functions.mailbox.inc.php 135 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953295429552956295729582959296029612962296329642965296629672968296929702971297229732974297529762977297829792980298129822983298429852986298729882989299029912992299329942995299629972998299930003001300230033004300530063007300830093010301130123013301430153016301730183019302030213022302330243025302630273028302930303031303230333034303530363037303830393040304130423043304430453046304730483049305030513052305330543055305630573058305930603061306230633064306530663067306830693070307130723073307430753076307730783079308030813082308330843085308630873088308930903091309230933094309530963097309830993100310131023103310431053106310731083109311031113112311331143115311631173118311931203121312231233124312531263127312831293130313131323133313431353136313731383139314031413142314331443145314631473148314931503151315231533154315531563157315831593160316131623163316431653166316731683169317031713172317331743175317631773178317931803181318231833184318531863187318831893190319131923193319431953196319731983199
  1. <?php
  2. function mailbox($_action, $_type, $_data = null) {
  3. global $pdo;
  4. global $redis;
  5. global $lang;
  6. switch ($_action) {
  7. case 'add':
  8. switch ($_type) {
  9. case 'time_limited_alias':
  10. if (isset($_data['username']) && filter_var($_data['username'], FILTER_VALIDATE_EMAIL)) {
  11. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data['username'])) {
  12. $_SESSION['return'] = array(
  13. 'type' => 'danger',
  14. 'msg' => sprintf($lang['danger']['access_denied'])
  15. );
  16. return false;
  17. }
  18. else {
  19. $username = $_data['username'];
  20. }
  21. }
  22. else {
  23. $username = $_SESSION['mailcow_cc_username'];
  24. }
  25. if (!is_numeric($_data["validity"]) || $_data["validity"] > 672) {
  26. $_SESSION['return'] = array(
  27. 'type' => 'danger',
  28. 'msg' => sprintf($lang['danger']['validity_missing'])
  29. );
  30. return false;
  31. }
  32. try {
  33. $stmt = $pdo->prepare("SELECT `domain` FROM `mailbox` WHERE `username` = :username");
  34. $stmt->execute(array(':username' => $_SESSION['mailcow_cc_username']));
  35. $domain = $stmt->fetch(PDO::FETCH_ASSOC)['domain'];
  36. }
  37. catch (PDOException $e) {
  38. $_SESSION['return'] = array(
  39. 'type' => 'danger',
  40. 'msg' => 'MySQL: '.$e
  41. );
  42. return false;
  43. }
  44. $validity = strtotime("+".$_data["validity"]." hour");
  45. $letters = 'abcefghijklmnopqrstuvwxyz1234567890';
  46. $random_name = substr(str_shuffle($letters), 0, 24);
  47. try {
  48. $stmt = $pdo->prepare("INSERT INTO `spamalias` (`address`, `goto`, `validity`) VALUES
  49. (:address, :goto, :validity)");
  50. $stmt->execute(array(
  51. ':address' => $random_name . '@' . $domain,
  52. ':goto' => $username,
  53. ':validity' => $validity
  54. ));
  55. }
  56. catch (PDOException $e) {
  57. $_SESSION['return'] = array(
  58. 'type' => 'danger',
  59. 'msg' => 'MySQL: '.$e
  60. );
  61. return false;
  62. }
  63. $_SESSION['return'] = array(
  64. 'type' => 'success',
  65. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($usernames))
  66. );
  67. break;
  68. case 'syncjob':
  69. if (isset($_data['username']) && filter_var($_data['username'], FILTER_VALIDATE_EMAIL)) {
  70. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data['username'])) {
  71. $_SESSION['return'] = array(
  72. 'type' => 'danger',
  73. 'msg' => sprintf($lang['danger']['access_denied'])
  74. );
  75. return false;
  76. }
  77. else {
  78. $username = $_data['username'];
  79. }
  80. }
  81. elseif ($_SESSION['mailcow_cc_role'] == "user") {
  82. $username = $_SESSION['mailcow_cc_username'];
  83. }
  84. else {
  85. $_SESSION['return'] = array(
  86. 'type' => 'danger',
  87. 'msg' => 'No user defined'
  88. );
  89. return false;
  90. }
  91. $active = intval($_data['active']);
  92. $delete2duplicates = intval($_data['delete2duplicates']);
  93. $delete1 = intval($_data['delete1']);
  94. $port1 = $_data['port1'];
  95. $host1 = strtolower($_data['host1']);
  96. $password1 = $_data['password1'];
  97. $exclude = $_data['exclude'];
  98. $maxage = $_data['maxage'];
  99. $subfolder2 = $_data['subfolder2'];
  100. $user1 = $_data['user1'];
  101. $mins_interval = $_data['mins_interval'];
  102. $enc1 = $_data['enc1'];
  103. if (empty($subfolder2)) {
  104. $subfolder2 = "";
  105. }
  106. if (!isset($maxage) || !filter_var($maxage, FILTER_VALIDATE_INT, array('options' => array('min_range' => 1, 'max_range' => 32767)))) {
  107. $maxage = "0";
  108. }
  109. if (!filter_var($port1, FILTER_VALIDATE_INT, array('options' => array('min_range' => 1, 'max_range' => 65535)))) {
  110. $_SESSION['return'] = array(
  111. 'type' => 'danger',
  112. 'msg' => sprintf($lang['danger']['access_denied'])
  113. );
  114. return false;
  115. }
  116. if (!filter_var($mins_interval, FILTER_VALIDATE_INT, array('options' => array('min_range' => 10, 'max_range' => 3600)))) {
  117. $_SESSION['return'] = array(
  118. 'type' => 'danger',
  119. 'msg' => sprintf($lang['danger']['access_denied'])
  120. );
  121. return false;
  122. }
  123. if (!is_valid_domain_name($host1)) {
  124. $_SESSION['return'] = array(
  125. 'type' => 'danger',
  126. 'msg' => sprintf($lang['danger']['access_denied'])
  127. );
  128. return false;
  129. }
  130. if ($enc1 != "TLS" && $enc1 != "SSL" && $enc1 != "PLAIN") {
  131. $_SESSION['return'] = array(
  132. 'type' => 'danger',
  133. 'msg' => sprintf($lang['danger']['access_denied'])
  134. );
  135. return false;
  136. }
  137. if (@preg_match("/" . $exclude . "/", null) === false) {
  138. $_SESSION['return'] = array(
  139. 'type' => 'danger',
  140. 'msg' => sprintf($lang['danger']['access_denied'])
  141. );
  142. return false;
  143. }
  144. try {
  145. $stmt = $pdo->prepare("SELECT '1' FROM `imapsync`
  146. WHERE `user2` = :user2 AND `user1` = :user1 AND `host1` = :host1");
  147. $stmt->execute(array(':user1' => $user1, ':user2' => $username, ':host1' => $host1));
  148. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  149. }
  150. catch(PDOException $e) {
  151. $_SESSION['return'] = array(
  152. 'type' => 'danger',
  153. 'msg' => 'MySQL: '.$e
  154. );
  155. return false;
  156. }
  157. if ($num_results != 0) {
  158. $_SESSION['return'] = array(
  159. 'type' => 'danger',
  160. 'msg' => sprintf($lang['danger']['object_exists'], htmlspecialchars($host1 . ' / ' . $user1))
  161. );
  162. return false;
  163. }
  164. try {
  165. $stmt = $pdo->prepare("INSERT INTO `imapsync` (`user2`, `exclude`, `delete1`, `maxage`, `subfolder2`, `host1`, `authmech1`, `user1`, `password1`, `mins_interval`, `port1`, `enc1`, `delete2duplicates`, `active`)
  166. VALUES (:user2, :exclude, :maxage, :delete1, :subfolder2, :host1, :authmech1, :user1, :password1, :mins_interval, :port1, :enc1, :delete2duplicates, :active)");
  167. $stmt->execute(array(
  168. ':user2' => $username,
  169. ':exclude' => $exclude,
  170. ':maxage' => $maxage,
  171. ':delete1' => $delete1,
  172. ':subfolder2' => $subfolder2,
  173. ':host1' => $host1,
  174. ':authmech1' => 'PLAIN',
  175. ':user1' => $user1,
  176. ':password1' => $password1,
  177. ':mins_interval' => $mins_interval,
  178. ':port1' => $port1,
  179. ':enc1' => $enc1,
  180. ':delete2duplicates' => $delete2duplicates,
  181. ':active' => $active,
  182. ));
  183. }
  184. catch(PDOException $e) {
  185. $_SESSION['return'] = array(
  186. 'type' => 'danger',
  187. 'msg' => 'MySQL: '.$e
  188. );
  189. return false;
  190. }
  191. $_SESSION['return'] = array(
  192. 'type' => 'success',
  193. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  194. );
  195. return true;
  196. break;
  197. case 'domain':
  198. if ($_SESSION['mailcow_cc_role'] != "admin") {
  199. $_SESSION['return'] = array(
  200. 'type' => 'danger',
  201. 'msg' => sprintf($lang['danger']['access_denied'])
  202. );
  203. return false;
  204. }
  205. $domain = idn_to_ascii(strtolower(trim($_data['domain'])));
  206. $description = $_data['description'];
  207. $aliases = $_data['aliases'];
  208. $mailboxes = $_data['mailboxes'];
  209. $maxquota = $_data['maxquota'];
  210. $quota = $_data['quota'];
  211. if ($maxquota > $quota) {
  212. $_SESSION['return'] = array(
  213. 'type' => 'danger',
  214. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeds_domain_quota'])
  215. );
  216. return false;
  217. }
  218. if ($maxquota == "0" || empty($maxquota)) {
  219. $_SESSION['return'] = array(
  220. 'type' => 'danger',
  221. 'msg' => sprintf($lang['danger']['maxquota_empty'])
  222. );
  223. return false;
  224. }
  225. $active = intval($_data['active']);
  226. $relay_all_recipients = intval($_data['relay_all_recipients']);
  227. $backupmx = intval($_data['backupmx']);
  228. ($relay_all_recipients == 1) ? $backupmx = '1' : null;
  229. if (!is_valid_domain_name($domain)) {
  230. $_SESSION['return'] = array(
  231. 'type' => 'danger',
  232. 'msg' => sprintf($lang['danger']['domain_invalid'])
  233. );
  234. return false;
  235. }
  236. foreach (array($quota, $maxquota, $mailboxes, $aliases) as $data) {
  237. if (!is_numeric($data)) {
  238. $_SESSION['return'] = array(
  239. 'type' => 'danger',
  240. 'msg' => sprintf($lang['danger']['object_is_not_numeric'], htmlspecialchars($data))
  241. );
  242. return false;
  243. }
  244. }
  245. try {
  246. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  247. WHERE `domain` = :domain");
  248. $stmt->execute(array(':domain' => $domain));
  249. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  250. $stmt = $pdo->prepare("SELECT `alias_domain` FROM `alias_domain`
  251. WHERE `alias_domain` = :domain");
  252. $stmt->execute(array(':domain' => $domain));
  253. $num_results = $num_results + count($stmt->fetchAll(PDO::FETCH_ASSOC));
  254. }
  255. catch(PDOException $e) {
  256. $_SESSION['return'] = array(
  257. 'type' => 'danger',
  258. 'msg' => 'MySQL: '.$e
  259. );
  260. return false;
  261. }
  262. if ($num_results != 0) {
  263. $_SESSION['return'] = array(
  264. 'type' => 'danger',
  265. 'msg' => sprintf($lang['danger']['domain_exists'], htmlspecialchars($domain))
  266. );
  267. return false;
  268. }
  269. try {
  270. $stmt = $pdo->prepare("INSERT INTO `domain` (`domain`, `description`, `aliases`, `mailboxes`, `maxquota`, `quota`, `backupmx`, `active`, `relay_all_recipients`)
  271. VALUES (:domain, :description, :aliases, :mailboxes, :maxquota, :quota, :backupmx, :active, :relay_all_recipients)");
  272. $stmt->execute(array(
  273. ':domain' => $domain,
  274. ':description' => $description,
  275. ':aliases' => $aliases,
  276. ':mailboxes' => $mailboxes,
  277. ':maxquota' => $maxquota,
  278. ':quota' => $quota,
  279. ':backupmx' => $backupmx,
  280. ':active' => $active,
  281. ':relay_all_recipients' => $relay_all_recipients
  282. ));
  283. try {
  284. $redis->hSet('DOMAIN_MAP', $domain, 1);
  285. }
  286. catch (RedisException $e) {
  287. $_SESSION['return'] = array(
  288. 'type' => 'danger',
  289. 'msg' => 'Redis: '.$e
  290. );
  291. return false;
  292. }
  293. $_SESSION['return'] = array(
  294. 'type' => 'success',
  295. 'msg' => sprintf($lang['success']['domain_added'], htmlspecialchars($domain))
  296. );
  297. }
  298. catch (PDOException $e) {
  299. mailbox('delete', 'domain', array('domain' => $domain));
  300. $_SESSION['return'] = array(
  301. 'type' => 'danger',
  302. 'msg' => 'MySQL: '.$e
  303. );
  304. return false;
  305. }
  306. break;
  307. case 'alias':
  308. $addresses = array_map('trim', preg_split( "/( |,|;|\n)/", $_data['address']));
  309. $gotos = array_map('trim', preg_split( "/( |,|;|\n)/", $_data['goto']));
  310. $active = intval($_data['active']);
  311. if (empty($addresses[0])) {
  312. $_SESSION['return'] = array(
  313. 'type' => 'danger',
  314. 'msg' => sprintf($lang['danger']['alias_empty'])
  315. );
  316. return false;
  317. }
  318. if (empty($gotos[0])) {
  319. $_SESSION['return'] = array(
  320. 'type' => 'danger',
  321. 'msg' => sprintf($lang['danger']['goto_empty'])
  322. );
  323. return false;
  324. }
  325. foreach ($gotos as &$goto) {
  326. if (empty($goto)) {
  327. continue;
  328. }
  329. $goto_domain = idn_to_ascii(substr(strstr($goto, '@'), 1));
  330. $goto_local_part = strstr($goto, '@', true);
  331. $goto = $goto_local_part.'@'.$goto_domain;
  332. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox`
  333. WHERE `kind` REGEXP 'location|thing|group'
  334. AND `username`= :goto");
  335. $stmt->execute(array(':goto' => $goto));
  336. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  337. if ($num_results != 0) {
  338. $_SESSION['return'] = array(
  339. 'type' => 'danger',
  340. 'msg' => sprintf($lang['danger']['goto_invalid'])
  341. );
  342. return false;
  343. }
  344. if (!filter_var($goto, FILTER_VALIDATE_EMAIL) === true) {
  345. $_SESSION['return'] = array(
  346. 'type' => 'danger',
  347. 'msg' => sprintf($lang['danger']['goto_invalid'])
  348. );
  349. return false;
  350. }
  351. }
  352. $gotos = array_filter($gotos);
  353. $goto = implode(",", $gotos);
  354. foreach ($addresses as $address) {
  355. if (empty($address)) {
  356. continue;
  357. }
  358. if (in_array($address, $gotos)) {
  359. continue;
  360. }
  361. $stmt = $pdo->prepare("SELECT `address` FROM `alias`
  362. WHERE `address`= :address");
  363. $stmt->execute(array(':address' => $address));
  364. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  365. if ($num_results != 0) {
  366. $_SESSION['return'] = array(
  367. 'type' => 'danger',
  368. 'msg' => sprintf($lang['danger']['is_alias_or_mailbox'], htmlspecialchars($address))
  369. );
  370. return false;
  371. }
  372. $domain = idn_to_ascii(substr(strstr($address, '@'), 1));
  373. $local_part = strstr($address, '@', true);
  374. $address = $local_part.'@'.$domain;
  375. $domaindata = mailbox('get', 'domain_details', $domain);
  376. if (is_array($domaindata) && $domaindata['aliases_left'] == "0") {
  377. $_SESSION['return'] = array(
  378. 'type' => 'danger',
  379. 'msg' => sprintf($lang['danger']['max_alias_exceeded'])
  380. );
  381. return false;
  382. }
  383. try {
  384. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  385. WHERE `domain`= :domain1 OR `domain` = (SELECT `target_domain` FROM `alias_domain` WHERE `alias_domain` = :domain2)");
