functions.domain_admin.inc.php 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445
  1. <?php
  2. function domain_admin($_action, $_data = null) {
  3. global $pdo;
  4. global $lang;
  5. $_data_log = $_data;
  6. !isset($_data_log['password']) ?: $_data_log['password'] = '*';
  7. !isset($_data_log['password2']) ?: $_data_log['password2'] = '*';
  8. switch ($_action) {
  9. case 'add':
  10. $username = strtolower(trim($_data['username']));
  11. $password = $_data['password'];
  12. $password2 = $_data['password2'];
  13. $domains = (array)$_data['domains'];
  14. $active = intval($_data['active']);
  15. if ($_SESSION['mailcow_cc_role'] != "admin") {
  16. $_SESSION['return'][] = array(
  17. 'type' => 'danger',
  18. 'log' => array(__FUNCTION__, $_action, $_data_log),
  19. 'msg' => 'access_denied'
  20. );
  21. return false;
  22. }
  23. if (empty($domains)) {
  24. $_SESSION['return'][] = array(
  25. 'type' => 'danger',
  26. 'log' => array(__FUNCTION__, $_action, $_data_log),
  27. 'msg' => 'domain_invalid'
  28. );
  29. return false;
  30. }
  31. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username)) || empty ($username)) {
  32. $_SESSION['return'][] = array(
  33. 'type' => 'danger',
  34. 'log' => array(__FUNCTION__, $_action, $_data_log),
  35. 'msg' => 'username_invalid'
  36. );
  37. return false;
  38. }
  39. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox`
  40. WHERE `username` = :username");
  41. $stmt->execute(array(':username' => $username));
  42. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  43. $stmt = $pdo->prepare("SELECT `username` FROM `admin`
  44. WHERE `username` = :username");
  45. $stmt->execute(array(':username' => $username));
  46. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  47. $stmt = $pdo->prepare("SELECT `username` FROM `domain_admins`
  48. WHERE `username` = :username");
  49. $stmt->execute(array(':username' => $username));
  50. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  51. foreach ($num_results as $num_results_each) {
  52. if ($num_results_each != 0) {
  53. $_SESSION['return'][] = array(
  54. 'type' => 'danger',
  55. 'log' => array(__FUNCTION__, $_action, $_data_log),
  56. 'msg' => array('object_exists', htmlspecialchars($username))
  57. );
  58. return false;
  59. }
  60. }
  61. if (!empty($password) && !empty($password2)) {
  62. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) {
  63. $_SESSION['return'][] = array(
  64. 'type' => 'danger',
  65. 'log' => array(__FUNCTION__, $_action, $_data_log),
  66. 'msg' => 'password_complexity'
  67. );
  68. return false;
  69. }
  70. if ($password != $password2) {
  71. $_SESSION['return'][] = array(
  72. 'type' => 'danger',
  73. 'log' => array(__FUNCTION__, $_action, $_data_log),
  74. 'msg' => 'password_mismatch'
  75. );
  76. return false;
  77. }
  78. $password_hashed = hash_password($password);
  79. foreach ($domains as $domain) {
  80. if (!is_valid_domain_name($domain)) {
  81. $_SESSION['return'][] = array(
  82. 'type' => 'danger',
  83. 'log' => array(__FUNCTION__, $_action, $_data_log),
  84. 'msg' => 'domain_invalid'
  85. );
  86. return false;
  87. }
  88. $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
  89. VALUES (:username, :domain, :created, :active)");
  90. $stmt->execute(array(
  91. ':username' => $username,
  92. ':domain' => $domain,
  93. ':created' => date('Y-m-d H:i:s'),
  94. ':active' => $active
  95. ));
  96. }
  97. $stmt = $pdo->prepare("INSERT INTO `admin` (`username`, `password`, `superadmin`, `active`)
  98. VALUES (:username, :password_hashed, '0', :active)");
  99. $stmt->execute(array(
  100. ':username' => $username,
  101. ':password_hashed' => $password_hashed,
  102. ':active' => $active
  103. ));
  104. }
  105. else {
  106. $_SESSION['return'][] = array(
  107. 'type' => 'danger',
  108. 'log' => array(__FUNCTION__, $_action, $_data_log),
  109. 'msg' => 'password_empty'
  110. );
  111. return false;
  112. }
  113. $stmt = $pdo->prepare("INSERT INTO `da_acl` (`username`) VALUES (:username)");
