functions.mailbox.inc.php 139 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871287228732874287528762877287828792880288128822883288428852886288728882889289028912892289328942895289628972898289929002901290229032904290529062907290829092910291129122913291429152916291729182919292029212922292329242925292629272928292929302931293229332934293529362937293829392940294129422943294429452946294729482949295029512952295329542955295629572958295929602961296229632964296529662967296829692970297129722973297429752976297729782979298029812982298329842985298629872988298929902991299229932994299529962997299829993000300130023003300430053006300730083009301030113012301330143015301630173018301930203021302230233024302530263027302830293030303130323033303430353036303730383039304030413042304330443045304630473048304930503051305230533054305530563057305830593060306130623063306430653066306730683069307030713072307330743075307630773078307930803081308230833084308530863087308830893090309130923093309430953096309730983099310031013102310331043105310631073108310931103111311231133114311531163117311831193120312131223123312431253126312731283129313031313132313331343135313631373138313931403141314231433144314531463147314831493150315131523153315431553156315731583159316031613162316331643165316631673168316931703171317231733174317531763177317831793180318131823183318431853186318731883189319031913192319331943195319631973198319932003201320232033204320532063207320832093210321132123213321432153216321732183219322032213222322332243225322632273228322932303231323232333234323532363237323832393240324132423243324432453246324732483249325032513252325332543255325632573258325932603261326232633264326532663267326832693270327132723273327432753276327732783279328032813282328332843285328632873288328932903291329232933294329532963297329832993300330133023303330433053306
  1. <?php
  2. function mailbox($_action, $_type, $_data = null) {
  3. global $pdo;
  4. global $redis;
  5. global $lang;
  6. switch ($_action) {
  7. case 'add':
  8. switch ($_type) {
  9. case 'time_limited_alias':
  10. if (!isset($_SESSION['acl']['spam_alias']) || $_SESSION['acl']['spam_alias'] != "1" ) {
  11. $_SESSION['return'] = array(
  12. 'type' => 'danger',
  13. 'msg' => sprintf($lang['danger']['access_denied'])
  14. );
  15. return false;
  16. }
  17. if (isset($_data['username']) && filter_var($_data['username'], FILTER_VALIDATE_EMAIL)) {
  18. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data['username'])) {
  19. $_SESSION['return'] = array(
  20. 'type' => 'danger',
  21. 'msg' => sprintf($lang['danger']['access_denied'])
  22. );
  23. return false;
  24. }
  25. else {
  26. $username = $_data['username'];
  27. }
  28. }
  29. else {
  30. $username = $_SESSION['mailcow_cc_username'];
  31. }
  32. if (!is_numeric($_data["validity"]) || $_data["validity"] > 672) {
  33. $_SESSION['return'] = array(
  34. 'type' => 'danger',
  35. 'msg' => sprintf($lang['danger']['validity_missing'])
  36. );
  37. return false;
  38. }
  39. try {
  40. $stmt = $pdo->prepare("SELECT `domain` FROM `mailbox` WHERE `username` = :username");
  41. $stmt->execute(array(':username' => $_SESSION['mailcow_cc_username']));
  42. $domain = $stmt->fetch(PDO::FETCH_ASSOC)['domain'];
  43. }
  44. catch (PDOException $e) {
  45. $_SESSION['return'] = array(
  46. 'type' => 'danger',
  47. 'msg' => 'MySQL: '.$e
  48. );
  49. return false;
  50. }
  51. $validity = strtotime("+".$_data["validity"]." hour");
  52. $letters = 'abcefghijklmnopqrstuvwxyz1234567890';
  53. $random_name = substr(str_shuffle($letters), 0, 24);
  54. try {
  55. $stmt = $pdo->prepare("INSERT INTO `spamalias` (`address`, `goto`, `validity`) VALUES
  56. (:address, :goto, :validity)");
  57. $stmt->execute(array(
  58. ':address' => $random_name . '@' . $domain,
  59. ':goto' => $username,
  60. ':validity' => $validity
  61. ));
  62. }
  63. catch (PDOException $e) {
  64. $_SESSION['return'] = array(
  65. 'type' => 'danger',
  66. 'msg' => 'MySQL: '.$e
  67. );
  68. return false;
  69. }
  70. $_SESSION['return'] = array(
  71. 'type' => 'success',
  72. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($usernames))
  73. );
  74. break;
  75. case 'syncjob':
  76. if (!isset($_SESSION['acl']['syncjobs']) || $_SESSION['acl']['syncjobs'] != "1" ) {
  77. $_SESSION['return'] = array(
  78. 'type' => 'danger',
  79. 'msg' => sprintf($lang['danger']['access_denied'])
  80. );
  81. return false;
  82. }
  83. if (isset($_data['username']) && filter_var($_data['username'], FILTER_VALIDATE_EMAIL)) {
  84. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data['username'])) {
  85. $_SESSION['return'] = array(
  86. 'type' => 'danger',
  87. 'msg' => sprintf($lang['danger']['access_denied'])
  88. );
  89. return false;
  90. }
  91. else {
  92. $username = $_data['username'];
  93. }
  94. }
  95. elseif ($_SESSION['mailcow_cc_role'] == "user") {
  96. $username = $_SESSION['mailcow_cc_username'];
  97. }
  98. else {
  99. $_SESSION['return'] = array(
  100. 'type' => 'danger',
  101. 'msg' => 'No user defined'
  102. );
  103. return false;
  104. }
  105. $active = intval($_data['active']);
  106. $delete2duplicates = intval($_data['delete2duplicates']);
  107. $delete1 = intval($_data['delete1']);
  108. $delete2 = intval($_data['delete2']);
  109. $port1 = $_data['port1'];
  110. $host1 = strtolower($_data['host1']);
  111. $password1 = $_data['password1'];
  112. $exclude = $_data['exclude'];
  113. $maxage = $_data['maxage'];
  114. $subfolder2 = $_data['subfolder2'];
  115. $user1 = $_data['user1'];
  116. $mins_interval = $_data['mins_interval'];
  117. $enc1 = $_data['enc1'];
  118. if (empty($subfolder2)) {
  119. $subfolder2 = "";
  120. }
  121. if (!isset($maxage) || !filter_var($maxage, FILTER_VALIDATE_INT, array('options' => array('min_range' => 1, 'max_range' => 32767)))) {
  122. $maxage = "0";
  123. }
  124. if (!filter_var($port1, FILTER_VALIDATE_INT, array('options' => array('min_range' => 1, 'max_range' => 65535)))) {
  125. $_SESSION['return'] = array(
  126. 'type' => 'danger',
  127. 'msg' => sprintf($lang['danger']['access_denied'])
  128. );
  129. return false;
  130. }
  131. if (!filter_var($mins_interval, FILTER_VALIDATE_INT, array('options' => array('min_range' => 10, 'max_range' => 3600)))) {
  132. $_SESSION['return'] = array(
  133. 'type' => 'danger',
  134. 'msg' => sprintf($lang['danger']['access_denied'])
  135. );
  136. return false;
  137. }
  138. if (!is_valid_domain_name($host1)) {
  139. $_SESSION['return'] = array(
  140. 'type' => 'danger',
  141. 'msg' => sprintf($lang['danger']['access_denied'])
  142. );
  143. return false;
  144. }
  145. if ($enc1 != "TLS" && $enc1 != "SSL" && $enc1 != "PLAIN") {
  146. $_SESSION['return'] = array(
  147. 'type' => 'danger',
  148. 'msg' => sprintf($lang['danger']['access_denied'])
  149. );
  150. return false;
  151. }
  152. if (@preg_match("/" . $exclude . "/", null) === false) {
  153. $_SESSION['return'] = array(
  154. 'type' => 'danger',
  155. 'msg' => sprintf($lang['danger']['access_denied'])
  156. );
  157. return false;
  158. }
  159. try {
  160. $stmt = $pdo->prepare("SELECT '1' FROM `imapsync`
  161. WHERE `user2` = :user2 AND `user1` = :user1 AND `host1` = :host1");
  162. $stmt->execute(array(':user1' => $user1, ':user2' => $username, ':host1' => $host1));
  163. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  164. }
  165. catch(PDOException $e) {
  166. $_SESSION['return'] = array(
  167. 'type' => 'danger',
  168. 'msg' => 'MySQL: '.$e
  169. );
  170. return false;
  171. }
  172. if ($num_results != 0) {
  173. $_SESSION['return'] = array(
  174. 'type' => 'danger',
  175. 'msg' => sprintf($lang['danger']['object_exists'], htmlspecialchars($host1 . ' / ' . $user1))
  176. );
  177. return false;
  178. }
  179. try {
  180. $stmt = $pdo->prepare("INSERT INTO `imapsync` (`user2`, `exclude`, `delete1`, `delete2`, `maxage`, `subfolder2`, `host1`, `authmech1`, `user1`, `password1`, `mins_interval`, `port1`, `enc1`, `delete2duplicates`, `active`)
  181. VALUES (:user2, :exclude, :maxage, :delete1, :delete2, :subfolder2, :host1, :authmech1, :user1, :password1, :mins_interval, :port1, :enc1, :delete2duplicates, :active)");
  182. $stmt->execute(array(
  183. ':user2' => $username,
  184. ':exclude' => $exclude,
  185. ':maxage' => $maxage,
  186. ':delete1' => $delete1,
  187. ':delete2' => $delete2,
  188. ':subfolder2' => $subfolder2,
  189. ':host1' => $host1,
  190. ':authmech1' => 'PLAIN',
  191. ':user1' => $user1,
  192. ':password1' => $password1,
  193. ':mins_interval' => $mins_interval,
  194. ':port1' => $port1,
  195. ':enc1' => $enc1,
  196. ':delete2duplicates' => $delete2duplicates,
  197. ':active' => $active,
  198. ));
  199. }
  200. catch(PDOException $e) {
  201. $_SESSION['return'] = array(
  202. 'type' => 'danger',
  203. 'msg' => 'MySQL: '.$e
  204. );
  205. return false;
  206. }
  207. $_SESSION['return'] = array(
  208. 'type' => 'success',
  209. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  210. );
  211. return true;
  212. break;
  213. case 'domain':
  214. if ($_SESSION['mailcow_cc_role'] != "admin") {
  215. $_SESSION['return'] = array(
  216. 'type' => 'danger',
  217. 'msg' => sprintf($lang['danger']['access_denied'])
  218. );
  219. return false;
  220. }
  221. $domain = idn_to_ascii(strtolower(trim($_data['domain'])));
  222. $description = $_data['description'];
  223. $aliases = $_data['aliases'];
  224. $mailboxes = $_data['mailboxes'];
  225. $maxquota = $_data['maxquota'];
  226. $quota = $_data['quota'];
  227. if ($maxquota > $quota) {
  228. $_SESSION['return'] = array(
  229. 'type' => 'danger',
  230. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeds_domain_quota'])
  231. );
  232. return false;
  233. }
  234. if ($maxquota == "0" || empty($maxquota)) {
  235. $_SESSION['return'] = array(
  236. 'type' => 'danger',
  237. 'msg' => sprintf($lang['danger']['maxquota_empty'])
  238. );
  239. return false;
  240. }
  241. $active = intval($_data['active']);
  242. $relay_all_recipients = intval($_data['relay_all_recipients']);
  243. $backupmx = intval($_data['backupmx']);
  244. ($relay_all_recipients == 1) ? $backupmx = '1' : null;
  245. if (!is_valid_domain_name($domain)) {
  246. $_SESSION['return'] = array(
  247. 'type' => 'danger',
  248. 'msg' => sprintf($lang['danger']['domain_invalid'])
  249. );
  250. return false;
  251. }
  252. foreach (array($quota, $maxquota, $mailboxes, $aliases) as $data) {
  253. if (!is_numeric($data)) {
  254. $_SESSION['return'] = array(
  255. 'type' => 'danger',
  256. 'msg' => sprintf($lang['danger']['object_is_not_numeric'], htmlspecialchars($data))
  257. );
  258. return false;
  259. }
  260. }
  261. try {
  262. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  263. WHERE `domain` = :domain");
  264. $stmt->execute(array(':domain' => $domain));
  265. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  266. $stmt = $pdo->prepare("SELECT `alias_domain` FROM `alias_domain`
  267. WHERE `alias_domain` = :domain");
  268. $stmt->execute(array(':domain' => $domain));
  269. $num_results = $num_results + count($stmt->fetchAll(PDO::FETCH_ASSOC));
  270. }
  271. catch(PDOException $e) {
  272. $_SESSION['return'] = array(
  273. 'type' => 'danger',
  274. 'msg' => 'MySQL: '.$e
  275. );
  276. return false;
  277. }
  278. if ($num_results != 0) {
  279. $_SESSION['return'] = array(
  280. 'type' => 'danger',
  281. 'msg' => sprintf($lang['danger']['domain_exists'], htmlspecialchars($domain))
  282. );
  283. return false;
  284. }
  285. try {
  286. $stmt = $pdo->prepare("INSERT INTO `domain` (`domain`, `description`, `aliases`, `mailboxes`, `maxquota`, `quota`, `backupmx`, `active`, `relay_all_recipients`)
  287. VALUES (:domain, :description, :aliases, :mailboxes, :maxquota, :quota, :backupmx, :active, :relay_all_recipients)");
  288. $stmt->execute(array(
  289. ':domain' => $domain,
  290. ':description' => $description,
  291. ':aliases' => $aliases,
  292. ':mailboxes' => $mailboxes,
  293. ':maxquota' => $maxquota,
  294. ':quota' => $quota,
  295. ':backupmx' => $backupmx,
  296. ':active' => $active,
  297. ':relay_all_recipients' => $relay_all_recipients
  298. ));
  299. try {
  300. $redis->hSet('DOMAIN_MAP', $domain, 1);
  301. }
  302. catch (RedisException $e) {
  303. $_SESSION['return'] = array(
  304. 'type' => 'danger',
  305. 'msg' => 'Redis: '.$e
  306. );
  307. return false;
  308. }
  309. $_SESSION['return'] = array(
  310. 'type' => 'success',
  311. 'msg' => sprintf($lang['success']['domain_added'], htmlspecialchars($domain))
  312. );
  313. }
  314. catch (PDOException $e) {
  315. mailbox('delete', 'domain', array('domain' => $domain));
  316. $_SESSION['return'] = array(
  317. 'type' => 'danger',
  318. 'msg' => 'MySQL: '.$e
  319. );
  320. return false;
  321. }
  322. break;
  323. case 'alias':
  324. $addresses = array_map('trim', preg_split( "/( |,|;|\n)/", $_data['address']));
  325. $gotos = array_map('trim', preg_split( "/( |,|;|\n)/", $_data['goto']));
  326. $active = intval($_data['active']);
  327. if (empty($addresses[0])) {
  328. $_SESSION['return'] = array(
  329. 'type' => 'danger',
  330. 'msg' => sprintf($lang['danger']['alias_empty'])
  331. );
  332. return false;
  333. }
  334. if (empty($gotos[0])) {
  335. $_SESSION['return'] = array(
  336. 'type' => 'danger',
  337. 'msg' => sprintf($lang['danger']['goto_empty'])
  338. );
  339. return false;
  340. }
  341. foreach ($gotos as &$goto) {
  342. if (empty($goto)) {
  343. continue;
  344. }
  345. $goto_domain = idn_to_ascii(substr(strstr($goto, '@'), 1));
  346. $goto_local_part = strstr($goto, '@', true);
  347. $goto = $goto_local_part.'@'.$goto_domain;
  348. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox`
  349. WHERE `kind` REGEXP 'location|thing|group'
  350. AND `username`= :goto");
  351. $stmt->execute(array(':goto' => $goto));
  352. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  353. if ($num_results != 0) {
  354. $_SESSION['return'] = array(
  355. 'type' => 'danger',
  356. 'msg' => sprintf($lang['danger']['goto_invalid'])
  357. );
  358. return false;
  359. }
  360. if (!filter_var($goto, FILTER_VALIDATE_EMAIL) === true) {
  361. $_SESSION['return'] = array(
  362. 'type' => 'danger',
  363. 'msg' => sprintf($lang['danger']['goto_invalid'])
  364. );
  365. return false;
  366. }
  367. }
  368. $gotos = array_filter($gotos);
  369. $goto = implode(",", $gotos);
  370. foreach ($addresses as $address) {
  371. if (empty($address)) {
  372. continue;
  373. }
  374. if (in_array($address, $gotos)) {
  375. continue;
  376. }
  377. $stmt = $pdo->prepare("SELECT `address` FROM `alias`
  378. WHERE `address`= :address");
  379. $stmt->execute(array(':address' => $address));
  380. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  381. if ($num_results != 0) {
