functions.app_passwd.inc.php 7.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208
  1. <?php
  2. function app_passwd($_action, $_data = null) {
  3. global $pdo;
  4. global $lang;
  5. $_data_log = $_data;
  6. if (isset($_data['username']) && filter_var($_data['username'], FILTER_VALIDATE_EMAIL)) {
  7. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data['username'])) {
  8. $_SESSION['return'][] = array(
  9. 'type' => 'danger',
  10. 'log' => array(__FUNCTION__, $_action, $_data_log),
  11. 'msg' => 'access_denied'
  12. );
  13. return false;
  14. }
  15. else {
  16. $username = $_data['username'];
  17. }
  18. }
  19. else {
  20. $username = $_SESSION['mailcow_cc_username'];
  21. }
  22. switch ($_action) {
  23. case 'add':
  24. $app_name = trim($_data['app_name']);
  25. $password = $_data['app_passwd'];
  26. $password2 = $_data['app_passwd2'];
  27. $active = intval($_data['active']);
  28. $domain = mailbox('get', 'mailbox_details', $username)['domain'];
  29. if (empty($domain)) {
  30. $_SESSION['return'][] = array(
  31. 'type' => 'danger',
  32. 'log' => array(__FUNCTION__, $_action, $_data_log),
  33. 'msg' => 'access_denied'
  34. );
  35. return false;
  36. }
  37. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) {
  38. $_SESSION['return'][] = array(
  39. 'type' => 'danger',
  40. 'log' => array(__FUNCTION__, $_action, $_data_log),
  41. 'msg' => 'password_complexity'
  42. );
  43. return false;
  44. }
  45. if ($password != $password2) {
  46. $_SESSION['return'][] = array(
  47. 'type' => 'danger',
  48. 'log' => array(__FUNCTION__, $_action, $_data_log),
  49. 'msg' => 'password_mismatch'
  50. );
  51. return false;
  52. }
  53. $password_hashed = hash_password($password);
  54. if (empty($app_name)) {
  55. $_SESSION['return'][] = array(
  56. 'type' => 'danger',
  57. 'log' => array(__FUNCTION__, $_action, $_data_log),
  58. 'msg' => 'app_name_empty'
  59. );
  60. return false;
  61. }
  62. try {
  63. $stmt = $pdo->prepare("INSERT INTO `app_passwd` (`name`, `mailbox`, `domain`, `password`, `active`)
  64. VALUES (:app_name, :mailbox, :domain, :password, :active)");
  65. $stmt->execute(array(
  66. ':app_name' => $app_name,
  67. ':mailbox' => $username,
  68. ':domain' => $domain,
  69. ':password' => $password_hashed,
  70. ':active' => $active
  71. ));
  72. }
  73. catch (PDOException $e) {
  74. $_SESSION['return'][] = array(
  75. 'type' => 'danger',
  76. 'log' => array(__FUNCTION__, $_action, $_data_log),
  77. 'msg' => array('mysql_error', $e)
  78. );
  79. return false;
  80. }
  81. $_SESSION['return'][] = array(
  82. 'type' => 'success',
  83. 'log' => array(__FUNCTION__, $_action, $_data_log),
  84. 'msg' => 'app_passwd_added'
  85. );
  86. break;
  87. case 'edit':
  88. $ids = (array)$_data['id'];
  89. foreach ($ids as $id) {
  90. $is_now = app_passwd('details', $id);
  91. if (!empty($is_now)) {
  92. $app_name = (!empty($_data['app_name'])) ? $_data['app_name'] : $is_now['name'];
  93. $password = (!empty($_data['password'])) ? $_data['password'] : null;
  94. $password2 = (!empty($_data['password2'])) ? $_data['password2'] : null;
  95. $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active_int'];
  96. }
  97. else {
  98. $_SESSION['return'][] = array(
  99. 'type' => 'danger',
  100. 'log' => array(__FUNCTION__, $_action, $_data_log),
  101. 'msg' => array('app_passwd_id_invalid', $id)
