functions.domain_admin.inc.php 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454
  1. <?php
  2. function domain_admin($_action, $_data = null) {
  3. global $pdo;
  4. global $lang;
  5. $_data_log = $_data;
  6. !isset($_data_log['password']) ?: $_data_log['password'] = '*';
  7. !isset($_data_log['password2']) ?: $_data_log['password2'] = '*';
  8. !isset($_data_log['user_old_pass']) ?: $_data_log['user_old_pass'] = '*';
  9. !isset($_data_log['user_new_pass']) ?: $_data_log['user_new_pass'] = '*';
  10. !isset($_data_log['user_new_pass2']) ?: $_data_log['user_new_pass2'] = '*';
  11. switch ($_action) {
  12. case 'add':
  13. $username = strtolower(trim($_data['username']));
  14. $password = $_data['password'];
  15. $password2 = $_data['password2'];
  16. $domains = (array)$_data['domains'];
  17. $active = intval($_data['active']);
  18. if ($_SESSION['mailcow_cc_role'] != "admin") {
  19. $_SESSION['return'][] = array(
  20. 'type' => 'danger',
  21. 'log' => array(__FUNCTION__, $_action, $_data_log),
  22. 'msg' => 'access_denied'
  23. );
  24. return false;
  25. }
  26. if (empty($domains)) {
  27. $_SESSION['return'][] = array(
  28. 'type' => 'danger',
  29. 'log' => array(__FUNCTION__, $_action, $_data_log),
  30. 'msg' => 'domain_invalid'
  31. );
  32. return false;
  33. }
  34. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username)) || empty ($username) || $username == 'API') {
  35. $_SESSION['return'][] = array(
  36. 'type' => 'danger',
  37. 'log' => array(__FUNCTION__, $_action, $_data_log),
  38. 'msg' => array('username_invalid', $username)
  39. );
  40. return false;
  41. }
  42. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox`
  43. WHERE `username` = :username");
  44. $stmt->execute(array(':username' => $username));
  45. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  46. $stmt = $pdo->prepare("SELECT `username` FROM `admin`
  47. WHERE `username` = :username");
  48. $stmt->execute(array(':username' => $username));
  49. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  50. $stmt = $pdo->prepare("SELECT `username` FROM `domain_admins`
  51. WHERE `username` = :username");
  52. $stmt->execute(array(':username' => $username));
  53. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  54. foreach ($num_results as $num_results_each) {
  55. if ($num_results_each != 0) {
  56. $_SESSION['return'][] = array(
  57. 'type' => 'danger',
  58. 'log' => array(__FUNCTION__, $_action, $_data_log),
  59. 'msg' => array('object_exists', htmlspecialchars($username))
  60. );
  61. return false;
  62. }
  63. }
  64. if (!empty($password) && !empty($password2)) {
  65. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) {
  66. $_SESSION['return'][] = array(
  67. 'type' => 'danger',
  68. 'log' => array(__FUNCTION__, $_action, $_data_log),
  69. 'msg' => 'password_complexity'
  70. );
  71. return false;
  72. }
  73. if ($password != $password2) {
  74. $_SESSION['return'][] = array(
  75. 'type' => 'danger',
  76. 'log' => array(__FUNCTION__, $_action, $_data_log),
  77. 'msg' => 'password_mismatch'
  78. );
  79. return false;
  80. }
  81. $password_hashed = hash_password($password);
  82. $valid_domains = 0;
  83. foreach ($domains as $domain) {
  84. if (!is_valid_domain_name($domain) || mailbox('get', 'domain_details', $domain) === false) {
  85. $_SESSION['return'][] = array(
  86. 'type' => 'danger',
  87. 'log' => array(__FUNCTION__, $_action, $_data_log),
  88. 'msg' => array('domain_invalid', htmlspecialchars($domain))
  89. );
  90. continue;
  91. }
  92. $valid_domains++;
  93. $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
  94. VALUES (:username, :domain, :created, :active)");
  95. $stmt->execute(array(
  96. ':username' => $username,
  97. ':domain' => $domain,
  98. ':created' => date('Y-m-d H:i:s'),
  99. ':active' => $active
  100. ));
  101. }
  102. if ($valid_domains != 0) {
  103. $stmt = $pdo->prepare("INSERT INTO `admin` (`username`, `password`, `superadmin`, `active`)
  104. VALUES (:username, :password_hashed, '0', :active)");
  105. $stmt->execute(array(
  106. ':username' => $username,
  107. ':password_hashed' => $password_hashed,