  382. $_SESSION['return'] = array(
  383. 'type' => 'danger',
  384. 'msg' => sprintf($lang['danger']['is_alias_or_mailbox'], htmlspecialchars($address))
  385. );
  386. return false;
  387. }
  388. $domain = idn_to_ascii(substr(strstr($address, '@'), 1));
  389. $local_part = strstr($address, '@', true);
  390. $address = $local_part.'@'.$domain;
  391. $domaindata = mailbox('get', 'domain_details', $domain);
  392. if (is_array($domaindata) && $domaindata['aliases_left'] == "0") {
  393. $_SESSION['return'] = array(
  394. 'type' => 'danger',
  395. 'msg' => sprintf($lang['danger']['max_alias_exceeded'])
  396. );
  397. return false;
  398. }
  399. try {
  400. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  401. WHERE `domain`= :domain1 OR `domain` = (SELECT `target_domain` FROM `alias_domain` WHERE `alias_domain` = :domain2)");
  402. $stmt->execute(array(':domain1' => $domain, ':domain2' => $domain));
  403. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  404. if ($num_results == 0) {
  405. $_SESSION['return'] = array(
  406. 'type' => 'danger',
  407. 'msg' => sprintf($lang['danger']['domain_not_found'], htmlspecialchars($domain))
  408. );
  409. return false;
  410. }
  411. $stmt = $pdo->prepare("SELECT `address` FROM `alias`
  412. WHERE `address`= :address");
  413. $stmt->execute(array(':address' => $address));
  414. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  415. if ($num_results != 0) {
  416. $_SESSION['return'] = array(
  417. 'type' => 'danger',
  418. 'msg' => sprintf($lang['danger']['is_alias_or_mailbox'], htmlspecialchars($address))
  419. );
  420. return false;
  421. }
  422. $stmt = $pdo->prepare("SELECT `address` FROM `spamalias`
  423. WHERE `address`= :address");
  424. $stmt->execute(array(':address' => $address));
  425. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  426. if ($num_results != 0) {
  427. $_SESSION['return'] = array(
  428. 'type' => 'danger',
  429. 'msg' => sprintf($lang['danger']['is_spam_alias'], htmlspecialchars($address))
  430. );
  431. return false;
  432. }
  433. }
  434. catch(PDOException $e) {
  435. $_SESSION['return'] = array(
  436. 'type' => 'danger',
  437. 'msg' => 'MySQL: '.$e
  438. );
  439. return false;
  440. }
  441. if ((!filter_var($address, FILTER_VALIDATE_EMAIL) === true) && !empty($local_part)) {
  442. $_SESSION['return'] = array(
  443. 'type' => 'danger',
  444. 'msg' => sprintf($lang['danger']['alias_invalid'])
  445. );
  446. return false;
  447. }
  448. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  449. $_SESSION['return'] = array(
  450. 'type' => 'danger',
  451. 'msg' => sprintf($lang['danger']['access_denied'])
  452. );
  453. return false;
  454. }
  455. try {
  456. $stmt = $pdo->prepare("INSERT INTO `alias` (`address`, `goto`, `domain`, `active`)
  457. VALUES (:address, :goto, :domain, :active)");
  458. if (!filter_var($address, FILTER_VALIDATE_EMAIL) === true) {
  459. $stmt->execute(array(
  460. ':address' => '@'.$domain,
  461. ':goto' => $goto,
  462. ':domain' => $domain,
  463. ':active' => $active
  464. ));
  465. }
  466. else {
  467. $stmt->execute(array(
  468. ':address' => $address,
  469. ':goto' => $goto,
  470. ':domain' => $domain,
  471. ':active' => $active
  472. ));
  473. }
  474. $_SESSION['return'] = array(
  475. 'type' => 'success',
  476. 'msg' => sprintf($lang['success']['alias_added'])
  477. );
  478. }
  479. catch (PDOException $e) {
  480. mailbox('delete', 'alias', array('address' => $address));
  481. $_SESSION['return'] = array(
  482. 'type' => 'danger',
  483. 'msg' => 'MySQL: '.$e
  484. );
  485. return false;
  486. }
  487. }
  488. $_SESSION['return'] = array(
  489. 'type' => 'success',
  490. 'msg' => sprintf($lang['success']['alias_added'])
  491. );
  492. break;
  493. case 'alias_domain':
  494. $active = intval($_data['active']);
  495. $alias_domains = array_map('trim', preg_split( "/( |,|;|\n)/", $_data['alias_domain']));
  496. $target_domain = idn_to_ascii(strtolower(trim($_data['target_domain'])));
  497. if (!is_valid_domain_name($target_domain)) {
  498. $_SESSION['return'] = array(
  499. 'type' => 'danger',
  500. 'msg' => sprintf($lang['danger']['target_domain_invalid'])
  501. );
  502. return false;
  503. }
  504. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $target_domain)) {
  505. $_SESSION['return'] = array(
  506. 'type' => 'danger',
  507. 'msg' => sprintf($lang['danger']['access_denied'])
  508. );
  509. return false;
  510. }
  511. foreach ($alias_domains as $alias_domain) {
  512. $alias_domain = idn_to_ascii(strtolower(trim($alias_domain)));
  513. if (!is_valid_domain_name($alias_domain)) {
  514. $_SESSION['return'] = array(
  515. 'type' => 'danger',
  516. 'msg' => sprintf($lang['danger']['alias_domain_invalid'])
  517. );
  518. return false;
  519. }
  520. if ($alias_domain == $target_domain) {
  521. $_SESSION['return'] = array(
  522. 'type' => 'danger',
  523. 'msg' => sprintf($lang['danger']['aliasd_targetd_identical'])
  524. );
  525. return false;
  526. }
  527. try {
  528. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  529. WHERE `domain`= :target_domain");
  530. $stmt->execute(array(':target_domain' => $target_domain));
  531. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  532. if ($num_results == 0) {
  533. $_SESSION['return'] = array(
  534. 'type' => 'danger',
  535. 'msg' => sprintf($lang['danger']['targetd_not_found'])
  536. );
  537. return false;
  538. }
  539. $stmt = $pdo->prepare("SELECT `alias_domain` FROM `alias_domain` WHERE `alias_domain`= :alias_domain
  540. UNION
  541. SELECT `alias_domain` FROM `alias_domain` WHERE `alias_domain`= :alias_domain_in_domain");
  542. $stmt->execute(array(':alias_domain' => $alias_domain, ':alias_domain_in_domain' => $alias_domain));
  543. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  544. if ($num_results != 0) {
  545. $_SESSION['return'] = array(
  546. 'type' => 'danger',
  547. 'msg' => sprintf($lang['danger']['aliasd_exists'])
  548. );
  549. return false;
  550. }
  551. }
  552. catch(PDOException $e) {
  553. $_SESSION['return'] = array(
  554. 'type' => 'danger',
  555. 'msg' => 'MySQL: '.$e
  556. );
  557. return false;
  558. }
  559. try {
  560. $stmt = $pdo->prepare("INSERT INTO `alias_domain` (`alias_domain`, `target_domain`, `active`)
  561. VALUES (:alias_domain, :target_domain, :active)");
  562. $stmt->execute(array(
  563. ':alias_domain' => $alias_domain,
  564. ':target_domain' => $target_domain,
  565. ':active' => $active
  566. ));
  567. }
  568. catch (PDOException $e) {
  569. mailbox('delete', 'alias_domain', array('alias_domain' => $alias_domain));
  570. $_SESSION['return'] = array(
  571. 'type' => 'danger',
  572. 'msg' => 'MySQL: '.$e
  573. );
  574. return false;
  575. }
  576. }
  577. $_SESSION['return'] = array(
  578. 'type' => 'success',
  579. 'msg' => sprintf($lang['success']['aliasd_added'], htmlspecialchars(implode(', ', $alias_domains)))
  580. );
  581. break;
  582. case 'mailbox':
  583. $local_part = strtolower(trim($_data['local_part']));
  584. $domain = idn_to_ascii(strtolower(trim($_data['domain'])));
  585. $username = $local_part . '@' . $domain;
  586. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  587. $_SESSION['return'] = array(
  588. 'type' => 'danger',
  589. 'msg' => sprintf($lang['danger']['mailbox_invalid'])
  590. );
  591. return false;
  592. }
  593. if (empty($_data['local_part'])) {
  594. $_SESSION['return'] = array(
  595. 'type' => 'danger',
  596. 'msg' => sprintf($lang['danger']['mailbox_invalid'])
  597. );
  598. return false;
  599. }
  600. $password = $_data['password'];
  601. $password2 = $_data['password2'];
  602. $name = $_data['name'];
  603. $quota_m = filter_var($_data['quota'], FILTER_SANITIZE_NUMBER_FLOAT);
  604. if (empty($name)) {
  605. $name = $local_part;
  606. }
  607. $active = intval($_data['active']);
  608. $quota_b = ($quota_m * 1048576);
  609. $maildir = $domain."/".$local_part."/";
  610. if (!is_valid_domain_name($domain)) {
  611. $_SESSION['return'] = array(
  612. 'type' => 'danger',
  613. 'msg' => sprintf($lang['danger']['domain_invalid'])
  614. );
  615. return false;
  616. }
  617. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  618. $_SESSION['return'] = array(
  619. 'type' => 'danger',
  620. 'msg' => sprintf($lang['danger']['access_denied'])
  621. );
  622. return false;
  623. }
  624. try {
  625. $stmt = $pdo->prepare("SELECT `mailboxes`, `maxquota`, `quota` FROM `domain`
  626. WHERE `domain` = :domain");
  627. $stmt->execute(array(':domain' => $domain));
  628. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  629. $stmt = $pdo->prepare("SELECT
  630. COUNT(*) as count,
  631. COALESCE(ROUND(SUM(`quota`)/1048576), 0) as `quota`
  632. FROM `mailbox`
  633. WHERE `kind` NOT REGEXP 'location|thing|group'
  634. AND `domain` = :domain");
  635. $stmt->execute(array(':domain' => $domain));
  636. $MailboxData = $stmt->fetch(PDO::FETCH_ASSOC);
  637. $stmt = $pdo->prepare("SELECT `local_part` FROM `mailbox` WHERE `local_part` = :local_part and `domain`= :domain");
  638. $stmt->execute(array(':local_part' => $local_part, ':domain' => $domain));
  639. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  640. if ($num_results != 0) {
  641. $_SESSION['return'] = array(
  642. 'type' => 'danger',
  643. 'msg' => sprintf($lang['danger']['object_exists'], htmlspecialchars($username))
  644. );
  645. return false;
  646. }
  647. $stmt = $pdo->prepare("SELECT `address` FROM `alias` WHERE address= :username");
  648. $stmt->execute(array(':username' => $username));
  649. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  650. if ($num_results != 0) {
  651. $_SESSION['return'] = array(
  652. 'type' => 'danger',
  653. 'msg' => sprintf($lang['danger']['is_alias'], htmlspecialchars($username))
  654. );
  655. return false;
  656. }
  657. $stmt = $pdo->prepare("SELECT `address` FROM `spamalias` WHERE `address`= :username");
  658. $stmt->execute(array(':username' => $username));
  659. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  660. if ($num_results != 0) {
  661. $_SESSION['return'] = array(
  662. 'type' => 'danger',
  663. 'msg' => sprintf($lang['danger']['is_spam_alias'], htmlspecialchars($username))
  664. );
  665. return false;
  666. }
  667. $stmt = $pdo->prepare("SELECT `domain` FROM `domain` WHERE `domain`= :domain");
  668. $stmt->execute(array(':domain' => $domain));
  669. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  670. if ($num_results == 0) {
  671. $_SESSION['return'] = array(
  672. 'type' => 'danger',
  673. 'msg' => sprintf($lang['danger']['domain_not_found'], htmlspecialchars($domain))
  674. );
  675. return false;
  676. }
  677. }
  678. catch(PDOException $e) {
  679. $_SESSION['return'] = array(
  680. 'type' => 'danger',
  681. 'msg' => 'MySQL: '.$e
  682. );
  683. return false;
  684. }
  685. if (!is_numeric($quota_m) || $quota_m == "0") {
  686. $_SESSION['return'] = array(
  687. 'type' => 'danger',
  688. 'msg' => sprintf($lang['danger']['quota_not_0_not_numeric'])
  689. );
  690. return false;
  691. }
  692. if (!empty($password) && !empty($password2)) {
  693. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) {
  694. $_SESSION['return'] = array(
  695. 'type' => 'danger',
  696. 'msg' => sprintf($lang['danger']['password_complexity'])
  697. );
  698. return false;
  699. }
  700. if ($password != $password2) {
  701. $_SESSION['return'] = array(
  702. 'type' => 'danger',
  703. 'msg' => sprintf($lang['danger']['password_mismatch'])
  704. );
  705. return false;
  706. }
  707. $password_hashed = hash_password($password);
  708. }
  709. else {
  710. $_SESSION['return'] = array(
  711. 'type' => 'danger',
  712. 'msg' => sprintf($lang['danger']['password_empty'])
  713. );
  714. return false;
  715. }
  716. if ($MailboxData['count'] >= $DomainData['mailboxes']) {
  717. $_SESSION['return'] = array(
  718. 'type' => 'danger',
  719. 'msg' => sprintf($lang['danger']['max_mailbox_exceeded'], $MailboxData['count'], $DomainData['mailboxes'])
  720. );
  721. return false;
  722. }
  723. if ($quota_m > $DomainData['maxquota']) {
  724. $_SESSION['return'] = array(
  725. 'type' => 'danger',
  726. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeded'], $DomainData['maxquota'])
  727. );
  728. return false;
  729. }
  730. if (($MailboxData['quota'] + $quota_m) > $DomainData['quota']) {
  731. $quota_left_m = ($DomainData['quota'] - $MailboxData['quota']);
  732. $_SESSION['return'] = array(
  733. 'type' => 'danger',
  734. 'msg' => sprintf($lang['danger']['mailbox_quota_left_exceeded'], $quota_left_m)
  735. );
  736. return false;
  737. }
  738. try {
  739. $stmt = $pdo->prepare("INSERT INTO `mailbox` (`username`, `password`, `name`, `maildir`, `quota`, `local_part`, `domain`, `active`)
  740. VALUES (:username, :password_hashed, :name, :maildir, :quota_b, :local_part, :domain, :active)");
  741. $stmt->execute(array(
  742. ':username' => $username,
  743. ':password_hashed' => $password_hashed,
  744. ':name' => $name,
  745. ':maildir' => $maildir,
  746. ':quota_b' => $quota_b,
  747. ':local_part' => $local_part,
  748. ':domain' => $domain,
  749. ':active' => $active
  750. ));
  751. $stmt = $pdo->prepare("INSERT INTO `quota2` (`username`, `bytes`, `messages`)
  752. VALUES (:username, '0', '0')");
  753. $stmt->execute(array(':username' => $username));
  754. $stmt = $pdo->prepare("INSERT INTO `alias` (`address`, `goto`, `domain`, `active`)
  755. VALUES (:username1, :username2, :domain, :active)");
  756. $stmt->execute(array(
  757. ':username1' => $username,
  758. ':username2' => $username,
  759. ':domain' => $domain,
  760. ':active' => $active
  761. ));
  762. $stmt = $pdo->prepare("INSERT INTO `user_acl` (`username`) VALUES (:username)");
  763. $stmt->execute(array(
  764. ':username' => $username
  765. ));
  766. $_SESSION['return'] = array(
  767. 'type' => 'success',
  768. 'msg' => sprintf($lang['success']['mailbox_added'], htmlspecialchars($username))
  769. );
  770. }
  771. catch (PDOException $e) {
  772. mailbox('delete', 'mailbox', array('username' => $username));
  773. $_SESSION['return'] = array(
  774. 'type' => 'danger',
  775. 'msg' => 'MySQL: '.$e
  776. );
  777. return false;
  778. }
  779. break;
  780. case 'resource':
  781. $domain = idn_to_ascii(strtolower(trim($_data['domain'])));
  782. $description = $_data['description'];
  783. $local_part = preg_replace('/[^\da-z]/i', '', preg_quote($description, '/'));
  784. $name = $local_part . '@' . $domain;
  785. $kind = $_data['kind'];
  786. $active = intval($_data['active']);
  787. $multiple_bookings = intval($_data['multiple_bookings']);
  788. if (!filter_var($name, FILTER_VALIDATE_EMAIL)) {
  789. $_SESSION['return'] = array(