  386. $stmt->execute(array(':domain1' => $domain, ':domain2' => $domain));
  387. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  388. if ($num_results == 0) {
  389. $_SESSION['return'] = array(
  390. 'type' => 'danger',
  391. 'msg' => sprintf($lang['danger']['domain_not_found'], htmlspecialchars($domain))
  392. );
  393. return false;
  394. }
  395. $stmt = $pdo->prepare("SELECT `address` FROM `alias`
  396. WHERE `address`= :address");
  397. $stmt->execute(array(':address' => $address));
  398. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  399. if ($num_results != 0) {
  400. $_SESSION['return'] = array(
  401. 'type' => 'danger',
  402. 'msg' => sprintf($lang['danger']['is_alias_or_mailbox'], htmlspecialchars($address))
  403. );
  404. return false;
  405. }
  406. $stmt = $pdo->prepare("SELECT `address` FROM `spamalias`
  407. WHERE `address`= :address");
  408. $stmt->execute(array(':address' => $address));
  409. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  410. if ($num_results != 0) {
  411. $_SESSION['return'] = array(
  412. 'type' => 'danger',
  413. 'msg' => sprintf($lang['danger']['is_spam_alias'], htmlspecialchars($address))
  414. );
  415. return false;
  416. }
  417. }
  418. catch(PDOException $e) {
  419. $_SESSION['return'] = array(
  420. 'type' => 'danger',
  421. 'msg' => 'MySQL: '.$e
  422. );
  423. return false;
  424. }
  425. if ((!filter_var($address, FILTER_VALIDATE_EMAIL) === true) && !empty($local_part)) {
  426. $_SESSION['return'] = array(
  427. 'type' => 'danger',
  428. 'msg' => sprintf($lang['danger']['alias_invalid'])
  429. );
  430. return false;
  431. }
  432. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  433. $_SESSION['return'] = array(
  434. 'type' => 'danger',
  435. 'msg' => sprintf($lang['danger']['access_denied'])
  436. );
  437. return false;
  438. }
  439. try {
  440. $stmt = $pdo->prepare("INSERT INTO `alias` (`address`, `goto`, `domain`, `active`)
  441. VALUES (:address, :goto, :domain, :active)");
  442. if (!filter_var($address, FILTER_VALIDATE_EMAIL) === true) {
  443. $stmt->execute(array(
  444. ':address' => '@'.$domain,
  445. ':goto' => $goto,
  446. ':domain' => $domain,
  447. ':active' => $active
  448. ));
  449. }
  450. else {
  451. $stmt->execute(array(
  452. ':address' => $address,
  453. ':goto' => $goto,
  454. ':domain' => $domain,
  455. ':active' => $active
  456. ));
  457. }
  458. $_SESSION['return'] = array(
  459. 'type' => 'success',
  460. 'msg' => sprintf($lang['success']['alias_added'])
  461. );
  462. }
  463. catch (PDOException $e) {
  464. mailbox('delete', 'alias', array('address' => $address));
  465. $_SESSION['return'] = array(
  466. 'type' => 'danger',
  467. 'msg' => 'MySQL: '.$e
  468. );
  469. return false;
  470. }
  471. }
  472. $_SESSION['return'] = array(
  473. 'type' => 'success',
  474. 'msg' => sprintf($lang['success']['alias_added'])
  475. );
  476. break;
  477. case 'alias_domain':
  478. $active = intval($_data['active']);
  479. $alias_domains = array_map('trim', preg_split( "/( |,|;|\n)/", $_data['alias_domain']));
  480. $target_domain = idn_to_ascii(strtolower(trim($_data['target_domain'])));
  481. if (!is_valid_domain_name($target_domain)) {
  482. $_SESSION['return'] = array(
  483. 'type' => 'danger',
  484. 'msg' => sprintf($lang['danger']['target_domain_invalid'])
  485. );
  486. return false;
  487. }
  488. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $target_domain)) {
  489. $_SESSION['return'] = array(
  490. 'type' => 'danger',
  491. 'msg' => sprintf($lang['danger']['access_denied'])
  492. );
  493. return false;
  494. }
  495. foreach ($alias_domains as $alias_domain) {
  496. $alias_domain = idn_to_ascii(strtolower(trim($alias_domain)));
  497. if (!is_valid_domain_name($alias_domain)) {
  498. $_SESSION['return'] = array(
  499. 'type' => 'danger',
  500. 'msg' => sprintf($lang['danger']['alias_domain_invalid'])
  501. );
  502. return false;
  503. }
  504. if ($alias_domain == $target_domain) {
  505. $_SESSION['return'] = array(
  506. 'type' => 'danger',
  507. 'msg' => sprintf($lang['danger']['aliasd_targetd_identical'])
  508. );
  509. return false;
  510. }
  511. try {
  512. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  513. WHERE `domain`= :target_domain");
  514. $stmt->execute(array(':target_domain' => $target_domain));
  515. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  516. if ($num_results == 0) {
  517. $_SESSION['return'] = array(
  518. 'type' => 'danger',
  519. 'msg' => sprintf($lang['danger']['targetd_not_found'])
  520. );
  521. return false;
  522. }
  523. $stmt = $pdo->prepare("SELECT `alias_domain` FROM `alias_domain` WHERE `alias_domain`= :alias_domain
  524. UNION
  525. SELECT `alias_domain` FROM `alias_domain` WHERE `alias_domain`= :alias_domain_in_domain");
  526. $stmt->execute(array(':alias_domain' => $alias_domain, ':alias_domain_in_domain' => $alias_domain));
  527. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  528. if ($num_results != 0) {
  529. $_SESSION['return'] = array(
  530. 'type' => 'danger',
  531. 'msg' => sprintf($lang['danger']['aliasd_exists'])
  532. );
  533. return false;
  534. }
  535. }
  536. catch(PDOException $e) {
  537. $_SESSION['return'] = array(
  538. 'type' => 'danger',
  539. 'msg' => 'MySQL: '.$e
  540. );
  541. return false;
  542. }
  543. try {
  544. $stmt = $pdo->prepare("INSERT INTO `alias_domain` (`alias_domain`, `target_domain`, `active`)
  545. VALUES (:alias_domain, :target_domain, :active)");
  546. $stmt->execute(array(
  547. ':alias_domain' => $alias_domain,
  548. ':target_domain' => $target_domain,
  549. ':active' => $active
  550. ));
  551. }
  552. catch (PDOException $e) {
  553. mailbox('delete', 'alias_domain', array('alias_domain' => $alias_domain));
  554. $_SESSION['return'] = array(
  555. 'type' => 'danger',
  556. 'msg' => 'MySQL: '.$e
  557. );
  558. return false;
  559. }
  560. }
  561. $_SESSION['return'] = array(
  562. 'type' => 'success',
  563. 'msg' => sprintf($lang['success']['aliasd_added'], htmlspecialchars(implode(', ', $alias_domains)))
  564. );
  565. break;
  566. case 'mailbox':
  567. $local_part = strtolower(trim($_data['local_part']));
  568. $domain = idn_to_ascii(strtolower(trim($_data['domain'])));
  569. $username = $local_part . '@' . $domain;
  570. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  571. $_SESSION['return'] = array(
  572. 'type' => 'danger',
  573. 'msg' => sprintf($lang['danger']['mailbox_invalid'])
  574. );
  575. return false;
  576. }
  577. if (empty($_data['local_part'])) {
  578. $_SESSION['return'] = array(
  579. 'type' => 'danger',
  580. 'msg' => sprintf($lang['danger']['mailbox_invalid'])
  581. );
  582. return false;
  583. }
  584. $password = $_data['password'];
  585. $password2 = $_data['password2'];
  586. $name = $_data['name'];
  587. $quota_m = filter_var($_data['quota'], FILTER_SANITIZE_NUMBER_FLOAT);
  588. if (empty($name)) {
  589. $name = $local_part;
  590. }
  591. $active = intval($_data['active']);
  592. $quota_b = ($quota_m * 1048576);
  593. $maildir = $domain."/".$local_part."/";
  594. if (!is_valid_domain_name($domain)) {
  595. $_SESSION['return'] = array(
  596. 'type' => 'danger',
  597. 'msg' => sprintf($lang['danger']['domain_invalid'])
  598. );
  599. return false;
  600. }
  601. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  602. $_SESSION['return'] = array(
  603. 'type' => 'danger',
  604. 'msg' => sprintf($lang['danger']['access_denied'])
  605. );
  606. return false;
  607. }
  608. try {
  609. $stmt = $pdo->prepare("SELECT `mailboxes`, `maxquota`, `quota` FROM `domain`
  610. WHERE `domain` = :domain");
  611. $stmt->execute(array(':domain' => $domain));
  612. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  613. $stmt = $pdo->prepare("SELECT
  614. COUNT(*) as count,
  615. COALESCE(ROUND(SUM(`quota`)/1048576), 0) as `quota`
  616. FROM `mailbox`
  617. WHERE `kind` NOT REGEXP 'location|thing|group'
  618. AND `domain` = :domain");
  619. $stmt->execute(array(':domain' => $domain));
  620. $MailboxData = $stmt->fetch(PDO::FETCH_ASSOC);
  621. $stmt = $pdo->prepare("SELECT `local_part` FROM `mailbox` WHERE `local_part` = :local_part and `domain`= :domain");
  622. $stmt->execute(array(':local_part' => $local_part, ':domain' => $domain));
  623. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  624. if ($num_results != 0) {
  625. $_SESSION['return'] = array(
  626. 'type' => 'danger',
  627. 'msg' => sprintf($lang['danger']['object_exists'], htmlspecialchars($username))
  628. );
  629. return false;
  630. }
  631. $stmt = $pdo->prepare("SELECT `address` FROM `alias` WHERE address= :username");
  632. $stmt->execute(array(':username' => $username));
  633. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  634. if ($num_results != 0) {
  635. $_SESSION['return'] = array(
  636. 'type' => 'danger',
  637. 'msg' => sprintf($lang['danger']['is_alias'], htmlspecialchars($username))
  638. );
  639. return false;
  640. }
  641. $stmt = $pdo->prepare("SELECT `address` FROM `spamalias` WHERE `address`= :username");
  642. $stmt->execute(array(':username' => $username));
  643. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  644. if ($num_results != 0) {
  645. $_SESSION['return'] = array(
  646. 'type' => 'danger',
  647. 'msg' => sprintf($lang['danger']['is_spam_alias'], htmlspecialchars($username))
  648. );
  649. return false;
  650. }
  651. $stmt = $pdo->prepare("SELECT `domain` FROM `domain` WHERE `domain`= :domain");
  652. $stmt->execute(array(':domain' => $domain));
  653. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  654. if ($num_results == 0) {
  655. $_SESSION['return'] = array(
  656. 'type' => 'danger',
  657. 'msg' => sprintf($lang['danger']['domain_not_found'], htmlspecialchars($domain))
  658. );
  659. return false;
  660. }
  661. }
  662. catch(PDOException $e) {
  663. $_SESSION['return'] = array(
  664. 'type' => 'danger',
  665. 'msg' => 'MySQL: '.$e
  666. );
  667. return false;
  668. }
  669. if (!is_numeric($quota_m) || $quota_m == "0") {
  670. $_SESSION['return'] = array(
  671. 'type' => 'danger',
  672. 'msg' => sprintf($lang['danger']['quota_not_0_not_numeric'])
  673. );
  674. return false;
  675. }
  676. if (!empty($password) && !empty($password2)) {
  677. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) {
  678. $_SESSION['return'] = array(
  679. 'type' => 'danger',
  680. 'msg' => sprintf($lang['danger']['password_complexity'])
  681. );
  682. return false;
  683. }
  684. if ($password != $password2) {
  685. $_SESSION['return'] = array(
  686. 'type' => 'danger',
  687. 'msg' => sprintf($lang['danger']['password_mismatch'])
  688. );
  689. return false;
  690. }
  691. $password_hashed = hash_password($password);
  692. }
  693. else {
  694. $_SESSION['return'] = array(
  695. 'type' => 'danger',
  696. 'msg' => sprintf($lang['danger']['password_empty'])
  697. );
  698. return false;
  699. }
  700. if ($MailboxData['count'] >= $DomainData['mailboxes']) {
  701. $_SESSION['return'] = array(
  702. 'type' => 'danger',
  703. 'msg' => sprintf($lang['danger']['max_mailbox_exceeded'], $MailboxData['count'], $DomainData['mailboxes'])
  704. );
  705. return false;
  706. }
  707. if ($quota_m > $DomainData['maxquota']) {
  708. $_SESSION['return'] = array(
  709. 'type' => 'danger',
  710. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeded'], $DomainData['maxquota'])
  711. );
  712. return false;
  713. }
  714. if (($MailboxData['quota'] + $quota_m) > $DomainData['quota']) {
  715. $quota_left_m = ($DomainData['quota'] - $MailboxData['quota']);
  716. $_SESSION['return'] = array(
  717. 'type' => 'danger',
  718. 'msg' => sprintf($lang['danger']['mailbox_quota_left_exceeded'], $quota_left_m)
  719. );
  720. return false;
  721. }
  722. try {
  723. $stmt = $pdo->prepare("INSERT INTO `mailbox` (`username`, `password`, `name`, `maildir`, `quota`, `local_part`, `domain`, `active`)
  724. VALUES (:username, :password_hashed, :name, :maildir, :quota_b, :local_part, :domain, :active)");
  725. $stmt->execute(array(
  726. ':username' => $username,
  727. ':password_hashed' => $password_hashed,
  728. ':name' => $name,
  729. ':maildir' => $maildir,
  730. ':quota_b' => $quota_b,
  731. ':local_part' => $local_part,
  732. ':domain' => $domain,
  733. ':active' => $active
  734. ));
  735. $stmt = $pdo->prepare("INSERT INTO `quota2` (`username`, `bytes`, `messages`)
  736. VALUES (:username, '0', '0')");
  737. $stmt->execute(array(':username' => $username));
  738. $stmt = $pdo->prepare("INSERT INTO `alias` (`address`, `goto`, `domain`, `active`)
  739. VALUES (:username1, :username2, :domain, :active)");
  740. $stmt->execute(array(
  741. ':username1' => $username,
  742. ':username2' => $username,
  743. ':domain' => $domain,
  744. ':active' => $active
  745. ));
  746. $_SESSION['return'] = array(
  747. 'type' => 'success',
  748. 'msg' => sprintf($lang['success']['mailbox_added'], htmlspecialchars($username))
  749. );
  750. }
  751. catch (PDOException $e) {
  752. mailbox('delete', 'mailbox', array('username' => $username));
  753. $_SESSION['return'] = array(
  754. 'type' => 'danger',
  755. 'msg' => 'MySQL: '.$e
  756. );
  757. return false;
  758. }
  759. break;
  760. case 'resource':
  761. $domain = idn_to_ascii(strtolower(trim($_data['domain'])));
  762. $description = $_data['description'];
  763. $local_part = preg_replace('/[^\da-z]/i', '', preg_quote($description, '/'));
  764. $name = $local_part . '@' . $domain;
  765. $kind = $_data['kind'];
  766. $active = intval($_data['active']);
  767. $multiple_bookings = intval($_data['multiple_bookings']);
  768. if (!filter_var($name, FILTER_VALIDATE_EMAIL)) {
  769. $_SESSION['return'] = array(
  770. 'type' => 'danger',
  771. 'msg' => sprintf($lang['danger']['resource_invalid'])
  772. );
  773. return false;
  774. }
  775. if (empty($description)) {
  776. $_SESSION['return'] = array(
  777. 'type' => 'danger',
  778. 'msg' => sprintf($lang['danger']['description_invalid'])
  779. );
  780. return false;
  781. }
  782. if ($kind != 'location' && $kind != 'group' && $kind != 'thing') {