  108. ':active' => $active
  109. ));
  110. }
  111. }
  112. else {
  113. $_SESSION['return'][] = array(
  114. 'type' => 'danger',
  115. 'log' => array(__FUNCTION__, $_action, $_data_log),
  116. 'msg' => 'password_empty'
  117. );
  118. return false;
  119. }
  120. if ($valid_domains != 0) {
  121. $stmt = $pdo->prepare("INSERT INTO `da_acl` (`username`) VALUES (:username)");
  122. $stmt->execute(array(
  123. ':username' => $username
  124. ));
  125. $_SESSION['return'][] = array(
  126. 'type' => 'success',
  127. 'log' => array(__FUNCTION__, $_action, $_data_log),
  128. 'msg' => array('domain_admin_added', htmlspecialchars($username))
  129. );
  130. }
  131. break;
  132. case 'edit':
  133. if ($_SESSION['mailcow_cc_role'] != "admin" && $_SESSION['mailcow_cc_role'] != "domainadmin") {
  134. $_SESSION['return'][] = array(
  135. 'type' => 'danger',
  136. 'log' => array(__FUNCTION__, $_action, $_data_log),
  137. 'msg' => 'access_denied'
  138. );
  139. return false;
  140. }
  141. // Administrator
  142. if ($_SESSION['mailcow_cc_role'] == "admin") {
  143. if (!is_array($_data['username'])) {
  144. $usernames = array();
  145. $usernames[] = $_data['username'];
  146. }
  147. else {
  148. $usernames = $_data['username'];
  149. }
  150. foreach ($usernames as $username) {
  151. $is_now = domain_admin('details', $username);
  152. $domains = (isset($_data['domains'])) ? (array)$_data['domains'] : null;
  153. if (!empty($is_now)) {
  154. $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active_int'];
  155. $domains = (!empty($domains)) ? $domains : $is_now['selected_domains'];
  156. $username_new = (!empty($_data['username_new'])) ? $_data['username_new'] : $is_now['username'];
  157. }
  158. else {
  159. $_SESSION['return'][] = array(
  160. 'type' => 'danger',
  161. 'log' => array(__FUNCTION__, $_action, $_data_log),
  162. 'msg' => 'access_denied'
  163. );
  164. continue;
  165. }
  166. $password = $_data['password'];
  167. $password2 = $_data['password2'];
  168. if (!empty($domains)) {
  169. foreach ($domains as $domain) {
  170. if (!is_valid_domain_name($domain) || mailbox('get', 'domain_details', $domain) === false) {
  171. $_SESSION['return'][] = array(
  172. 'type' => 'danger',
  173. 'log' => array(__FUNCTION__, $_action, $_data_log),
  174. 'msg' => array('domain_invalid', htmlspecialchars($domain))
  175. );
  176. continue 2;
  177. }
  178. }
  179. }
  180. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username_new))) {
  181. $_SESSION['return'][] = array(
  182. 'type' => 'danger',
  183. 'log' => array(__FUNCTION__, $_action, $_data_log),
  184. 'msg' => array('username_invalid', $username_new)
  185. );
  186. continue;
  187. }
  188. if ($username_new != $username) {
  189. if (!empty(domain_admin('details', $username_new)['username'])) {
  190. $_SESSION['return'][] = array(
  191. 'type' => 'danger',
  192. 'log' => array(__FUNCTION__, $_action, $_data_log),
  193. 'msg' => array('username_invalid', $username_new)
  194. );
  195. continue;
  196. }
  197. }
  198. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
  199. $stmt->execute(array(
  200. ':username' => $username,
  201. ));
  202. $stmt = $pdo->prepare("UPDATE `da_acl` SET `username` = :username_new WHERE `username` = :username");
  203. $stmt->execute(array(
  204. ':username_new' => $username_new,
  205. ':username' => $username
  206. ));
  207. if (!empty($domains)) {
  208. foreach ($domains as $domain) {
  209. $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
  210. VALUES (:username_new, :domain, :created, :active)");
  211. $stmt->execute(array(
  212. ':username_new' => $username_new,
  213. ':domain' => $domain,
  214. ':created' => date('Y-m-d H:i:s'),
  215. ':active' => $active
  216. ));
  217. }
  218. }
  219. if (!empty($password) && !empty($password2)) {
  220. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) {
  221. $_SESSION['return'][] = array(
  222. 'type' => 'danger',
  223. 'log' => array(__FUNCTION__, $_action, $_data_log),
  224. 'msg' => 'password_complexity'
  225. );
  226. continue;
  227. }
  228. if ($password != $password2) {
  229. $_SESSION['return'][] = array(