  790. 'type' => 'danger',
  791. 'msg' => sprintf($lang['danger']['resource_invalid'])
  792. );
  793. return false;
  794. }
  795. if (empty($description)) {
  796. $_SESSION['return'] = array(
  797. 'type' => 'danger',
  798. 'msg' => sprintf($lang['danger']['description_invalid'])
  799. );
  800. return false;
  801. }
  802. if ($kind != 'location' && $kind != 'group' && $kind != 'thing') {
  803. $_SESSION['return'] = array(
  804. 'type' => 'danger',
  805. 'msg' => sprintf($lang['danger']['resource_invalid'])
  806. );
  807. return false;
  808. }
  809. if (!is_valid_domain_name($domain)) {
  810. $_SESSION['return'] = array(
  811. 'type' => 'danger',
  812. 'msg' => sprintf($lang['danger']['domain_invalid'])
  813. );
  814. return false;
  815. }
  816. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  817. $_SESSION['return'] = array(
  818. 'type' => 'danger',
  819. 'msg' => sprintf($lang['danger']['access_denied'])
  820. );
  821. return false;
  822. }
  823. try {
  824. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox` WHERE `username` = :name");
  825. $stmt->execute(array(':name' => $name));
  826. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  827. if ($num_results != 0) {
  828. $_SESSION['return'] = array(
  829. 'type' => 'danger',
  830. 'msg' => sprintf($lang['danger']['object_exists'], htmlspecialchars($name))
  831. );
  832. return false;
  833. }
  834. $stmt = $pdo->prepare("SELECT `address` FROM `alias` WHERE address= :name");
  835. $stmt->execute(array(':name' => $name));
  836. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  837. if ($num_results != 0) {
  838. $_SESSION['return'] = array(
  839. 'type' => 'danger',
  840. 'msg' => sprintf($lang['danger']['is_alias'], htmlspecialchars($name))
  841. );
  842. return false;
  843. }
  844. $stmt = $pdo->prepare("SELECT `address` FROM `spamalias` WHERE `address`= :name");
  845. $stmt->execute(array(':name' => $name));
  846. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  847. if ($num_results != 0) {
  848. $_SESSION['return'] = array(
  849. 'type' => 'danger',
  850. 'msg' => sprintf($lang['danger']['is_spam_alias'], htmlspecialchars($name))
  851. );
  852. return false;
  853. }
  854. $stmt = $pdo->prepare("SELECT `domain` FROM `domain` WHERE `domain`= :domain");
  855. $stmt->execute(array(':domain' => $domain));
  856. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  857. if ($num_results == 0) {
  858. $_SESSION['return'] = array(
  859. 'type' => 'danger',
  860. 'msg' => sprintf($lang['danger']['domain_not_found'], htmlspecialchars($domain))
  861. );
  862. return false;
  863. }
  864. }
  865. catch(PDOException $e) {
  866. $_SESSION['return'] = array(
  867. 'type' => 'danger',
  868. 'msg' => 'MySQL: '.$e
  869. );
  870. return false;
  871. }
  872. try {
  873. $stmt = $pdo->prepare("INSERT INTO `mailbox` (`username`, `password`, `name`, `maildir`, `quota`, `local_part`, `domain`, `active`, `multiple_bookings`, `kind`)
  874. VALUES (:name, 'RESOURCE', :description, 'RESOURCE', 0, :local_part, :domain, :active, :multiple_bookings, :kind)");
  875. $stmt->execute(array(
  876. ':name' => $name,
  877. ':description' => $description,
  878. ':local_part' => $local_part,
  879. ':domain' => $domain,
  880. ':active' => $active,
  881. ':kind' => $kind,
  882. ':multiple_bookings' => $multiple_bookings
  883. ));
  884. $_SESSION['return'] = array(
  885. 'type' => 'success',
  886. 'msg' => sprintf($lang['success']['resource_added'], htmlspecialchars($name))
  887. );
  888. }
  889. catch (PDOException $e) {
  890. mailbox('delete', 'resource', array('name' => $name));
  891. $_SESSION['return'] = array(
  892. 'type' => 'danger',
  893. 'msg' => 'MySQL: '.$e
  894. );
  895. return false;
  896. }
  897. break;
  898. }
  899. break;
  900. case 'edit':
  901. switch ($_type) {
  902. case 'alias_domain':
  903. $alias_domains = (array)$_data['alias_domain'];
  904. foreach ($alias_domains as $alias_domain) {
  905. $alias_domain = idn_to_ascii(strtolower(trim($alias_domain)));
  906. $is_now = mailbox('get', 'alias_domain_details', $alias_domain);
  907. if (!empty($is_now)) {
  908. $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active_int'];
  909. $target_domain = (!empty($_data['target_domain'])) ? idn_to_ascii(strtolower(trim($_data['target_domain']))) : $is_now['target_domain'];
  910. }
  911. else {
  912. $_SESSION['return'] = array(
  913. 'type' => 'danger',
  914. 'msg' => sprintf($lang['danger']['alias_domain_invalid'])
  915. );
  916. return false;
  917. }
  918. if (!is_valid_domain_name($target_domain)) {
  919. $_SESSION['return'] = array(
  920. 'type' => 'danger',
  921. 'msg' => sprintf($lang['danger']['target_domain_invalid'])
  922. );
  923. return false;
  924. }
  925. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $target_domain)) {
  926. $_SESSION['return'] = array(
  927. 'type' => 'danger',
  928. 'msg' => sprintf($lang['danger']['access_denied'])
  929. );
  930. return false;
  931. }
  932. if (empty(mailbox('get', 'domain_details', $target_domain)) || !empty(mailbox('get', 'alias_domain_details', $target_domain))) {
  933. $_SESSION['return'] = array(
  934. 'type' => 'danger',
  935. 'msg' => sprintf($lang['danger']['target_domain_invalid'])
  936. );
  937. return false;
  938. }
  939. try {
  940. $stmt = $pdo->prepare("UPDATE `alias_domain` SET
  941. `target_domain` = :target_domain,
  942. `active` = :active
  943. WHERE `alias_domain` = :alias_domain");
  944. $stmt->execute(array(
  945. ':alias_domain' => $alias_domain,
  946. ':target_domain' => $target_domain,
  947. ':active' => $active
  948. ));
  949. }
  950. catch (PDOException $e) {
  951. $_SESSION['return'] = array(
  952. 'type' => 'danger',
  953. 'msg' => 'MySQL: '.$e
  954. );
  955. return false;
  956. }
  957. }
  958. $_SESSION['return'] = array(
  959. 'type' => 'success',
  960. 'msg' => sprintf($lang['success']['aliasd_modified'], htmlspecialchars(implode(', ', $alias_domains)))
  961. );
  962. break;
  963. case 'tls_policy':
  964. if (!is_array($_data['username'])) {
  965. $usernames = array();
  966. $usernames[] = $_data['username'];
  967. }
  968. else {
  969. $usernames = $_data['username'];
  970. }
  971. if (!isset($_SESSION['acl']['tls_policy']) || $_SESSION['acl']['tls_policy'] != "1" ) {
  972. $_SESSION['return'] = array(
  973. 'type' => 'danger',
  974. 'msg' => sprintf($lang['danger']['access_denied'])
  975. );
  976. return false;
  977. }
  978. foreach ($usernames as $username) {
  979. if (!filter_var($username, FILTER_VALIDATE_EMAIL) || !hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $username)) {
  980. $_SESSION['return'] = array(
  981. 'type' => 'danger',
  982. 'msg' => sprintf($lang['danger']['access_denied'])
  983. );
  984. return false;
  985. }
  986. $is_now = mailbox('get', 'tls_policy', $username);
  987. if (!empty($is_now)) {
  988. $tls_enforce_in = (isset($_data['tls_enforce_in'])) ? intval($_data['tls_enforce_in']) : $is_now['tls_enforce_in'];
  989. $tls_enforce_out = (isset($_data['tls_enforce_out'])) ? intval($_data['tls_enforce_out']) : $is_now['tls_enforce_out'];
  990. }
  991. else {
  992. $_SESSION['return'] = array(
  993. 'type' => 'danger',
  994. 'msg' => sprintf($lang['danger']['access_denied'])
  995. );
  996. return false;
  997. }
  998. try {
  999. $stmt = $pdo->prepare("UPDATE `mailbox` SET `tls_enforce_out` = :tls_out, `tls_enforce_in` = :tls_in WHERE `username` = :username");
  1000. $stmt->execute(array(
  1001. ':tls_out' => $tls_enforce_out,
  1002. ':tls_in' => $tls_enforce_in,
  1003. ':username' => $username
  1004. ));
  1005. }
  1006. catch (PDOException $e) {
  1007. $_SESSION['return'] = array(
  1008. 'type' => 'danger',
  1009. 'msg' => 'MySQL: '.$e
  1010. );
  1011. return false;
  1012. }
  1013. }
  1014. $_SESSION['return'] = array(
  1015. 'type' => 'success',
  1016. 'msg' => sprintf($lang['success']['mailbox_modified'], implode(', ', $usernames))
  1017. );
  1018. break;
  1019. case 'spam_score':
  1020. if (!is_array($_data['username'])) {
  1021. $usernames = array();
  1022. $usernames[] = $_data['username'];
  1023. }
  1024. else {
  1025. $usernames = $_data['username'];
  1026. }
  1027. if (!isset($_SESSION['acl']['spam_score']) || $_SESSION['acl']['spam_score'] != "1" ) {
  1028. $_SESSION['return'] = array(
  1029. 'type' => 'danger',
  1030. 'msg' => sprintf($lang['danger']['access_denied'])
  1031. );
  1032. return false;
  1033. }
  1034. foreach ($usernames as $username) {
  1035. $lowspamlevel = explode(',', $_data['spam_score'])[0];
  1036. $highspamlevel = explode(',', $_data['spam_score'])[1];
  1037. if (!is_numeric($lowspamlevel) || !is_numeric($highspamlevel)) {
  1038. $_SESSION['return'] = array(
  1039. 'type' => 'danger',
  1040. 'msg' => sprintf($lang['danger']['access_denied'])
  1041. );
  1042. return false;
  1043. }
  1044. try {
  1045. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :username
  1046. AND (`option` = 'lowspamlevel' OR `option` = 'highspamlevel')");
  1047. $stmt->execute(array(
  1048. ':username' => $username
  1049. ));
  1050. $stmt = $pdo->prepare("INSERT INTO `filterconf` (`object`, `option`, `value`)
  1051. VALUES (:username, 'highspamlevel', :highspamlevel)");
  1052. $stmt->execute(array(
  1053. ':username' => $username,
  1054. ':highspamlevel' => $highspamlevel
  1055. ));
  1056. $stmt = $pdo->prepare("INSERT INTO `filterconf` (`object`, `option`, `value`)
  1057. VALUES (:username, 'lowspamlevel', :lowspamlevel)");
  1058. $stmt->execute(array(
  1059. ':username' => $username,
  1060. ':lowspamlevel' => $lowspamlevel
  1061. ));
  1062. }
  1063. catch (PDOException $e) {
  1064. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :username
  1065. AND (`option` = 'lowspamlevel' OR `option` = 'highspamlevel')");
  1066. $stmt->execute(array(
  1067. ':username' => $username
  1068. ));
  1069. $_SESSION['return'] = array(
  1070. 'type' => 'danger',
  1071. 'msg' => 'MySQL: '.$e
  1072. );
  1073. return false;
  1074. }
  1075. }
  1076. $_SESSION['return'] = array(
  1077. 'type' => 'success',
  1078. 'msg' => sprintf($lang['success']['mailbox_modified'], implode(', ', $usernames))
  1079. );
  1080. break;
  1081. case 'time_limited_alias':
  1082. if (!isset($_SESSION['acl']['spam_alias']) || $_SESSION['acl']['spam_alias'] != "1" ) {
  1083. $_SESSION['return'] = array(
  1084. 'type' => 'danger',
  1085. 'msg' => sprintf($lang['danger']['access_denied'])
  1086. );
  1087. return false;
  1088. }
  1089. if (!is_array($_data['address'])) {
  1090. $addresses = array();
  1091. $addresses[] = $_data['address'];
  1092. }
  1093. else {
  1094. $addresses = $_data['address'];
  1095. }
  1096. foreach ($addresses as $address) {
  1097. try {
  1098. $stmt = $pdo->prepare("SELECT `goto` FROM `spamalias` WHERE `address` = :address");
  1099. $stmt->execute(array(':address' => $address));
  1100. $goto = $stmt->fetch(PDO::FETCH_ASSOC)['goto'];
  1101. }
  1102. catch (PDOException $e) {
  1103. $_SESSION['return'] = array(
  1104. 'type' => 'danger',
  1105. 'msg' => 'MySQL: '.$e
  1106. );
  1107. return false;
  1108. }
  1109. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $goto)) {
  1110. $_SESSION['return'] = array(
  1111. 'type' => 'danger',
  1112. 'msg' => sprintf($lang['danger']['access_denied'])
  1113. );
  1114. return false;
  1115. }
  1116. try {
  1117. $stmt = $pdo->prepare("UPDATE `spamalias` SET `validity` = (`validity` + 3600) WHERE
  1118. `address` = :address AND
  1119. `validity` >= :validity");
  1120. $stmt->execute(array(
  1121. ':address' => $address,
  1122. ':validity' => time()
  1123. ));
  1124. }
  1125. catch (PDOException $e) {
  1126. $_SESSION['return'] = array(
  1127. 'type' => 'danger',
  1128. 'msg' => 'MySQL: '.$e
  1129. );
  1130. return false;
  1131. }
  1132. }
  1133. $_SESSION['return'] = array(
  1134. 'type' => 'success',
  1135. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars(implode(', ', $usernames)))
  1136. );
  1137. break;
  1138. case 'delimiter_action':
  1139. if (!is_array($_data['username'])) {
  1140. $usernames = array();
  1141. $usernames[] = $_data['username'];
  1142. }
  1143. else {
  1144. $usernames = $_data['username'];
  1145. }
  1146. if (!isset($_SESSION['acl']['delimiter_action']) || $_SESSION['acl']['delimiter_action'] != "1" ) {
  1147. $_SESSION['return'] = array(
  1148. 'type' => 'danger',
  1149. 'msg' => sprintf($lang['danger']['access_denied'])
  1150. );
  1151. return false;
  1152. }
  1153. foreach ($usernames as $username) {
  1154. if (!filter_var($username, FILTER_VALIDATE_EMAIL) || !hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $username)) {
  1155. $_SESSION['return'] = array(
  1156. 'type' => 'danger',
  1157. 'msg' => sprintf($lang['danger']['access_denied'])
  1158. );
  1159. return false;
  1160. }
  1161. if (isset($_data['tagged_mail_handler']) && $_data['tagged_mail_handler'] == "subject") {
  1162. try {
  1163. $redis->hSet('RCPT_WANTS_SUBJECT_TAG', $username, 1);
  1164. }
  1165. catch (RedisException $e) {
  1166. $_SESSION['return'] = array(
  1167. 'type' => 'danger',
  1168. 'msg' => 'Redis: '.$e
  1169. );
  1170. return false;
  1171. }
  1172. }
  1173. else {
  1174. try {
  1175. $redis->hDel('RCPT_WANTS_SUBJECT_TAG', $username);
  1176. }
  1177. catch (RedisException $e) {
  1178. $_SESSION['return'] = array(
  1179. 'type' => 'danger',
  1180. 'msg' => 'Redis: '.$e
  1181. );
  1182. return false;
  1183. }
  1184. }
  1185. }
  1186. $_SESSION['return'] = array(
  1187. 'type' => 'success',
  1188. 'msg' => sprintf($lang['success']['mailbox_modified'], implode(', ', $usernames))
  1189. );
  1190. break;
  1191. case 'ratelimit':
  1192. $rl_value = intval($_data['rl_value']);
  1193. $rl_frame = $_data['rl_frame'];
  1194. if (!in_array($rl_frame, array('s', 'm', 'h'))) {
  1195. $_SESSION['return'] = array(
  1196. 'type' => 'danger',
  1197. 'msg' => 'Ratelimit time frame is incorrect'
  1198. );
  1199. return false;
  1200. }
  1201. if (!is_array($_data['object'])) {
  1202. $objects = array();
  1203. $objects[] = $_data['object'];
  1204. }
  1205. else {
  1206. $objects = $_data['object'];
  1207. }
  1208. foreach ($objects as $object) {
  1209. if (is_valid_domain_name($object)) {
  1210. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $object)) {
  1211. $_SESSION['return'] = array(
  1212. 'type' => 'danger',
  1213. 'msg' => sprintf($lang['danger']['access_denied'])
  1214. );
  1215. return false;
  1216. }
  1217. }
  1218. elseif (filter_var($object, FILTER_VALIDATE_EMAIL)) {
  1219. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $object)) {
  1220. $_SESSION['return'] = array(
  1221. 'type' => 'danger',
  1222. 'msg' => sprintf($lang['danger']['access_denied'])
  1223. );
