain' => $domain,
  2920. ));
  2921. $stmt = $pdo->prepare("DELETE FROM `alias` WHERE `domain` = :domain");
  2922. $stmt->execute(array(
  2923. ':domain' => $domain,
  2924. ));
  2925. $stmt = $pdo->prepare("DELETE FROM `alias_domain` WHERE `target_domain` = :domain");
  2926. $stmt->execute(array(
  2927. ':domain' => $domain,
  2928. ));
  2929. $stmt = $pdo->prepare("DELETE FROM `mailbox` WHERE `domain` = :domain");
  2930. $stmt->execute(array(
  2931. ':domain' => $domain,
  2932. ));
  2933. $stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` LIKE :domain");
  2934. $stmt->execute(array(
  2935. ':domain' => '%@'.$domain,
  2936. ));
  2937. $stmt = $pdo->prepare("DELETE FROM `quota2` WHERE `username` = :domain");
  2938. $stmt->execute(array(
  2939. ':domain' => '%@'.$domain,
  2940. ));
  2941. $stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `address` = :domain");
  2942. $stmt->execute(array(
  2943. ':domain' => '%@'.$domain,
  2944. ));
  2945. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :domain");
  2946. $stmt->execute(array(
  2947. ':domain' => '%@'.$domain,
  2948. ));
  2949. }
  2950. catch (PDOException $e) {
  2951. $_SESSION['return'] = array(
  2952. 'type' => 'danger',
  2953. 'msg' => 'MySQL: '.$e
  2954. );
  2955. return false;
  2956. }
  2957. try {
  2958. $redis->hDel('DOMAIN_MAP', $domain);
  2959. }
  2960. catch (RedisException $e) {
  2961. $_SESSION['return'] = array(
  2962. 'type' => 'danger',
  2963. 'msg' => 'Redis: '.$e
  2964. );
  2965. return false;
  2966. }
  2967. }
  2968. $_SESSION['return'] = array(
  2969. 'type' => 'success',
  2970. 'msg' => sprintf($lang['success']['domain_removed'], htmlspecialchars(implode(', ', $domains)))
  2971. );
  2972. return true;
  2973. break;
  2974. case 'alias':
  2975. if (!is_array($_data['address'])) {
  2976. $addresses = array();
  2977. $addresses[] = $_data['address'];
  2978. }
  2979. else {
  2980. $addresses = $_data['address'];
  2981. }
  2982. foreach ($addresses as $address) {
  2983. $local_part = strstr($address, '@', true);
  2984. $domain = mailbox('get', 'alias_details', $address)['domain'];
  2985. try {
  2986. $stmt = $pdo->prepare("SELECT `goto` FROM `alias` WHERE `address` = :address");
  2987. $stmt->execute(array(':address' => $address));
  2988. $gotos = $stmt->fetch(PDO::FETCH_ASSOC);
  2989. }
  2990. catch(PDOException $e) {
  2991. $_SESSION['return'] = array(
  2992. 'type' => 'danger',
  2993. 'msg' => 'MySQL: '.$e
  2994. );
  2995. return false;
  2996. }
  2997. $goto_array = explode(',', $gotos['goto']);
  2998. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  2999. $_SESSION['return'] = array(
  3000. 'type' => 'danger',
  3001. 'msg' => sprintf($lang['danger']['access_denied'])
  3002. );
  3003. return false;
  3004. }
  3005. try {
  3006. $stmt = $pdo->prepare("DELETE FROM `alias` WHERE `address` = :address AND `address` NOT IN (SELECT `username` FROM `mailbox`)");
  3007. $stmt->execute(array(
  3008. ':address' => $address
  3009. ));
  3010. }
  3011. catch (PDOException $e) {
  3012. $_SESSION['return'] = array(
  3013. 'type' => 'danger',
  3014. 'msg' => 'MySQL: '.$e
  3015. );
  3016. return false;
  3017. }
  3018. }
  3019. $_SESSION['return'] = array(
  3020. 'type' => 'success',
  3021. 'msg' => sprintf($lang['success']['alias_removed'], htmlspecialchars(implode(', ', $addresses)))
  3022. );
  3023. break;
  3024. case 'alias_domain':
  3025. if (!is_array($_data['alias_domain'])) {
  3026. $alias_domains = array();
  3027. $alias_domains[] = $_data['alias_domain'];
  3028. }
  3029. else {
  3030. $alias_domains = $_data['alias_domain'];
  3031. }
  3032. foreach ($alias_domains as $alias_domain) {
  3033. if (!is_valid_domain_name($alias_domain)) {
  3034. $_SESSION['return'] = array(
  3035. 'type' => 'danger',
  3036. 'msg' => sprintf($lang['danger']['domain_invalid'])
  3037. );
  3038. return false;
  3039. }
  3040. try {
  3041. $stmt = $pdo->prepare("SELECT `target_domain` FROM `alias_domain`
  3042. WHERE `alias_domain`= :alias_domain");
  3043. $stmt->execute(array(':alias_domain' => $alias_domain));