  783. $_SESSION['return'] = array(
  784. 'type' => 'danger',
  785. 'msg' => sprintf($lang['danger']['resource_invalid'])
  786. );
  787. return false;
  788. }
  789. if (!is_valid_domain_name($domain)) {
  790. $_SESSION['return'] = array(
  791. 'type' => 'danger',
  792. 'msg' => sprintf($lang['danger']['domain_invalid'])
  793. );
  794. return false;
  795. }
  796. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  797. $_SESSION['return'] = array(
  798. 'type' => 'danger',
  799. 'msg' => sprintf($lang['danger']['access_denied'])
  800. );
  801. return false;
  802. }
  803. try {
  804. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox` WHERE `username` = :name");
  805. $stmt->execute(array(':name' => $name));
  806. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  807. if ($num_results != 0) {
  808. $_SESSION['return'] = array(
  809. 'type' => 'danger',
  810. 'msg' => sprintf($lang['danger']['object_exists'], htmlspecialchars($name))
  811. );
  812. return false;
  813. }
  814. $stmt = $pdo->prepare("SELECT `address` FROM `alias` WHERE address= :name");
  815. $stmt->execute(array(':name' => $name));
  816. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  817. if ($num_results != 0) {
  818. $_SESSION['return'] = array(
  819. 'type' => 'danger',
  820. 'msg' => sprintf($lang['danger']['is_alias'], htmlspecialchars($name))
  821. );
  822. return false;
  823. }
  824. $stmt = $pdo->prepare("SELECT `address` FROM `spamalias` WHERE `address`= :name");
  825. $stmt->execute(array(':name' => $name));
  826. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  827. if ($num_results != 0) {
  828. $_SESSION['return'] = array(
  829. 'type' => 'danger',
  830. 'msg' => sprintf($lang['danger']['is_spam_alias'], htmlspecialchars($name))
  831. );
  832. return false;
  833. }
  834. $stmt = $pdo->prepare("SELECT `domain` FROM `domain` WHERE `domain`= :domain");
  835. $stmt->execute(array(':domain' => $domain));
  836. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  837. if ($num_results == 0) {
  838. $_SESSION['return'] = array(
  839. 'type' => 'danger',
  840. 'msg' => sprintf($lang['danger']['domain_not_found'], htmlspecialchars($domain))
  841. );
  842. return false;
  843. }
  844. }
  845. catch(PDOException $e) {
  846. $_SESSION['return'] = array(
  847. 'type' => 'danger',
  848. 'msg' => 'MySQL: '.$e
  849. );
  850. return false;
  851. }
  852. try {
  853. $stmt = $pdo->prepare("INSERT INTO `mailbox` (`username`, `password`, `name`, `maildir`, `quota`, `local_part`, `domain`, `active`, `multiple_bookings`, `kind`)
  854. VALUES (:name, 'RESOURCE', :description, 'RESOURCE', 0, :local_part, :domain, :active, :multiple_bookings, :kind)");
  855. $stmt->execute(array(
  856. ':name' => $name,
  857. ':description' => $description,
  858. ':local_part' => $local_part,
  859. ':domain' => $domain,
  860. ':active' => $active,
  861. ':kind' => $kind,
  862. ':multiple_bookings' => $multiple_bookings
  863. ));
  864. $_SESSION['return'] = array(
  865. 'type' => 'success',
  866. 'msg' => sprintf($lang['success']['resource_added'], htmlspecialchars($name))
  867. );
  868. }
  869. catch (PDOException $e) {
  870. mailbox('delete', 'resource', array('name' => $name));
  871. $_SESSION['return'] = array(
  872. 'type' => 'danger',
  873. 'msg' => 'MySQL: '.$e
  874. );
  875. return false;
  876. }
  877. break;
  878. }
  879. break;
  880. case 'edit':
  881. switch ($_type) {
  882. case 'alias_domain':
  883. $alias_domains = (array)$_data['alias_domain'];
  884. foreach ($alias_domains as $alias_domain) {
  885. $alias_domain = idn_to_ascii(strtolower(trim($alias_domain)));
  886. $is_now = mailbox('get', 'alias_domain_details', $alias_domain);
  887. if (!empty($is_now)) {
  888. $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active_int'];
  889. $target_domain = (!empty($_data['target_domain'])) ? idn_to_ascii(strtolower(trim($_data['target_domain']))) : $is_now['target_domain'];
  890. }
  891. else {
  892. $_SESSION['return'] = array(
  893. 'type' => 'danger',
  894. 'msg' => sprintf($lang['danger']['alias_domain_invalid'])
  895. );
  896. return false;
  897. }
  898. if (!is_valid_domain_name($target_domain)) {
  899. $_SESSION['return'] = array(
  900. 'type' => 'danger',
  901. 'msg' => sprintf($lang['danger']['target_domain_invalid'])
  902. );
  903. return false;
  904. }
  905. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $target_domain)) {
  906. $_SESSION['return'] = array(
  907. 'type' => 'danger',
  908. 'msg' => sprintf($lang['danger']['access_denied'])
  909. );
  910. return false;
  911. }
  912. if (empty(mailbox('get', 'domain_details', $target_domain)) || !empty(mailbox('get', 'alias_domain_details', $target_domain))) {
  913. $_SESSION['return'] = array(
  914. 'type' => 'danger',
  915. 'msg' => sprintf($lang['danger']['target_domain_invalid'])
  916. );
  917. return false;
  918. }
  919. try {
  920. $stmt = $pdo->prepare("UPDATE `alias_domain` SET
  921. `target_domain` = :target_domain,
  922. `active` = :active
  923. WHERE `alias_domain` = :alias_domain");
  924. $stmt->execute(array(
  925. ':alias_domain' => $alias_domain,
  926. ':target_domain' => $target_domain,
  927. ':active' => $active
  928. ));
  929. }
  930. catch (PDOException $e) {
  931. $_SESSION['return'] = array(
  932. 'type' => 'danger',
  933. 'msg' => 'MySQL: '.$e
  934. );
  935. return false;
  936. }
  937. }
  938. $_SESSION['return'] = array(
  939. 'type' => 'success',
  940. 'msg' => sprintf($lang['success']['aliasd_modified'], htmlspecialchars(implode(', ', $alias_domains)))
  941. );
  942. break;
  943. case 'tls_policy':
  944. if (!is_array($_data['username'])) {
  945. $usernames = array();
  946. $usernames[] = $_data['username'];
  947. }
  948. else {
  949. $usernames = $_data['username'];
  950. }
  951. foreach ($usernames as $username) {
  952. if (!filter_var($username, FILTER_VALIDATE_EMAIL) || !hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $username)) {
  953. $_SESSION['return'] = array(
  954. 'type' => 'danger',
  955. 'msg' => sprintf($lang['danger']['access_denied'])
  956. );
  957. return false;
  958. }
  959. $is_now = mailbox('get', 'tls_policy', $username);
  960. if (!empty($is_now)) {
  961. $tls_enforce_in = (isset($_data['tls_enforce_in'])) ? intval($_data['tls_enforce_in']) : $is_now['tls_enforce_in'];
  962. $tls_enforce_out = (isset($_data['tls_enforce_out'])) ? intval($_data['tls_enforce_out']) : $is_now['tls_enforce_out'];
  963. }
  964. else {
  965. $_SESSION['return'] = array(
  966. 'type' => 'danger',
  967. 'msg' => sprintf($lang['danger']['access_denied'])
  968. );
  969. return false;
  970. }
  971. try {
  972. $stmt = $pdo->prepare("UPDATE `mailbox` SET `tls_enforce_out` = :tls_out, `tls_enforce_in` = :tls_in WHERE `username` = :username");
  973. $stmt->execute(array(
  974. ':tls_out' => $tls_enforce_out,
  975. ':tls_in' => $tls_enforce_in,
  976. ':username' => $username
  977. ));
  978. }
  979. catch (PDOException $e) {
  980. $_SESSION['return'] = array(
  981. 'type' => 'danger',
  982. 'msg' => 'MySQL: '.$e
  983. );
  984. return false;
  985. }
  986. }
  987. $_SESSION['return'] = array(
  988. 'type' => 'success',
  989. 'msg' => sprintf($lang['success']['mailbox_modified'], implode(', ', $usernames))
  990. );
  991. break;
  992. case 'spam_score':
  993. if (!is_array($_data['username'])) {
  994. $usernames = array();
  995. $usernames[] = $_data['username'];
  996. }
  997. else {
  998. $usernames = $_data['username'];
  999. }
  1000. foreach ($usernames as $username) {
  1001. $lowspamlevel = explode(',', $_data['spam_score'])[0];
  1002. $highspamlevel = explode(',', $_data['spam_score'])[1];
  1003. if (!is_numeric($lowspamlevel) || !is_numeric($highspamlevel)) {
  1004. $_SESSION['return'] = array(
  1005. 'type' => 'danger',
  1006. 'msg' => sprintf($lang['danger']['access_denied'])
  1007. );
  1008. return false;
  1009. }
  1010. try {
  1011. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :username
  1012. AND (`option` = 'lowspamlevel' OR `option` = 'highspamlevel')");
  1013. $stmt->execute(array(
  1014. ':username' => $username
  1015. ));
  1016. $stmt = $pdo->prepare("INSERT INTO `filterconf` (`object`, `option`, `value`)
  1017. VALUES (:username, 'highspamlevel', :highspamlevel)");
  1018. $stmt->execute(array(
  1019. ':username' => $username,
  1020. ':highspamlevel' => $highspamlevel
  1021. ));
  1022. $stmt = $pdo->prepare("INSERT INTO `filterconf` (`object`, `option`, `value`)
  1023. VALUES (:username, 'lowspamlevel', :lowspamlevel)");
  1024. $stmt->execute(array(
  1025. ':username' => $username,
  1026. ':lowspamlevel' => $lowspamlevel
  1027. ));
  1028. }
  1029. catch (PDOException $e) {
  1030. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :username
  1031. AND (`option` = 'lowspamlevel' OR `option` = 'highspamlevel')");
  1032. $stmt->execute(array(
  1033. ':username' => $username
  1034. ));
  1035. $_SESSION['return'] = array(
  1036. 'type' => 'danger',
  1037. 'msg' => 'MySQL: '.$e
  1038. );
  1039. return false;
  1040. }
  1041. }
  1042. $_SESSION['return'] = array(
  1043. 'type' => 'success',
  1044. 'msg' => sprintf($lang['success']['mailbox_modified'], implode(', ', $usernames))
  1045. );
  1046. break;
  1047. case 'time_limited_alias':
  1048. if (!is_array($_data['address'])) {
  1049. $addresses = array();
  1050. $addresses[] = $_data['address'];
  1051. }
  1052. else {
  1053. $addresses = $_data['address'];
  1054. }
  1055. foreach ($addresses as $address) {
  1056. try {
  1057. $stmt = $pdo->prepare("SELECT `goto` FROM `spamalias` WHERE `address` = :address");
  1058. $stmt->execute(array(':address' => $address));
  1059. $goto = $stmt->fetch(PDO::FETCH_ASSOC)['goto'];
  1060. }
  1061. catch (PDOException $e) {
  1062. $_SESSION['return'] = array(
  1063. 'type' => 'danger',
  1064. 'msg' => 'MySQL: '.$e
  1065. );
  1066. return false;
  1067. }
  1068. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $goto)) {
  1069. $_SESSION['return'] = array(
  1070. 'type' => 'danger',
  1071. 'msg' => sprintf($lang['danger']['access_denied'])
  1072. );
  1073. return false;
  1074. }
  1075. try {
  1076. $stmt = $pdo->prepare("UPDATE `spamalias` SET `validity` = (`validity` + 3600) WHERE
  1077. `address` = :address AND
  1078. `validity` >= :validity");
  1079. $stmt->execute(array(
  1080. ':address' => $address,
  1081. ':validity' => time()
  1082. ));
  1083. }
  1084. catch (PDOException $e) {
  1085. $_SESSION['return'] = array(
  1086. 'type' => 'danger',
  1087. 'msg' => 'MySQL: '.$e
  1088. );
  1089. return false;
  1090. }
  1091. }
  1092. $_SESSION['return'] = array(
  1093. 'type' => 'success',
  1094. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars(implode(', ', $usernames)))
  1095. );
  1096. break;
  1097. case 'delimiter_action':
  1098. if (!is_array($_data['username'])) {
  1099. $usernames = array();
  1100. $usernames[] = $_data['username'];
  1101. }
  1102. else {
  1103. $usernames = $_data['username'];
  1104. }
  1105. foreach ($usernames as $username) {
  1106. if (!filter_var($username, FILTER_VALIDATE_EMAIL) || !hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $username)) {
  1107. $_SESSION['return'] = array(
  1108. 'type' => 'danger',
  1109. 'msg' => sprintf($lang['danger']['access_denied'])
  1110. );
  1111. return false;
  1112. }
  1113. if (isset($_data['tagged_mail_handler']) && $_data['tagged_mail_handler'] == "subject") {
  1114. try {
  1115. $redis->hSet('RCPT_WANTS_SUBJECT_TAG', $username, 1);
  1116. }
  1117. catch (RedisException $e) {
  1118. $_SESSION['return'] = array(
  1119. 'type' => 'danger',
  1120. 'msg' => 'Redis: '.$e
  1121. );
  1122. return false;
  1123. }
  1124. }
  1125. else {
  1126. try {
  1127. $redis->hDel('RCPT_WANTS_SUBJECT_TAG', $username);
  1128. }
  1129. catch (RedisException $e) {
  1130. $_SESSION['return'] = array(
  1131. 'type' => 'danger',
  1132. 'msg' => 'Redis: '.$e
  1133. );
  1134. return false;
  1135. }
  1136. }
  1137. }
  1138. $_SESSION['return'] = array(
  1139. 'type' => 'success',
  1140. 'msg' => sprintf($lang['success']['mailbox_modified'], implode(', ', $usernames))
  1141. );
  1142. break;
  1143. case 'domain_ratelimit':
  1144. $rl_value = intval($_data['rl_value']);
  1145. $rl_frame = $_data['rl_frame'];
  1146. if (!in_array($rl_frame, array('s', 'm', 'h'))) {
  1147. $_SESSION['return'] = array(
  1148. 'type' => 'danger',
  1149. 'msg' => 'Ratelimit time frame is incorrect'
  1150. );
  1151. return false;
  1152. }
  1153. if (!is_array($_data['domain'])) {
  1154. $domains = array();
  1155. $domains[] = $_data['domain'];
  1156. }
  1157. else {
  1158. $domains = $_data['domain'];
  1159. }
  1160. foreach ($domains as $domain) {
  1161. if (!is_valid_domain_name($domain) || !hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  1162. $_SESSION['return'] = array(
  1163. 'type' => 'danger',
  1164. 'msg' => sprintf($lang['danger']['access_denied'])
  1165. );
  1166. return false;
  1167. }
  1168. if (empty($rl_value)) {
  1169. try {
  1170. $redis->hDel('RL_OBJECT', $domain);
  1171. $redis->hDel('RL_VALUE', $domain);
  1172. }
  1173. catch (RedisException $e) {
  1174. $_SESSION['return'] = array(
  1175. 'type' => 'danger',
  1176. 'msg' => 'Redis: '.$e
  1177. );
  1178. return false;
  1179. }
  1180. }
  1181. else {
  1182. try {
  1183. $redis->hSet('RL_OBJECT', $domain, '1');
  1184. $redis->hSet('RL_VALUE', $domain, $rl_value . ' / 1' . $rl_frame);
  1185. }
  1186. catch (RedisException $e) {
  1187. $_SESSION['return'] = array(
  1188. 'type' => 'danger',
  1189. 'msg' => 'Redis: '.$e
  1190. );
  1191. return false;
  1192. }
  1193. }
  1194. }
  1195. $_SESSION['return'] = array(
  1196. 'type' => 'success',
  1197. 'msg' => sprintf($lang['success']['domain_modified'], implode(', ', $domains))
  1198. );
  1199. break;
  1200. case 'syncjob':
  1201. if (!is_array($_data['id'])) {
  1202. $ids = array();
  1203. $ids[] = $_data['id'];
  1204. }
  1205. else {
  1206. $ids = $_data['id'];
  1207. }
  1208. foreach ($ids as $id) {
  1209. $is_now = mailbox('get', 'syncjob_details', $id);
  1210. if (!empty($is_now)) {