  1224. return false;
  1225. }
  1226. }
  1227. else {
  1228. return false;
  1229. }
  1230. if (empty($rl_value)) {
  1231. try {
  1232. $redis->hDel('RL_VALUE', $object);
  1233. }
  1234. catch (RedisException $e) {
  1235. $_SESSION['return'] = array(
  1236. 'type' => 'danger',
  1237. 'msg' => 'Redis: '.$e
  1238. );
  1239. return false;
  1240. }
  1241. }
  1242. else {
  1243. try {
  1244. $redis->hSet('RL_VALUE', $object, $rl_value . ' / 1' . $rl_frame);
  1245. }
  1246. catch (RedisException $e) {
  1247. $_SESSION['return'] = array(
  1248. 'type' => 'danger',
  1249. 'msg' => 'Redis: '.$e
  1250. );
  1251. return false;
  1252. }
  1253. }
  1254. }
  1255. $_SESSION['return'] = array(
  1256. 'type' => 'success',
  1257. 'msg' => sprintf($lang['success']['domain_modified'], implode(', ', $objects))
  1258. );
  1259. break;
  1260. case 'syncjob':
  1261. if (!is_array($_data['id'])) {
  1262. $ids = array();
  1263. $ids[] = $_data['id'];
  1264. }
  1265. else {
  1266. $ids = $_data['id'];
  1267. }
  1268. if (!isset($_SESSION['acl']['syncjobs']) || $_SESSION['acl']['syncjobs'] != "1" ) {
  1269. $_SESSION['return'] = array(
  1270. 'type' => 'danger',
  1271. 'msg' => sprintf($lang['danger']['access_denied'])
  1272. );
  1273. return false;
  1274. }
  1275. foreach ($ids as $id) {
  1276. $is_now = mailbox('get', 'syncjob_details', $id);
  1277. if (!empty($is_now)) {
  1278. $username = $is_now['user2'];
  1279. $user1 = (!empty($_data['user1'])) ? $_data['user1'] : $is_now['user1'];
  1280. $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active_int'];
  1281. $delete2duplicates = (isset($_data['delete2duplicates'])) ? intval($_data['delete2duplicates']) : $is_now['delete2duplicates'];
  1282. $delete1 = (isset($_data['delete1'])) ? intval($_data['delete1']) : $is_now['delete1'];
  1283. $delete2 = (isset($_data['delete2'])) ? intval($_data['delete2']) : $is_now['delete2'];
  1284. $port1 = (!empty($_data['port1'])) ? $_data['port1'] : $is_now['port1'];
  1285. $password1 = (!empty($_data['password1'])) ? $_data['password1'] : $is_now['password1'];
  1286. $host1 = (!empty($_data['host1'])) ? $_data['host1'] : $is_now['host1'];
  1287. $subfolder2 = (!empty($_data['subfolder2'])) ? $_data['subfolder2'] : $is_now['subfolder2'];
  1288. $enc1 = (!empty($_data['enc1'])) ? $_data['enc1'] : $is_now['enc1'];
  1289. $mins_interval = (!empty($_data['mins_interval'])) ? $_data['mins_interval'] : $is_now['mins_interval'];
  1290. $exclude = (!empty($_data['exclude'])) ? $_data['exclude'] : $is_now['exclude'];
  1291. $maxage = (!empty($_data['maxage'])) ? $_data['maxage'] : $is_now['maxage'];
  1292. }
  1293. else {
  1294. $_SESSION['return'] = array(
  1295. 'type' => 'danger',
  1296. 'msg' => sprintf($lang['danger']['access_denied'])
  1297. );
  1298. return false;
  1299. }
  1300. if (empty($subfolder2)) {
  1301. $subfolder2 = "";
  1302. }
  1303. if (!isset($maxage) || !filter_var($maxage, FILTER_VALIDATE_INT, array('options' => array('min_range' => 1, 'max_range' => 32767)))) {
  1304. $maxage = "0";
  1305. }
  1306. if (!filter_var($port1, FILTER_VALIDATE_INT, array('options' => array('min_range' => 1, 'max_range' => 65535)))) {
  1307. $_SESSION['return'] = array(
  1308. 'type' => 'danger',
  1309. 'msg' => sprintf($lang['danger']['access_denied'])
  1310. );
  1311. return false;
  1312. }
  1313. if (!filter_var($mins_interval, FILTER_VALIDATE_INT, array('options' => array('min_range' => 10, 'max_range' => 3600)))) {
  1314. $_SESSION['return'] = array(
  1315. 'type' => 'danger',
  1316. 'msg' => sprintf($lang['danger']['access_denied'])
  1317. );
  1318. return false;
  1319. }
  1320. if (!is_valid_domain_name($host1)) {
  1321. $_SESSION['return'] = array(
  1322. 'type' => 'danger',
  1323. 'msg' => sprintf($lang['danger']['access_denied'])
  1324. );
  1325. return false;
  1326. }
  1327. if ($enc1 != "TLS" && $enc1 != "SSL" && $enc1 != "PLAIN") {
  1328. $_SESSION['return'] = array(
  1329. 'type' => 'danger',
  1330. 'msg' => sprintf($lang['danger']['access_denied'])
  1331. );
  1332. return false;
  1333. }
  1334. if (@preg_match("/" . $exclude . "/", null) === false) {
  1335. $_SESSION['return'] = array(
  1336. 'type' => 'danger',
  1337. 'msg' => sprintf($lang['danger']['access_denied'])
  1338. );
  1339. return false;
  1340. }
  1341. try {
  1342. $stmt = $pdo->prepare("UPDATE `imapsync` SET `delete1` = :delete1, `delete2` = :delete2, `maxage` = :maxage, `subfolder2` = :subfolder2, `exclude` = :exclude, `host1` = :host1, `user1` = :user1, `password1` = :password1, `mins_interval` = :mins_interval, `port1` = :port1, `enc1` = :enc1, `delete2duplicates` = :delete2duplicates, `active` = :active
  1343. WHERE `id` = :id");
  1344. $stmt->execute(array(
  1345. ':delete1' => $delete1,
  1346. ':delete2' => $delete2,
  1347. ':id' => $id,
  1348. ':exclude' => $exclude,
  1349. ':maxage' => $maxage,
  1350. ':subfolder2' => $subfolder2,
  1351. ':host1' => $host1,
  1352. ':user1' => $user1,
  1353. ':password1' => $password1,
  1354. ':mins_interval' => $mins_interval,
  1355. ':port1' => $port1,
  1356. ':enc1' => $enc1,
  1357. ':delete2duplicates' => $delete2duplicates,
  1358. ':active' => $active,
  1359. ));
  1360. }
  1361. catch(PDOException $e) {
  1362. $_SESSION['return'] = array(
  1363. 'type' => 'danger',
  1364. 'msg' => 'MySQL: '.$e
  1365. );
  1366. return false;
  1367. }
  1368. }
  1369. $_SESSION['return'] = array(
  1370. 'type' => 'success',
  1371. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  1372. );
  1373. return true;
  1374. break;
  1375. case 'alias':
  1376. if (!is_array($_data['address'])) {
  1377. $addresses = array();
  1378. $addresses[] = $_data['address'];
  1379. }
  1380. else {
  1381. $addresses = $_data['address'];
  1382. }
  1383. foreach ($addresses as $address) {
  1384. $is_now = mailbox('get', 'alias_details', $address);
  1385. if (!empty($is_now)) {
  1386. $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active_int'];
  1387. $goto = (!empty($_data['goto'])) ? $_data['goto'] : $is_now['goto'];
  1388. }
  1389. else {
  1390. $_SESSION['return'] = array(
  1391. 'type' => 'danger',
  1392. 'msg' => sprintf($lang['danger']['alias_invalid'])
  1393. );
  1394. return false;
  1395. }
  1396. $gotos = array_map('trim', preg_split( "/( |,|;|\n)/", $_data['goto']));
  1397. foreach ($gotos as &$goto) {
  1398. if (empty($goto)) {
  1399. continue;
  1400. }
  1401. if (!filter_var($goto, FILTER_VALIDATE_EMAIL)) {
  1402. $_SESSION['return'] = array(
  1403. 'type' => 'danger',
  1404. 'msg' =>sprintf($lang['danger']['goto_invalid'])
  1405. );
  1406. return false;
  1407. }
  1408. if ($goto == $address) {
  1409. $_SESSION['return'] = array(
  1410. 'type' => 'danger',
  1411. 'msg' => sprintf($lang['danger']['alias_goto_identical'])
  1412. );
  1413. return false;
  1414. }
  1415. }
  1416. $gotos = array_filter($gotos);
  1417. $goto = implode(",", $gotos);
  1418. $domain = idn_to_ascii(substr(strstr($address, '@'), 1));
  1419. $local_part = strstr($address, '@', true);
  1420. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  1421. $_SESSION['return'] = array(
  1422. 'type' => 'danger',
  1423. 'msg' => sprintf($lang['danger']['access_denied'])
  1424. );
  1425. return false;
  1426. }
  1427. if ((!filter_var($address, FILTER_VALIDATE_EMAIL) === true) && !empty($local_part)) {
  1428. $_SESSION['return'] = array(
  1429. 'type' => 'danger',
  1430. 'msg' => sprintf($lang['danger']['alias_invalid'])
  1431. );
  1432. return false;
  1433. }
  1434. try {
  1435. if (!empty($goto)) {
  1436. $stmt = $pdo->prepare("UPDATE `alias` SET
  1437. `goto` = :goto,
  1438. `active`= :active
  1439. WHERE `address` = :address");
  1440. $stmt->execute(array(
  1441. ':goto' => $goto,
  1442. ':active' => $active,
  1443. ':address' => $address
  1444. ));
  1445. }
  1446. else {
  1447. $stmt = $pdo->prepare("UPDATE `alias` SET
  1448. `active`= :active
  1449. WHERE `address` = :address");
  1450. $stmt->execute(array(
  1451. ':active' => $active,
  1452. ':address' => $address
  1453. ));
  1454. }
  1455. }
  1456. catch (PDOException $e) {
  1457. $_SESSION['return'] = array(
  1458. 'type' => 'danger',
  1459. 'msg' => 'MySQL: '.$e
  1460. );
  1461. return false;
  1462. }
  1463. }
  1464. $_SESSION['return'] = array(
  1465. 'type' => 'success',
  1466. 'msg' => sprintf($lang['success']['alias_modified'], htmlspecialchars(implode(', ', $addresses)))
  1467. );
  1468. break;
  1469. case 'domain':
  1470. if (!is_array($_data['domain'])) {
  1471. $domains = array();
  1472. $domains[] = $_data['domain'];
  1473. }
  1474. else {
  1475. $domains = $_data['domain'];
  1476. }
  1477. foreach ($domains as $domain) {
  1478. $domain = idn_to_ascii($domain);
  1479. if (!is_valid_domain_name($domain)) {
  1480. $_SESSION['return'] = array(
  1481. 'type' => 'danger',
  1482. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1483. );
  1484. return false;
  1485. }
  1486. if ($_SESSION['mailcow_cc_role'] == "domainadmin" &&
  1487. hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  1488. $description = $_data['description'];
  1489. $active = intval($_data['active']);
  1490. try {
  1491. $stmt = $pdo->prepare("UPDATE `domain` SET
  1492. `description` = :description
  1493. WHERE `domain` = :domain");
  1494. $stmt->execute(array(
  1495. ':description' => $description,
  1496. ':domain' => $domain
  1497. ));
  1498. $_SESSION['return'] = array(
  1499. 'type' => 'success',
  1500. 'msg' => sprintf($lang['success']['domain_modified'], htmlspecialchars($domain))
  1501. );
  1502. }
  1503. catch (PDOException $e) {
  1504. $_SESSION['return'] = array(
  1505. 'type' => 'danger',
  1506. 'msg' => 'MySQL: '.$e
  1507. );
  1508. return false;
  1509. }
  1510. }
  1511. elseif ($_SESSION['mailcow_cc_role'] == "admin") {
  1512. $is_now = mailbox('get', 'domain_details', $domain);
  1513. if (!empty($is_now)) {
  1514. $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active_int'];
  1515. $backupmx = (isset($_data['backupmx'])) ? intval($_data['backupmx']) : $is_now['backupmx_int'];
  1516. $relay_all_recipients = (isset($_data['relay_all_recipients'])) ? intval($_data['relay_all_recipients']) : $is_now['relay_all_recipients_int'];
  1517. $relayhost = (isset($_data['relayhost'])) ? intval($_data['relayhost']) : $is_now['relayhost'];
  1518. $aliases = (!empty($_data['aliases'])) ? $_data['aliases'] : $is_now['max_num_aliases_for_domain'];
  1519. $mailboxes = (!empty($_data['mailboxes'])) ? $_data['mailboxes'] : $is_now['max_num_mboxes_for_domain'];
  1520. $maxquota = (!empty($_data['maxquota'])) ? $_data['maxquota'] : ($is_now['max_quota_for_mbox'] / 1048576);
  1521. $quota = (!empty($_data['quota'])) ? $_data['quota'] : ($is_now['max_quota_for_domain'] / 1048576);
  1522. $description = (!empty($_data['description'])) ? $_data['description'] : $is_now['description'];
  1523. ($relay_all_recipients == '1') ? $backupmx = '1' : null;
  1524. }
  1525. else {
  1526. $_SESSION['return'] = array(
  1527. 'type' => 'danger',
  1528. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1529. );
  1530. return false;
  1531. }
  1532. try {
  1533. // todo: should be using api here
  1534. $stmt = $pdo->prepare("SELECT
  1535. COUNT(*) AS count,
  1536. MAX(COALESCE(ROUND(`quota`/1048576), 0)) AS `biggest_mailbox`,
  1537. COALESCE(ROUND(SUM(`quota`)/1048576), 0) AS `quota_all`
  1538. FROM `mailbox`
  1539. WHERE `kind` NOT REGEXP 'location|thing|group'
  1540. AND domain = :domain");
  1541. $stmt->execute(array(':domain' => $domain));
  1542. $MailboxData = $stmt->fetch(PDO::FETCH_ASSOC);
  1543. // todo: should be using api here
  1544. $stmt = $pdo->prepare("SELECT COUNT(*) AS `count` FROM `alias`
  1545. WHERE domain = :domain
  1546. AND address NOT IN (
  1547. SELECT `username` FROM `mailbox`
  1548. )");
  1549. $stmt->execute(array(':domain' => $domain));
  1550. $AliasData = $stmt->fetch(PDO::FETCH_ASSOC);
  1551. }
  1552. catch(PDOException $e) {
  1553. $_SESSION['return'] = array(
  1554. 'type' => 'danger',
  1555. 'msg' => 'MySQL: '.$e
  1556. );
  1557. return false;
  1558. }
  1559. if ($maxquota > $quota) {
  1560. $_SESSION['return'] = array(
  1561. 'type' => 'danger',
  1562. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeds_domain_quota'])
  1563. );
  1564. return false;
  1565. }
  1566. if ($maxquota == "0" || empty($maxquota)) {
  1567. $_SESSION['return'] = array(
  1568. 'type' => 'danger',
  1569. 'msg' => sprintf($lang['danger']['maxquota_empty'])
  1570. );
  1571. return false;
  1572. }
  1573. if ($MailboxData['biggest_mailbox'] > $maxquota) {
  1574. $_SESSION['return'] = array(
  1575. 'type' => 'danger',
  1576. 'msg' => sprintf($lang['danger']['max_quota_in_use'], $MailboxData['biggest_mailbox'])
  1577. );
  1578. return false;
  1579. }
  1580. if ($MailboxData['quota_all'] > $quota) {
  1581. $_SESSION['return'] = array(
  1582. 'type' => 'danger',
  1583. 'msg' => sprintf($lang['danger']['domain_quota_m_in_use'], $MailboxData['quota_all'])
  1584. );
  1585. return false;
  1586. }
  1587. if ($MailboxData['count'] > $mailboxes) {
  1588. $_SESSION['return'] = array(
  1589. 'type' => 'danger',
  1590. 'msg' => sprintf($lang['danger']['mailboxes_in_use'], $MailboxData['count'])
  1591. );
  1592. return false;
  1593. }
  1594. if ($AliasData['count'] > $aliases) {
  1595. $_SESSION['return'] = array(
  1596. 'type' => 'danger',
  1597. 'msg' => sprintf($lang['danger']['aliases_in_use'], $AliasData['count'])
  1598. );
  1599. return false;
  1600. }
  1601. try {
  1602. $stmt = $pdo->prepare("UPDATE `domain` SET
  1603. `relay_all_recipients` = :relay_all_recipients,
  1604. `backupmx` = :backupmx,
  1605. `active` = :active,
  1606. `quota` = :quota,
  1607. `maxquota` = :maxquota,
  1608. `relayhost` = :relayhost,
  1609. `mailboxes` = :mailboxes,
  1610. `aliases` = :aliases,
  1611. `description` = :description
  1612. WHERE `domain` = :domain");
  1613. $stmt->execute(array(
  1614. ':relay_all_recipients' => $relay_all_recipients,
  1615. ':backupmx' => $backupmx,
  1616. ':active' => $active,
  1617. ':quota' => $quota,
  1618. ':maxquota' => $maxquota,
  1619. ':relayhost' => $relayhost,
  1620. ':mailboxes' => $mailboxes,
  1621. ':aliases' => $aliases,
  1622. ':description' => $description,
  1623. ':domain' => $domain
  1624. ));
  1625. }
  1626. catch (PDOException $e) {
  1627. $_SESSION['return'] = array(
  1628. 'type' => 'danger',
  1629. 'msg' => 'MySQL: '.$e
  1630. );
  1631. return false;
  1632. }
  1633. }
  1634. }
  1635. $_SESSION['return'] = array(
  1636. 'type' => 'success',
  1637. 'msg' => sprintf($lang['success']['domain_modified'], htmlspecialchars(implode(', ', $domains)))
  1638. );
  1639. break;
  1640. case 'mailbox':
  1641. if (!is_array($_data['username'])) {