  114. $stmt->execute(array(
  115. ':username' => $username
  116. ));
  117. $_SESSION['return'][] = array(
  118. 'type' => 'success',
  119. 'log' => array(__FUNCTION__, $_action, $_data_log),
  120. 'msg' => array('domain_admin_added', htmlspecialchars($username))
  121. );
  122. break;
  123. case 'edit':
  124. if ($_SESSION['mailcow_cc_role'] != "admin" && $_SESSION['mailcow_cc_role'] != "domainadmin") {
  125. $_SESSION['return'][] = array(
  126. 'type' => 'danger',
  127. 'log' => array(__FUNCTION__, $_action, $_data_log),
  128. 'msg' => 'access_denied'
  129. );
  130. return false;
  131. }
  132. // Administrator
  133. if ($_SESSION['mailcow_cc_role'] == "admin") {
  134. if (!is_array($_data['username'])) {
  135. $usernames = array();
  136. $usernames[] = $_data['username'];
  137. }
  138. else {
  139. $usernames = $_data['username'];
  140. }
  141. foreach ($usernames as $username) {
  142. $is_now = domain_admin('details', $username);
  143. $domains = (isset($_data['domains'])) ? (array)$_data['domains'] : null;
  144. if (!empty($is_now)) {
  145. $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active_int'];
  146. $domains = (!empty($domains)) ? $domains : $is_now['selected_domains'];
  147. $username_new = (!empty($_data['username_new'])) ? $_data['username_new'] : $is_now['username'];
  148. }
  149. else {
  150. $_SESSION['return'][] = array(
  151. 'type' => 'danger',
  152. 'log' => array(__FUNCTION__, $_action, $_data_log),
  153. 'msg' => 'access_denied'
  154. );
  155. continue;
  156. }
  157. $password = $_data['password'];
  158. $password2 = $_data['password2'];
  159. if (!empty($domains)) {
  160. foreach ($domains as $domain) {
  161. if (!is_valid_domain_name($domain)) {
  162. $_SESSION['return'][] = array(
  163. 'type' => 'danger',
  164. 'log' => array(__FUNCTION__, $_action, $_data_log),
  165. 'msg' => array('domain_invalid', htmlspecialchars($domain))
  166. );
  167. continue 2;
  168. }
  169. }
  170. }
  171. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username_new))) {
  172. $_SESSION['return'][] = array(
  173. 'type' => 'danger',
  174. 'log' => array(__FUNCTION__, $_action, $_data_log),
  175. 'msg' => array('username_invalid', $username_new)
  176. );
  177. continue;
  178. }
  179. if ($username_new != $username) {
  180. if (!empty(domain_admin('details', $username_new)['username'])) {
  181. $_SESSION['return'][] = array(
  182. 'type' => 'danger',
  183. 'log' => array(__FUNCTION__, $_action, $_data_log),
  184. 'msg' => array('username_invalid', $username_new)
  185. );
  186. continue;
  187. }
  188. }
  189. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
  190. $stmt->execute(array(
  191. ':username' => $username,
  192. ));
  193. $stmt = $pdo->prepare("UPDATE `da_acl` SET `username` = :username_new WHERE `username` = :username");
  194. $stmt->execute(array(
  195. ':username_new' => $username_new,
  196. ':username' => $username
  197. ));
  198. if (!empty($domains)) {
  199. foreach ($domains as $domain) {
  200. $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
  201. VALUES (:username_new, :domain, :created, :active)");
  202. $stmt->execute(array(
  203. ':username_new' => $username_new,
  204. ':domain' => $domain,
  205. ':created' => date('Y-m-d H:i:s'),
  206. ':active' => $active
  207. ));
  208. }
  209. }
  210. if (!empty($password) && !empty($password2)) {
  211. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) {
  212. $_SESSION['return'][] = array(
  213. 'type' => 'danger',
  214. 'log' => array(__FUNCTION__, $_action, $_data_log),
  215. 'msg' => 'password_complexity'
  216. );
  217. continue;
  218. }
  219. if ($password != $password2) {
  220. $_SESSION['return'][] = array(
  221. 'type' => 'danger',
  222. 'log' => array(__FUNCTION__, $_action, $_data_log),
  223. 'msg' => 'password_mismatch'
  224. );
  225. continue;
  226. }
  227. $password_hashed = hash_password($password);
