triggers.inc.php 7.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223
  1. <?php
  2. // handle iam authentication
  3. if ($iam_provider){
  4. if (isset($_GET['iam_sso'])){
  5. // redirect for sso
  6. $redirect_uri = identity_provider('get-redirect', array('iam_provider' => $iam_provider));
  7. $redirect_uri = !empty($redirect_uri) ? $redirect_uri : '/';
  8. header('Location: ' . $redirect_uri);
  9. die();
  10. }
  11. if ($_SESSION['iam_token'] && $_SESSION['iam_refresh_token']) {
  12. // Session found, try to refresh
  13. $isRefreshed = identity_provider('refresh-token', array('iam_provider' => $iam_provider));
  14. if (!$isRefreshed){
  15. // Session could not be refreshed, redirect to provider
  16. $redirect_uri = identity_provider('get-redirect', array('iam_provider' => $iam_provider));
  17. $redirect_uri = !empty($redirect_uri) ? $redirect_uri : '/';
  18. header('Location: ' . $redirect_uri);
  19. die();
  20. }
  21. } elseif ($_GET['code'] && $_GET['state'] === $_SESSION['oauth2state']) {
  22. // Check given state against previously stored one to mitigate CSRF attack
  23. // Recieved access token in $_GET['code']
  24. // extract info and verify user
  25. identity_provider('verify-sso', array('iam_provider' => $iam_provider));
  26. }
  27. }
  28. // SSO Domain Admin
  29. if (!empty($_GET['sso_token'])) {
  30. $username = domain_admin_sso('check', $_GET['sso_token']);
  31. if ($username !== false) {
  32. $_SESSION['mailcow_cc_username'] = $username;
  33. $_SESSION['mailcow_cc_role'] = 'domainadmin';
  34. header('Location: /mailbox');
  35. }
  36. }
  37. if (isset($_POST["verify_tfa_login"])) {
  38. if (verify_tfa_login($_SESSION['pending_mailcow_cc_username'], $_POST)) {
  39. if ($_SESSION['pending_mailcow_cc_role'] == "admin") {
  40. $_SESSION['mailcow_cc_username'] = $_SESSION['pending_mailcow_cc_username'];
  41. $_SESSION['mailcow_cc_role'] = "admin";
  42. unset($_SESSION['pending_mailcow_cc_username']);
  43. unset($_SESSION['pending_mailcow_cc_role']);
  44. unset($_SESSION['pending_tfa_methods']);
  45. header("Location: /debug");
  46. die();
  47. }
  48. elseif ($_SESSION['pending_mailcow_cc_role'] == "domainadmin") {
  49. $_SESSION['mailcow_cc_username'] = $_SESSION['pending_mailcow_cc_username'];
  50. $_SESSION['mailcow_cc_role'] = "domainadmin";
  51. unset($_SESSION['pending_mailcow_cc_username']);
  52. unset($_SESSION['pending_mailcow_cc_role']);
  53. unset($_SESSION['pending_tfa_methods']);
  54. header("Location: /mailbox");
  55. die();
  56. }
  57. elseif ($_SESSION['pending_mailcow_cc_role'] == "user") {
  58. set_user_loggedin_session($_SESSION['pending_mailcow_cc_username']);
  59. $user_details = mailbox("get", "mailbox_details", $_SESSION['mailcow_cc_username']);
  60. $is_dual = (!empty($_SESSION["dual-login"]["username"])) ? true : false;
  61. if (intval($user_details['attributes']['sogo_access']) == 1 && !$is_dual) {
  62. header("Location: /SOGo/so/{$_SESSION['mailcow_cc_username']}");
  63. die();
  64. } else {
  65. header("Location: /user");
  66. die();
  67. }
  68. }
  69. }
  70. unset($_SESSION['pending_mailcow_cc_username']);
  71. unset($_SESSION['pending_mailcow_cc_role']);
  72. unset($_SESSION['pending_tfa_methods']);
  73. }
  74. if (isset($_GET["cancel_tfa_login"])) {
  75. unset($_SESSION['pending_mailcow_cc_username']);
  76. unset($_SESSION['pending_mailcow_cc_role']);
  77. unset($_SESSION['pending_tfa_methods']);
  78. header("Location: /");
  79. }
  80. if (isset($_POST["quick_release"])) {
  81. quarantine('quick_release', $_POST["quick_release"]);
  82. }
  83. if (isset($_POST["quick_delete"])) {
  84. quarantine('quick_delete', $_POST["quick_delete"]);
  85. }
  86. if (isset($_POST["login_user"]) && isset($_POST["pass_user"])) {
  87. $login_user = strtolower(trim($_POST["login_user"]));
  88. $as = check_login($login_user, $_POST["pass_user"]);
  89. if ($as == "admin") {
  90. $_SESSION['mailcow_cc_username'] = $login_user;
  91. $_SESSION['mailcow_cc_role'] = "admin";
  92. header("Location: /debug");
  93. }
  94. elseif ($as == "domainadmin") {
  95. $_SESSION['mailcow_cc_username'] = $login_user;