  1642. $usernames = array();
  1643. $usernames[] = $_data['username'];
  1644. }
  1645. else {
  1646. $usernames = $_data['username'];
  1647. }
  1648. foreach ($usernames as $username) {
  1649. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  1650. $_SESSION['return'] = array(
  1651. 'type' => 'danger',
  1652. 'msg' => sprintf($lang['danger']['username_invalid'])
  1653. );
  1654. return false;
  1655. }
  1656. $is_now = mailbox('get', 'mailbox_details', $username);
  1657. if (!empty($is_now)) {
  1658. $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active_int'];
  1659. $name = (!empty($_data['name'])) ? $_data['name'] : $is_now['name'];
  1660. $domain = $is_now['domain'];
  1661. $quota_m = (!empty($_data['quota'])) ? $_data['quota'] : ($is_now['quota'] / 1048576);
  1662. $quota_b = $quota_m * 1048576;
  1663. $password = (!empty($_data['password'])) ? $_data['password'] : null;
  1664. $password2 = (!empty($_data['password2'])) ? $_data['password2'] : null;
  1665. }
  1666. else {
  1667. $_SESSION['return'] = array(
  1668. 'type' => 'danger',
  1669. 'msg' => sprintf($lang['danger']['access_denied'])
  1670. );
  1671. return false;
  1672. }
  1673. try {
  1674. $stmt = $pdo->prepare("SELECT `quota`, `maxquota`
  1675. FROM `domain`
  1676. WHERE `domain` = :domain");
  1677. $stmt->execute(array(':domain' => $domain));
  1678. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  1679. }
  1680. catch(PDOException $e) {
  1681. $_SESSION['return'] = array(
  1682. 'type' => 'danger',
  1683. 'msg' => 'MySQL: '.$e
  1684. );
  1685. return false;
  1686. }
  1687. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  1688. $_SESSION['return'] = array(
  1689. 'type' => 'danger',
  1690. 'msg' => sprintf($lang['danger']['access_denied'])
  1691. );
  1692. return false;
  1693. }
  1694. if (!is_numeric($quota_m) || $quota_m == "0") {
  1695. $_SESSION['return'] = array(
  1696. 'type' => 'danger',
  1697. 'msg' => sprintf($lang['danger']['quota_not_0_not_numeric'], htmlspecialchars($quota_m))
  1698. );
  1699. return false;
  1700. }
  1701. if ($quota_m > $DomainData['maxquota']) {
  1702. $_SESSION['return'] = array(
  1703. 'type' => 'danger',
  1704. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeded'], $DomainData['maxquota'])
  1705. );
  1706. return false;
  1707. }
  1708. if (((($is_now['quota_used'] / 1048576) - $quota_m) + $quota_m) > $DomainData['quota']) {
  1709. $_SESSION['return'] = array(
  1710. 'type' => 'danger',
  1711. 'msg' => sprintf($lang['danger']['mailbox_quota_left_exceeded'], ($is_now['max_new_quota'] / 1048576))
  1712. );
  1713. return false;
  1714. }
  1715. if (isset($_data['sender_acl'])) {
  1716. // Get sender_acl items set by admin
  1717. $sender_acl_admin = array_merge(
  1718. mailbox('get', 'sender_acl_handles', $username)['sender_acl_domains']['ro'],
  1719. mailbox('get', 'sender_acl_handles', $username)['sender_acl_addresses']['ro']
  1720. );
  1721. // Get sender_acl items from POST array
  1722. $sender_acl_domain_admin = ($_data['sender_acl'] == "0") ? array() : (array)$_data['sender_acl'];
  1723. if (!empty($sender_acl_domain_admin) || !empty($sender_acl_admin)) {
  1724. // Check items in POST array and skip invalid
  1725. foreach ($sender_acl_domain_admin as $key => $val) {
  1726. if (!filter_var($val, FILTER_VALIDATE_EMAIL) && !is_valid_domain_name(ltrim($val, '@'))) {
  1727. unset($sender_acl_domain_admin[$key]);
  1728. }
  1729. if (is_valid_domain_name(ltrim($val, '@'))) {
  1730. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], ltrim($val, '@'))) {
  1731. $_SESSION['return'] = array(
  1732. 'type' => 'danger',
  1733. 'msg' => sprintf($lang['danger']['sender_acl_invalid'])
  1734. );
  1735. return false;
  1736. }
  1737. }
  1738. if (filter_var($val, FILTER_VALIDATE_EMAIL)) {
  1739. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $val)) {
  1740. $_SESSION['return'] = array(
  1741. 'type' => 'danger',
  1742. 'msg' => sprintf($lang['danger']['sender_acl_invalid'])
  1743. );
  1744. return false;
  1745. }
  1746. }
  1747. }
  1748. // Merge both arrays
  1749. $sender_acl_merged = array_merge($sender_acl_domain_admin, $sender_acl_admin);
  1750. try {
  1751. $stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` = :username");
  1752. $stmt->execute(array(
  1753. ':username' => $username
  1754. ));
  1755. }
  1756. catch (PDOException $e) {
  1757. $_SESSION['return'] = array(
  1758. 'type' => 'danger',
  1759. 'msg' => 'MySQL: '.$e
  1760. );
  1761. return false;
  1762. }
  1763. foreach ($sender_acl_merged as $sender_acl) {
  1764. $domain = ltrim($sender_acl, '@');
  1765. if (is_valid_domain_name($domain)) {
  1766. $sender_acl = '@' . $domain;
  1767. }
  1768. try {
  1769. $stmt = $pdo->prepare("INSERT INTO `sender_acl` (`send_as`, `logged_in_as`)
  1770. VALUES (:sender_acl, :username)");
  1771. $stmt->execute(array(
  1772. ':sender_acl' => $sender_acl,
  1773. ':username' => $username
  1774. ));
  1775. }
  1776. catch (PDOException $e) {
  1777. $_SESSION['return'] = array(
  1778. 'type' => 'danger',
  1779. 'msg' => 'MySQL: '.$e
  1780. );
  1781. return false;
  1782. }
  1783. }
  1784. }
  1785. else {
  1786. try {
  1787. $stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` = :username");
  1788. $stmt->execute(array(
  1789. ':username' => $username
  1790. ));
  1791. }
  1792. catch (PDOException $e) {
  1793. $_SESSION['return'] = array(
  1794. 'type' => 'danger',
  1795. 'msg' => 'MySQL: '.$e
  1796. );
  1797. return false;
  1798. }
  1799. }
  1800. }
  1801. if (!empty($password) && !empty($password2)) {
  1802. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) {
  1803. $_SESSION['return'] = array(
  1804. 'type' => 'danger',
  1805. 'msg' => sprintf($lang['danger']['password_complexity'])
  1806. );
  1807. return false;
  1808. }
  1809. if ($password != $password2) {
  1810. $_SESSION['return'] = array(
  1811. 'type' => 'danger',
  1812. 'msg' => sprintf($lang['danger']['password_mismatch'])
  1813. );
  1814. return false;
  1815. }
  1816. $password_hashed = hash_password($password);
  1817. try {
  1818. $stmt = $pdo->prepare("UPDATE `alias` SET
  1819. `active` = :active
  1820. WHERE `address` = :address");
  1821. $stmt->execute(array(
  1822. ':address' => $username,
  1823. ':active' => $active
  1824. ));
  1825. $stmt = $pdo->prepare("UPDATE `mailbox` SET
  1826. `active` = :active,
  1827. `password` = :password_hashed,
  1828. `name`= :name,
  1829. `quota` = :quota_b
  1830. WHERE `username` = :username");
  1831. $stmt->execute(array(
  1832. ':password_hashed' => $password_hashed,
  1833. ':active' => $active,
  1834. ':name' => $name,
  1835. ':quota_b' => $quota_b,
  1836. ':username' => $username
  1837. ));
  1838. }
  1839. catch (PDOException $e) {
  1840. $_SESSION['return'] = array(
  1841. 'type' => 'danger',
  1842. 'msg' => 'MySQL: '.$e
  1843. );
  1844. return false;
  1845. }
  1846. }
  1847. try {
  1848. $stmt = $pdo->prepare("UPDATE `alias` SET
  1849. `active` = :active
  1850. WHERE `address` = :address");
  1851. $stmt->execute(array(
  1852. ':address' => $username,
  1853. ':active' => $active
  1854. ));
  1855. $stmt = $pdo->prepare("UPDATE `mailbox` SET
  1856. `active` = :active,
  1857. `name`= :name,
  1858. `quota` = :quota_b
  1859. WHERE `username` = :username");
  1860. $stmt->execute(array(
  1861. ':active' => $active,
  1862. ':name' => $name,
  1863. ':quota_b' => $quota_b,
  1864. ':username' => $username
  1865. ));
  1866. }
  1867. catch (PDOException $e) {
  1868. $_SESSION['return'] = array(
  1869. 'type' => 'danger',
  1870. 'msg' => 'MySQL: '.$e
  1871. );
  1872. return false;
  1873. }
  1874. }
  1875. $_SESSION['return'] = array(
  1876. 'type' => 'success',
  1877. 'msg' => sprintf($lang['success']['mailbox_modified'], implode(', ', $usernames))
  1878. );
  1879. break;
  1880. case 'resource':
  1881. if (!is_array($_data['name'])) {
  1882. $names = array();
  1883. $names[] = $_data['name'];
  1884. }
  1885. else {
  1886. $names = $_data['name'];
  1887. }
  1888. foreach ($names as $name) {
  1889. $is_now = mailbox('get', 'resource_details', $name);
  1890. if (!empty($is_now)) {
  1891. $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active_int'];
  1892. $multiple_bookings = (isset($_data['multiple_bookings'])) ? intval($_data['multiple_bookings']) : $is_now['multiple_bookings_int'];
  1893. $description = (!empty($_data['description'])) ? $_data['description'] : $is_now['description'];
  1894. $kind = (!empty($_data['kind'])) ? $_data['kind'] : $is_now['kind'];
  1895. }
  1896. else {
  1897. $_SESSION['return'] = array(
  1898. 'type' => 'danger',
  1899. 'msg' => sprintf($lang['danger']['resource_invalid'])
  1900. );
  1901. return false;
  1902. }
  1903. if (!filter_var($name, FILTER_VALIDATE_EMAIL)) {
  1904. $_SESSION['return'] = array(
  1905. 'type' => 'danger',
  1906. 'msg' => sprintf($lang['danger']['resource_invalid'])
  1907. );
  1908. return false;
  1909. }
  1910. if (empty($description)) {
  1911. $_SESSION['return'] = array(
  1912. 'type' => 'danger',
  1913. 'msg' => sprintf($lang['danger']['description_invalid'])
  1914. );
  1915. return false;
  1916. }
  1917. if ($kind != 'location' && $kind != 'group' && $kind != 'thing') {
  1918. $_SESSION['return'] = array(
  1919. 'type' => 'danger',
  1920. 'msg' => sprintf($lang['danger']['resource_invalid'])
  1921. );
  1922. return false;
  1923. }
  1924. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $name)) {
  1925. $_SESSION['return'] = array(
  1926. 'type' => 'danger',
  1927. 'msg' => sprintf($lang['danger']['access_denied'])
  1928. );
  1929. return false;
  1930. }
  1931. try {
  1932. $stmt = $pdo->prepare("UPDATE `mailbox` SET
  1933. `active` = :active,
  1934. `name`= :description,
  1935. `kind`= :kind,
  1936. `multiple_bookings`= :multiple_bookings
  1937. WHERE `username` = :name");
  1938. $stmt->execute(array(
  1939. ':active' => $active,
  1940. ':description' => $description,
  1941. ':multiple_bookings' => $multiple_bookings,
  1942. ':kind' => $kind,
  1943. ':name' => $name
  1944. ));
  1945. }
  1946. catch (PDOException $e) {
  1947. $_SESSION['return'] = array(
  1948. 'type' => 'danger',
  1949. 'msg' => 'MySQL: '.$e
  1950. );
  1951. return false;
  1952. }
  1953. }
  1954. $_SESSION['return'] = array(
  1955. 'type' => 'success',
  1956. 'msg' => sprintf($lang['success']['resource_modified'], implode(', ', $names))
  1957. );
  1958. break;
  1959. }
  1960. break;
  1961. case 'get':
  1962. switch ($_type) {
  1963. case 'sender_acl_handles':
  1964. if ($_SESSION['mailcow_cc_role'] != "admin" && $_SESSION['mailcow_cc_role'] != "domainadmin") {
  1965. return false;
  1966. }
  1967. $data['sender_acl_domains']['ro'] = array();
  1968. $data['sender_acl_domains']['rw'] = array();
  1969. $data['sender_acl_domains']['selectable'] = array();
  1970. $data['sender_acl_addresses']['ro'] = array();
  1971. $data['sender_acl_addresses']['rw'] = array();
  1972. $data['sender_acl_addresses']['selectable'] = array();
  1973. $data['fixed_sender_aliases'] = array();
  1974. try {
  1975. // Fixed addresses
  1976. $stmt = $pdo->prepare("SELECT `address` FROM `alias` WHERE `goto` REGEXP :goto AND `address` NOT LIKE '@%'");
  1977. $stmt->execute(array(':goto' => '(^|,)'.$_data.'($|,)'));
  1978. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  1979. while ($row = array_shift($rows)) {
  1980. $data['fixed_sender_aliases'][] = $row['address'];
  1981. }
  1982. $stmt = $pdo->prepare("SELECT CONCAT(`local_part`, '@', `alias_domain`.`alias_domain`) AS `alias_domain_alias` FROM `mailbox`, `alias_domain`
  1983. WHERE `alias_domain`.`target_domain` = `mailbox`.`domain`
  1984. AND `mailbox`.`username` = :username");
  1985. $stmt->execute(array(':username' => $_data));
  1986. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  1987. while ($row = array_shift($rows)) {
  1988. if (!empty($row['alias_domain_alias'])) {
  1989. $data['fixed_sender_aliases'][] = $row['alias_domain_alias'];
  1990. }
  1991. }
  1992. // Return array $data['sender_acl_domains/addresses']['ro'] with read-only objects
  1993. // Return array $data['sender_acl_domains/addresses']['rw'] with read-write objects (can be deleted)
  1994. $stmt = $pdo->prepare("SELECT REPLACE(`send_as`, '@', '') AS `send_as` FROM `sender_acl` WHERE `logged_in_as` = :logged_in_as AND `send_as` LIKE '@%'");
  1995. $stmt->execute(array(':logged_in_as' => $_data));
  1996. $domain_rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  1997. while ($domain_row = array_shift($domain_rows)) {
  1998. if (is_valid_domain_name($domain_row['send_as']) && !hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain_row['send_as'])) {
  1999. $data['sender_acl_domains']['ro'][] = $domain_row['send_as'];
  2000. continue;
  2001. }
  2002. if (is_valid_domain_name($domain_row['send_as']) && hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain_row['send_as'])) {
  2003. $data['sender_acl_domains']['rw'][] = $domain_row['send_as'];
  2004. continue;
  2005. }
  2006. }
  2007. $stmt = $pdo->prepare("SELECT `send_as` FROM `sender_acl` WHERE `logged_in_as` = :logged_in_as AND `send_as` NOT LIKE '@%'");
  2008. $stmt->execute(array(':logged_in_as' => $_data));
  2009. $address_rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2010. while ($address_row = array_shift($address_rows)) {
  2011. if (filter_var($address_row['send_as'], FILTER_VALIDATE_EMAIL) && !hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $address_row['send_as'])) {
  2012. $data['sender_acl_addresses']['ro'][] = $address_row['send_as'];
  2013. continue;
  2014. }
  2015. if (filter_var($address_row['send_as'], FILTER_VALIDATE_EMAIL) && hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $address_row['send_as'])) {
  2016. $data['sender_acl_addresses']['rw'][] = $address_row['send_as'];
  2017. continue;
  2018. }
  2019. }
  2020. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  2021. WHERE `domain` NOT IN (
  2022. SELECT REPLACE(`send_as`, '@', '') FROM `sender_acl`
  2023. WHERE `logged_in_as` = :logged_in_as
  2024. AND `send_as` LIKE '@%')");
  2025. $stmt->execute(array(
  2026. ':logged_in_as' => $_data,
  2027. ));
  2028. $rows_domain = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2029. while ($row_domain = array_shift($rows_domain)) {
  2030. if (is_valid_domain_name($row_domain['domain']) && hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $row_domain['domain'])) {
  2031. $data['sender_acl_domains']['selectable'][] = $row_domain['domain'];
  2032. }
  2033. }
  2034. $stmt = $pdo->prepare("SELECT `address` FROM `alias`
  2035. WHERE `goto` != :goto
  2036. AND `address` NOT IN (
  2037. SELECT `send_as` FROM `sender_acl`
  2038. WHERE `logged_in_as` = :logged_in_as