  1211. $username = $is_now['user2'];
  1212. $user1 = (!empty($_data['user1'])) ? $_data['user1'] : $is_now['user1'];
  1213. $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active_int'];
  1214. $delete2duplicates = (isset($_data['delete2duplicates'])) ? intval($_data['delete2duplicates']) : $is_now['delete2duplicates'];
  1215. $delete1 = (isset($_data['delete1'])) ? intval($_data['delete1']) : $is_now['delete1'];
  1216. $port1 = (!empty($_data['port1'])) ? $_data['port1'] : $is_now['port1'];
  1217. $password1 = (!empty($_data['password1'])) ? $_data['password1'] : $is_now['password1'];
  1218. $host1 = (!empty($_data['host1'])) ? $_data['host1'] : $is_now['host1'];
  1219. $subfolder2 = (!empty($_data['subfolder2'])) ? $_data['subfolder2'] : $is_now['subfolder2'];
  1220. $enc1 = (!empty($_data['enc1'])) ? $_data['enc1'] : $is_now['enc1'];
  1221. $mins_interval = (!empty($_data['mins_interval'])) ? $_data['mins_interval'] : $is_now['mins_interval'];
  1222. $exclude = (!empty($_data['exclude'])) ? $_data['exclude'] : $is_now['exclude'];
  1223. $maxage = (!empty($_data['maxage'])) ? $_data['maxage'] : $is_now['maxage'];
  1224. }
  1225. else {
  1226. $_SESSION['return'] = array(
  1227. 'type' => 'danger',
  1228. 'msg' => sprintf($lang['danger']['access_denied'])
  1229. );
  1230. return false;
  1231. }
  1232. if (empty($subfolder2)) {
  1233. $subfolder2 = "";
  1234. }
  1235. if (!isset($maxage) || !filter_var($maxage, FILTER_VALIDATE_INT, array('options' => array('min_range' => 1, 'max_range' => 32767)))) {
  1236. $maxage = "0";
  1237. }
  1238. if (!filter_var($port1, FILTER_VALIDATE_INT, array('options' => array('min_range' => 1, 'max_range' => 65535)))) {
  1239. $_SESSION['return'] = array(
  1240. 'type' => 'danger',
  1241. 'msg' => sprintf($lang['danger']['access_denied'])
  1242. );
  1243. return false;
  1244. }
  1245. if (!filter_var($mins_interval, FILTER_VALIDATE_INT, array('options' => array('min_range' => 10, 'max_range' => 3600)))) {
  1246. $_SESSION['return'] = array(
  1247. 'type' => 'danger',
  1248. 'msg' => sprintf($lang['danger']['access_denied'])
  1249. );
  1250. return false;
  1251. }
  1252. if (!is_valid_domain_name($host1)) {
  1253. $_SESSION['return'] = array(
  1254. 'type' => 'danger',
  1255. 'msg' => sprintf($lang['danger']['access_denied'])
  1256. );
  1257. return false;
  1258. }
  1259. if ($enc1 != "TLS" && $enc1 != "SSL" && $enc1 != "PLAIN") {
  1260. $_SESSION['return'] = array(
  1261. 'type' => 'danger',
  1262. 'msg' => sprintf($lang['danger']['access_denied'])
  1263. );
  1264. return false;
  1265. }
  1266. if (@preg_match("/" . $exclude . "/", null) === false) {
  1267. $_SESSION['return'] = array(
  1268. 'type' => 'danger',
  1269. 'msg' => sprintf($lang['danger']['access_denied'])
  1270. );
  1271. return false;
  1272. }
  1273. try {
  1274. $stmt = $pdo->prepare("UPDATE `imapsync` SET `delete1` = :delete1, `maxage` = :maxage, `subfolder2` = :subfolder2, `exclude` = :exclude, `host1` = :host1, `user1` = :user1, `password1` = :password1, `mins_interval` = :mins_interval, `port1` = :port1, `enc1` = :enc1, `delete2duplicates` = :delete2duplicates, `active` = :active
  1275. WHERE `id` = :id");
  1276. $stmt->execute(array(
  1277. ':delete1' => $delete1,
  1278. ':id' => $id,
  1279. ':exclude' => $exclude,
  1280. ':maxage' => $maxage,
  1281. ':subfolder2' => $subfolder2,
  1282. ':host1' => $host1,
  1283. ':user1' => $user1,
  1284. ':password1' => $password1,
  1285. ':mins_interval' => $mins_interval,
  1286. ':port1' => $port1,
  1287. ':enc1' => $enc1,
  1288. ':delete2duplicates' => $delete2duplicates,
  1289. ':active' => $active,
  1290. ));
  1291. }
  1292. catch(PDOException $e) {
  1293. $_SESSION['return'] = array(
  1294. 'type' => 'danger',
  1295. 'msg' => 'MySQL: '.$e
  1296. );
  1297. return false;
  1298. }
  1299. }
  1300. $_SESSION['return'] = array(
  1301. 'type' => 'success',
  1302. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  1303. );
  1304. return true;
  1305. break;
  1306. case 'alias':
  1307. if (!is_array($_data['address'])) {
  1308. $addresses = array();
  1309. $addresses[] = $_data['address'];
  1310. }
  1311. else {
  1312. $addresses = $_data['address'];
  1313. }
  1314. foreach ($addresses as $address) {
  1315. $is_now = mailbox('get', 'alias_details', $address);
  1316. if (!empty($is_now)) {
  1317. $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active_int'];
  1318. $goto = (!empty($_data['goto'])) ? $_data['goto'] : $is_now['goto'];
  1319. }
  1320. else {
  1321. $_SESSION['return'] = array(
  1322. 'type' => 'danger',
  1323. 'msg' => sprintf($lang['danger']['alias_invalid'])
  1324. );
  1325. return false;
  1326. }
  1327. $gotos = array_map('trim', preg_split( "/( |,|;|\n)/", $_data['goto']));
  1328. foreach ($gotos as &$goto) {
  1329. if (empty($goto)) {
  1330. continue;
  1331. }
  1332. if (!filter_var($goto, FILTER_VALIDATE_EMAIL)) {
  1333. $_SESSION['return'] = array(
  1334. 'type' => 'danger',
  1335. 'msg' =>sprintf($lang['danger']['goto_invalid'])
  1336. );
  1337. return false;
  1338. }
  1339. if ($goto == $address) {
  1340. $_SESSION['return'] = array(
  1341. 'type' => 'danger',
  1342. 'msg' => sprintf($lang['danger']['alias_goto_identical'])
  1343. );
  1344. return false;
  1345. }
  1346. }
  1347. $gotos = array_filter($gotos);
  1348. $goto = implode(",", $gotos);
  1349. $domain = idn_to_ascii(substr(strstr($address, '@'), 1));
  1350. $local_part = strstr($address, '@', true);
  1351. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  1352. $_SESSION['return'] = array(
  1353. 'type' => 'danger',
  1354. 'msg' => sprintf($lang['danger']['access_denied'])
  1355. );
  1356. return false;
  1357. }
  1358. if ((!filter_var($address, FILTER_VALIDATE_EMAIL) === true) && !empty($local_part)) {
  1359. $_SESSION['return'] = array(
  1360. 'type' => 'danger',
  1361. 'msg' => sprintf($lang['danger']['alias_invalid'])
  1362. );
  1363. return false;
  1364. }
  1365. try {
  1366. if (!empty($goto)) {
  1367. $stmt = $pdo->prepare("UPDATE `alias` SET
  1368. `goto` = :goto,
  1369. `active`= :active
  1370. WHERE `address` = :address");
  1371. $stmt->execute(array(
  1372. ':goto' => $goto,
  1373. ':active' => $active,
  1374. ':address' => $address
  1375. ));
  1376. }
  1377. else {
  1378. $stmt = $pdo->prepare("UPDATE `alias` SET
  1379. `active`= :active
  1380. WHERE `address` = :address");
  1381. $stmt->execute(array(
  1382. ':active' => $active,
  1383. ':address' => $address
  1384. ));
  1385. }
  1386. }
  1387. catch (PDOException $e) {
  1388. $_SESSION['return'] = array(
  1389. 'type' => 'danger',
  1390. 'msg' => 'MySQL: '.$e
  1391. );
  1392. return false;
  1393. }
  1394. }
  1395. $_SESSION['return'] = array(
  1396. 'type' => 'success',
  1397. 'msg' => sprintf($lang['success']['alias_modified'], htmlspecialchars(implode(', ', $addresses)))
  1398. );
  1399. break;
  1400. case 'domain':
  1401. if (!is_array($_data['domain'])) {
  1402. $domains = array();
  1403. $domains[] = $_data['domain'];
  1404. }
  1405. else {
  1406. $domains = $_data['domain'];
  1407. }
  1408. foreach ($domains as $domain) {
  1409. $domain = idn_to_ascii($domain);
  1410. if (!is_valid_domain_name($domain)) {
  1411. $_SESSION['return'] = array(
  1412. 'type' => 'danger',
  1413. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1414. );
  1415. return false;
  1416. }
  1417. if ($_SESSION['mailcow_cc_role'] == "domainadmin" &&
  1418. hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  1419. $description = $_data['description'];
  1420. $active = intval($_data['active']);
  1421. try {
  1422. $stmt = $pdo->prepare("UPDATE `domain` SET
  1423. `description` = :description
  1424. WHERE `domain` = :domain");
  1425. $stmt->execute(array(
  1426. ':description' => $description,
  1427. ':domain' => $domain
  1428. ));
  1429. $_SESSION['return'] = array(
  1430. 'type' => 'success',
  1431. 'msg' => sprintf($lang['success']['domain_modified'], htmlspecialchars($domain))
  1432. );
  1433. }
  1434. catch (PDOException $e) {
  1435. $_SESSION['return'] = array(
  1436. 'type' => 'danger',
  1437. 'msg' => 'MySQL: '.$e
  1438. );
  1439. return false;
  1440. }
  1441. }
  1442. elseif ($_SESSION['mailcow_cc_role'] == "admin") {
  1443. $is_now = mailbox('get', 'domain_details', $domain);
  1444. if (!empty($is_now)) {
  1445. $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active_int'];
  1446. $backupmx = (isset($_data['backupmx'])) ? intval($_data['backupmx']) : $is_now['backupmx_int'];
  1447. $relay_all_recipients = (isset($_data['relay_all_recipients'])) ? intval($_data['relay_all_recipients']) : $is_now['relay_all_recipients_int'];
  1448. $relayhost = (isset($_data['relayhost'])) ? intval($_data['relayhost']) : $is_now['relayhost'];
  1449. $aliases = (!empty($_data['aliases'])) ? $_data['aliases'] : $is_now['max_num_aliases_for_domain'];
  1450. $mailboxes = (!empty($_data['mailboxes'])) ? $_data['mailboxes'] : $is_now['max_num_mboxes_for_domain'];
  1451. $maxquota = (!empty($_data['maxquota'])) ? $_data['maxquota'] : ($is_now['max_quota_for_mbox'] / 1048576);
  1452. $quota = (!empty($_data['quota'])) ? $_data['quota'] : ($is_now['max_quota_for_domain'] / 1048576);
  1453. $description = (!empty($_data['description'])) ? $_data['description'] : $is_now['description'];
  1454. ($relay_all_recipients == '1') ? $backupmx = '1' : null;
  1455. }
  1456. else {
  1457. $_SESSION['return'] = array(
  1458. 'type' => 'danger',
  1459. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1460. );
  1461. return false;
  1462. }
  1463. try {
  1464. // todo: should be using api here
  1465. $stmt = $pdo->prepare("SELECT
  1466. COUNT(*) AS count,
  1467. MAX(COALESCE(ROUND(`quota`/1048576), 0)) AS `biggest_mailbox`,
  1468. COALESCE(ROUND(SUM(`quota`)/1048576), 0) AS `quota_all`
  1469. FROM `mailbox`
  1470. WHERE `kind` NOT REGEXP 'location|thing|group'
  1471. AND domain = :domain");
  1472. $stmt->execute(array(':domain' => $domain));
  1473. $MailboxData = $stmt->fetch(PDO::FETCH_ASSOC);
  1474. // todo: should be using api here
  1475. $stmt = $pdo->prepare("SELECT COUNT(*) AS `count` FROM `alias`
  1476. WHERE domain = :domain
  1477. AND address NOT IN (
  1478. SELECT `username` FROM `mailbox`
  1479. )");
  1480. $stmt->execute(array(':domain' => $domain));
  1481. $AliasData = $stmt->fetch(PDO::FETCH_ASSOC);
  1482. }
  1483. catch(PDOException $e) {
  1484. $_SESSION['return'] = array(
  1485. 'type' => 'danger',
  1486. 'msg' => 'MySQL: '.$e
  1487. );
  1488. return false;
  1489. }
  1490. if ($maxquota > $quota) {
  1491. $_SESSION['return'] = array(
  1492. 'type' => 'danger',
  1493. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeds_domain_quota'])
  1494. );
  1495. return false;
  1496. }
  1497. if ($maxquota == "0" || empty($maxquota)) {
  1498. $_SESSION['return'] = array(
  1499. 'type' => 'danger',
  1500. 'msg' => sprintf($lang['danger']['maxquota_empty'])
  1501. );
  1502. return false;
  1503. }
  1504. if ($MailboxData['biggest_mailbox'] > $maxquota) {
  1505. $_SESSION['return'] = array(
  1506. 'type' => 'danger',
  1507. 'msg' => sprintf($lang['danger']['max_quota_in_use'], $MailboxData['biggest_mailbox'])
  1508. );
  1509. return false;
  1510. }
  1511. if ($MailboxData['quota_all'] > $quota) {
  1512. $_SESSION['return'] = array(
  1513. 'type' => 'danger',
  1514. 'msg' => sprintf($lang['danger']['domain_quota_m_in_use'], $MailboxData['quota_all'])
  1515. );
  1516. return false;
  1517. }
  1518. if ($MailboxData['count'] > $mailboxes) {
  1519. $_SESSION['return'] = array(
  1520. 'type' => 'danger',
  1521. 'msg' => sprintf($lang['danger']['mailboxes_in_use'], $MailboxData['count'])
  1522. );
  1523. return false;
  1524. }
  1525. if ($AliasData['count'] > $aliases) {
  1526. $_SESSION['return'] = array(
  1527. 'type' => 'danger',
  1528. 'msg' => sprintf($lang['danger']['aliases_in_use'], $AliasData['count'])
  1529. );
  1530. return false;
  1531. }
  1532. try {
  1533. $stmt = $pdo->prepare("UPDATE `domain` SET
  1534. `relay_all_recipients` = :relay_all_recipients,
  1535. `backupmx` = :backupmx,
  1536. `active` = :active,
  1537. `quota` = :quota,
  1538. `maxquota` = :maxquota,
  1539. `relayhost` = :relayhost,
  1540. `mailboxes` = :mailboxes,
  1541. `aliases` = :aliases,
  1542. `description` = :description
  1543. WHERE `domain` = :domain");
  1544. $stmt->execute(array(
  1545. ':relay_all_recipients' => $relay_all_recipients,
  1546. ':backupmx' => $backupmx,
  1547. ':active' => $active,
  1548. ':quota' => $quota,
  1549. ':maxquota' => $maxquota,
  1550. ':relayhost' => $relayhost,
  1551. ':mailboxes' => $mailboxes,
  1552. ':aliases' => $aliases,
  1553. ':description' => $description,
  1554. ':domain' => $domain
  1555. ));
  1556. }
  1557. catch (PDOException $e) {
  1558. $_SESSION['return'] = array(
  1559. 'type' => 'danger',
  1560. 'msg' => 'MySQL: '.$e
  1561. );
  1562. return false;
  1563. }
  1564. }
  1565. }
  1566. $_SESSION['return'] = array(
  1567. 'type' => 'success',
  1568. 'msg' => sprintf($lang['success']['domain_modified'], htmlspecialchars(implode(', ', $domains)))
  1569. );
  1570. break;
  1571. case 'mailbox':
  1572. if (!is_array($_data['username'])) {
  1573. $usernames = array();
  1574. $usernames[] = $_data['username'];
  1575. }
  1576. else {
  1577. $usernames = $_data['username'];
  1578. }
  1579. foreach ($usernames as $username) {
  1580. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  1581. $_SESSION['return'] = array(
  1582. 'type' => 'danger',
  1583. 'msg' => sprintf($lang['danger']['username_invalid'])
  1584. );
  1585. return false;
  1586. }
  1587. $is_now = mailbox('get', 'mailbox_details', $username);
  1588. if (!empty($is_now)) {
  1589. $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active_int'];
  1590. $name = (!empty($_data['name'])) ? $_data['name'] : $is_now['name'];
  1591. $domain = $is_now['domain'];
  1592. $quota_m = (!empty($_data['quota'])) ? $_data['quota'] : ($is_now['quota'] / 1048576);
  1593. $quota_b = $quota_m * 1048576;
  1594. $password = (!empty($_data['password'])) ? $_data['password'] : null;
  1595. $password2 = (!empty($_data['password2'])) ? $_data['password2'] : null;
