functions.domain_admin.inc.php 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545
  1. <?php
  2. function domain_admin($_action, $_data = null) {
  3. global $pdo;
  4. global $lang;
  5. $_data_log = $_data;
  6. !isset($_data_log['password']) ?: $_data_log['password'] = '*';
  7. !isset($_data_log['password2']) ?: $_data_log['password2'] = '*';
  8. switch ($_action) {
  9. case 'add':
  10. $username = strtolower(trim($_data['username']));
  11. $password = $_data['password'];
  12. $password2 = $_data['password2'];
  13. $domains = (array)$_data['domains'];
  14. $active = intval($_data['active']);
  15. if ($_SESSION['mailcow_cc_role'] != "admin") {
  16. $_SESSION['return'] = array(
  17. 'type' => 'danger',
  18. 'log' => array(__FUNCTION__, $_action, $_data_log),
  19. 'msg' => 'access_denied'
  20. );
  21. return false;
  22. }
  23. if (empty($domains)) {
  24. $_SESSION['return'] = array(
  25. 'type' => 'danger',
  26. 'log' => array(__FUNCTION__, $_action, $_data_log),
  27. 'msg' => 'domain_invalid'
  28. );
  29. return false;
  30. }
  31. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username)) || empty ($username)) {
  32. $_SESSION['return'] = array(
  33. 'type' => 'danger',
  34. 'log' => array(__FUNCTION__, $_action, $_data_log),
  35. 'msg' => 'username_invalid'
  36. );
  37. return false;
  38. }
  39. try {
  40. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox`
  41. WHERE `username` = :username");
  42. $stmt->execute(array(':username' => $username));
  43. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  44. $stmt = $pdo->prepare("SELECT `username` FROM `admin`
  45. WHERE `username` = :username");
  46. $stmt->execute(array(':username' => $username));
  47. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  48. $stmt = $pdo->prepare("SELECT `username` FROM `domain_admins`
  49. WHERE `username` = :username");
  50. $stmt->execute(array(':username' => $username));
  51. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  52. }
  53. catch(PDOException $e) {
  54. $_SESSION['return'] = array(
  55. 'type' => 'danger',
  56. 'log' => array(__FUNCTION__, $_action, $_data_log),
  57. 'msg' => array('mysql_error', $e)
  58. );
  59. return false;
  60. }
  61. foreach ($num_results as $num_results_each) {
  62. if ($num_results_each != 0) {
  63. $_SESSION['return'] = array(
  64. 'type' => 'danger',
  65. 'log' => array(__FUNCTION__, $_action, $_data_log),
  66. 'msg' => array('object_exists', htmlspecialchars($username))
  67. );
  68. return false;
  69. }
  70. }
  71. if (!empty($password) && !empty($password2)) {
  72. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) {
  73. $_SESSION['return'] = array(
  74. 'type' => 'danger',
  75. 'log' => array(__FUNCTION__, $_action, $_data_log),
  76. 'msg' => 'password_complexity'
  77. );
  78. return false;
  79. }
  80. if ($password != $password2) {
  81. $_SESSION['return'] = array(
  82. 'type' => 'danger',
  83. 'log' => array(__FUNCTION__, $_action, $_data_log),
  84. 'msg' => 'password_mismatch'
  85. );
  86. return false;
  87. }
  88. $password_hashed = hash_password($password);
  89. foreach ($domains as $domain) {
  90. if (!is_valid_domain_name($domain)) {
  91. $_SESSION['return'] = array(
  92. 'type' => 'danger',
  93. 'log' => array(__FUNCTION__, $_action, $_data_log),
  94. 'msg' => 'domain_invalid'
  95. );
  96. return false;
  97. }
  98. try {
  99. $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
  100. VALUES (:username, :domain, :created, :active)");
  101. $stmt->execute(array(
  102. ':username' => $username,
  103. ':domain' => $domain,
  104. ':created' => date('Y-m-d H:i:s'),