  2039. AND `send_as` NOT LIKE '@%')");
  2040. $stmt->execute(array(
  2041. ':logged_in_as' => $_data,
  2042. ':goto' => $_data
  2043. ));
  2044. $rows_mbox = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2045. while ($row = array_shift($rows_mbox)) {
  2046. if (filter_var($row['address'], FILTER_VALIDATE_EMAIL) && hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $row['address'])) {
  2047. $data['sender_acl_addresses']['selectable'][] = $row['address'];
  2048. }
  2049. }
  2050. }
  2051. catch(PDOException $e) {
  2052. $_SESSION['return'] = array(
  2053. 'type' => 'danger',
  2054. 'msg' => 'MySQL: '.$e
  2055. );
  2056. return false;
  2057. }
  2058. return $data;
  2059. break;
  2060. case 'mailboxes':
  2061. $mailboxes = array();
  2062. if (isset($_data) && !hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2063. return false;
  2064. }
  2065. elseif (isset($_data) && hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2066. try {
  2067. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox` WHERE `kind` NOT REGEXP 'location|thing|group' AND `domain` != 'ALL' AND `domain` = :domain");
  2068. $stmt->execute(array(
  2069. ':domain' => $_data,
  2070. ));
  2071. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2072. while($row = array_shift($rows)) {
  2073. $mailboxes[] = $row['username'];
  2074. }
  2075. }
  2076. catch (PDOException $e) {
  2077. $_SESSION['return'] = array(
  2078. 'type' => 'danger',
  2079. 'msg' => 'MySQL: '.$e
  2080. );
  2081. return false;
  2082. }
  2083. }
  2084. else {
  2085. try {
  2086. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox` WHERE `kind` NOT REGEXP 'location|thing|group' AND `domain` IN (SELECT `domain` FROM `domain_admins` WHERE `active` = '1' AND `username` = :username) OR 'admin' = :role");
  2087. $stmt->execute(array(
  2088. ':username' => $_SESSION['mailcow_cc_username'],
  2089. ':role' => $_SESSION['mailcow_cc_role'],
  2090. ));
  2091. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2092. while($row = array_shift($rows)) {
  2093. $mailboxes[] = $row['username'];
  2094. }
  2095. }
  2096. catch (PDOException $e) {
  2097. $_SESSION['return'] = array(
  2098. 'type' => 'danger',
  2099. 'msg' => 'MySQL: '.$e
  2100. );
  2101. return false;
  2102. }
  2103. }
  2104. return $mailboxes;
  2105. break;
  2106. case 'tls_policy':
  2107. $policydata = array();
  2108. if (isset($_data) && filter_var($_data, FILTER_VALIDATE_EMAIL)) {
  2109. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2110. return false;
  2111. }
  2112. }
  2113. else {
  2114. $_data = $_SESSION['mailcow_cc_username'];
  2115. }
  2116. try {
  2117. $stmt = $pdo->prepare("SELECT `tls_enforce_out`, `tls_enforce_in` FROM `mailbox` WHERE `username` = :username");
  2118. $stmt->execute(array(':username' => $_data));
  2119. $policydata = $stmt->fetch(PDO::FETCH_ASSOC);
  2120. }
  2121. catch(PDOException $e) {
  2122. $_SESSION['return'] = array(
  2123. 'type' => 'danger',
  2124. 'msg' => 'MySQL: '.$e
  2125. );
  2126. return false;
  2127. }
  2128. return $policydata;
  2129. break;
  2130. case 'syncjob_details':
  2131. $syncjobdetails = array();
  2132. if (!is_numeric($_data)) {
  2133. return false;
  2134. }
  2135. try {
  2136. $stmt = $pdo->prepare("SELECT *,
  2137. CONCAT(LEFT(`password1`, 3), '...') AS `password1_short`,
  2138. `active` AS `active_int`,
  2139. CASE `active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`
  2140. FROM `imapsync` WHERE id = :id");
  2141. $stmt->execute(array(':id' => $_data));
  2142. $syncjobdetails = $stmt->fetch(PDO::FETCH_ASSOC);
  2143. }
  2144. catch(PDOException $e) {
  2145. $_SESSION['return'] = array(
  2146. 'type' => 'danger',
  2147. 'msg' => 'MySQL: '.$e
  2148. );
  2149. }
  2150. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $syncjobdetails['user2'])) {
  2151. return false;
  2152. }
  2153. return $syncjobdetails;
  2154. break;
  2155. case 'syncjobs':
  2156. $syncjobdata = array();
  2157. if (isset($_data) && filter_var($_data, FILTER_VALIDATE_EMAIL)) {
  2158. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2159. return false;
  2160. }
  2161. }
  2162. else {
  2163. $_data = $_SESSION['mailcow_cc_username'];
  2164. }
  2165. try {
  2166. $stmt = $pdo->prepare("SELECT `id` FROM `imapsync` WHERE `user2` = :username");
  2167. $stmt->execute(array(':username' => $_data));
  2168. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2169. while($row = array_shift($rows)) {
  2170. $syncjobdata[] = $row['id'];
  2171. }
  2172. }
  2173. catch(PDOException $e) {
  2174. $_SESSION['return'] = array(
  2175. 'type' => 'danger',
  2176. 'msg' => 'MySQL: '.$e
  2177. );
  2178. }
  2179. return $syncjobdata;
  2180. break;
  2181. case 'spam_score':
  2182. $default = "5, 15";
  2183. $policydata = array();
  2184. if (isset($_data) && filter_var($_data, FILTER_VALIDATE_EMAIL)) {
  2185. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2186. return false;
  2187. }
  2188. }
  2189. else {
  2190. $_data = $_SESSION['mailcow_cc_username'];
  2191. }
  2192. try {
  2193. $stmt = $pdo->prepare("SELECT `value` FROM `filterconf` WHERE `object` = :username AND
  2194. (`option` = 'lowspamlevel' OR `option` = 'highspamlevel')");
  2195. $stmt->execute(array(':username' => $_data));
  2196. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  2197. }
  2198. catch(PDOException $e) {
  2199. $_SESSION['return'] = array(
  2200. 'type' => 'danger',
  2201. 'msg' => 'MySQL: '.$e
  2202. );
  2203. return false;
  2204. }
  2205. if (empty($num_results)) {
  2206. return $default;
  2207. }
  2208. else {
  2209. try {
  2210. $stmt = $pdo->prepare("SELECT `value` FROM `filterconf` WHERE `option` = 'highspamlevel' AND `object` = :username");
  2211. $stmt->execute(array(':username' => $_data));
  2212. $highspamlevel = $stmt->fetch(PDO::FETCH_ASSOC);
  2213. $stmt = $pdo->prepare("SELECT `value` FROM `filterconf` WHERE `option` = 'lowspamlevel' AND `object` = :username");
  2214. $stmt->execute(array(':username' => $_data));
  2215. $lowspamlevel = $stmt->fetch(PDO::FETCH_ASSOC);
  2216. return $lowspamlevel['value'].', '.$highspamlevel['value'];
  2217. }
  2218. catch(PDOException $e) {
  2219. $_SESSION['return'] = array(
  2220. 'type' => 'danger',
  2221. 'msg' => 'MySQL: '.$e
  2222. );
  2223. return false;
  2224. }
  2225. }
  2226. break;
  2227. case 'time_limited_aliases':
  2228. $tladata = array();
  2229. if (isset($_data) && filter_var($_data, FILTER_VALIDATE_EMAIL)) {
  2230. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2231. return false;
  2232. }
  2233. }
  2234. else {
  2235. $_data = $_SESSION['mailcow_cc_username'];
  2236. }
  2237. try {
  2238. $stmt = $pdo->prepare("SELECT `address`,
  2239. `goto`,
  2240. `validity`
  2241. FROM `spamalias`
  2242. WHERE `goto` = :username
  2243. AND `validity` >= :unixnow");
  2244. $stmt->execute(array(':username' => $_data, ':unixnow' => time()));
  2245. $tladata = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2246. }
  2247. catch(PDOException $e) {
  2248. $_SESSION['return'] = array(
  2249. 'type' => 'danger',
  2250. 'msg' => 'MySQL: '.$e
  2251. );
  2252. }
  2253. return $tladata;
  2254. break;
  2255. case 'delimiter_action':
  2256. $policydata = array();
  2257. if (isset($_data) && filter_var($_data, FILTER_VALIDATE_EMAIL)) {
  2258. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2259. return false;
  2260. }
  2261. }
  2262. else {
  2263. $_data = $_SESSION['mailcow_cc_username'];
  2264. }
  2265. try {
  2266. if ($redis->hGet('RCPT_WANTS_SUBJECT_TAG', $_data)) {
  2267. return "subject";
  2268. }
  2269. else {
  2270. return "subfolder";
  2271. }
  2272. }
  2273. catch (RedisException $e) {
  2274. $_SESSION['return'] = array(
  2275. 'type' => 'danger',
  2276. 'msg' => 'Redis: '.$e
  2277. );
  2278. return false;
  2279. }
  2280. break;
  2281. case 'resources':
  2282. $resources = array();
  2283. if (isset($_data) && !hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2284. return false;
  2285. }
  2286. elseif (isset($_data) && hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2287. try {
  2288. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox` WHERE `kind` REGEXP 'location|thing|group' AND `domain` != 'ALL' AND `domain` = :domain");
  2289. $stmt->execute(array(
  2290. ':domain' => $_data,
  2291. ));
  2292. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2293. while($row = array_shift($rows)) {
  2294. $resources[] = $row['username'];
  2295. }
  2296. }
  2297. catch (PDOException $e) {
  2298. $_SESSION['return'] = array(
  2299. 'type' => 'danger',
  2300. 'msg' => 'MySQL: '.$e
  2301. );
  2302. return false;
  2303. }
  2304. }
  2305. else {
  2306. try {
  2307. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox` WHERE `kind` REGEXP 'location|thing|group' AND `domain` IN (SELECT `domain` FROM `domain_admins` WHERE `active` = '1' AND `username` = :username) OR 'admin' = :role");
  2308. $stmt->execute(array(
  2309. ':username' => $_SESSION['mailcow_cc_username'],
  2310. ':role' => $_SESSION['mailcow_cc_role'],
  2311. ));
  2312. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2313. while($row = array_shift($rows)) {
  2314. $resources[] = $row['username'];
  2315. }
  2316. }
  2317. catch (PDOException $e) {
  2318. $_SESSION['return'] = array(
  2319. 'type' => 'danger',
  2320. 'msg' => 'MySQL: '.$e
  2321. );
  2322. return false;
  2323. }
  2324. }
  2325. return $resources;
  2326. break;
  2327. case 'alias_domains':
  2328. $aliasdomains = array();
  2329. if (isset($_data) && !hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2330. return false;
  2331. }
  2332. elseif (isset($_data) && hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2333. try {
  2334. $stmt = $pdo->prepare("SELECT `alias_domain` FROM `alias_domain` WHERE `target_domain` = :domain");
  2335. $stmt->execute(array(
  2336. ':domain' => $_data,
  2337. ));
  2338. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2339. while($row = array_shift($rows)) {
  2340. $aliasdomains[] = $row['alias_domain'];
  2341. }
  2342. }
  2343. catch (PDOException $e) {
  2344. $_SESSION['return'] = array(
  2345. 'type' => 'danger',
  2346. 'msg' => 'MySQL: '.$e
  2347. );
  2348. return false;
  2349. }
  2350. }
  2351. else {
  2352. try {
  2353. $stmt = $pdo->prepare("SELECT `alias_domain` FROM `alias_domain` WHERE `target_domain` IN (SELECT `domain` FROM `domain_admins` WHERE `active` = '1' AND `username` = :username) OR 'admin' = :role");
  2354. $stmt->execute(array(
  2355. ':username' => $_SESSION['mailcow_cc_username'],
  2356. ':role' => $_SESSION['mailcow_cc_role'],
  2357. ));
  2358. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2359. while($row = array_shift($rows)) {
  2360. $aliasdomains[] = $row['alias_domain'];
  2361. }
  2362. }
  2363. catch (PDOException $e) {
  2364. $_SESSION['return'] = array(
  2365. 'type' => 'danger',
  2366. 'msg' => 'MySQL: '.$e
  2367. );
  2368. return false;
  2369. }
  2370. }
  2371. return $aliasdomains;
  2372. break;
  2373. case 'aliases':
  2374. $aliases = array();
  2375. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2376. return false;
  2377. }
  2378. try {
  2379. $stmt = $pdo->prepare("SELECT `address` FROM `alias` WHERE `address` != `goto` AND `domain` = :domain");
  2380. $stmt->execute(array(
  2381. ':domain' => $_data,
  2382. ));
  2383. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2384. while($row = array_shift($rows)) {
  2385. $aliases[] = $row['address'];
  2386. }
  2387. }
  2388. catch (PDOException $e) {
  2389. $_SESSION['return'] = array(
  2390. 'type' => 'danger',
  2391. 'msg' => 'MySQL: '.$e
  2392. );
  2393. return false;
  2394. }
  2395. return $aliases;
  2396. break;
  2397. case 'ratelimit':
  2398. if (is_valid_domain_name($_data)) {
  2399. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2400. $_SESSION['return'] = array(
  2401. 'type' => 'danger',
  2402. 'msg' => sprintf($lang['danger']['access_denied'])
  2403. );
  2404. return false;
  2405. }
  2406. }
  2407. elseif (filter_var($_data, FILTER_VALIDATE_EMAIL)) {
  2408. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2409. $_SESSION['return'] = array(
  2410. 'type' => 'danger',
  2411. 'msg' => sprintf($lang['danger']['access_denied'])
  2412. );
  2413. return false;
  2414. }
  2415. }
  2416. else {
  2417. return false;
  2418. }
  2419. try {
  2420. if ($rl_value = $redis->hGet('RL_VALUE', $_data)) {
  2421. $rl = explode(' / 1', $rl_value);
  2422. $data['value'] = $rl[0];
  2423. $data['frame'] = $rl[1];
  2424. return $data;
  2425. }
  2426. else {
  2427. return false;
  2428. }
  2429. }
  2430. catch (RedisException $e) {
  2431. $_SESSION['return'] = array(
  2432. 'type' => 'danger',
  2433. 'msg' => 'Redis: '.$e
  2434. );
  2435. return false;
  2436. }
  2437. return false;
  2438. break;
  2439. case 'alias_details':
  2440. $aliasdata = array();
  2441. try {
  2442. $stmt = $pdo->prepare("SELECT
  2443. `domain`,
  2444. `goto`,
  2445. `address`,
  2446. `active` as `active_int`,
  2447. CASE `active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`,
  2448. `created`,
  2449. `modified`
  2450. FROM `alias`
  2451. WHERE `address` = :address AND `address` != `goto`");
  2452. $stmt->execute(array(
  2453. ':address' => $_data,
  2454. ));
  2455. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  2456. $stmt = $pdo->prepare("SELECT `target_domain` FROM `alias_domain` WHERE `alias_domain` = :domain");
  2457. $stmt->execute(array(
  2458. ':domain' => $row['domain'],
  2459. ));
  2460. $row_alias_domain = $stmt->fetch(PDO::FETCH_ASSOC);
  2461. if (isset($row_alias_domain['target_domain']) && !empty($row_alias_domain['target_domain'])) {
  2462. $aliasdata['in_primary_domain'] = $row_alias_domain['target_domain'];
  2463. }
  2464. else {
  2465. $aliasdata['in_primary_domain'] = "";
  2466. }
  2467. $aliasdata['domain'] = $row['domain'];
  2468. $aliasdata['goto'] = $row['goto'];
  2469. $aliasdata['address'] = $row['address'];
  2470. (!filter_var($aliasdata['address'], FILTER_VALIDATE_EMAIL)) ? $aliasdata['is_catch_all'] = 1 : $aliasdata['is_catch_all'] = 0;
  2471. $aliasdata['active'] = $row['active'];
  2472. $aliasdata['active_int'] = $row['active_int'];
  2473. $aliasdata['created'] = $row['created'];
  2474. $aliasdata['modified'] = $row['modified'];
  2475. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $aliasdata['domain'])) {
  2476. return false;
  2477. }
  2478. }
  2479. catch (PDOException $e) {
  2480. $_SESSION['return'] = array(
  2481. 'type' => 'danger',
  2482. 'msg' => 'MySQL: '.$e
  2483. );
  2484. return false;
  2485. }
  2486. return $aliasdata;
  2487. break;
  2488. case 'alias_domain_details':
  2489. $aliasdomaindata = array();