  230. 'type' => 'danger',
  231. 'log' => array(__FUNCTION__, $_action, $_data_log),
  232. 'msg' => 'password_mismatch'
  233. );
  234. continue;
  235. }
  236. $password_hashed = hash_password($password);
  237. $stmt = $pdo->prepare("UPDATE `admin` SET `username` = :username_new, `active` = :active, `password` = :password_hashed WHERE `username` = :username");
  238. $stmt->execute(array(
  239. ':password_hashed' => $password_hashed,
  240. ':username_new' => $username_new,
  241. ':username' => $username,
  242. ':active' => $active
  243. ));
  244. if (isset($_data['disable_tfa'])) {
  245. $stmt = $pdo->prepare("UPDATE `tfa` SET `active` = '0' WHERE `username` = :username");
  246. $stmt->execute(array(':username' => $username));
  247. }
  248. else {
  249. $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username_new WHERE `username` = :username");
  250. $stmt->execute(array(':username_new' => $username_new, ':username' => $username));
  251. }
  252. }
  253. else {
  254. $stmt = $pdo->prepare("UPDATE `admin` SET `username` = :username_new, `active` = :active WHERE `username` = :username");
  255. $stmt->execute(array(
  256. ':username_new' => $username_new,
  257. ':username' => $username,
  258. ':active' => $active
  259. ));
  260. if (isset($_data['disable_tfa'])) {
  261. $stmt = $pdo->prepare("UPDATE `tfa` SET `active` = '0' WHERE `username` = :username");
  262. $stmt->execute(array(':username' => $username));
  263. }
  264. else {
  265. $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username_new WHERE `username` = :username");
  266. $stmt->execute(array(':username_new' => $username_new, ':username' => $username));
  267. }
  268. }
  269. $_SESSION['return'][] = array(
  270. 'type' => 'success',
  271. 'log' => array(__FUNCTION__, $_action, $_data_log),
  272. 'msg' => array('domain_admin_modified', htmlspecialchars($username))
  273. );
  274. }
  275. return true;
  276. }
  277. // Domain administrator
  278. // Can only edit itself
  279. elseif ($_SESSION['mailcow_cc_role'] == "domainadmin") {
  280. $username = $_SESSION['mailcow_cc_username'];
  281. $password_old = $_data['user_old_pass'];
  282. $password_new = $_data['user_new_pass'];
  283. $password_new2 = $_data['user_new_pass2'];
  284. $stmt = $pdo->prepare("SELECT `password` FROM `admin`
  285. WHERE `username` = :user");
  286. $stmt->execute(array(':user' => $username));
  287. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  288. if (!verify_hash($row['password'], $password_old)) {
  289. $_SESSION['return'][] = array(
  290. 'type' => 'danger',
  291. 'log' => array(__FUNCTION__, $_action, $_data_log),
  292. 'msg' => 'access_denied'
  293. );
  294. return false;
  295. }
  296. if (!empty($password_new2) && !empty($password_new)) {
  297. if ($password_new2 != $password_new) {
  298. $_SESSION['return'][] = array(
  299. 'type' => 'danger',
  300. 'log' => array(__FUNCTION__, $_action, $_data_log),
  301. 'msg' => 'password_mismatch'
  302. );
  303. return false;
  304. }
  305. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password_new)) {
  306. $_SESSION['return'][] = array(
  307. 'type' => 'danger',
  308. 'log' => array(__FUNCTION__, $_action, $_data_log),
  309. 'msg' => 'password_complexity'
  310. );
  311. return false;
  312. }
  313. $password_hashed = hash_password($password_new);
  314. $stmt = $pdo->prepare("UPDATE `admin` SET `password` = :password_hashed WHERE `username` = :username");
  315. $stmt->execute(array(
  316. ':password_hashed' => $password_hashed,
  317. ':username' => $username
  318. ));
  319. }
  320. $_SESSION['return'][] = array(
  321. 'type' => 'success',
  322. 'log' => array(__FUNCTION__, $_action, $_data_log),
  323. 'msg' => array('domain_admin_modified', htmlspecialchars($username))
  324. );
  325. }
  326. break;
  327. case 'delete':
  328. if ($_SESSION['mailcow_cc_role'] != "admin") {
  329. $_SESSION['return'][] = array(
  330. 'type' => 'danger',
  331. 'log' => array(__FUNCTION__, $_action, $_data_log),
  332. 'msg' => 'access_denied'
  333. );
  334. return false;
  335. }
  336. $usernames = (array)$_data['username'];