  1596. }
  1597. else {
  1598. $_SESSION['return'] = array(
  1599. 'type' => 'danger',
  1600. 'msg' => sprintf($lang['danger']['access_denied'])
  1601. );
  1602. return false;
  1603. }
  1604. try {
  1605. $stmt = $pdo->prepare("SELECT `quota`, `maxquota`
  1606. FROM `domain`
  1607. WHERE `domain` = :domain");
  1608. $stmt->execute(array(':domain' => $domain));
  1609. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  1610. }
  1611. catch(PDOException $e) {
  1612. $_SESSION['return'] = array(
  1613. 'type' => 'danger',
  1614. 'msg' => 'MySQL: '.$e
  1615. );
  1616. return false;
  1617. }
  1618. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  1619. $_SESSION['return'] = array(
  1620. 'type' => 'danger',
  1621. 'msg' => sprintf($lang['danger']['access_denied'])
  1622. );
  1623. return false;
  1624. }
  1625. if (!is_numeric($quota_m) || $quota_m == "0") {
  1626. $_SESSION['return'] = array(
  1627. 'type' => 'danger',
  1628. 'msg' => sprintf($lang['danger']['quota_not_0_not_numeric'], htmlspecialchars($quota_m))
  1629. );
  1630. return false;
  1631. }
  1632. if ($quota_m > $DomainData['maxquota']) {
  1633. $_SESSION['return'] = array(
  1634. 'type' => 'danger',
  1635. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeded'], $DomainData['maxquota'])
  1636. );
  1637. return false;
  1638. }
  1639. if (((($is_now['quota_used'] / 1048576) - $quota_m) + $quota_m) > $DomainData['quota']) {
  1640. $_SESSION['return'] = array(
  1641. 'type' => 'danger',
  1642. 'msg' => sprintf($lang['danger']['mailbox_quota_left_exceeded'], ($is_now['max_new_quota'] / 1048576))
  1643. );
  1644. return false;
  1645. }
  1646. if (isset($_data['sender_acl'])) {
  1647. // Get sender_acl items set by admin
  1648. $sender_acl_admin = array_merge(
  1649. mailbox('get', 'sender_acl_handles', $username)['sender_acl_domains']['ro'],
  1650. mailbox('get', 'sender_acl_handles', $username)['sender_acl_addresses']['ro']
  1651. );
  1652. // Get sender_acl items from POST array
  1653. $sender_acl_domain_admin = ($_data['sender_acl'] == "0") ? array() : (array)$_data['sender_acl'];
  1654. if (!empty($sender_acl_domain_admin) || !empty($sender_acl_admin)) {
  1655. // Check items in POST array and skip invalid
  1656. foreach ($sender_acl_domain_admin as $key => $val) {
  1657. if (!filter_var($val, FILTER_VALIDATE_EMAIL) && !is_valid_domain_name(ltrim($val, '@'))) {
  1658. unset($sender_acl_domain_admin[$key]);
  1659. }
  1660. if (is_valid_domain_name(ltrim($val, '@'))) {
  1661. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], ltrim($val, '@'))) {
  1662. $_SESSION['return'] = array(
  1663. 'type' => 'danger',
  1664. 'msg' => sprintf($lang['danger']['sender_acl_invalid'])
  1665. );
  1666. return false;
  1667. }
  1668. }
  1669. if (filter_var($val, FILTER_VALIDATE_EMAIL)) {
  1670. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $val)) {
  1671. $_SESSION['return'] = array(
  1672. 'type' => 'danger',
  1673. 'msg' => sprintf($lang['danger']['sender_acl_invalid'])
  1674. );
  1675. return false;
  1676. }
  1677. }
  1678. }
  1679. // Merge both arrays
  1680. $sender_acl_merged = array_merge($sender_acl_domain_admin, $sender_acl_admin);
  1681. try {
  1682. $stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` = :username");
  1683. $stmt->execute(array(
  1684. ':username' => $username
  1685. ));
  1686. }
  1687. catch (PDOException $e) {
  1688. $_SESSION['return'] = array(
  1689. 'type' => 'danger',
  1690. 'msg' => 'MySQL: '.$e
  1691. );
  1692. return false;
  1693. }
  1694. foreach ($sender_acl_merged as $sender_acl) {
  1695. $domain = ltrim($sender_acl, '@');
  1696. if (is_valid_domain_name($domain)) {
  1697. $sender_acl = '@' . $domain;
  1698. }
  1699. try {
  1700. $stmt = $pdo->prepare("INSERT INTO `sender_acl` (`send_as`, `logged_in_as`)
  1701. VALUES (:sender_acl, :username)");
  1702. $stmt->execute(array(
  1703. ':sender_acl' => $sender_acl,
  1704. ':username' => $username
  1705. ));
  1706. }
  1707. catch (PDOException $e) {
  1708. $_SESSION['return'] = array(
  1709. 'type' => 'danger',
  1710. 'msg' => 'MySQL: '.$e
  1711. );
  1712. return false;
  1713. }
  1714. }
  1715. }
  1716. else {
  1717. try {
  1718. $stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` = :username");
  1719. $stmt->execute(array(
  1720. ':username' => $username
  1721. ));
  1722. }
  1723. catch (PDOException $e) {
  1724. $_SESSION['return'] = array(
  1725. 'type' => 'danger',
  1726. 'msg' => 'MySQL: '.$e
  1727. );
  1728. return false;
  1729. }
  1730. }
  1731. }
  1732. if (!empty($password) && !empty($password2)) {
  1733. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) {
  1734. $_SESSION['return'] = array(
  1735. 'type' => 'danger',
  1736. 'msg' => sprintf($lang['danger']['password_complexity'])
  1737. );
  1738. return false;
  1739. }
  1740. if ($password != $password2) {
  1741. $_SESSION['return'] = array(
  1742. 'type' => 'danger',
  1743. 'msg' => sprintf($lang['danger']['password_mismatch'])
  1744. );
  1745. return false;
  1746. }
  1747. $password_hashed = hash_password($password);
  1748. try {
  1749. $stmt = $pdo->prepare("UPDATE `alias` SET
  1750. `active` = :active
  1751. WHERE `address` = :address");
  1752. $stmt->execute(array(
  1753. ':address' => $username,
  1754. ':active' => $active
  1755. ));
  1756. $stmt = $pdo->prepare("UPDATE `mailbox` SET
  1757. `active` = :active,
  1758. `password` = :password_hashed,
  1759. `name`= :name,
  1760. `quota` = :quota_b
  1761. WHERE `username` = :username");
  1762. $stmt->execute(array(
  1763. ':password_hashed' => $password_hashed,
  1764. ':active' => $active,
  1765. ':name' => $name,
  1766. ':quota_b' => $quota_b,
  1767. ':username' => $username
  1768. ));
  1769. }
  1770. catch (PDOException $e) {
  1771. $_SESSION['return'] = array(
  1772. 'type' => 'danger',
  1773. 'msg' => 'MySQL: '.$e
  1774. );
  1775. return false;
  1776. }
  1777. }
  1778. try {
  1779. $stmt = $pdo->prepare("UPDATE `alias` SET
  1780. `active` = :active
  1781. WHERE `address` = :address");
  1782. $stmt->execute(array(
  1783. ':address' => $username,
  1784. ':active' => $active
  1785. ));
  1786. $stmt = $pdo->prepare("UPDATE `mailbox` SET
  1787. `active` = :active,
  1788. `name`= :name,
  1789. `quota` = :quota_b
  1790. WHERE `username` = :username");
  1791. $stmt->execute(array(
  1792. ':active' => $active,
  1793. ':name' => $name,
  1794. ':quota_b' => $quota_b,
  1795. ':username' => $username
  1796. ));
  1797. }
  1798. catch (PDOException $e) {
  1799. $_SESSION['return'] = array(
  1800. 'type' => 'danger',
  1801. 'msg' => 'MySQL: '.$e
  1802. );
  1803. return false;
  1804. }
  1805. }
  1806. $_SESSION['return'] = array(
  1807. 'type' => 'success',
  1808. 'msg' => sprintf($lang['success']['mailbox_modified'], implode(', ', $usernames))
  1809. );
  1810. break;
  1811. case 'resource':
  1812. if (!is_array($_data['name'])) {
  1813. $names = array();
  1814. $names[] = $_data['name'];
  1815. }
  1816. else {
  1817. $names = $_data['name'];
  1818. }
  1819. foreach ($names as $name) {
  1820. $is_now = mailbox('get', 'resource_details', $name);
  1821. if (!empty($is_now)) {
  1822. $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active_int'];
  1823. $multiple_bookings = (isset($_data['multiple_bookings'])) ? intval($_data['multiple_bookings']) : $is_now['multiple_bookings_int'];
  1824. $description = (!empty($_data['description'])) ? $_data['description'] : $is_now['description'];
  1825. $kind = (!empty($_data['kind'])) ? $_data['kind'] : $is_now['kind'];
  1826. }
  1827. else {
  1828. $_SESSION['return'] = array(
  1829. 'type' => 'danger',
  1830. 'msg' => sprintf($lang['danger']['resource_invalid'])
  1831. );
  1832. return false;
  1833. }
  1834. if (!filter_var($name, FILTER_VALIDATE_EMAIL)) {
  1835. $_SESSION['return'] = array(
  1836. 'type' => 'danger',
  1837. 'msg' => sprintf($lang['danger']['resource_invalid'])
  1838. );
  1839. return false;
  1840. }
  1841. if (empty($description)) {
  1842. $_SESSION['return'] = array(
  1843. 'type' => 'danger',
  1844. 'msg' => sprintf($lang['danger']['description_invalid'])
  1845. );
  1846. return false;
  1847. }
  1848. if ($kind != 'location' && $kind != 'group' && $kind != 'thing') {
  1849. $_SESSION['return'] = array(
  1850. 'type' => 'danger',
  1851. 'msg' => sprintf($lang['danger']['resource_invalid'])
  1852. );
  1853. return false;
  1854. }
  1855. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $name)) {
  1856. $_SESSION['return'] = array(
  1857. 'type' => 'danger',
  1858. 'msg' => sprintf($lang['danger']['access_denied'])
  1859. );
  1860. return false;
  1861. }
  1862. try {
  1863. $stmt = $pdo->prepare("UPDATE `mailbox` SET
  1864. `active` = :active,
  1865. `name`= :description,
  1866. `kind`= :kind,
  1867. `multiple_bookings`= :multiple_bookings
  1868. WHERE `username` = :name");
  1869. $stmt->execute(array(
  1870. ':active' => $active,
  1871. ':description' => $description,
  1872. ':multiple_bookings' => $multiple_bookings,
  1873. ':kind' => $kind,
  1874. ':name' => $name
  1875. ));
  1876. }
  1877. catch (PDOException $e) {
  1878. $_SESSION['return'] = array(
  1879. 'type' => 'danger',
  1880. 'msg' => 'MySQL: '.$e
  1881. );
  1882. return false;
  1883. }
  1884. }
  1885. $_SESSION['return'] = array(
  1886. 'type' => 'success',
  1887. 'msg' => sprintf($lang['success']['resource_modified'], implode(', ', $names))
  1888. );
  1889. break;
  1890. }
  1891. break;
  1892. case 'get':
  1893. switch ($_type) {
  1894. case 'sender_acl_handles':
  1895. if ($_SESSION['mailcow_cc_role'] != "admin" && $_SESSION['mailcow_cc_role'] != "domainadmin") {
  1896. return false;
  1897. }
  1898. $data['sender_acl_domains']['ro'] = array();
  1899. $data['sender_acl_domains']['rw'] = array();
  1900. $data['sender_acl_domains']['selectable'] = array();
  1901. $data['sender_acl_addresses']['ro'] = array();
  1902. $data['sender_acl_addresses']['rw'] = array();
  1903. $data['sender_acl_addresses']['selectable'] = array();
  1904. $data['fixed_sender_aliases'] = array();
  1905. try {
  1906. // Fixed addresses
  1907. $stmt = $pdo->prepare("SELECT `address` FROM `alias` WHERE `goto` REGEXP :goto AND `address` NOT LIKE '@%'");
  1908. $stmt->execute(array(':goto' => '(^|,)'.$_data.'($|,)'));
  1909. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  1910. while ($row = array_shift($rows)) {
  1911. $data['fixed_sender_aliases'][] = $row['address'];
  1912. }
  1913. $stmt = $pdo->prepare("SELECT CONCAT(`local_part`, '@', `alias_domain`.`alias_domain`) AS `alias_domain_alias` FROM `mailbox`, `alias_domain`
  1914. WHERE `alias_domain`.`target_domain` = `mailbox`.`domain`
  1915. AND `mailbox`.`username` = :username");
  1916. $stmt->execute(array(':username' => $_data));
  1917. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  1918. while ($row = array_shift($rows)) {
  1919. if (!empty($row['alias_domain_alias'])) {
  1920. $data['fixed_sender_aliases'][] = $row['alias_domain_alias'];
  1921. }
  1922. }
  1923. // Return array $data['sender_acl_domains/addresses']['ro'] with read-only objects
  1924. // Return array $data['sender_acl_domains/addresses']['rw'] with read-write objects (can be deleted)
  1925. $stmt = $pdo->prepare("SELECT REPLACE(`send_as`, '@', '') AS `send_as` FROM `sender_acl` WHERE `logged_in_as` = :logged_in_as AND `send_as` LIKE '@%'");
  1926. $stmt->execute(array(':logged_in_as' => $_data));
  1927. $domain_rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  1928. while ($domain_row = array_shift($domain_rows)) {
  1929. if (is_valid_domain_name($domain_row['send_as']) && !hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain_row['send_as'])) {
  1930. $data['sender_acl_domains']['ro'][] = $domain_row['send_as'];
  1931. continue;
  1932. }
  1933. if (is_valid_domain_name($domain_row['send_as']) && hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain_row['send_as'])) {
  1934. $data['sender_acl_domains']['rw'][] = $domain_row['send_as'];
  1935. continue;
  1936. }
  1937. }
  1938. $stmt = $pdo->prepare("SELECT `send_as` FROM `sender_acl` WHERE `logged_in_as` = :logged_in_as AND `send_as` NOT LIKE '@%'");
  1939. $stmt->execute(array(':logged_in_as' => $_data));
  1940. $address_rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  1941. while ($address_row = array_shift($address_rows)) {
  1942. if (filter_var($address_row['send_as'], FILTER_VALIDATE_EMAIL) && !hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $address_row['send_as'])) {
  1943. $data['sender_acl_addresses']['ro'][] = $address_row['send_as'];
  1944. continue;
  1945. }
  1946. if (filter_var($address_row['send_as'], FILTER_VALIDATE_EMAIL) && hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $address_row['send_as'])) {
  1947. $data['sender_acl_addresses']['rw'][] = $address_row['send_as'];
  1948. continue;
  1949. }
  1950. }
  1951. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  1952. WHERE `domain` NOT IN (
  1953. SELECT REPLACE(`send_as`, '@', '') FROM `sender_acl`
  1954. WHERE `logged_in_as` = :logged_in_as
  1955. AND `send_as` LIKE '@%')");
  1956. $stmt->execute(array(
  1957. ':logged_in_as' => $_data,
  1958. ));
  1959. $rows_domain = $stmt->fetchAll(PDO::FETCH_ASSOC);
  1960. while ($row_domain = array_shift($rows_domain)) {
  1961. if (is_valid_domain_name($row_domain['domain']) && hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $row_domain['domain'])) {
  1962. $data['sender_acl_domains']['selectable'][] = $row_domain['domain'];
  1963. }
  1964. }
  1965. $stmt = $pdo->prepare("SELECT `address` FROM `alias`
  1966. WHERE `goto` != :goto
  1967. AND `address` NOT IN (
  1968. SELECT `send_as` FROM `sender_acl`
  1969. WHERE `logged_in_as` = :logged_in_as
  1970. AND `send_as` NOT LIKE '@%')");
  1971. $stmt->execute(array(
  1972. ':logged_in_as' => $_data,
  1973. ':goto' => $_data
  1974. ));
  1975. $rows_mbox = $stmt->fetchAll(PDO::FETCH_ASSOC);
  1976. while ($row = array_shift($rows_mbox)) {
  1977. if (filter_var($row['address'], FILTER_VALIDATE_EMAIL) && hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $row['address'])) {
  1978. $data['sender_acl_addresses']['selectable'][] = $row['address'];