  96. $_SESSION['mailcow_cc_role'] = "domainadmin";
  97. header("Location: /mailbox");
  98. }
  99. elseif ($as == "user") {
  100. set_user_loggedin_session($login_user);
  101. $http_parameters = explode('&', $_SESSION['index_query_string']);
  102. unset($_SESSION['index_query_string']);
  103. if (in_array('mobileconfig', $http_parameters)) {
  104. if (in_array('only_email', $http_parameters)) {
  105. header("Location: /mobileconfig.php?only_email");
  106. die();
  107. }
  108. header("Location: /mobileconfig.php");
  109. die();
  110. }
  111. $user_details = mailbox("get", "mailbox_details", $login_user);
  112. $is_dual = (!empty($_SESSION["dual-login"]["username"])) ? true : false;
  113. if (intval($user_details['attributes']['sogo_access']) == 1 && !$is_dual) {
  114. header("Location: /SOGo/so/{$login_user}");
  115. die();
  116. } else {
  117. header("Location: /user");
  118. die();
  119. }
  120. }
  121. elseif ($as != "pending") {
  122. unset($_SESSION['pending_mailcow_cc_username']);
  123. unset($_SESSION['pending_mailcow_cc_role']);
  124. unset($_SESSION['pending_tfa_methods']);
  125. unset($_SESSION['mailcow_cc_username']);
  126. unset($_SESSION['mailcow_cc_role']);
  127. }
  128. }
  129. if (isset($_SESSION['mailcow_cc_role']) && (isset($_SESSION['acl']['login_as']) && $_SESSION['acl']['login_as'] == "1")) {
  130. if (isset($_GET["duallogin"])) {
  131. $is_dual = (!empty($_SESSION["dual-login"]["username"])) ? true : false;
  132. if (!$is_dual) {
  133. $duallogin = html_entity_decode(rawurldecode($_GET["duallogin"]));
  134. if (filter_var($duallogin, FILTER_VALIDATE_EMAIL)) {
  135. if (!empty(mailbox('get', 'mailbox_details', $duallogin))) {
  136. $_SESSION["dual-login"]["username"] = $_SESSION['mailcow_cc_username'];
  137. $_SESSION["dual-login"]["role"] = $_SESSION['mailcow_cc_role'];
  138. $_SESSION['mailcow_cc_username'] = $duallogin;
  139. $_SESSION['mailcow_cc_role'] = "user";
  140. header("Location: /user");
  141. }
  142. }
  143. else {
  144. if (!empty(domain_admin('details', $duallogin))) {
  145. $_SESSION["dual-login"]["username"] = $_SESSION['mailcow_cc_username'];
  146. $_SESSION["dual-login"]["role"] = $_SESSION['mailcow_cc_role'];
  147. $_SESSION['mailcow_cc_username'] = $duallogin;
  148. $_SESSION['mailcow_cc_role'] = "domainadmin";
  149. header("Location: /user");
  150. }
  151. }
  152. }
  153. }
  154. }
  155. if (isset($_SESSION['mailcow_cc_role'])) {
  156. if (isset($_POST["set_tfa"])) {
  157. set_tfa($_POST);
  158. }
  159. if (isset($_POST["unset_tfa_key"])) {
  160. unset_tfa_key($_POST);
  161. }
  162. if (isset($_POST["unset_fido2_key"])) {
  163. fido2(array("action" => "unset_fido2_key", "post_data" => $_POST));
  164. }
  165. }
  166. if (isset($_SESSION['mailcow_cc_role']) && $_SESSION['mailcow_cc_role'] == "admin" && !isset($_SESSION['mailcow_cc_api'])) {
  167. // TODO: Move file upload to API?
  168. if (isset($_POST["submit_main_logo"])) {
  169. if ($_FILES['main_logo']['error'] == 0) {
  170. customize('add', 'main_logo', $_FILES);
  171. }
  172. if ($_FILES['main_logo_dark']['error'] == 0) {
  173. customize('add', 'main_logo_dark', $_FILES);
  174. }
  175. }
  176. if (isset($_POST["reset_main_logo"])) {
  177. customize('delete', 'main_logo');
  178. customize('delete', 'main_logo_dark');
  179. }
  180. // Some actions will not be available via API
  181. if (isset($_POST["license_validate_now"])) {
  182. license('verify');
  183. }
  184. if (isset($_POST["admin_api"])) {
  185. if (isset($_POST["admin_api"]["ro"])) {
  186. admin_api('ro', 'edit', $_POST);
  187. }
  188. elseif (isset($_POST["admin_api"]["rw"])) {
  189. admin_api('rw', 'edit', $_POST);
  190. }
  191. }
  192. if (isset($_POST["admin_api_regen_key"])) {
  193. if (isset($_POST["admin_api_regen_key"]["ro"])) {
  194. admin_api('ro', 'regen_key', $_POST);
  195. }
  196. elseif (isset($_POST["admin_api_regen_key"]["rw"])) {
  197. admin_api('rw', 'regen_key', $_POST);
  198. }
  199. }
  200. if (isset($_POST["rspamd_ui"])) {
  201. rspamd_ui('edit', $_POST);
  202. }
  203. if (isset($_POST["mass_send"])) {
  204. sys_mail($_POST);
  205. }
  206. }
  207. ?>