  2490. try {
  2491. $stmt = $pdo->prepare("SELECT
  2492. `alias_domain`,
  2493. `target_domain`,
  2494. `active` AS `active_int`,
  2495. CASE `active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`,
  2496. `created`,
  2497. `modified`
  2498. FROM `alias_domain`
  2499. WHERE `alias_domain` = :aliasdomain");
  2500. $stmt->execute(array(
  2501. ':aliasdomain' => $_data,
  2502. ));
  2503. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  2504. $aliasdomaindata['alias_domain'] = $row['alias_domain'];
  2505. $aliasdomaindata['target_domain'] = $row['target_domain'];
  2506. $aliasdomaindata['active'] = $row['active'];
  2507. $aliasdomaindata['active_int'] = $row['active_int'];
  2508. $aliasdomaindata['created'] = $row['created'];
  2509. $aliasdomaindata['modified'] = $row['modified'];
  2510. }
  2511. catch (PDOException $e) {
  2512. $_SESSION['return'] = array(
  2513. 'type' => 'danger',
  2514. 'msg' => 'MySQL: '.$e
  2515. );
  2516. return false;
  2517. }
  2518. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $aliasdomaindata['target_domain'])) {
  2519. return false;
  2520. }
  2521. return $aliasdomaindata;
  2522. break;
  2523. case 'domains':
  2524. $domains = array();
  2525. if ($_SESSION['mailcow_cc_role'] != "admin" && $_SESSION['mailcow_cc_role'] != "domainadmin") {
  2526. return false;
  2527. }
  2528. try {
  2529. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  2530. WHERE (`domain` IN (
  2531. SELECT `domain` from `domain_admins`
  2532. WHERE (`active`='1' AND `username` = :username))
  2533. )
  2534. OR ('admin'= :role)
  2535. AND `domain` != 'ALL'");
  2536. $stmt->execute(array(
  2537. ':username' => $_SESSION['mailcow_cc_username'],
  2538. ':role' => $_SESSION['mailcow_cc_role'],
  2539. ));
  2540. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2541. while($row = array_shift($rows)) {
  2542. $domains[] = $row['domain'];
  2543. }
  2544. }
  2545. catch (PDOException $e) {
  2546. $_SESSION['return'] = array(
  2547. 'type' => 'danger',
  2548. 'msg' => 'MySQL: '.$e
  2549. );
  2550. return false;
  2551. }
  2552. return $domains;
  2553. break;
  2554. case 'domain_details':
  2555. $domaindata = array();
  2556. $_data = idn_to_ascii(strtolower(trim($_data)));
  2557. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2558. return false;
  2559. }
  2560. try {
  2561. $stmt = $pdo->prepare("SELECT `target_domain` FROM `alias_domain` WHERE `alias_domain` = :domain");
  2562. $stmt->execute(array(
  2563. ':domain' => $_data
  2564. ));
  2565. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  2566. if (!empty($row)) {
  2567. $_data = $row['target_domain'];
  2568. }
  2569. $stmt = $pdo->prepare("SELECT
  2570. `domain`,
  2571. `description`,
  2572. `aliases`,
  2573. `mailboxes`,
  2574. `maxquota`,
  2575. `quota`,
  2576. `relayhost`,
  2577. `relay_all_recipients` as `relay_all_recipients_int`,
  2578. `backupmx` as `backupmx_int`,
  2579. `active` as `active_int`,
  2580. CASE `relay_all_recipients` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `relay_all_recipients`,
  2581. CASE `backupmx` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `backupmx`,
  2582. CASE `active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`
  2583. FROM `domain` WHERE `domain`= :domain");
  2584. $stmt->execute(array(
  2585. ':domain' => $_data
  2586. ));
  2587. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  2588. if (empty($row)) {
  2589. return false;
  2590. }
  2591. $stmt = $pdo->prepare("SELECT COUNT(*) AS `count`,
  2592. COALESCE(SUM(`quota`), 0) AS `in_use`
  2593. FROM `mailbox`
  2594. WHERE `kind` NOT REGEXP 'location|thing|group'
  2595. AND `domain` = :domain");
  2596. $stmt->execute(array(':domain' => $row['domain']));
  2597. $MailboxDataDomain = $stmt->fetch(PDO::FETCH_ASSOC);
  2598. $domaindata['max_new_mailbox_quota'] = ($row['quota'] * 1048576) - $MailboxDataDomain['in_use'];
  2599. if ($domaindata['max_new_mailbox_quota'] > ($row['maxquota'] * 1048576)) {
  2600. $domaindata['max_new_mailbox_quota'] = ($row['maxquota'] * 1048576);
  2601. }
  2602. $domaindata['quota_used_in_domain'] = $MailboxDataDomain['in_use'];
  2603. $domaindata['mboxes_in_domain'] = $MailboxDataDomain['count'];
  2604. $domaindata['mboxes_left'] = $row['mailboxes'] - $MailboxDataDomain['count'];
  2605. $domaindata['domain_name'] = $row['domain'];
  2606. $domaindata['description'] = $row['description'];
  2607. $domaindata['max_num_aliases_for_domain'] = $row['aliases'];
  2608. $domaindata['max_num_mboxes_for_domain'] = $row['mailboxes'];
  2609. $domaindata['max_quota_for_mbox'] = $row['maxquota'] * 1048576;
  2610. $domaindata['max_quota_for_domain'] = $row['quota'] * 1048576;
  2611. $domaindata['relayhost'] = $row['relayhost'];
  2612. $domaindata['backupmx'] = $row['backupmx'];
  2613. $domaindata['backupmx_int'] = $row['backupmx_int'];
  2614. $domaindata['active'] = $row['active'];
  2615. $domaindata['active_int'] = $row['active_int'];
  2616. $domaindata['relay_all_recipients'] = $row['relay_all_recipients'];
  2617. $domaindata['relay_all_recipients_int'] = $row['relay_all_recipients_int'];
  2618. $stmt = $pdo->prepare("SELECT COUNT(*) AS `alias_count` FROM `alias`
  2619. WHERE (`domain`= :domain OR `domain` IN (SELECT `alias_domain` FROM `alias_domain` WHERE `target_domain` = :domain2))
  2620. AND `address` NOT IN (
  2621. SELECT `username` FROM `mailbox`
  2622. )");
  2623. $stmt->execute(array(
  2624. ':domain' => $_data,
  2625. ':domain2' => $_data
  2626. ));
  2627. $AliasDataDomain = $stmt->fetch(PDO::FETCH_ASSOC);
  2628. (isset($AliasDataDomain['alias_count'])) ? $domaindata['aliases_in_domain'] = $AliasDataDomain['alias_count'] : $domaindata['aliases_in_domain'] = "0";
  2629. $domaindata['aliases_left'] = $row['aliases'] - $AliasDataDomain['alias_count'];
  2630. }
  2631. catch (PDOException $e) {
  2632. $_SESSION['return'] = array(
  2633. 'type' => 'danger',
  2634. 'msg' => 'MySQL: '.$e
  2635. );
  2636. return false;
  2637. }
  2638. return $domaindata;
  2639. break;
  2640. case 'mailbox_details':
  2641. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2642. return false;
  2643. }
  2644. $mailboxdata = array();
  2645. try {
  2646. $stmt = $pdo->prepare("SELECT
  2647. `domain`.`backupmx`,
  2648. `mailbox`.`username`,
  2649. `mailbox`.`name`,
  2650. `mailbox`.`active` AS `active_int`,
  2651. CASE `mailbox`.`active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`,
  2652. `mailbox`.`domain`,
  2653. `mailbox`.`quota`,
  2654. `quota2`.`bytes`,
  2655. `quota2`.`messages`
  2656. FROM `mailbox`, `quota2`, `domain`
  2657. WHERE `mailbox`.`kind` NOT REGEXP 'location|thing|group' AND `mailbox`.`username` = `quota2`.`username` AND `domain`.`domain` = `mailbox`.`domain` AND `mailbox`.`username` = :mailbox");
  2658. $stmt->execute(array(
  2659. ':mailbox' => $_data,
  2660. ));
  2661. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  2662. $stmt = $pdo->prepare("SELECT `maxquota`, `quota` FROM `domain` WHERE `domain` = :domain");
  2663. $stmt->execute(array(':domain' => $row['domain']));
  2664. $DomainQuota = $stmt->fetch(PDO::FETCH_ASSOC);
  2665. $stmt = $pdo->prepare("SELECT COALESCE(SUM(`quota`), 0) as `in_use` FROM `mailbox` WHERE `kind` NOT REGEXP 'location|thing|group' AND `domain` = :domain AND `username` != :username");
  2666. $stmt->execute(array(':domain' => $row['domain'], ':username' => $_data));
  2667. $MailboxUsage = $stmt->fetch(PDO::FETCH_ASSOC);
  2668. $stmt = $pdo->prepare("SELECT IFNULL(COUNT(`address`), 0) AS `sa_count` FROM `spamalias` WHERE `goto` = :address AND `validity` >= :unixnow");
  2669. $stmt->execute(array(':address' => $_data, ':unixnow' => time()));
  2670. $SpamaliasUsage = $stmt->fetch(PDO::FETCH_ASSOC);
  2671. $mailboxdata['max_new_quota'] = ($DomainQuota['quota'] * 1048576) - $MailboxUsage['in_use'];
  2672. if ($mailboxdata['max_new_quota'] > ($DomainQuota['maxquota'] * 1048576)) {
  2673. $mailboxdata['max_new_quota'] = ($DomainQuota['maxquota'] * 1048576);
  2674. }
  2675. $mailboxdata['username'] = $row['username'];
  2676. $mailboxdata['is_relayed'] = $row['backupmx'];
  2677. $mailboxdata['name'] = $row['name'];
  2678. $mailboxdata['active'] = $row['active'];
  2679. $mailboxdata['active_int'] = $row['active_int'];
  2680. $mailboxdata['domain'] = $row['domain'];
  2681. $mailboxdata['quota'] = $row['quota'];
  2682. $mailboxdata['quota_used'] = intval($row['bytes']);
  2683. $mailboxdata['percent_in_use'] = round((intval($row['bytes']) / intval($row['quota'])) * 100);
  2684. $mailboxdata['messages'] = $row['messages'];
  2685. $mailboxdata['spam_aliases'] = $SpamaliasUsage['sa_count'];
  2686. if ($mailboxdata['percent_in_use'] >= 90) {
  2687. $mailboxdata['percent_class'] = "danger";
  2688. }
  2689. elseif ($mailboxdata['percent_in_use'] >= 75) {
  2690. $mailboxdata['percent_class'] = "warning";
  2691. }
  2692. else {
  2693. $mailboxdata['percent_class'] = "success";
  2694. }
  2695. }
  2696. catch (PDOException $e) {
  2697. $_SESSION['return'] = array(
  2698. 'type' => 'danger',
  2699. 'msg' => 'MySQL: '.$e
  2700. );
  2701. return false;
  2702. }
  2703. return $mailboxdata;
  2704. break;
  2705. case 'resource_details':
  2706. $resourcedata = array();
  2707. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data)) {
  2708. return false;
  2709. }
  2710. try {
  2711. $stmt = $pdo->prepare("SELECT
  2712. `username`,
  2713. `name`,
  2714. `kind`,
  2715. `multiple_bookings` AS `multiple_bookings_int`,
  2716. `local_part`,
  2717. `active` AS `active_int`,
  2718. CASE `multiple_bookings` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `multiple_bookings`,
  2719. CASE `active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`,
  2720. `domain`
  2721. FROM `mailbox` WHERE `kind` REGEXP 'location|thing|group' AND `username` = :resource");
  2722. $stmt->execute(array(
  2723. ':resource' => $_data,
  2724. ));
  2725. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  2726. $resourcedata['name'] = $row['username'];
  2727. $resourcedata['kind'] = $row['kind'];
  2728. $resourcedata['multiple_bookings'] = $row['multiple_bookings'];
  2729. $resourcedata['multiple_bookings_int'] = $row['multiple_bookings_int'];
  2730. $resourcedata['description'] = $row['name'];
  2731. $resourcedata['active'] = $row['active'];
  2732. $resourcedata['active_int'] = $row['active_int'];
  2733. $resourcedata['domain'] = $row['domain'];
  2734. $resourcedata['local_part'] = $row['local_part'];
  2735. }
  2736. catch (PDOException $e) {
  2737. $_SESSION['return'] = array(
  2738. 'type' => 'danger',
  2739. 'msg' => 'MySQL: '.$e
  2740. );
  2741. return false;
  2742. }
  2743. if (!isset($resourcedata['domain']) ||
  2744. (isset($resourcedata['domain']) && !hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $resourcedata['domain']))) {
  2745. return false;
  2746. }
  2747. return $resourcedata;
  2748. break;
  2749. }
  2750. break;
  2751. case 'delete':
  2752. switch ($_type) {
  2753. case 'syncjob':
  2754. if (!is_array($_data['id'])) {
  2755. $ids = array();
  2756. $ids[] = $_data['id'];
  2757. }
  2758. else {
  2759. $ids = $_data['id'];
  2760. }
  2761. if (!isset($_SESSION['acl']['syncjobs']) || $_SESSION['acl']['syncjobs'] != "1" ) {
  2762. $_SESSION['return'] = array(
  2763. 'type' => 'danger',
  2764. 'msg' => sprintf($lang['danger']['access_denied'])
  2765. );
  2766. return false;
  2767. }
  2768. foreach ($ids as $id) {
  2769. if (!is_numeric($id)) {
  2770. $_SESSION['return'] = array(
  2771. 'type' => 'danger',
  2772. 'msg' => $id
  2773. );
  2774. return false;
  2775. }
  2776. try {
  2777. $stmt = $pdo->prepare("SELECT `user2` FROM `imapsync` WHERE id = :id");
  2778. $stmt->execute(array(':id' => $id));
  2779. $user2 = $stmt->fetch(PDO::FETCH_ASSOC)['user2'];
  2780. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $user2)) {
  2781. $_SESSION['return'] = array(
  2782. 'type' => 'danger',
  2783. 'msg' => sprintf($lang['danger']['access_denied'])
  2784. );
  2785. return false;
  2786. }
  2787. $stmt = $pdo->prepare("DELETE FROM `imapsync` WHERE `id`= :id");
  2788. $stmt->execute(array(':id' => $id));
  2789. }
  2790. catch (PDOException $e) {
  2791. $_SESSION['return'] = array(
  2792. 'type' => 'danger',
  2793. 'msg' => 'MySQL: '.$e
  2794. );
  2795. return false;
  2796. }
  2797. }
  2798. $_SESSION['return'] = array(
  2799. 'type' => 'success',
  2800. 'msg' => 'Deleted syncjob id/s ' . implode(', ', $ids)
  2801. );
  2802. return true;
  2803. break;
  2804. case 'time_limited_alias':
  2805. if (!is_array($_data['address'])) {
  2806. $addresses = array();
  2807. $addresses[] = $_data['address'];
  2808. }
  2809. else {
  2810. $addresses = $_data['address'];
  2811. }
  2812. if (!isset($_SESSION['acl']['spam_alias']) || $_SESSION['acl']['spam_alias'] != "1" ) {
  2813. $_SESSION['return'] = array(
  2814. 'type' => 'danger',
  2815. 'msg' => sprintf($lang['danger']['access_denied'])
  2816. );
  2817. return false;
  2818. }
  2819. foreach ($addresses as $address) {
  2820. try {
  2821. $stmt = $pdo->prepare("SELECT `goto` FROM `spamalias` WHERE `address` = :address");
  2822. $stmt->execute(array(':address' => $address));
  2823. $goto = $stmt->fetch(PDO::FETCH_ASSOC)['goto'];
  2824. }
  2825. catch (PDOException $e) {
  2826. $_SESSION['return'] = array(
  2827. 'type' => 'danger',
  2828. 'msg' => 'MySQL: '.$e
  2829. );
  2830. return false;
  2831. }
  2832. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $goto)) {
  2833. $_SESSION['return'] = array(
  2834. 'type' => 'danger',
  2835. 'msg' => sprintf($lang['danger']['access_denied'])
  2836. );
  2837. return false;
  2838. }
  2839. try {
  2840. $stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `goto` = :username AND `address` = :item");
  2841. $stmt->execute(array(
  2842. ':username' => $goto,
  2843. ':item' => $address
  2844. ));
  2845. }
  2846. catch (PDOException $e) {
  2847. $_SESSION['return'] = array(
  2848. 'type' => 'danger',
  2849. 'msg' => 'MySQL: '.$e
  2850. );
  2851. return false;
  2852. }
  2853. }
  2854. $_SESSION['return'] = array(
  2855. 'type' => 'success',
  2856. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($usernames))
  2857. );
  2858. break;
  2859. case 'eas_cache':
  2860. if (!is_array($_data['username'])) {
  2861. $usernames = array();
  2862. $usernames[] = $_data['username'];
  2863. }
  2864. else {
  2865. $usernames = $_data['username'];
  2866. }
  2867. if (!isset($_SESSION['acl']['eas_reset']) || $_SESSION['acl']['eas_reset'] != "1" ) {
  2868. $_SESSION['return'] = array(
  2869. 'type' => 'danger',
  2870. 'msg' => sprintf($lang['danger']['access_denied'])
  2871. );
  2872. return false;
  2873. }
  2874. foreach ($usernames as $username) {