  3044. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  3045. }
  3046. catch(PDOException $e) {
  3047. $_SESSION['return'] = array(
  3048. 'type' => 'danger',
  3049. 'msg' => 'MySQL: '.$e
  3050. );
  3051. return false;
  3052. }
  3053. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $DomainData['target_domain'])) {
  3054. $_SESSION['return'] = array(
  3055. 'type' => 'danger',
  3056. 'msg' => sprintf($lang['danger']['access_denied'])
  3057. );
  3058. return false;
  3059. }
  3060. try {
  3061. $stmt = $pdo->prepare("DELETE FROM `alias_domain` WHERE `alias_domain` = :alias_domain");
  3062. $stmt->execute(array(
  3063. ':alias_domain' => $alias_domain,
  3064. ));
  3065. $stmt = $pdo->prepare("DELETE FROM `alias` WHERE `domain` = :alias_domain");
  3066. $stmt->execute(array(
  3067. ':alias_domain' => $alias_domain,
  3068. ));
  3069. }
  3070. catch (PDOException $e) {
  3071. $_SESSION['return'] = array(
  3072. 'type' => 'danger',
  3073. 'msg' => 'MySQL: '.$e
  3074. );
  3075. return false;
  3076. }
  3077. }
  3078. $_SESSION['return'] = array(
  3079. 'type' => 'success',
  3080. 'msg' => sprintf($lang['success']['alias_domain_removed'], htmlspecialchars(implode(', ', $alias_domains)))
  3081. );
  3082. break;
  3083. case 'mailbox':
  3084. if (!is_array($_data['username'])) {
  3085. $usernames = array();
  3086. $usernames[] = $_data['username'];
  3087. }
  3088. else {
  3089. $usernames = $_data['username'];
  3090. }
  3091. foreach ($usernames as $username) {
  3092. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  3093. $_SESSION['return'] = array(
  3094. 'type' => 'danger',
  3095. 'msg' => sprintf($lang['danger']['access_denied'])
  3096. );
  3097. return false;
  3098. }
  3099. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $username)) {
  3100. $_SESSION['return'] = array(
  3101. 'type' => 'danger',
  3102. 'msg' => sprintf($lang['danger']['access_denied'])
  3103. );
  3104. return false;
  3105. }
  3106. try {
  3107. $stmt = $pdo->prepare("DELETE FROM `alias` WHERE `goto` = :username");
  3108. $stmt->execute(array(
  3109. ':username' => $username
  3110. ));
  3111. $stmt = $pdo->prepare("DELETE FROM `quota2` WHERE `username` = :username");
  3112. $stmt->execute(array(
  3113. ':username' => $username
  3114. ));
  3115. $stmt = $pdo->prepare("DELETE FROM `mailbox` WHERE `username` = :username");
  3116. $stmt->execute(array(
  3117. ':username' => $username
  3118. ));
  3119. $stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` = :username");
  3120. $stmt->execute(array(
  3121. ':username' => $username
  3122. ));
  3123. $stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `goto` = :username");
  3124. $stmt->execute(array(
  3125. ':username' => $username
  3126. ));
  3127. $stmt = $pdo->prepare("DELETE FROM `imapsync` WHERE `user2` = :username");
  3128. $stmt->execute(array(
  3129. ':username' => $username
  3130. ));
  3131. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :username");
  3132. $stmt->execute(array(
  3133. ':username' => $username
  3134. ));
  3135. $stmt = $pdo->prepare("DELETE FROM `sogo_user_profile` WHERE `c_uid` = :username");
  3136. $stmt->execute(array(
  3137. ':username' => $username
  3138. ));
  3139. $stmt = $pdo->prepare("DELETE FROM `sogo_cache_folder` WHERE `c_uid` = :username");
  3140. $stmt->execute(array(
  3141. ':username' => $username
  3142. ));
  3143. $stmt = $pdo->prepare("DELETE FROM `sogo_acl` WHERE `c_object` LIKE '%/" . $username . "/%' OR `c_uid` = :username");
  3144. $stmt->execute(array(
  3145. ':username' => $username
  3146. ));
  3147. $stmt = $pdo->prepare("DELETE FROM `sogo_store` WHERE `c_folder_id` IN (SELECT `c_folder_id` FROM `sogo_folder_info` WHERE `c_path2` = :username)");
  3148. $stmt->execute(array(
  3149. ':username' => $username
  3150. ));
  3151. $stmt = $pdo->prepare("DELETE FROM `sogo_quick_contact` WHERE `c_folder_id` IN (SELECT `c_folder_id` FROM `sogo_folder_info` WHERE `c_path2` = :username)");
  3152. $stmt->execute(array(
  3153. ':username' => $username
  3154. ));