  1979. }
  1980. }
  1981. }
  1982. catch(PDOException $e) {
  1983. $_SESSION['return'] = array(
  1984. 'type' => 'danger',
  1985. 'msg' => 'MySQL: '.$e
  1986. );
  1987. return false;
  1988. }
  1989. return $data;
  1990. break;
  1991. case 'mailboxes':
  1992. $mailboxes = array();
  1993. if (isset($_data) && !hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  1994. return false;
  1995. }
  1996. elseif (isset($_data) && hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  1997. try {
  1998. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox` WHERE `kind` NOT REGEXP 'location|thing|group' AND `domain` != 'ALL' AND `domain` = :domain");
  1999. $stmt->execute(array(
  2000. ':domain' => $_data,
  2001. ));
  2002. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2003. while($row = array_shift($rows)) {
  2004. $mailboxes[] = $row['username'];
  2005. }
  2006. }
  2007. catch (PDOException $e) {
  2008. $_SESSION['return'] = array(
  2009. 'type' => 'danger',
  2010. 'msg' => 'MySQL: '.$e
  2011. );
  2012. return false;
  2013. }
  2014. }
  2015. else {
  2016. try {
  2017. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox` WHERE `kind` NOT REGEXP 'location|thing|group' AND `domain` IN (SELECT `domain` FROM `domain_admins` WHERE `active` = '1' AND `username` = :username) OR 'admin' = :role");
  2018. $stmt->execute(array(
  2019. ':username' => $_SESSION['mailcow_cc_username'],
  2020. ':role' => $_SESSION['mailcow_cc_role'],
  2021. ));
  2022. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2023. while($row = array_shift($rows)) {
  2024. $mailboxes[] = $row['username'];
  2025. }
  2026. }
  2027. catch (PDOException $e) {
  2028. $_SESSION['return'] = array(
  2029. 'type' => 'danger',
  2030. 'msg' => 'MySQL: '.$e
  2031. );
  2032. return false;
  2033. }
  2034. }
  2035. return $mailboxes;
  2036. break;
  2037. case 'tls_policy':
  2038. $policydata = array();
  2039. if (isset($_data) && filter_var($_data, FILTER_VALIDATE_EMAIL)) {
  2040. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2041. return false;
  2042. }
  2043. }
  2044. else {
  2045. $_data = $_SESSION['mailcow_cc_username'];
  2046. }
  2047. try {
  2048. $stmt = $pdo->prepare("SELECT `tls_enforce_out`, `tls_enforce_in` FROM `mailbox` WHERE `username` = :username");
  2049. $stmt->execute(array(':username' => $_data));
  2050. $policydata = $stmt->fetch(PDO::FETCH_ASSOC);
  2051. }
  2052. catch(PDOException $e) {
  2053. $_SESSION['return'] = array(
  2054. 'type' => 'danger',
  2055. 'msg' => 'MySQL: '.$e
  2056. );
  2057. return false;
  2058. }
  2059. return $policydata;
  2060. break;
  2061. case 'syncjob_details':
  2062. $syncjobdetails = array();
  2063. if (!is_numeric($_data)) {
  2064. return false;
  2065. }
  2066. try {
  2067. $stmt = $pdo->prepare("SELECT *,
  2068. CONCAT(LEFT(`password1`, 3), '...') AS `password1_short`,
  2069. `active` AS `active_int`,
  2070. CASE `active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`
  2071. FROM `imapsync` WHERE id = :id");
  2072. $stmt->execute(array(':id' => $_data));
  2073. $syncjobdetails = $stmt->fetch(PDO::FETCH_ASSOC);
  2074. }
  2075. catch(PDOException $e) {
  2076. $_SESSION['return'] = array(
  2077. 'type' => 'danger',
  2078. 'msg' => 'MySQL: '.$e
  2079. );
  2080. }
  2081. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $syncjobdetails['user2'])) {
  2082. return false;
  2083. }
  2084. return $syncjobdetails;
  2085. break;
  2086. case 'syncjobs':
  2087. $syncjobdata = array();
  2088. if (isset($_data) && filter_var($_data, FILTER_VALIDATE_EMAIL)) {
  2089. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2090. return false;
  2091. }
  2092. }
  2093. else {
  2094. $_data = $_SESSION['mailcow_cc_username'];
  2095. }
  2096. try {
  2097. $stmt = $pdo->prepare("SELECT `id` FROM `imapsync` WHERE `user2` = :username");
  2098. $stmt->execute(array(':username' => $_data));
  2099. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2100. while($row = array_shift($rows)) {
  2101. $syncjobdata[] = $row['id'];
  2102. }
  2103. }
  2104. catch(PDOException $e) {
  2105. $_SESSION['return'] = array(
  2106. 'type' => 'danger',
  2107. 'msg' => 'MySQL: '.$e
  2108. );
  2109. }
  2110. return $syncjobdata;
  2111. break;
  2112. case 'spam_score':
  2113. $default = "5, 15";
  2114. $policydata = array();
  2115. if (isset($_data) && filter_var($_data, FILTER_VALIDATE_EMAIL)) {
  2116. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2117. return false;
  2118. }
  2119. }
  2120. else {
  2121. $_data = $_SESSION['mailcow_cc_username'];
  2122. }
  2123. try {
  2124. $stmt = $pdo->prepare("SELECT `value` FROM `filterconf` WHERE `object` = :username AND
  2125. (`option` = 'lowspamlevel' OR `option` = 'highspamlevel')");
  2126. $stmt->execute(array(':username' => $_data));
  2127. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  2128. }
  2129. catch(PDOException $e) {
  2130. $_SESSION['return'] = array(
  2131. 'type' => 'danger',
  2132. 'msg' => 'MySQL: '.$e
  2133. );
  2134. return false;
  2135. }
  2136. if (empty($num_results)) {
  2137. return $default;
  2138. }
  2139. else {
  2140. try {
  2141. $stmt = $pdo->prepare("SELECT `value` FROM `filterconf` WHERE `option` = 'highspamlevel' AND `object` = :username");
  2142. $stmt->execute(array(':username' => $_data));
  2143. $highspamlevel = $stmt->fetch(PDO::FETCH_ASSOC);
  2144. $stmt = $pdo->prepare("SELECT `value` FROM `filterconf` WHERE `option` = 'lowspamlevel' AND `object` = :username");
  2145. $stmt->execute(array(':username' => $_data));
  2146. $lowspamlevel = $stmt->fetch(PDO::FETCH_ASSOC);
  2147. return $lowspamlevel['value'].', '.$highspamlevel['value'];
  2148. }
  2149. catch(PDOException $e) {
  2150. $_SESSION['return'] = array(
  2151. 'type' => 'danger',
  2152. 'msg' => 'MySQL: '.$e
  2153. );
  2154. return false;
  2155. }
  2156. }
  2157. break;
  2158. case 'time_limited_aliases':
  2159. $tladata = array();
  2160. if (isset($_data) && filter_var($_data, FILTER_VALIDATE_EMAIL)) {
  2161. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2162. return false;
  2163. }
  2164. }
  2165. else {
  2166. $_data = $_SESSION['mailcow_cc_username'];
  2167. }
  2168. try {
  2169. $stmt = $pdo->prepare("SELECT `address`,
  2170. `goto`,
  2171. `validity`
  2172. FROM `spamalias`
  2173. WHERE `goto` = :username
  2174. AND `validity` >= :unixnow");
  2175. $stmt->execute(array(':username' => $_data, ':unixnow' => time()));
  2176. $tladata = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2177. }
  2178. catch(PDOException $e) {
  2179. $_SESSION['return'] = array(
  2180. 'type' => 'danger',
  2181. 'msg' => 'MySQL: '.$e
  2182. );
  2183. }
  2184. return $tladata;
  2185. break;
  2186. case 'delimiter_action':
  2187. $policydata = array();
  2188. if (isset($_data) && filter_var($_data, FILTER_VALIDATE_EMAIL)) {
  2189. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2190. return false;
  2191. }
  2192. }
  2193. else {
  2194. $_data = $_SESSION['mailcow_cc_username'];
  2195. }
  2196. try {
  2197. if ($redis->hGet('RCPT_WANTS_SUBJECT_TAG', $_data)) {
  2198. return "subject";
  2199. }
  2200. else {
  2201. return "subfolder";
  2202. }
  2203. }
  2204. catch (RedisException $e) {
  2205. $_SESSION['return'] = array(
  2206. 'type' => 'danger',
  2207. 'msg' => 'Redis: '.$e
  2208. );
  2209. return false;
  2210. }
  2211. break;
  2212. case 'resources':
  2213. $resources = array();
  2214. if (isset($_data) && !hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2215. return false;
  2216. }
  2217. elseif (isset($_data) && hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2218. try {
  2219. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox` WHERE `kind` REGEXP 'location|thing|group' AND `domain` != 'ALL' AND `domain` = :domain");
  2220. $stmt->execute(array(
  2221. ':domain' => $_data,
  2222. ));
  2223. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2224. while($row = array_shift($rows)) {
  2225. $resources[] = $row['username'];
  2226. }
  2227. }
  2228. catch (PDOException $e) {
  2229. $_SESSION['return'] = array(
  2230. 'type' => 'danger',
  2231. 'msg' => 'MySQL: '.$e
  2232. );
  2233. return false;
  2234. }
  2235. }
  2236. else {
  2237. try {
  2238. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox` WHERE `kind` REGEXP 'location|thing|group' AND `domain` IN (SELECT `domain` FROM `domain_admins` WHERE `active` = '1' AND `username` = :username) OR 'admin' = :role");
  2239. $stmt->execute(array(
  2240. ':username' => $_SESSION['mailcow_cc_username'],
  2241. ':role' => $_SESSION['mailcow_cc_role'],
  2242. ));
  2243. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2244. while($row = array_shift($rows)) {
  2245. $resources[] = $row['username'];
  2246. }
  2247. }
  2248. catch (PDOException $e) {
  2249. $_SESSION['return'] = array(
  2250. 'type' => 'danger',
  2251. 'msg' => 'MySQL: '.$e
  2252. );
  2253. return false;
  2254. }
  2255. }
  2256. return $resources;
  2257. break;
  2258. case 'alias_domains':
  2259. $aliasdomains = array();
  2260. if (isset($_data) && !hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2261. return false;
  2262. }
  2263. elseif (isset($_data) && hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2264. try {
  2265. $stmt = $pdo->prepare("SELECT `alias_domain` FROM `alias_domain` WHERE `target_domain` = :domain");
  2266. $stmt->execute(array(
  2267. ':domain' => $_data,
  2268. ));
  2269. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2270. while($row = array_shift($rows)) {
  2271. $aliasdomains[] = $row['alias_domain'];
  2272. }
  2273. }
  2274. catch (PDOException $e) {
  2275. $_SESSION['return'] = array(
  2276. 'type' => 'danger',
  2277. 'msg' => 'MySQL: '.$e
  2278. );
  2279. return false;
  2280. }
  2281. }
  2282. else {
  2283. try {
  2284. $stmt = $pdo->prepare("SELECT `alias_domain` FROM `alias_domain` WHERE `target_domain` IN (SELECT `domain` FROM `domain_admins` WHERE `active` = '1' AND `username` = :username) OR 'admin' = :role");
  2285. $stmt->execute(array(
  2286. ':username' => $_SESSION['mailcow_cc_username'],
  2287. ':role' => $_SESSION['mailcow_cc_role'],
  2288. ));
  2289. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2290. while($row = array_shift($rows)) {
  2291. $aliasdomains[] = $row['alias_domain'];
  2292. }
  2293. }
  2294. catch (PDOException $e) {
  2295. $_SESSION['return'] = array(
  2296. 'type' => 'danger',
  2297. 'msg' => 'MySQL: '.$e
  2298. );
  2299. return false;
  2300. }
  2301. }
  2302. return $aliasdomains;
  2303. break;
  2304. case 'aliases':
  2305. $aliases = array();
  2306. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2307. return false;
  2308. }
  2309. try {
  2310. $stmt = $pdo->prepare("SELECT `address` FROM `alias` WHERE `address` != `goto` AND `domain` = :domain");
  2311. $stmt->execute(array(
  2312. ':domain' => $_data,
  2313. ));
  2314. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2315. while($row = array_shift($rows)) {
  2316. $aliases[] = $row['address'];
  2317. }
  2318. }
  2319. catch (PDOException $e) {
  2320. $_SESSION['return'] = array(
  2321. 'type' => 'danger',
  2322. 'msg' => 'MySQL: '.$e
  2323. );
  2324. return false;
  2325. }
  2326. return $aliases;
  2327. break;
  2328. case 'domain_ratelimit':
  2329. $aliases = array();
  2330. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2331. return false;
  2332. }
  2333. try {
  2334. if (($rl_value = $redis->hGet('RL_VALUE', $_data)) && $redis->hGet('RL_OBJECT', $_data)) {
  2335. $rl = explode(' / 1', $rl_value);
  2336. $data['value'] = $rl[0];
  2337. $data['frame'] = $rl[1];
  2338. return $data;
  2339. }
  2340. else {
  2341. return false;
  2342. }
  2343. }
  2344. catch (RedisException $e) {
  2345. $_SESSION['return'] = array(
  2346. 'type' => 'danger',
  2347. 'msg' => 'Redis: '.$e
  2348. );
  2349. return false;
  2350. }
  2351. return false;
  2352. break;
  2353. case 'alias_details':
  2354. $aliasdata = array();
  2355. try {
  2356. $stmt = $pdo->prepare("SELECT
  2357. `domain`,
  2358. `goto`,
  2359. `address`,
  2360. `active` as `active_int`,
  2361. CASE `active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`,
  2362. `created`,
  2363. `modified`
  2364. FROM `alias`
  2365. WHERE `address` = :address AND `address` != `goto`");
  2366. $stmt->execute(array(
  2367. ':address' => $_data,
  2368. ));
  2369. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  2370. $stmt = $pdo->prepare("SELECT `target_domain` FROM `alias_domain` WHERE `alias_domain` = :domain");
  2371. $stmt->execute(array(
  2372. ':domain' => $row['domain'],
  2373. ));
  2374. $row_alias_domain = $stmt->fetch(PDO::FETCH_ASSOC);
  2375. if (isset($row_alias_domain['target_domain']) && !empty($row_alias_domain['target_domain'])) {
  2376. $aliasdata['in_primary_domain'] = $row_alias_domain['target_domain'];
  2377. }
  2378. else {
  2379. $aliasdata['in_primary_domain'] = "";
  2380. }
  2381. $aliasdata['domain'] = $row['domain'];
  2382. $aliasdata['goto'] = $row['goto'];
  2383. $aliasdata['address'] = $row['address'];
  2384. (!filter_var($aliasdata['address'], FILTER_VALIDATE_EMAIL)) ? $aliasdata['is_catch_all'] = 1 : $aliasdata['is_catch_all'] = 0;
  2385. $aliasdata['active'] = $row['active'];
  2386. $aliasdata['active_int'] = $row['active_int'];
  2387. $aliasdata['created'] = $row['created'];
  2388. $aliasdata['modified'] = $row['modified'];
  2389. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $aliasdata['domain'])) {
  2390. return false;
  2391. }
  2392. }
  2393. catch (PDOException $e) {
  2394. $_SESSION['return'] = array(
  2395. 'type' => 'danger',
  2396. 'msg' => 'MySQL: '.$e
  2397. );
  2398. return false;
  2399. }
  2400. return $aliasdata;
  2401. break;
  2402. case 'alias_domain_details':
  2403. $aliasdomaindata = array();
  2404. try {
  2405. $stmt = $pdo->prepare("SELECT
  2406. `alias_domain`,
  2407. `target_domain`,
  2408. `active` AS `active_int`,
  2409. CASE `active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`,
  2410. `created`,
  2411. `modified`
  2412. FROM `alias_domain`
  2413. WHERE `alias_domain` = :aliasdomain");
  2414. $stmt->execute(array(