  105. ':active' => $active
  106. ));
  107. }
  108. catch (PDOException $e) {
  109. domain_admin('delete', $username);
  110. $_SESSION['return'] = array(
  111. 'type' => 'danger',
  112. 'log' => array(__FUNCTION__, $_action, $_data_log),
  113. 'msg' => array('mysql_error', $e)
  114. );
  115. return false;
  116. }
  117. }
  118. try {
  119. $stmt = $pdo->prepare("INSERT INTO `admin` (`username`, `password`, `superadmin`, `active`)
  120. VALUES (:username, :password_hashed, '0', :active)");
  121. $stmt->execute(array(
  122. ':username' => $username,
  123. ':password_hashed' => $password_hashed,
  124. ':active' => $active
  125. ));
  126. }
  127. catch (PDOException $e) {
  128. $_SESSION['return'] = array(
  129. 'type' => 'danger',
  130. 'log' => array(__FUNCTION__, $_action, $_data_log),
  131. 'msg' => array('mysql_error', $e)
  132. );
  133. return false;
  134. }
  135. }
  136. else {
  137. $_SESSION['return'] = array(
  138. 'type' => 'danger',
  139. 'log' => array(__FUNCTION__, $_action, $_data_log),
  140. 'msg' => 'password_empty'
  141. );
  142. return false;
  143. }
  144. $_SESSION['return'] = array(
  145. 'type' => 'success',
  146. 'log' => array(__FUNCTION__, $_action, $_data_log),
  147. 'msg' => array('domain_admin_added', htmlspecialchars($username))
  148. );
  149. break;
  150. case 'edit':
  151. if ($_SESSION['mailcow_cc_role'] != "admin" && $_SESSION['mailcow_cc_role'] != "domainadmin") {
  152. $_SESSION['return'] = array(
  153. 'type' => 'danger',
  154. 'log' => array(__FUNCTION__, $_action, $_data_log),
  155. 'msg' => 'access_denied'
  156. );
  157. return false;
  158. }
  159. // Administrator
  160. if ($_SESSION['mailcow_cc_role'] == "admin") {
  161. if (!is_array($_data['username'])) {
  162. $usernames = array();
  163. $usernames[] = $_data['username'];
  164. }
  165. else {
  166. $usernames = $_data['username'];
  167. }
  168. foreach ($usernames as $username) {
  169. $is_now = domain_admin('details', $username);
  170. $domains = (isset($_data['domains'])) ? (array)$_data['domains'] : null;
  171. if (!empty($is_now)) {
  172. $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active_int'];
  173. $domains = (!empty($domains)) ? $domains : $is_now['selected_domains'];
  174. $username_new = (!empty($_data['username_new'])) ? $_data['username_new'] : $is_now['username'];
  175. }
  176. else {
  177. $_SESSION['return'] = array(
  178. 'type' => 'danger',
  179. 'log' => array(__FUNCTION__, $_action, $_data_log),
  180. 'msg' => 'access_denied'
  181. );
  182. return false;
  183. }
  184. $password = $_data['password'];
  185. $password2 = $_data['password2'];
  186. if (!empty($domains)) {
  187. foreach ($domains as $domain) {
  188. if (!is_valid_domain_name($domain)) {
  189. $_SESSION['return'] = array(
  190. 'type' => 'danger',
  191. 'log' => array(__FUNCTION__, $_action, $_data_log),
  192. 'msg' => 'domain_invalid'
  193. );
  194. return false;
  195. }
  196. }
  197. }
  198. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username_new))) {
  199. $_SESSION['return'] = array(
  200. 'type' => 'danger',
  201. 'log' => array(__FUNCTION__, $_action, $_data_log),
  202. 'msg' => 'username_invalid'
  203. );
  204. return false;
  205. }
  206. if ($username_new != $username) {
  207. if (!empty(domain_admin('details', $username_new)['username'])) {
  208. $_SESSION['return'] = array(
  209. 'type' => 'danger',
  210. 'log' => array(__FUNCTION__, $_action, $_data_log),
  211. 'msg' => 'username_invalid'
  212. );
  213. return false;
  214. }
  215. }
  216. try {
  217. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
  218. $stmt->execute(array(