  337. foreach ($usernames as $username) {
  338. if (empty(domain_admin('details', $username))) {
  339. $_SESSION['return'][] = array(
  340. 'type' => 'danger',
  341. 'log' => array(__FUNCTION__, $_action, $_data_log),
  342. 'msg' => array('username_invalid', $username)
  343. );
  344. continue;
  345. }
  346. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
  347. $stmt->execute(array(
  348. ':username' => $username,
  349. ));
  350. $stmt = $pdo->prepare("DELETE FROM `admin` WHERE `username` = :username");
  351. $stmt->execute(array(
  352. ':username' => $username,
  353. ));
  354. $stmt = $pdo->prepare("DELETE FROM `da_acl` WHERE `username` = :username");
  355. $stmt->execute(array(
  356. ':username' => $username,
  357. ));
  358. $_SESSION['return'][] = array(
  359. 'type' => 'success',
  360. 'log' => array(__FUNCTION__, $_action, $_data_log),
  361. 'msg' => array('domain_admin_removed', htmlspecialchars($username))
  362. );
  363. }
  364. break;
  365. case 'get':
  366. $domainadmins = array();
  367. if ($_SESSION['mailcow_cc_role'] != "admin") {
  368. $_SESSION['return'][] = array(
  369. 'type' => 'danger',
  370. 'log' => array(__FUNCTION__, $_action, $_data_log),
  371. 'msg' => 'access_denied'
  372. );
  373. return false;
  374. }
  375. $stmt = $pdo->query("SELECT DISTINCT
  376. `username`
  377. FROM `domain_admins`
  378. WHERE `username` IN (
  379. SELECT `username` FROM `admin`
  380. WHERE `superadmin`!='1'
  381. )");
  382. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  383. while ($row = array_shift($rows)) {
  384. $domainadmins[] = $row['username'];
  385. }
  386. return $domainadmins;
  387. break;
  388. case 'details':
  389. $domainadmindata = array();
  390. if ($_SESSION['mailcow_cc_role'] == "domainadmin" && $_data != $_SESSION['mailcow_cc_username']) {
  391. return false;
  392. }
  393. elseif ($_SESSION['mailcow_cc_role'] != "admin" || !isset($_data)) {
  394. return false;
  395. }
  396. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $_data))) {
  397. return false;
  398. }
  399. $stmt = $pdo->prepare("SELECT
  400. `tfa`.`active` AS `tfa_active_int`,
  401. CASE `tfa`.`active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `tfa_active`,
  402. `domain_admins`.`username`,
  403. `domain_admins`.`created`,
  404. `domain_admins`.`active` AS `active_int`,
  405. CASE `domain_admins`.`active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`
  406. FROM `domain_admins`
  407. LEFT OUTER JOIN `tfa` ON `tfa`.`username`=`domain_admins`.`username`
  408. WHERE `domain_admins`.`username`= :domain_admin");
  409. $stmt->execute(array(
  410. ':domain_admin' => $_data
  411. ));
  412. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  413. if (empty($row)) {
  414. return false;
  415. }
  416. $domainadmindata['username'] = $row['username'];
  417. $domainadmindata['tfa_active'] = $row['tfa_active'];
  418. $domainadmindata['active'] = $row['active'];
  419. $domainadmindata['tfa_active_int'] = $row['tfa_active_int'];
  420. $domainadmindata['active_int'] = $row['active_int'];
  421. $domainadmindata['created'] = $row['created'];
  422. // GET SELECTED
  423. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  424. WHERE `domain` IN (
  425. SELECT `domain` FROM `domain_admins`
  426. WHERE `username`= :domain_admin)");
  427. $stmt->execute(array(':domain_admin' => $_data));
  428. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  429. while($row = array_shift($rows)) {
  430. $domainadmindata['selected_domains'][] = $row['domain'];
  431. }
  432. // GET UNSELECTED
  433. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  434. WHERE `domain` NOT IN (
  435. SELECT `domain` FROM `domain_admins`
  436. WHERE `username`= :domain_admin)");
  437. $stmt->execute(array(':domain_admin' => $_data));
  438. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  439. while($row = array_shift($rows)) {
  440. $domainadmindata['unselected_domains'][] = $row['domain'];
  441. }
  442. if (!isset($domainadmindata['unselected_domains'])) {
  443. $domainadmindata['unselected_domains'] = "";
  444. }
  445. return $domainadmindata;
  446. break;
  447. }
  448. }