  2415. ':aliasdomain' => $_data,
  2416. ));
  2417. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  2418. $aliasdomaindata['alias_domain'] = $row['alias_domain'];
  2419. $aliasdomaindata['target_domain'] = $row['target_domain'];
  2420. $aliasdomaindata['active'] = $row['active'];
  2421. $aliasdomaindata['active_int'] = $row['active_int'];
  2422. $aliasdomaindata['created'] = $row['created'];
  2423. $aliasdomaindata['modified'] = $row['modified'];
  2424. }
  2425. catch (PDOException $e) {
  2426. $_SESSION['return'] = array(
  2427. 'type' => 'danger',
  2428. 'msg' => 'MySQL: '.$e
  2429. );
  2430. return false;
  2431. }
  2432. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $aliasdomaindata['target_domain'])) {
  2433. return false;
  2434. }
  2435. return $aliasdomaindata;
  2436. break;
  2437. case 'domains':
  2438. $domains = array();
  2439. if ($_SESSION['mailcow_cc_role'] != "admin" && $_SESSION['mailcow_cc_role'] != "domainadmin") {
  2440. return false;
  2441. }
  2442. try {
  2443. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  2444. WHERE (`domain` IN (
  2445. SELECT `domain` from `domain_admins`
  2446. WHERE (`active`='1' AND `username` = :username))
  2447. )
  2448. OR ('admin'= :role)
  2449. AND `domain` != 'ALL'");
  2450. $stmt->execute(array(
  2451. ':username' => $_SESSION['mailcow_cc_username'],
  2452. ':role' => $_SESSION['mailcow_cc_role'],
  2453. ));
  2454. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2455. while($row = array_shift($rows)) {
  2456. $domains[] = $row['domain'];
  2457. }
  2458. }
  2459. catch (PDOException $e) {
  2460. $_SESSION['return'] = array(
  2461. 'type' => 'danger',
  2462. 'msg' => 'MySQL: '.$e
  2463. );
  2464. return false;
  2465. }
  2466. return $domains;
  2467. break;
  2468. case 'domain_details':
  2469. $domaindata = array();
  2470. $_data = idn_to_ascii(strtolower(trim($_data)));
  2471. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2472. return false;
  2473. }
  2474. try {
  2475. $stmt = $pdo->prepare("SELECT `target_domain` FROM `alias_domain` WHERE `alias_domain` = :domain");
  2476. $stmt->execute(array(
  2477. ':domain' => $_data
  2478. ));
  2479. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  2480. if (!empty($row)) {
  2481. $_data = $row['target_domain'];
  2482. }
  2483. $stmt = $pdo->prepare("SELECT
  2484. `domain`,
  2485. `description`,
  2486. `aliases`,
  2487. `mailboxes`,
  2488. `maxquota`,
  2489. `quota`,
  2490. `relayhost`,
  2491. `relay_all_recipients` as `relay_all_recipients_int`,
  2492. `backupmx` as `backupmx_int`,
  2493. `active` as `active_int`,
  2494. CASE `relay_all_recipients` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `relay_all_recipients`,
  2495. CASE `backupmx` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `backupmx`,
  2496. CASE `active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`
  2497. FROM `domain` WHERE `domain`= :domain");
  2498. $stmt->execute(array(
  2499. ':domain' => $_data
  2500. ));
  2501. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  2502. if (empty($row)) {
  2503. return false;
  2504. }
  2505. $stmt = $pdo->prepare("SELECT COUNT(*) AS `count`,
  2506. COALESCE(SUM(`quota`), 0) AS `in_use`
  2507. FROM `mailbox`
  2508. WHERE `kind` NOT REGEXP 'location|thing|group'
  2509. AND `domain` = :domain");
  2510. $stmt->execute(array(':domain' => $row['domain']));
  2511. $MailboxDataDomain = $stmt->fetch(PDO::FETCH_ASSOC);
  2512. $domaindata['max_new_mailbox_quota'] = ($row['quota'] * 1048576) - $MailboxDataDomain['in_use'];
  2513. if ($domaindata['max_new_mailbox_quota'] > ($row['maxquota'] * 1048576)) {
  2514. $domaindata['max_new_mailbox_quota'] = ($row['maxquota'] * 1048576);
  2515. }
  2516. $domaindata['quota_used_in_domain'] = $MailboxDataDomain['in_use'];
  2517. $domaindata['mboxes_in_domain'] = $MailboxDataDomain['count'];
  2518. $domaindata['mboxes_left'] = $row['mailboxes'] - $MailboxDataDomain['count'];
  2519. $domaindata['domain_name'] = $row['domain'];
  2520. $domaindata['description'] = $row['description'];
  2521. $domaindata['max_num_aliases_for_domain'] = $row['aliases'];
  2522. $domaindata['max_num_mboxes_for_domain'] = $row['mailboxes'];
  2523. $domaindata['max_quota_for_mbox'] = $row['maxquota'] * 1048576;
  2524. $domaindata['max_quota_for_domain'] = $row['quota'] * 1048576;
  2525. $domaindata['relayhost'] = $row['relayhost'];
  2526. $domaindata['backupmx'] = $row['backupmx'];
  2527. $domaindata['backupmx_int'] = $row['backupmx_int'];
  2528. $domaindata['active'] = $row['active'];
  2529. $domaindata['active_int'] = $row['active_int'];
  2530. $domaindata['relay_all_recipients'] = $row['relay_all_recipients'];
  2531. $domaindata['relay_all_recipients_int'] = $row['relay_all_recipients_int'];
  2532. $stmt = $pdo->prepare("SELECT COUNT(*) AS `alias_count` FROM `alias`
  2533. WHERE (`domain`= :domain OR `domain` IN (SELECT `alias_domain` FROM `alias_domain` WHERE `target_domain` = :domain2))
  2534. AND `address` NOT IN (
  2535. SELECT `username` FROM `mailbox`
  2536. )");
  2537. $stmt->execute(array(
  2538. ':domain' => $_data,
  2539. ':domain2' => $_data
  2540. ));
  2541. $AliasDataDomain = $stmt->fetch(PDO::FETCH_ASSOC);
  2542. (isset($AliasDataDomain['alias_count'])) ? $domaindata['aliases_in_domain'] = $AliasDataDomain['alias_count'] : $domaindata['aliases_in_domain'] = "0";
  2543. $domaindata['aliases_left'] = $row['aliases'] - $AliasDataDomain['alias_count'];
  2544. }
  2545. catch (PDOException $e) {
  2546. $_SESSION['return'] = array(
  2547. 'type' => 'danger',
  2548. 'msg' => 'MySQL: '.$e
  2549. );
  2550. return false;
  2551. }
  2552. return $domaindata;
  2553. break;
  2554. case 'mailbox_details':
  2555. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2556. return false;
  2557. }
  2558. $mailboxdata = array();
  2559. try {
  2560. $stmt = $pdo->prepare("SELECT
  2561. `domain`.`backupmx`,
  2562. `mailbox`.`username`,
  2563. `mailbox`.`name`,
  2564. `mailbox`.`active` AS `active_int`,
  2565. CASE `mailbox`.`active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`,
  2566. `mailbox`.`domain`,
  2567. `mailbox`.`quota`,
  2568. `quota2`.`bytes`,
  2569. `quota2`.`messages`
  2570. FROM `mailbox`, `quota2`, `domain`
  2571. WHERE `mailbox`.`kind` NOT REGEXP 'location|thing|group' AND `mailbox`.`username` = `quota2`.`username` AND `domain`.`domain` = `mailbox`.`domain` AND `mailbox`.`username` = :mailbox");
  2572. $stmt->execute(array(
  2573. ':mailbox' => $_data,
  2574. ));
  2575. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  2576. $stmt = $pdo->prepare("SELECT `maxquota`, `quota` FROM `domain` WHERE `domain` = :domain");
  2577. $stmt->execute(array(':domain' => $row['domain']));
  2578. $DomainQuota = $stmt->fetch(PDO::FETCH_ASSOC);
  2579. $stmt = $pdo->prepare("SELECT COALESCE(SUM(`quota`), 0) as `in_use` FROM `mailbox` WHERE `kind` NOT REGEXP 'location|thing|group' AND `domain` = :domain AND `username` != :username");
  2580. $stmt->execute(array(':domain' => $row['domain'], ':username' => $_data));
  2581. $MailboxUsage = $stmt->fetch(PDO::FETCH_ASSOC);
  2582. $stmt = $pdo->prepare("SELECT IFNULL(COUNT(`address`), 0) AS `sa_count` FROM `spamalias` WHERE `goto` = :address AND `validity` >= :unixnow");
  2583. $stmt->execute(array(':address' => $_data, ':unixnow' => time()));
  2584. $SpamaliasUsage = $stmt->fetch(PDO::FETCH_ASSOC);
  2585. $mailboxdata['max_new_quota'] = ($DomainQuota['quota'] * 1048576) - $MailboxUsage['in_use'];
  2586. if ($mailboxdata['max_new_quota'] > ($DomainQuota['maxquota'] * 1048576)) {
  2587. $mailboxdata['max_new_quota'] = ($DomainQuota['maxquota'] * 1048576);
  2588. }
  2589. $mailboxdata['username'] = $row['username'];
  2590. $mailboxdata['is_relayed'] = $row['backupmx'];
  2591. $mailboxdata['name'] = $row['name'];
  2592. $mailboxdata['active'] = $row['active'];
  2593. $mailboxdata['active_int'] = $row['active_int'];
  2594. $mailboxdata['domain'] = $row['domain'];
  2595. $mailboxdata['quota'] = $row['quota'];
  2596. $mailboxdata['quota_used'] = intval($row['bytes']);
  2597. $mailboxdata['percent_in_use'] = round((intval($row['bytes']) / intval($row['quota'])) * 100);
  2598. $mailboxdata['messages'] = $row['messages'];
  2599. $mailboxdata['spam_aliases'] = $SpamaliasUsage['sa_count'];
  2600. if ($mailboxdata['percent_in_use'] >= 90) {
  2601. $mailboxdata['percent_class'] = "danger";
  2602. }
  2603. elseif ($mailboxdata['percent_in_use'] >= 75) {
  2604. $mailboxdata['percent_class'] = "warning";
  2605. }
  2606. else {
  2607. $mailboxdata['percent_class'] = "success";
  2608. }
  2609. }
  2610. catch (PDOException $e) {
  2611. $_SESSION['return'] = array(
  2612. 'type' => 'danger',
  2613. 'msg' => 'MySQL: '.$e
  2614. );
  2615. return false;
  2616. }
  2617. return $mailboxdata;
  2618. break;
  2619. case 'resource_details':
  2620. $resourcedata = array();
  2621. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2622. return false;
  2623. }
  2624. try {
  2625. $stmt = $pdo->prepare("SELECT
  2626. `username`,
  2627. `name`,
  2628. `kind`,
  2629. `multiple_bookings` AS `multiple_bookings_int`,
  2630. `local_part`,
  2631. `active` AS `active_int`,
  2632. CASE `multiple_bookings` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `multiple_bookings`,
  2633. CASE `active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`,
  2634. `domain`
  2635. FROM `mailbox` WHERE `kind` REGEXP 'location|thing|group' AND `username` = :resource");
  2636. $stmt->execute(array(
  2637. ':resource' => $_data,
  2638. ));
  2639. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  2640. $resourcedata['name'] = $row['username'];
  2641. $resourcedata['kind'] = $row['kind'];
  2642. $resourcedata['multiple_bookings'] = $row['multiple_bookings'];
  2643. $resourcedata['multiple_bookings_int'] = $row['multiple_bookings_int'];
  2644. $resourcedata['description'] = $row['name'];
  2645. $resourcedata['active'] = $row['active'];
  2646. $resourcedata['active_int'] = $row['active_int'];
  2647. $resourcedata['domain'] = $row['domain'];
  2648. $resourcedata['local_part'] = $row['local_part'];
  2649. }
  2650. catch (PDOException $e) {
  2651. $_SESSION['return'] = array(
  2652. 'type' => 'danger',
  2653. 'msg' => 'MySQL: '.$e
  2654. );
  2655. return false;
  2656. }
  2657. if (!isset($resourcedata['domain']) ||
  2658. (isset($resourcedata['domain']) && !hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $resourcedata['domain']))) {
  2659. return false;
  2660. }
  2661. return $resourcedata;
  2662. break;
  2663. }
  2664. break;
  2665. case 'delete':
  2666. switch ($_type) {
  2667. case 'syncjob':
  2668. if (!is_array($_data['id'])) {
  2669. $ids = array();
  2670. $ids[] = $_data['id'];
  2671. }
  2672. else {
  2673. $ids = $_data['id'];
  2674. }
  2675. foreach ($ids as $id) {
  2676. if (!is_numeric($id)) {
  2677. $_SESSION['return'] = array(
  2678. 'type' => 'danger',
  2679. 'msg' => $id
  2680. );
  2681. return false;
  2682. }
  2683. try {
  2684. $stmt = $pdo->prepare("SELECT `user2` FROM `imapsync` WHERE id = :id");
  2685. $stmt->execute(array(':id' => $id));
  2686. $user2 = $stmt->fetch(PDO::FETCH_ASSOC)['user2'];
  2687. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $user2)) {
  2688. $_SESSION['return'] = array(
  2689. 'type' => 'danger',
  2690. 'msg' => sprintf($lang['danger']['access_denied'])
  2691. );
  2692. return false;
  2693. }
  2694. $stmt = $pdo->prepare("DELETE FROM `imapsync` WHERE `id`= :id");
  2695. $stmt->execute(array(':id' => $id));
  2696. }
  2697. catch (PDOException $e) {
  2698. $_SESSION['return'] = array(
  2699. 'type' => 'danger',
  2700. 'msg' => 'MySQL: '.$e
  2701. );
  2702. return false;
  2703. }
  2704. }
  2705. $_SESSION['return'] = array(
  2706. 'type' => 'success',
  2707. 'msg' => 'Deleted syncjob id/s ' . implode(', ', $ids)
  2708. );
  2709. return true;
  2710. break;
  2711. case 'time_limited_alias':
  2712. if (!is_array($_data['address'])) {
  2713. $addresses = array();
  2714. $addresses[] = $_data['address'];
  2715. }
  2716. else {
  2717. $addresses = $_data['address'];
  2718. }
  2719. foreach ($addresses as $address) {
  2720. try {
  2721. $stmt = $pdo->prepare("SELECT `goto` FROM `spamalias` WHERE `address` = :address");
  2722. $stmt->execute(array(':address' => $address));
  2723. $goto = $stmt->fetch(PDO::FETCH_ASSOC)['goto'];
  2724. }
  2725. catch (PDOException $e) {
  2726. $_SESSION['return'] = array(
  2727. 'type' => 'danger',
  2728. 'msg' => 'MySQL: '.$e
  2729. );
  2730. return false;
  2731. }
  2732. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $goto)) {
  2733. $_SESSION['return'] = array(
  2734. 'type' => 'danger',
  2735. 'msg' => sprintf($lang['danger']['access_denied'])
  2736. );
  2737. return false;
  2738. }
  2739. try {
  2740. $stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `goto` = :username AND `address` = :item");
  2741. $stmt->execute(array(
  2742. ':username' => $goto,
  2743. ':item' => $address
  2744. ));
  2745. }
  2746. catch (PDOException $e) {
  2747. $_SESSION['return'] = array(
  2748. 'type' => 'danger',
  2749. 'msg' => 'MySQL: '.$e
  2750. );
  2751. return false;
  2752. }
  2753. }
  2754. $_SESSION['return'] = array(
  2755. 'type' => 'success',
  2756. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($usernames))
  2757. );
  2758. break;
  2759. case 'eas_cache':
  2760. if (!is_array($_data['username'])) {
  2761. $usernames = array();
  2762. $usernames[] = $_data['username'];
  2763. }
  2764. else {
  2765. $usernames = $_data['username'];
  2766. }
  2767. foreach ($usernames as $username) {
  2768. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $username)) {
  2769. $_SESSION['return'] = array(
  2770. 'type' => 'danger',
  2771. 'msg' => sprintf($lang['danger']['access_denied'])
  2772. );
  2773. return false;
  2774. }
  2775. try {
  2776. $stmt = $pdo->prepare("DELETE FROM `sogo_cache_folder` WHERE `c_uid` = :username");
  2777. $stmt->execute(array(
  2778. ':username' => $username
  2779. ));
  2780. }
  2781. catch (PDOException $e) {
  2782. $_SESSION['return'] = array(
  2783. 'type' => 'danger',
  2784. 'msg' => 'MySQL: '.$e
  2785. );