  219. ':username' => $username,
  220. ));
  221. }
  222. catch (PDOException $e) {
  223. $_SESSION['return'] = array(
  224. 'type' => 'danger',
  225. 'log' => array(__FUNCTION__, $_action, $_data_log),
  226. 'msg' => array('mysql_error', $e)
  227. );
  228. return false;
  229. }
  230. if (!empty($domains)) {
  231. foreach ($domains as $domain) {
  232. try {
  233. $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
  234. VALUES (:username_new, :domain, :created, :active)");
  235. $stmt->execute(array(
  236. ':username_new' => $username_new,
  237. ':domain' => $domain,
  238. ':created' => date('Y-m-d H:i:s'),
  239. ':active' => $active
  240. ));
  241. }
  242. catch (PDOException $e) {
  243. $_SESSION['return'] = array(
  244. 'type' => 'danger',
  245. 'log' => array(__FUNCTION__, $_action, $_data_log),
  246. 'msg' => array('mysql_error', $e)
  247. );
  248. return false;
  249. }
  250. }
  251. }
  252. if (!empty($password) && !empty($password2)) {
  253. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) {
  254. $_SESSION['return'] = array(
  255. 'type' => 'danger',
  256. 'log' => array(__FUNCTION__, $_action, $_data_log),
  257. 'msg' => 'password_complexity'
  258. );
  259. return false;
  260. }
  261. if ($password != $password2) {
  262. $_SESSION['return'] = array(
  263. 'type' => 'danger',
  264. 'log' => array(__FUNCTION__, $_action, $_data_log),
  265. 'msg' => 'password_mismatch'
  266. );
  267. return false;
  268. }
  269. $password_hashed = hash_password($password);
  270. try {
  271. $stmt = $pdo->prepare("UPDATE `admin` SET `username` = :username_new, `active` = :active, `password` = :password_hashed WHERE `username` = :username");
  272. $stmt->execute(array(
  273. ':password_hashed' => $password_hashed,
  274. ':username_new' => $username_new,
  275. ':username' => $username,
  276. ':active' => $active
  277. ));
  278. if (isset($_data['disable_tfa'])) {
  279. $stmt = $pdo->prepare("UPDATE `tfa` SET `active` = '0' WHERE `username` = :username");
  280. $stmt->execute(array(':username' => $username));
  281. }
  282. else {
  283. $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username_new WHERE `username` = :username");
  284. $stmt->execute(array(':username_new' => $username_new, ':username' => $username));
  285. }
  286. }
  287. catch (PDOException $e) {
  288. $_SESSION['return'] = array(
  289. 'type' => 'danger',
  290. 'log' => array(__FUNCTION__, $_action, $_data_log),
  291. 'msg' => array('mysql_error', $e)
  292. );
  293. return false;
  294. }
  295. }
  296. else {
  297. try {
  298. $stmt = $pdo->prepare("UPDATE `admin` SET `username` = :username_new, `active` = :active WHERE `username` = :username");
  299. $stmt->execute(array(
  300. ':username_new' => $username_new,
  301. ':username' => $username,
  302. ':active' => $active
  303. ));
  304. if (isset($_data['disable_tfa'])) {
  305. $stmt = $pdo->prepare("UPDATE `tfa` SET `active` = '0' WHERE `username` = :username");
  306. $stmt->execute(array(':username' => $username));
  307. }
  308. else {
  309. $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username_new WHERE `username` = :username");
  310. $stmt->execute(array(':username_new' => $username_new, ':username' => $username));
  311. }
  312. }
  313. catch (PDOException $e) {
  314. $_SESSION['return'] = array(
  315. 'type' => 'danger',
  316. 'log' => array(__FUNCTION__, $_action, $_data_log),
  317. 'msg' => array('mysql_error', $e)
  318. );
  319. return false;
  320. }
  321. }
  322. }
  323. $_SESSION['return'] = array(
  324. 'type' => 'success',
  325. 'log' => array(__FUNCTION__, $_action, $_data_log),