  102. );
  103. continue;
  104. }
  105. $app_name = trim($app_name);
  106. if (!empty($password) && !empty($password2)) {
  107. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) {
  108. $_SESSION['return'][] = array(
  109. 'type' => 'danger',
  110. 'log' => array(__FUNCTION__, $_action, $_type, $_data_log, $_attr),
  111. 'msg' => 'password_complexity'
  112. );
  113. continue;
  114. }
  115. if ($password != $password2) {
  116. $_SESSION['return'][] = array(
  117. 'type' => 'danger',
  118. 'log' => array(__FUNCTION__, $_action, $_type, $_data_log, $_attr),
  119. 'msg' => 'password_mismatch'
  120. );
  121. continue;
  122. }
  123. $password_hashed = hash_password($password);
  124. $stmt = $pdo->prepare("UPDATE `app_passwd` SET
  125. `password` = :password_hashed
  126. WHERE `mailbox` = :username AND `id` = :id");
  127. $stmt->execute(array(
  128. ':password_hashed' => $password_hashed,
  129. ':username' => $username,
  130. ':id' => $id
  131. ));
  132. }
  133. try {
  134. $stmt = $pdo->prepare("UPDATE `app_passwd` SET
  135. `name` = :app_name,
  136. `mailbox` = :username,
  137. `active` = :active
  138. WHERE `id` = :id");
  139. $stmt->execute(array(
  140. ':app_name' => $app_name,
  141. ':username' => $username,
  142. ':active' => $active,
  143. ':id' => $id
  144. ));
  145. }
  146. catch (PDOException $e) {
  147. $_SESSION['return'][] = array(
  148. 'type' => 'danger',
  149. 'log' => array(__FUNCTION__, $_action, $_data_log),
  150. 'msg' => array('mysql_error', $e)
  151. );
  152. continue;
  153. }
  154. $_SESSION['return'][] = array(
  155. 'type' => 'success',
  156. 'log' => array(__FUNCTION__, $_action, $_data_log),
  157. 'msg' => array('object_modified', htmlspecialchars($ids))
  158. );
  159. }
  160. break;
  161. case 'delete':
  162. $ids = (array)$_data['id'];
  163. foreach ($ids as $id) {
  164. try {
  165. $stmt = $pdo->prepare("DELETE FROM `app_passwd` WHERE `id`= :id AND `mailbox`= :username");
  166. $stmt->execute(array(':id' => $id, ':username' => $username));
  167. }
  168. catch (PDOException $e) {
  169. $_SESSION['return'][] = array(
  170. 'type' => 'danger',
  171. 'log' => array(__FUNCTION__, $_action, $_data_log),
  172. 'msg' => array('mysql_error', $e)
  173. );
  174. return false;
  175. }
  176. $_SESSION['return'][] = array(
  177. 'type' => 'success',
  178. 'log' => array(__FUNCTION__, $_action, $_data_log),
  179. 'msg' => array('app_passwd_removed', htmlspecialchars($id))
  180. );
  181. }
  182. break;
  183. case 'get':
  184. $app_passwds = array();
  185. $stmt = $pdo->prepare("SELECT `id`, `name` FROM `app_passwd` WHERE `mailbox` = :username");
  186. $stmt->execute(array(':username' => $username));
  187. $app_passwds = $stmt->fetchAll(PDO::FETCH_ASSOC);
  188. return $app_passwds;
  189. break;
  190. case 'details':
  191. $app_passwd_data = array();
  192. $stmt = $pdo->prepare("SELECT `id`,
  193. `name`,
  194. `mailbox`,
  195. `domain`,
  196. `created`,
  197. `modified`,
  198. `active` AS `active_int`,
  199. CASE `active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`
  200. FROM `app_passwd`
  201. WHERE `id` = :id
  202. AND `mailbox` = :username");
  203. $stmt->execute(array(':id' => $_data, ':username' => $username));
  204. $app_passwd_data = $stmt->fetch(PDO::FETCH_ASSOC);
  205. return $app_passwd_data;
  206. break;
  207. }
  208. }