  2875. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $username)) {
  2876. $_SESSION['return'] = array(
  2877. 'type' => 'danger',
  2878. 'msg' => sprintf($lang['danger']['access_denied'])
  2879. );
  2880. return false;
  2881. }
  2882. try {
  2883. $stmt = $pdo->prepare("DELETE FROM `sogo_cache_folder` WHERE `c_uid` = :username");
  2884. $stmt->execute(array(
  2885. ':username' => $username
  2886. ));
  2887. }
  2888. catch (PDOException $e) {
  2889. $_SESSION['return'] = array(
  2890. 'type' => 'danger',
  2891. 'msg' => 'MySQL: '.$e
  2892. );
  2893. return false;
  2894. }
  2895. }
  2896. $_SESSION['return'] = array(
  2897. 'type' => 'success',
  2898. 'msg' => sprintf($lang['success']['eas_reset'], htmlspecialchars(implode(', ', $usernames)))
  2899. );
  2900. break;
  2901. case 'domain':
  2902. if (!is_array($_data['domain'])) {
  2903. $domains = array();
  2904. $domains[] = $_data['domain'];
  2905. }
  2906. else {
  2907. $domains = $_data['domain'];
  2908. }
  2909. if ($_SESSION['mailcow_cc_role'] != "admin") {
  2910. $_SESSION['return'] = array(
  2911. 'type' => 'danger',
  2912. 'msg' => sprintf($lang['danger']['access_denied'])
  2913. );
  2914. return false;
  2915. }
  2916. foreach ($domains as $domain) {
  2917. if (!is_valid_domain_name($domain)) {
  2918. $_SESSION['return'] = array(
  2919. 'type' => 'danger',
  2920. 'msg' => sprintf($lang['danger']['domain_invalid'])
  2921. );
  2922. return false;
  2923. }
  2924. $domain = idn_to_ascii(strtolower(trim($domain)));
  2925. try {
  2926. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox`
  2927. WHERE `domain` = :domain");
  2928. $stmt->execute(array(':domain' => $domain));
  2929. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  2930. }
  2931. catch(PDOException $e) {
  2932. $_SESSION['return'] = array(
  2933. 'type' => 'danger',
  2934. 'msg' => 'MySQL: '.$e
  2935. );
  2936. return false;
  2937. }
  2938. if ($num_results != 0 || !empty($num_results)) {
  2939. $_SESSION['return'] = array(
  2940. 'type' => 'danger',
  2941. 'msg' => sprintf($lang['danger']['domain_not_empty'])
  2942. );
  2943. return false;
  2944. }
  2945. try {
  2946. $stmt = $pdo->prepare("DELETE FROM `domain` WHERE `domain` = :domain");
  2947. $stmt->execute(array(
  2948. ':domain' => $domain,
  2949. ));
  2950. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `domain` = :domain");
  2951. $stmt->execute(array(
  2952. ':domain' => $domain,
  2953. ));
  2954. $stmt = $pdo->prepare("DELETE FROM `alias` WHERE `domain` = :domain");
  2955. $stmt->execute(array(
  2956. ':domain' => $domain,
  2957. ));
  2958. $stmt = $pdo->prepare("DELETE FROM `alias_domain` WHERE `target_domain` = :domain");
  2959. $stmt->execute(array(
  2960. ':domain' => $domain,
  2961. ));
  2962. $stmt = $pdo->prepare("DELETE FROM `mailbox` WHERE `domain` = :domain");
  2963. $stmt->execute(array(
  2964. ':domain' => $domain,
  2965. ));
  2966. $stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` LIKE :domain");
  2967. $stmt->execute(array(
  2968. ':domain' => '%@'.$domain,
  2969. ));
  2970. $stmt = $pdo->prepare("DELETE FROM `quota2` WHERE `username` = :domain");
  2971. $stmt->execute(array(
  2972. ':domain' => '%@'.$domain,
  2973. ));
  2974. $stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `address` = :domain");
  2975. $stmt->execute(array(
  2976. ':domain' => '%@'.$domain,
  2977. ));
  2978. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :domain");
  2979. $stmt->execute(array(
  2980. ':domain' => '%@'.$domain,
  2981. ));
  2982. }
  2983. catch (PDOException $e) {
  2984. $_SESSION['return'] = array(
  2985. 'type' => 'danger',
  2986. 'msg' => 'MySQL: '.$e
  2987. );
  2988. return false;
  2989. }
  2990. try {
  2991. $redis->hDel('DOMAIN_MAP', $domain);
  2992. }
  2993. catch (RedisException $e) {
  2994. $_SESSION['return'] = array(
  2995. 'type' => 'danger',
  2996. 'msg' => 'Redis: '.$e
  2997. );
  2998. return false;
  2999. }
  3000. }
  3001. $_SESSION['return'] = array(
  3002. 'type' => 'success',
  3003. 'msg' => sprintf($lang['success']['domain_removed'], htmlspecialchars(implode(', ', $domains)))
  3004. );
  3005. return true;
  3006. break;
  3007. case 'alias':
  3008. if (!is_array($_data['address'])) {
  3009. $addresses = array();
  3010. $addresses[] = $_data['address'];
  3011. }
  3012. else {
  3013. $addresses = $_data['address'];
  3014. }
  3015. foreach ($addresses as $address) {
  3016. $local_part = strstr($address, '@', true);
  3017. $domain = mailbox('get', 'alias_details', $address)['domain'];
  3018. try {
  3019. $stmt = $pdo->prepare("SELECT `goto` FROM `alias` WHERE `address` = :address");
  3020. $stmt->execute(array(':address' => $address));
  3021. $gotos = $stmt->fetch(PDO::FETCH_ASSOC);
  3022. }
  3023. catch(PDOException $e) {
  3024. $_SESSION['return'] = array(
  3025. 'type' => 'danger',
  3026. 'msg' => 'MySQL: '.$e
  3027. );
  3028. return false;
  3029. }
  3030. $goto_array = explode(',', $gotos['goto']);
  3031. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  3032. $_SESSION['return'] = array(
  3033. 'type' => 'danger',
  3034. 'msg' => sprintf($lang['danger']['access_denied'])
  3035. );
  3036. return false;
  3037. }
  3038. try {
  3039. $stmt = $pdo->prepare("DELETE FROM `alias` WHERE `address` = :address AND `address` NOT IN (SELECT `username` FROM `mailbox`)");
  3040. $stmt->execute(array(
  3041. ':address' => $address
  3042. ));
  3043. }
  3044. catch (PDOException $e) {
  3045. $_SESSION['return'] = array(
  3046. 'type' => 'danger',
  3047. 'msg' => 'MySQL: '.$e
  3048. );
  3049. return false;
  3050. }
  3051. }
  3052. $_SESSION['return'] = array(
  3053. 'type' => 'success',
  3054. 'msg' => sprintf($lang['success']['alias_removed'], htmlspecialchars(implode(', ', $addresses)))
  3055. );
  3056. break;
  3057. case 'alias_domain':
  3058. if (!is_array($_data['alias_domain'])) {
  3059. $alias_domains = array();
  3060. $alias_domains[] = $_data['alias_domain'];
  3061. }
  3062. else {
  3063. $alias_domains = $_data['alias_domain'];
  3064. }
  3065. foreach ($alias_domains as $alias_domain) {
  3066. if (!is_valid_domain_name($alias_domain)) {
  3067. $_SESSION['return'] = array(
  3068. 'type' => 'danger',
  3069. 'msg' => sprintf($lang['danger']['domain_invalid'])
  3070. );
  3071. return false;
  3072. }
  3073. try {
  3074. $stmt = $pdo->prepare("SELECT `target_domain` FROM `alias_domain`
  3075. WHERE `alias_domain`= :alias_domain");
  3076. $stmt->execute(array(':alias_domain' => $alias_domain));
  3077. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  3078. }
  3079. catch(PDOException $e) {
  3080. $_SESSION['return'] = array(
  3081. 'type' => 'danger',
  3082. 'msg' => 'MySQL: '.$e
  3083. );
  3084. return false;
  3085. }
  3086. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $DomainData['target_domain'])) {
  3087. $_SESSION['return'] = array(
  3088. 'type' => 'danger',
  3089. 'msg' => sprintf($lang['danger']['access_denied'])
  3090. );
  3091. return false;
  3092. }
  3093. try {
  3094. $stmt = $pdo->prepare("DELETE FROM `alias_domain` WHERE `alias_domain` = :alias_domain");
  3095. $stmt->execute(array(
  3096. ':alias_domain' => $alias_domain,
  3097. ));
  3098. $stmt = $pdo->prepare("DELETE FROM `alias` WHERE `domain` = :alias_domain");
  3099. $stmt->execute(array(
  3100. ':alias_domain' => $alias_domain,
  3101. ));
  3102. }
  3103. catch (PDOException $e) {
  3104. $_SESSION['return'] = array(
  3105. 'type' => 'danger',
  3106. 'msg' => 'MySQL: '.$e
  3107. );
  3108. return false;
  3109. }
  3110. }
  3111. $_SESSION['return'] = array(
  3112. 'type' => 'success',
  3113. 'msg' => sprintf($lang['success']['alias_domain_removed'], htmlspecialchars(implode(', ', $alias_domains)))
  3114. );
  3115. break;
  3116. case 'mailbox':
  3117. if (!is_array($_data['username'])) {
  3118. $usernames = array();
  3119. $usernames[] = $_data['username'];
  3120. }
  3121. else {
  3122. $usernames = $_data['username'];
  3123. }
  3124. foreach ($usernames as $username) {
  3125. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  3126. $_SESSION['return'] = array(
  3127. 'type' => 'danger',
  3128. 'msg' => sprintf($lang['danger']['access_denied'])
  3129. );
  3130. return false;
  3131. }
  3132. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $username)) {
  3133. $_SESSION['return'] = array(
  3134. 'type' => 'danger',
  3135. 'msg' => sprintf($lang['danger']['access_denied'])
  3136. );
  3137. return false;
  3138. }
  3139. try {
  3140. $stmt = $pdo->prepare("DELETE FROM `alias` WHERE `goto` = :username");
  3141. $stmt->execute(array(
  3142. ':username' => $username
  3143. ));
  3144. $stmt = $pdo->prepare("DELETE FROM `quota2` WHERE `username` = :username");
  3145. $stmt->execute(array(
  3146. ':username' => $username
  3147. ));
  3148. $stmt = $pdo->prepare("DELETE FROM `mailbox` WHERE `username` = :username");
  3149. $stmt->execute(array(
  3150. ':username' => $username
  3151. ));
  3152. $stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` = :username");
  3153. $stmt->execute(array(
  3154. ':username' => $username
  3155. ));
  3156. $stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `goto` = :username");
  3157. $stmt->execute(array(
  3158. ':username' => $username
  3159. ));
  3160. $stmt = $pdo->prepare("DELETE FROM `imapsync` WHERE `user2` = :username");
  3161. $stmt->execute(array(
  3162. ':username' => $username
  3163. ));
  3164. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :username");
  3165. $stmt->execute(array(
  3166. ':username' => $username
  3167. ));
  3168. $stmt = $pdo->prepare("DELETE FROM `sogo_user_profile` WHERE `c_uid` = :username");
  3169. $stmt->execute(array(
  3170. ':username' => $username
  3171. ));
  3172. $stmt = $pdo->prepare("DELETE FROM `sogo_cache_folder` WHERE `c_uid` = :username");
  3173. $stmt->execute(array(
  3174. ':username' => $username
  3175. ));
  3176. $stmt = $pdo->prepare("DELETE FROM `sogo_acl` WHERE `c_object` LIKE '%/" . $username . "/%' OR `c_uid` = :username");
  3177. $stmt->execute(array(
  3178. ':username' => $username
  3179. ));
  3180. $stmt = $pdo->prepare("DELETE FROM `sogo_store` WHERE `c_folder_id` IN (SELECT `c_folder_id` FROM `sogo_folder_info` WHERE `c_path2` = :username)");
  3181. $stmt->execute(array(
  3182. ':username' => $username
  3183. ));
  3184. $stmt = $pdo->prepare("DELETE FROM `sogo_quick_contact` WHERE `c_folder_id` IN (SELECT `c_folder_id` FROM `sogo_folder_info` WHERE `c_path2` = :username)");
  3185. $stmt->execute(array(
  3186. ':username' => $username
  3187. ));
  3188. $stmt = $pdo->prepare("DELETE FROM `sogo_quick_appointment` WHERE `c_folder_id` IN (SELECT `c_folder_id` FROM `sogo_folder_info` WHERE `c_path2` = :username)");
  3189. $stmt->execute(array(
  3190. ':username' => $username
  3191. ));
  3192. $stmt = $pdo->prepare("DELETE FROM `sogo_folder_info` WHERE `c_path2` = :username");
  3193. $stmt->execute(array(
  3194. ':username' => $username
  3195. ));
  3196. $stmt = $pdo->prepare("SELECT `address`, `goto` FROM `alias`
  3197. WHERE `goto` REGEXP :username");
  3198. $stmt->execute(array(':username' => '(^|,)'.$username.'($|,)'));
  3199. $GotoData = $stmt->fetchAll(PDO::FETCH_ASSOC);
  3200. foreach ($GotoData as $gotos) {
  3201. $goto_exploded = explode(',', $gotos['goto']);
  3202. if (($key = array_search($username, $goto_exploded)) !== false) {
  3203. unset($goto_exploded[$key]);
  3204. }
  3205. $gotos_rebuild = implode(',', $goto_exploded);
  3206. $stmt = $pdo->prepare("UPDATE `alias` SET
  3207. `goto` = :goto
  3208. WHERE `address` = :address");
  3209. $stmt->execute(array(
  3210. ':goto' => $gotos_rebuild,
  3211. ':address' => $gotos['address']
  3212. ));
  3213. }
  3214. }
  3215. catch (PDOException $e) {
  3216. $_SESSION['return'] = array(
  3217. 'type' => 'danger',
  3218. 'msg' => 'MySQL: '.$e
  3219. );
  3220. return false;
  3221. }
  3222. }
  3223. $_SESSION['return'] = array(
  3224. 'type' => 'success',
  3225. 'msg' => sprintf($lang['success']['mailbox_removed'], htmlspecialchars(implode(', ', $usernames)))
  3226. );
  3227. break;
  3228. case 'resource':
  3229. if (!is_array($_data['name'])) {
  3230. $names = array();
  3231. $names[] = $_data['name'];
  3232. }
  3233. else {
  3234. $names = $_data['name'];
  3235. }
  3236. foreach ($names as $name) {
  3237. if (!filter_var($name, FILTER_VALIDATE_EMAIL)) {
  3238. $_SESSION['return'] = array(
  3239. 'type' => 'danger',
  3240. 'msg' => sprintf($lang['danger']['access_denied'])
  3241. );
  3242. return false;
  3243. }
  3244. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $name)) {
  3245. $_SESSION['return'] = array(
  3246. 'type' => 'danger',
  3247. 'msg' => sprintf($lang['danger']['access_denied'])
  3248. );
  3249. return false;
  3250. }
  3251. try {
  3252. $stmt = $pdo->prepare("DELETE FROM `mailbox` WHERE `username` = :username");
  3253. $stmt->execute(array(
  3254. ':username' => $name
  3255. ));
  3256. $stmt = $pdo->prepare("DELETE FROM `sogo_user_profile` WHERE `c_uid` = :username");
  3257. $stmt->execute(array(
  3258. ':username' => $name
  3259. ));
  3260. $stmt = $pdo->prepare("DELETE FROM `sogo_cache_folder` WHERE `c_uid` = :username");
  3261. $stmt->execute(array(
  3262. ':username' => $name
  3263. ));
  3264. $stmt = $pdo->prepare("DELETE FROM `sogo_acl` WHERE `c_object` LIKE '%/" . $name . "/%' OR `c_uid` = :username");
  3265. $stmt->execute(array(
  3266. ':username' => $name
  3267. ));
  3268. $stmt = $pdo->prepare("DELETE FROM `sogo_store` WHERE `c_folder_id` IN (SELECT `c_folder_id` FROM `sogo_folder_info` WHERE `c_path2` = :username)");
  3269. $stmt->execute(array(
  3270. ':username' => $name
  3271. ));
  3272. $stmt = $pdo->prepare("DELETE FROM `sogo_quick_contact` WHERE `c_folder_id` IN (SELECT `c_folder_id` FROM `sogo_folder_info` WHERE `c_path2` = :username)");
  3273. $stmt->execute(array(
  3274. ':username' => $name
  3275. ));
  3276. $stmt = $pdo->prepare("DELETE FROM `sogo_quick_appointment` WHERE `c_folder_id` IN (SELECT `c_folder_id` FROM `sogo_folder_info` WHERE `c_path2` = :username)");
  3277. $stmt->execute(array(
  3278. ':username' => $name
  3279. ));
  3280. $stmt = $pdo->prepare("DELETE FROM `sogo_folder_info` WHERE `c_path2` = :username");
  3281. $stmt->execute(array(
  3282. ':username' => $name
  3283. ));
  3284. }
  3285. catch (PDOException $e) {
  3286. $_SESSION['return'] = array(
  3287. 'type' => 'danger',
  3288. 'msg' => 'MySQL: '.$e
  3289. );
  3290. return false;
  3291. }
  3292. }
  3293. $_SESSION['return'] = array(
  3294. 'type' => 'success',
  3295. 'msg' => sprintf($lang['success']['resource_removed'], htmlspecialchars(implode(', ', $names)))
  3296. );
  3297. break;
  3298. }
  3299. break;
  3300. }
  3301. }