  326. 'msg' => array('domain_admin_modified', htmlspecialchars(implode(', ', $usernames)))
  327. );
  328. }
  329. // Domain administrator
  330. // Can only edit itself
  331. elseif ($_SESSION['mailcow_cc_role'] == "domainadmin") {
  332. $username = $_SESSION['mailcow_cc_username'];
  333. $password_old = $_data['user_old_pass'];
  334. $password_new = $_data['user_new_pass'];
  335. $password_new2 = $_data['user_new_pass2'];
  336. $stmt = $pdo->prepare("SELECT `password` FROM `admin`
  337. WHERE `username` = :user");
  338. $stmt->execute(array(':user' => $username));
  339. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  340. if (!verify_hash($row['password'], $password_old)) {
  341. $_SESSION['return'] = array(
  342. 'type' => 'danger',
  343. 'log' => array(__FUNCTION__, $_action, $_data_log),
  344. 'msg' => 'access_denied'
  345. );
  346. return false;
  347. }
  348. if (!empty($password_new2) && !empty($password_new)) {
  349. if ($password_new2 != $password_new) {
  350. $_SESSION['return'] = array(
  351. 'type' => 'danger',
  352. 'log' => array(__FUNCTION__, $_action, $_data_log),
  353. 'msg' => 'password_mismatch'
  354. );
  355. return false;
  356. }
  357. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password_new)) {
  358. $_SESSION['return'] = array(
  359. 'type' => 'danger',
  360. 'log' => array(__FUNCTION__, $_action, $_data_log),
  361. 'msg' => 'password_complexity'
  362. );
  363. return false;
  364. }
  365. $password_hashed = hash_password($password_new);
  366. try {
  367. $stmt = $pdo->prepare("UPDATE `admin` SET `password` = :password_hashed WHERE `username` = :username");
  368. $stmt->execute(array(
  369. ':password_hashed' => $password_hashed,
  370. ':username' => $username
  371. ));
  372. }
  373. catch (PDOException $e) {
  374. $_SESSION['return'] = array(
  375. 'type' => 'danger',
  376. 'log' => array(__FUNCTION__, $_action, $_data_log),
  377. 'msg' => array('mysql_error', $e)
  378. );
  379. return false;
  380. }
  381. }
  382. $_SESSION['return'] = array(
  383. 'type' => 'success',
  384. 'log' => array(__FUNCTION__, $_action, $_data_log),
  385. 'msg' => array('domain_admin_modified', htmlspecialchars($username))
  386. );
  387. }
  388. break;
  389. case 'delete':
  390. if ($_SESSION['mailcow_cc_role'] != "admin") {
  391. $_SESSION['return'] = array(
  392. 'type' => 'danger',
  393. 'log' => array(__FUNCTION__, $_action, $_data_log),
  394. 'msg' => 'access_denied'
  395. );
  396. return false;
  397. }
  398. $usernames = (array)$_data['username'];
  399. foreach ($usernames as $username) {
  400. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
  401. $_SESSION['return'] = array(
  402. 'type' => 'danger',
  403. 'log' => array(__FUNCTION__, $_action, $_data_log),
  404. 'msg' => 'username_invalid'
  405. );
  406. return false;
  407. }
  408. try {
  409. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
  410. $stmt->execute(array(
  411. ':username' => $username,
  412. ));
  413. $stmt = $pdo->prepare("DELETE FROM `admin` WHERE `username` = :username");
  414. $stmt->execute(array(
  415. ':username' => $username,
  416. ));
  417. }
  418. catch (PDOException $e) {
  419. $_SESSION['return'] = array(
  420. 'type' => 'danger',
  421. 'log' => array(__FUNCTION__, $_action, $_data_log),
  422. 'msg' => array('mysql_error', $e)
  423. );
  424. return false;
  425. }
  426. }
  427. $_SESSION['return'] = array(
  428. 'type' => 'success',
  429. 'log' => array(__FUNCTION__, $_action, $_data_log),
  430. 'msg' => array('domain_admin_removed', htmlspecialchars(implode(', ', $usernames)))
  431. );
  432. break;