  228. $stmt = $pdo->prepare("UPDATE `admin` SET `username` = :username_new, `active` = :active, `password` = :password_hashed WHERE `username` = :username");
  229. $stmt->execute(array(
  230. ':password_hashed' => $password_hashed,
  231. ':username_new' => $username_new,
  232. ':username' => $username,
  233. ':active' => $active
  234. ));
  235. if (isset($_data['disable_tfa'])) {
  236. $stmt = $pdo->prepare("UPDATE `tfa` SET `active` = '0' WHERE `username` = :username");
  237. $stmt->execute(array(':username' => $username));
  238. }
  239. else {
  240. $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username_new WHERE `username` = :username");
  241. $stmt->execute(array(':username_new' => $username_new, ':username' => $username));
  242. }
  243. }
  244. else {
  245. $stmt = $pdo->prepare("UPDATE `admin` SET `username` = :username_new, `active` = :active WHERE `username` = :username");
  246. $stmt->execute(array(
  247. ':username_new' => $username_new,
  248. ':username' => $username,
  249. ':active' => $active
  250. ));
  251. if (isset($_data['disable_tfa'])) {
  252. $stmt = $pdo->prepare("UPDATE `tfa` SET `active` = '0' WHERE `username` = :username");
  253. $stmt->execute(array(':username' => $username));
  254. }
  255. else {
  256. $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username_new WHERE `username` = :username");
  257. $stmt->execute(array(':username_new' => $username_new, ':username' => $username));
  258. }
  259. }
  260. $_SESSION['return'][] = array(
  261. 'type' => 'success',
  262. 'log' => array(__FUNCTION__, $_action, $_data_log),
  263. 'msg' => array('domain_admin_modified', htmlspecialchars($username))
  264. );
  265. }
  266. return true;
  267. }
  268. // Domain administrator
  269. // Can only edit itself
  270. elseif ($_SESSION['mailcow_cc_role'] == "domainadmin") {
  271. $username = $_SESSION['mailcow_cc_username'];
  272. $password_old = $_data['user_old_pass'];
  273. $password_new = $_data['user_new_pass'];
  274. $password_new2 = $_data['user_new_pass2'];
  275. $stmt = $pdo->prepare("SELECT `password` FROM `admin`
  276. WHERE `username` = :user");
  277. $stmt->execute(array(':user' => $username));
  278. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  279. if (!verify_hash($row['password'], $password_old)) {
  280. $_SESSION['return'][] = array(
  281. 'type' => 'danger',
  282. 'log' => array(__FUNCTION__, $_action, $_data_log),
  283. 'msg' => 'access_denied'
  284. );
  285. return false;
  286. }
  287. if (!empty($password_new2) && !empty($password_new)) {
  288. if ($password_new2 != $password_new) {
  289. $_SESSION['return'][] = array(
  290. 'type' => 'danger',
  291. 'log' => array(__FUNCTION__, $_action, $_data_log),
  292. 'msg' => 'password_mismatch'
  293. );
  294. return false;
  295. }
  296. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password_new)) {
  297. $_SESSION['return'][] = array(
  298. 'type' => 'danger',
  299. 'log' => array(__FUNCTION__, $_action, $_data_log),
  300. 'msg' => 'password_complexity'
  301. );
  302. return false;
  303. }
  304. $password_hashed = hash_password($password_new);
  305. $stmt = $pdo->prepare("UPDATE `admin` SET `password` = :password_hashed WHERE `username` = :username");
  306. $stmt->execute(array(
  307. ':password_hashed' => $password_hashed,
  308. ':username' => $username
  309. ));
  310. }
  311. $_SESSION['return'][] = array(
  312. 'type' => 'success',
  313. 'log' => array(__FUNCTION__, $_action, $_data_log),
  314. 'msg' => array('domain_admin_modified', htmlspecialchars($username))
  315. );
  316. }
  317. break;
  318. case 'delete':
  319. if ($_SESSION['mailcow_cc_role'] != "admin") {
  320. $_SESSION['return'][] = array(
  321. 'type' => 'danger',
  322. 'log' => array(__FUNCTION__, $_action, $_data_log),
  323. 'msg' => 'access_denied'
  324. );
  325. return false;
  326. }
  327. $usernames = (array)$_data['username'];
  328. foreach ($usernames as $username) {
  329. if (empty(domain_admin('details', $username))) {
  330. $_SESSION['return'][] = array(
  331. 'type' => 'danger',