  2786. return false;
  2787. }
  2788. }
  2789. $_SESSION['return'] = array(
  2790. 'type' => 'success',
  2791. 'msg' => sprintf($lang['success']['eas_reset'], htmlspecialchars(implode(', ', $usernames)))
  2792. );
  2793. break;
  2794. case 'domain':
  2795. if (!is_array($_data['domain'])) {
  2796. $domains = array();
  2797. $domains[] = $_data['domain'];
  2798. }
  2799. else {
  2800. $domains = $_data['domain'];
  2801. }
  2802. if ($_SESSION['mailcow_cc_role'] != "admin") {
  2803. $_SESSION['return'] = array(
  2804. 'type' => 'danger',
  2805. 'msg' => sprintf($lang['danger']['access_denied'])
  2806. );
  2807. return false;
  2808. }
  2809. foreach ($domains as $domain) {
  2810. if (!is_valid_domain_name($domain)) {
  2811. $_SESSION['return'] = array(
  2812. 'type' => 'danger',
  2813. 'msg' => sprintf($lang['danger']['domain_invalid'])
  2814. );
  2815. return false;
  2816. }
  2817. $domain = idn_to_ascii(strtolower(trim($domain)));
  2818. try {
  2819. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox`
  2820. WHERE `domain` = :domain");
  2821. $stmt->execute(array(':domain' => $domain));
  2822. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  2823. }
  2824. catch(PDOException $e) {
  2825. $_SESSION['return'] = array(
  2826. 'type' => 'danger',
  2827. 'msg' => 'MySQL: '.$e
  2828. );
  2829. return false;
  2830. }
  2831. if ($num_results != 0 || !empty($num_results)) {
  2832. $_SESSION['return'] = array(
  2833. 'type' => 'danger',
  2834. 'msg' => sprintf($lang['danger']['domain_not_empty'])
  2835. );
  2836. return false;
  2837. }
  2838. try {
  2839. $stmt = $pdo->prepare("DELETE FROM `domain` WHERE `domain` = :domain");
  2840. $stmt->execute(array(
  2841. ':domain' => $domain,
  2842. ));
  2843. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `domain` = :domain");
  2844. $stmt->execute(array(
  2845. ':domain' => $domain,
  2846. ));
  2847. $stmt = $pdo->prepare("DELETE FROM `alias` WHERE `domain` = :domain");
  2848. $stmt->execute(array(
  2849. ':domain' => $domain,
  2850. ));
  2851. $stmt = $pdo->prepare("DELETE FROM `alias_domain` WHERE `target_domain` = :domain");
  2852. $stmt->execute(array(
  2853. ':domain' => $domain,
  2854. ));
  2855. $stmt = $pdo->prepare("DELETE FROM `mailbox` WHERE `domain` = :domain");
  2856. $stmt->execute(array(
  2857. ':domain' => $domain,
  2858. ));
  2859. $stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` LIKE :domain");
  2860. $stmt->execute(array(
  2861. ':domain' => '%@'.$domain,
  2862. ));
  2863. $stmt = $pdo->prepare("DELETE FROM `quota2` WHERE `username` = :domain");
  2864. $stmt->execute(array(
  2865. ':domain' => '%@'.$domain,
  2866. ));
  2867. $stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `address` = :domain");
  2868. $stmt->execute(array(
  2869. ':domain' => '%@'.$domain,
  2870. ));
  2871. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :domain");
  2872. $stmt->execute(array(
  2873. ':domain' => '%@'.$domain,
  2874. ));
  2875. }
  2876. catch (PDOException $e) {
  2877. $_SESSION['return'] = array(
  2878. 'type' => 'danger',
  2879. 'msg' => 'MySQL: '.$e
  2880. );
  2881. return false;
  2882. }
  2883. try {
  2884. $redis->hDel('DOMAIN_MAP', $domain);
  2885. }
  2886. catch (RedisException $e) {
  2887. $_SESSION['return'] = array(
  2888. 'type' => 'danger',
  2889. 'msg' => 'Redis: '.$e
  2890. );
  2891. return false;
  2892. }
  2893. }
  2894. $_SESSION['return'] = array(
  2895. 'type' => 'success',
  2896. 'msg' => sprintf($lang['success']['domain_removed'], htmlspecialchars(implode(', ', $domains)))
  2897. );
  2898. return true;
  2899. break;
  2900. case 'alias':
  2901. if (!is_array($_data['address'])) {
  2902. $addresses = array();
  2903. $addresses[] = $_data['address'];
  2904. }
  2905. else {
  2906. $addresses = $_data['address'];
  2907. }
  2908. foreach ($addresses as $address) {
  2909. $local_part = strstr($address, '@', true);
  2910. $domain = mailbox('get', 'alias_details', $address)['domain'];
  2911. try {
  2912. $stmt = $pdo->prepare("SELECT `goto` FROM `alias` WHERE `address` = :address");
  2913. $stmt->execute(array(':address' => $address));
  2914. $gotos = $stmt->fetch(PDO::FETCH_ASSOC);
  2915. }
  2916. catch(PDOException $e) {
  2917. $_SESSION['return'] = array(
  2918. 'type' => 'danger',
  2919. 'msg' => 'MySQL: '.$e
  2920. );
  2921. return false;
  2922. }
  2923. $goto_array = explode(',', $gotos['goto']);
  2924. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  2925. $_SESSION['return'] = array(
  2926. 'type' => 'danger',
  2927. 'msg' => sprintf($lang['danger']['access_denied'])
  2928. );
  2929. return false;
  2930. }
  2931. try {
  2932. $stmt = $pdo->prepare("DELETE FROM `alias` WHERE `address` = :address AND `address` NOT IN (SELECT `username` FROM `mailbox`)");
  2933. $stmt->execute(array(
  2934. ':address' => $address
  2935. ));
  2936. }
  2937. catch (PDOException $e) {
  2938. $_SESSION['return'] = array(
  2939. 'type' => 'danger',
  2940. 'msg' => 'MySQL: '.$e
  2941. );
  2942. return false;
  2943. }
  2944. }
  2945. $_SESSION['return'] = array(
  2946. 'type' => 'success',
  2947. 'msg' => sprintf($lang['success']['alias_removed'], htmlspecialchars(implode(', ', $addresses)))
  2948. );
  2949. break;
  2950. case 'alias_domain':
  2951. if (!is_array($_data['alias_domain'])) {
  2952. $alias_domains = array();
  2953. $alias_domains[] = $_data['alias_domain'];
  2954. }
  2955. else {
  2956. $alias_domains = $_data['alias_domain'];
  2957. }
  2958. foreach ($alias_domains as $alias_domain) {
  2959. if (!is_valid_domain_name($alias_domain)) {
  2960. $_SESSION['return'] = array(
  2961. 'type' => 'danger',
  2962. 'msg' => sprintf($lang['danger']['domain_invalid'])
  2963. );
  2964. return false;
  2965. }
  2966. try {
  2967. $stmt = $pdo->prepare("SELECT `target_domain` FROM `alias_domain`
  2968. WHERE `alias_domain`= :alias_domain");
  2969. $stmt->execute(array(':alias_domain' => $alias_domain));
  2970. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  2971. }
  2972. catch(PDOException $e) {
  2973. $_SESSION['return'] = array(
  2974. 'type' => 'danger',
  2975. 'msg' => 'MySQL: '.$e
  2976. );
  2977. return false;
  2978. }
  2979. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $DomainData['target_domain'])) {
  2980. $_SESSION['return'] = array(
  2981. 'type' => 'danger',
  2982. 'msg' => sprintf($lang['danger']['access_denied'])
  2983. );
  2984. return false;
  2985. }
  2986. try {
  2987. $stmt = $pdo->prepare("DELETE FROM `alias_domain` WHERE `alias_domain` = :alias_domain");
  2988. $stmt->execute(array(
  2989. ':alias_domain' => $alias_domain,
  2990. ));
  2991. $stmt = $pdo->prepare("DELETE FROM `alias` WHERE `domain` = :alias_domain");
  2992. $stmt->execute(array(
  2993. ':alias_domain' => $alias_domain,
  2994. ));
  2995. }
  2996. catch (PDOException $e) {
  2997. $_SESSION['return'] = array(
  2998. 'type' => 'danger',
  2999. 'msg' => 'MySQL: '.$e
  3000. );
  3001. return false;
  3002. }
  3003. }
  3004. $_SESSION['return'] = array(
  3005. 'type' => 'success',
  3006. 'msg' => sprintf($lang['success']['alias_domain_removed'], htmlspecialchars(implode(', ', $alias_domains)))
  3007. );
  3008. break;
  3009. case 'mailbox':
  3010. if (!is_array($_data['username'])) {
  3011. $usernames = array();
  3012. $usernames[] = $_data['username'];
  3013. }
  3014. else {
  3015. $usernames = $_data['username'];
  3016. }
  3017. foreach ($usernames as $username) {
  3018. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  3019. $_SESSION['return'] = array(
  3020. 'type' => 'danger',
  3021. 'msg' => sprintf($lang['danger']['access_denied'])
  3022. );
  3023. return false;
  3024. }
  3025. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $username)) {
  3026. $_SESSION['return'] = array(
  3027. 'type' => 'danger',
  3028. 'msg' => sprintf($lang['danger']['access_denied'])
  3029. );
  3030. return false;
  3031. }
  3032. try {
  3033. $stmt = $pdo->prepare("DELETE FROM `alias` WHERE `goto` = :username");
  3034. $stmt->execute(array(
  3035. ':username' => $username
  3036. ));
  3037. $stmt = $pdo->prepare("DELETE FROM `quota2` WHERE `username` = :username");
  3038. $stmt->execute(array(
  3039. ':username' => $username
  3040. ));
  3041. $stmt = $pdo->prepare("DELETE FROM `mailbox` WHERE `username` = :username");
  3042. $stmt->execute(array(
  3043. ':username' => $username
  3044. ));
  3045. $stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` = :username");
  3046. $stmt->execute(array(
  3047. ':username' => $username
  3048. ));
  3049. $stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `goto` = :username");
  3050. $stmt->execute(array(
  3051. ':username' => $username
  3052. ));
  3053. $stmt = $pdo->prepare("DELETE FROM `imapsync` WHERE `user2` = :username");
  3054. $stmt->execute(array(
  3055. ':username' => $username
  3056. ));
  3057. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :username");
  3058. $stmt->execute(array(
  3059. ':username' => $username
  3060. ));
  3061. $stmt = $pdo->prepare("DELETE FROM `sogo_user_profile` WHERE `c_uid` = :username");
  3062. $stmt->execute(array(
  3063. ':username' => $username
  3064. ));
  3065. $stmt = $pdo->prepare("DELETE FROM `sogo_cache_folder` WHERE `c_uid` = :username");
  3066. $stmt->execute(array(
  3067. ':username' => $username
  3068. ));
  3069. $stmt = $pdo->prepare("DELETE FROM `sogo_acl` WHERE `c_object` LIKE '%/" . $username . "/%' OR `c_uid` = :username");
  3070. $stmt->execute(array(
  3071. ':username' => $username
  3072. ));
  3073. $stmt = $pdo->prepare("DELETE FROM `sogo_store` WHERE `c_folder_id` IN (SELECT `c_folder_id` FROM `sogo_folder_info` WHERE `c_path2` = :username)");
  3074. $stmt->execute(array(
  3075. ':username' => $username
  3076. ));
  3077. $stmt = $pdo->prepare("DELETE FROM `sogo_quick_contact` WHERE `c_folder_id` IN (SELECT `c_folder_id` FROM `sogo_folder_info` WHERE `c_path2` = :username)");
  3078. $stmt->execute(array(
  3079. ':username' => $username
  3080. ));
  3081. $stmt = $pdo->prepare("DELETE FROM `sogo_quick_appointment` WHERE `c_folder_id` IN (SELECT `c_folder_id` FROM `sogo_folder_info` WHERE `c_path2` = :username)");
  3082. $stmt->execute(array(
  3083. ':username' => $username
  3084. ));
  3085. $stmt = $pdo->prepare("DELETE FROM `sogo_folder_info` WHERE `c_path2` = :username");
  3086. $stmt->execute(array(
  3087. ':username' => $username
  3088. ));
  3089. $stmt = $pdo->prepare("SELECT `address`, `goto` FROM `alias`
  3090. WHERE `goto` REGEXP :username");
  3091. $stmt->execute(array(':username' => '(^|,)'.$username.'($|,)'));
  3092. $GotoData = $stmt->fetchAll(PDO::FETCH_ASSOC);
  3093. foreach ($GotoData as $gotos) {
  3094. $goto_exploded = explode(',', $gotos['goto']);
  3095. if (($key = array_search($username, $goto_exploded)) !== false) {
  3096. unset($goto_exploded[$key]);
  3097. }
  3098. $gotos_rebuild = implode(',', $goto_exploded);
  3099. $stmt = $pdo->prepare("UPDATE `alias` SET
  3100. `goto` = :goto
  3101. WHERE `address` = :address");
  3102. $stmt->execute(array(
  3103. ':goto' => $gotos_rebuild,
  3104. ':address' => $gotos['address']
  3105. ));
  3106. }
  3107. }
  3108. catch (PDOException $e) {
  3109. $_SESSION['return'] = array(
  3110. 'type' => 'danger',
  3111. 'msg' => 'MySQL: '.$e
  3112. );
  3113. return false;
  3114. }
  3115. }
  3116. $_SESSION['return'] = array(
  3117. 'type' => 'success',
  3118. 'msg' => sprintf($lang['success']['mailbox_removed'], htmlspecialchars(implode(', ', $usernames)))
  3119. );
  3120. break;
  3121. case 'resource':
  3122. if (!is_array($_data['name'])) {
  3123. $names = array();
  3124. $names[] = $_data['name'];
  3125. }
  3126. else {
  3127. $names = $_data['name'];
  3128. }
  3129. foreach ($names as $name) {
  3130. if (!filter_var($name, FILTER_VALIDATE_EMAIL)) {
  3131. $_SESSION['return'] = array(
  3132. 'type' => 'danger',
  3133. 'msg' => sprintf($lang['danger']['access_denied'])
  3134. );
  3135. return false;
  3136. }
  3137. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $name)) {
  3138. $_SESSION['return'] = array(
  3139. 'type' => 'danger',
  3140. 'msg' => sprintf($lang['danger']['access_denied'])
  3141. );
  3142. return false;
  3143. }
  3144. try {
  3145. $stmt = $pdo->prepare("DELETE FROM `mailbox` WHERE `username` = :username");
  3146. $stmt->execute(array(
  3147. ':username' => $name
  3148. ));
  3149. $stmt = $pdo->prepare("DELETE FROM `sogo_user_profile` WHERE `c_uid` = :username");
  3150. $stmt->execute(array(
  3151. ':username' => $name
  3152. ));
  3153. $stmt = $pdo->prepare("DELETE FROM `sogo_cache_folder` WHERE `c_uid` = :username");
  3154. $stmt->execute(array(
  3155. ':username' => $name
  3156. ));
  3157. $stmt = $pdo->prepare("DELETE FROM `sogo_acl` WHERE `c_object` LIKE '%/" . $name . "/%' OR `c_uid` = :username");
  3158. $stmt->execute(array(
  3159. ':username' => $name
  3160. ));
  3161. $stmt = $pdo->prepare("DELETE FROM `sogo_store` WHERE `c_folder_id` IN (SELECT `c_folder_id` FROM `sogo_folder_info` WHERE `c_path2` = :username)");
  3162. $stmt->execute(array(
  3163. ':username' => $name
  3164. ));
  3165. $stmt = $pdo->prepare("DELETE FROM `sogo_quick_contact` WHERE `c_folder_id` IN (SELECT `c_folder_id` FROM `sogo_folder_info` WHERE `c_path2` = :username)");
  3166. $stmt->execute(array(
  3167. ':username' => $name
  3168. ));
  3169. $stmt = $pdo->prepare("DELETE FROM `sogo_quick_appointment` WHERE `c_folder_id` IN (SELECT `c_folder_id` FROM `sogo_folder_info` WHERE `c_path2` = :username)");
  3170. $stmt->execute(array(
  3171. ':username' => $name
  3172. ));
  3173. $stmt = $pdo->prepare("DELETE FROM `sogo_folder_info` WHERE `c_path2` = :username");
  3174. $stmt->execute(array(
  3175. ':username' => $name
  3176. ));
  3177. }
  3178. catch (PDOException $e) {
  3179. $_SESSION['return'] = array(
  3180. 'type' => 'danger',
  3181. 'msg' => 'MySQL: '.$e
  3182. );
  3183. return false;
  3184. }
  3185. }
  3186. $_SESSION['return'] = array(
  3187. 'type' => 'success',
  3188. 'msg' => sprintf($lang['success']['resource_removed'], htmlspecialchars(implode(', ', $names)))
  3189. );
  3190. break;
  3191. }
  3192. break;
  3193. }
  3194. }