  433. case 'get':
  434. $domainadmins = array();
  435. if ($_SESSION['mailcow_cc_role'] != "admin") {
  436. $_SESSION['return'] = array(
  437. 'type' => 'danger',
  438. 'log' => array(__FUNCTION__, $_action, $_data_log),
  439. 'msg' => 'access_denied'
  440. );
  441. return false;
  442. }
  443. try {
  444. $stmt = $pdo->query("SELECT DISTINCT
  445. `username`
  446. FROM `domain_admins`
  447. WHERE `username` IN (
  448. SELECT `username` FROM `admin`
  449. WHERE `superadmin`!='1'
  450. )");
  451. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  452. while ($row = array_shift($rows)) {
  453. $domainadmins[] = $row['username'];
  454. }
  455. }
  456. catch(PDOException $e) {
  457. $_SESSION['return'] = array(
  458. 'type' => 'danger',
  459. 'log' => array(__FUNCTION__, $_action, $_data_log),
  460. 'msg' => array('mysql_error', $e)
  461. );
  462. }
  463. return $domainadmins;
  464. break;
  465. case 'details':
  466. $domainadmindata = array();
  467. if ($_SESSION['mailcow_cc_role'] == "domainadmin" && $_data != $_SESSION['mailcow_cc_username']) {
  468. return false;
  469. }
  470. elseif ($_SESSION['mailcow_cc_role'] != "admin" || !isset($_data)) {
  471. return false;
  472. }
  473. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $_data))) {
  474. return false;
  475. }
  476. try {
  477. $stmt = $pdo->prepare("SELECT
  478. `tfa`.`active` AS `tfa_active_int`,
  479. CASE `tfa`.`active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `tfa_active`,
  480. `domain_admins`.`username`,
  481. `domain_admins`.`created`,
  482. `domain_admins`.`active` AS `active_int`,
  483. CASE `domain_admins`.`active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`
  484. FROM `domain_admins`
  485. LEFT OUTER JOIN `tfa` ON `tfa`.`username`=`domain_admins`.`username`
  486. WHERE `domain_admins`.`username`= :domain_admin");
  487. $stmt->execute(array(
  488. ':domain_admin' => $_data
  489. ));
  490. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  491. if (empty($row)) {
  492. return false;
  493. }
  494. $domainadmindata['username'] = $row['username'];
  495. $domainadmindata['tfa_active'] = $row['tfa_active'];
  496. $domainadmindata['active'] = $row['active'];
  497. $domainadmindata['tfa_active_int'] = $row['tfa_active_int'];
  498. $domainadmindata['active_int'] = $row['active_int'];
  499. $domainadmindata['modified'] = $row['created'];
  500. // GET SELECTED
  501. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  502. WHERE `domain` IN (
  503. SELECT `domain` FROM `domain_admins`
  504. WHERE `username`= :domain_admin)");
  505. $stmt->execute(array(':domain_admin' => $_data));
  506. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  507. while($row = array_shift($rows)) {
  508. $domainadmindata['selected_domains'][] = $row['domain'];
  509. }
  510. // GET UNSELECTED
  511. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  512. WHERE `domain` NOT IN (
  513. SELECT `domain` FROM `domain_admins`
  514. WHERE `username`= :domain_admin)");
  515. $stmt->execute(array(':domain_admin' => $_data));
  516. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  517. while($row = array_shift($rows)) {
  518. $domainadmindata['unselected_domains'][] = $row['domain'];
  519. }
  520. if (!isset($domainadmindata['unselected_domains'])) {
  521. $domainadmindata['unselected_domains'] = "";
  522. }
  523. }
  524. catch(PDOException $e) {
  525. $_SESSION['return'] = array(
  526. 'type' => 'danger',
  527. 'log' => array(__FUNCTION__, $_action, $_data_log),
  528. 'msg' => array('mysql_error', $e)
  529. );
  530. }
  531. return $domainadmindata;
  532. break;
  533. }
  534. }