  332. 'log' => array(__FUNCTION__, $_action, $_data_log),
  333. 'msg' => array('username_invalid', $username)
  334. );
  335. continue;
  336. }
  337. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
  338. $stmt->execute(array(
  339. ':username' => $username,
  340. ));
  341. $stmt = $pdo->prepare("DELETE FROM `admin` WHERE `username` = :username");
  342. $stmt->execute(array(
  343. ':username' => $username,
  344. ));
  345. $stmt = $pdo->prepare("DELETE FROM `da_acl` WHERE `username` = :username");
  346. $stmt->execute(array(
  347. ':username' => $username,
  348. ));
  349. $_SESSION['return'][] = array(
  350. 'type' => 'success',
  351. 'log' => array(__FUNCTION__, $_action, $_data_log),
  352. 'msg' => array('domain_admin_removed', htmlspecialchars($username))
  353. );
  354. }
  355. break;
  356. case 'get':
  357. $domainadmins = array();
  358. if ($_SESSION['mailcow_cc_role'] != "admin") {
  359. $_SESSION['return'][] = array(
  360. 'type' => 'danger',
  361. 'log' => array(__FUNCTION__, $_action, $_data_log),
  362. 'msg' => 'access_denied'
  363. );
  364. return false;
  365. }
  366. $stmt = $pdo->query("SELECT DISTINCT
  367. `username`
  368. FROM `domain_admins`
  369. WHERE `username` IN (
  370. SELECT `username` FROM `admin`
  371. WHERE `superadmin`!='1'
  372. )");
  373. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  374. while ($row = array_shift($rows)) {
  375. $domainadmins[] = $row['username'];
  376. }
  377. return $domainadmins;
  378. break;
  379. case 'details':
  380. $domainadmindata = array();
  381. if ($_SESSION['mailcow_cc_role'] == "domainadmin" && $_data != $_SESSION['mailcow_cc_username']) {
  382. return false;
  383. }
  384. elseif ($_SESSION['mailcow_cc_role'] != "admin" || !isset($_data)) {
  385. return false;
  386. }
  387. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $_data))) {
  388. return false;
  389. }
  390. $stmt = $pdo->prepare("SELECT
  391. `tfa`.`active` AS `tfa_active_int`,
  392. CASE `tfa`.`active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `tfa_active`,
  393. `domain_admins`.`username`,
  394. `domain_admins`.`created`,
  395. `domain_admins`.`active` AS `active_int`,
  396. CASE `domain_admins`.`active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`
  397. FROM `domain_admins`
  398. LEFT OUTER JOIN `tfa` ON `tfa`.`username`=`domain_admins`.`username`
  399. WHERE `domain_admins`.`username`= :domain_admin");
  400. $stmt->execute(array(
  401. ':domain_admin' => $_data
  402. ));
  403. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  404. if (empty($row)) {
  405. return false;
  406. }
  407. $domainadmindata['username'] = $row['username'];
  408. $domainadmindata['tfa_active'] = $row['tfa_active'];
  409. $domainadmindata['active'] = $row['active'];
  410. $domainadmindata['tfa_active_int'] = $row['tfa_active_int'];
  411. $domainadmindata['active_int'] = $row['active_int'];
  412. $domainadmindata['created'] = $row['created'];
  413. // GET SELECTED
  414. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  415. WHERE `domain` IN (
  416. SELECT `domain` FROM `domain_admins`
  417. WHERE `username`= :domain_admin)");
  418. $stmt->execute(array(':domain_admin' => $_data));
  419. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  420. while($row = array_shift($rows)) {
  421. $domainadmindata['selected_domains'][] = $row['domain'];
  422. }
  423. // GET UNSELECTED
  424. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  425. WHERE `domain` NOT IN (
  426. SELECT `domain` FROM `domain_admins`
  427. WHERE `username`= :domain_admin)");
  428. $stmt->execute(array(':domain_admin' => $_data));
  429. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  430. while($row = array_shift($rows)) {
  431. $domainadmindata['unselected_domains'][] = $row['domain'];
  432. }
  433. if (!isset($domainadmindata['unselected_domains'])) {
  434. $domainadmindata['unselected_domains'] = "";
  435. }
  436. return $domainadmindata;
  437. break;
  438. }
  439. }