triggers.user.inc.php 5.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158
  1. <?php
  2. // handle iam authentication
  3. if ($iam_provider){
  4. if (isset($_GET['iam_sso'])){
  5. // redirect for sso
  6. $redirect_uri = identity_provider('get-redirect');
  7. $redirect_uri = !empty($redirect_uri) ? $redirect_uri : '/';
  8. header('Location: ' . $redirect_uri);
  9. die();
  10. }
  11. if ($_SESSION['iam_token'] && $_SESSION['iam_refresh_token']) {
  12. // Session found, try to refresh
  13. $isRefreshed = identity_provider('refresh-token');
  14. if (!$isRefreshed){
  15. // Session could not be refreshed, redirect to provider
  16. $redirect_uri = identity_provider('get-redirect');
  17. $redirect_uri = !empty($redirect_uri) ? $redirect_uri : '/';
  18. header('Location: ' . $redirect_uri);
  19. die();
  20. }
  21. } elseif ($_GET['code'] && $_GET['state'] === $_SESSION['oauth2state']) {
  22. // Check given state against previously stored one to mitigate CSRF attack
  23. // Received access token in $_GET['code']
  24. // extract info and verify user
  25. identity_provider('verify-sso');
  26. }
  27. }
  28. if (isset($_POST["pw_reset_request"]) && !empty($_POST['username'])) {
  29. reset_password("issue", $_POST['username']);
  30. header("Location: /");
  31. exit;
  32. }
  33. if (isset($_POST["pw_reset"])) {
  34. $username = reset_password("check", $_POST['token']);
  35. $reset_result = reset_password("reset", array(
  36. 'new_password' => $_POST['new_password'],
  37. 'new_password2' => $_POST['new_password2'],
  38. 'token' => $_POST['token'],
  39. 'username' => $username,
  40. 'check_tfa' => True
  41. ));
  42. if ($reset_result){
  43. header("Location: /");
  44. exit;
  45. }
  46. }
  47. if (isset($_POST["verify_tfa_login"])) {
  48. if (verify_tfa_login($_SESSION['pending_mailcow_cc_username'], $_POST)) {
  49. if ($_SESSION['pending_mailcow_cc_role'] == "user") {
  50. if (isset($_SESSION['pending_pw_reset_token']) && isset($_SESSION['pending_pw_new_password'])) {
  51. reset_password("reset", array(
  52. 'new_password' => $_SESSION['pending_pw_new_password'],
  53. 'new_password2' => $_SESSION['pending_pw_new_password'],
  54. 'token' => $_SESSION['pending_pw_reset_token'],
  55. 'username' => $_SESSION['pending_mailcow_cc_username']
  56. ));
  57. unset($_SESSION['pending_pw_reset_token']);
  58. unset($_SESSION['pending_pw_new_password']);
  59. unset($_SESSION['pending_mailcow_cc_username']);
  60. unset($_SESSION['pending_tfa_methods']);
  61. header("Location: /");
  62. die();
  63. } else {
  64. set_user_loggedin_session($_SESSION['pending_mailcow_cc_username']);
  65. if (isset($_SESSION['oauth2_request'])) {
  66. $oauth2_request = $_SESSION['oauth2_request'];
  67. unset($_SESSION['oauth2_request']);
  68. header('Location: ' . $oauth2_request);
  69. die();
  70. }
  71. $user_details = mailbox("get", "mailbox_details", $_SESSION['mailcow_cc_username']);
  72. $is_dual = (!empty($_SESSION["dual-login"]["username"])) ? true : false;
  73. if (intval($user_details['attributes']['sogo_access']) == 1 && !$is_dual) {
  74. header("Location: /SOGo/so/{$_SESSION['mailcow_cc_username']}");
  75. die();
  76. } else {
  77. header("Location: /user");
  78. die();
  79. }
  80. }
  81. }
  82. }
  83. unset($_SESSION['pending_mailcow_cc_username']);
  84. unset($_SESSION['pending_mailcow_cc_role']);
  85. unset($_SESSION['pending_tfa_methods']);
  86. }
  87. if (isset($_POST["verify_fido2_login"])) {
  88. $res = fido2(array(
  89. "action" => "verify",
  90. "token" => $_POST["token"],
  91. "user" => "user"
  92. ));
  93. if (is_array($res) && $res['role'] == "user" && !empty($res['username'])){
  94. set_user_loggedin_session($res['username']);
  95. $_SESSION["fido2_cid"] = $res['cid'];
  96. }
  97. exit;
  98. }
  99. if (isset($_GET["cancel_tfa_login"])) {
  100. unset($_SESSION['pending_pw_reset_token']);
  101. unset($_SESSION['pending_pw_new_password']);
  102. unset($_SESSION['pending_mailcow_cc_username']);
  103. unset($_SESSION['pending_mailcow_cc_role']);
  104. unset($_SESSION['pending_tfa_methods']);
  105. header("Location: /");
  106. }
  107. if (isset($_POST["login_user"]) && isset($_POST["pass_user"])) {
  108. $login_user = strtolower(trim($_POST["login_user"]));
  109. $as = check_login($login_user, $_POST["pass_user"], false, array("role" => "user"));
  110. if ($as == "user") {
  111. set_user_loggedin_session($login_user);
  112. $http_parameters = explode('&', $_SESSION['index_query_string']);
  113. unset($_SESSION['index_query_string']);
  114. if (in_array('mobileconfig', $http_parameters)) {
  115. if (in_array('only_email', $http_parameters)) {
  116. header("Location: /mobileconfig.php?only_email");
  117. die();
  118. }
  119. header("Location: /mobileconfig.php");
  120. die();
  121. }
  122. if (isset($_SESSION['oauth2_request'])) {
  123. $oauth2_request = $_SESSION['oauth2_request'];
  124. unset($_SESSION['oauth2_request']);
  125. header('Location: ' . $oauth2_request);
  126. die();
  127. }
  128. $user_details = mailbox("get", "mailbox_details", $login_user);
  129. $is_dual = (!empty($_SESSION["dual-login"]["username"])) ? true : false;
  130. if (intval($user_details['attributes']['sogo_access']) == 1 && !$is_dual) {
  131. header("Location: /SOGo/so/{$login_user}");
  132. die();
  133. } else {
  134. header("Location: /user");
  135. die();
  136. }
  137. }
  138. elseif ($as != "pending") {
  139. unset($_SESSION['pending_mailcow_cc_username']);
  140. unset($_SESSION['pending_mailcow_cc_role']);
  141. unset($_SESSION['pending_tfa_methods']);
  142. unset($_SESSION['mailcow_cc_username']);
  143. unset($_SESSION['mailcow_cc_role']);
  144. }
  145. }
  146. ?>