  3155. $stmt = $pdo->prepare("DELETE FROM `sogo_quick_appointment` WHERE `c_folder_id` IN (SELECT `c_folder_id` FROM `sogo_folder_info` WHERE `c_path2` = :username)");
  3156. $stmt->execute(array(
  3157. ':username' => $username
  3158. ));
  3159. $stmt = $pdo->prepare("DELETE FROM `sogo_folder_info` WHERE `c_path2` = :username");
  3160. $stmt->execute(array(
  3161. ':username' => $username
  3162. ));
  3163. $stmt = $pdo->prepare("SELECT `address`, `goto` FROM `alias`
  3164. WHERE `goto` REGEXP :username");
  3165. $stmt->execute(array(':username' => '(^|,)'.$username.'($|,)'));
  3166. $GotoData = $stmt->fetchAll(PDO::FETCH_ASSOC);
  3167. foreach ($GotoData as $gotos) {
  3168. $goto_exploded = explode(',', $gotos['goto']);
  3169. if (($key = array_search($username, $goto_exploded)) !== false) {
  3170. unset($goto_exploded[$key]);
  3171. }
  3172. $gotos_rebuild = implode(',', $goto_exploded);
  3173. $stmt = $pdo->prepare("UPDATE `alias` SET
  3174. `goto` = :goto
  3175. WHERE `address` = :address");
  3176. $stmt->execute(array(
  3177. ':goto' => $gotos_rebuild,
  3178. ':address' => $gotos['address']
  3179. ));
  3180. }
  3181. }
  3182. catch (PDOException $e) {
  3183. $_SESSION['return'] = array(
  3184. 'type' => 'danger',
  3185. 'msg' => 'MySQL: '.$e
  3186. );
  3187. return false;
  3188. }
  3189. }
  3190. $_SESSION['return'] = array(
  3191. 'type' => 'success',
  3192. 'msg' => sprintf($lang['success']['mailbox_removed'], htmlspecialchars(implode(', ', $usernames)))
  3193. );
  3194. break;
  3195. case 'resource':
  3196. if (!is_array($_data['name'])) {
  3197. $names = array();
  3198. $names[] = $_data['name'];
  3199. }
  3200. else {
  3201. $names = $_data['name'];
  3202. }
  3203. foreach ($names as $name) {
  3204. if (!filter_var($name, FILTER_VALIDATE_EMAIL)) {
  3205. $_SESSION['return'] = array(
  3206. 'type' => 'danger',
  3207. 'msg' => sprintf($lang['danger']['access_denied'])
  3208. );
  3209. return false;
  3210. }
  3211. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $name)) {
  3212. $_SESSION['return'] = array(
  3213. 'type' => 'danger',
  3214. 'msg' => sprintf($lang['danger']['access_denied'])
  3215. );
  3216. return false;
  3217. }
  3218. try {
  3219. $stmt = $pdo->prepare("DELETE FROM `mailbox` WHERE `username` = :username");
  3220. $stmt->execute(array(
  3221. ':username' => $name
  3222. ));
  3223. $stmt = $pdo->prepare("DELETE FROM `sogo_user_profile` WHERE `c_uid` = :username");
  3224. $stmt->execute(array(
  3225. ':username' => $name
  3226. ));
  3227. $stmt = $pdo->prepare("DELETE FROM `sogo_cache_folder` WHERE `c_uid` = :username");
  3228. $stmt->execute(array(
  3229. ':username' => $name
  3230. ));
  3231. $stmt = $pdo->prepare("DELETE FROM `sogo_acl` WHERE `c_object` LIKE '%/" . $name . "/%' OR `c_uid` = :username");
  3232. $stmt->execute(array(
  3233. ':username' => $name
  3234. ));
  3235. $stmt = $pdo->prepare("DELETE FROM `sogo_store` WHERE `c_folder_id` IN (SELECT `c_folder_id` FROM `sogo_folder_info` WHERE `c_path2` = :username)");
  3236. $stmt->execute(array(
  3237. ':username' => $name
  3238. ));
  3239. $stmt = $pdo->prepare("DELETE FROM `sogo_quick_contact` WHERE `c_folder_id` IN (SELECT `c_folder_id` FROM `sogo_folder_info` WHERE `c_path2` = :username)");
  3240. $stmt->execute(array(
  3241. ':username' => $name
  3242. ));
  3243. $stmt = $pdo->prepare("DELETE FROM `sogo_quick_appointment` WHERE `c_folder_id` IN (SELECT `c_folder_id` FROM `sogo_folder_info` WHERE `c_path2` = :username)");
  3244. $stmt->execute(array(
  3245. ':username' => $name
  3246. ));
  3247. $stmt = $pdo->prepare("DELETE FROM `sogo_folder_info` WHERE `c_path2` = :username");
  3248. $stmt->execute(array(
  3249. ':username' => $name
  3250. ));
  3251. }
  3252. catch (PDOException $e) {
  3253. $_SESSION['return'] = array(
  3254. 'type' => 'danger',
  3255. 'msg' => 'MySQL: '.$e
  3256. );
  3257. return false;
  3258. }
  3259. }
  3260. $_SESSION['return'] = array(
  3261. 'type' => 'success',
  3262. 'msg' => sprintf($lang['success']['resource_removed'], htmlspecialchars(implode(', ', $names)))
  3263. );
  3264. break;
  3265. }
  3266. break;
  3267. }
  3268. }