functions.inc.php 140 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953295429552956295729582959296029612962296329642965296629672968296929702971297229732974297529762977297829792980298129822983298429852986298729882989299029912992299329942995299629972998299930003001300230033004300530063007300830093010301130123013301430153016301730183019302030213022302330243025302630273028302930303031303230333034303530363037303830393040304130423043304430453046304730483049305030513052305330543055305630573058305930603061306230633064306530663067306830693070307130723073307430753076307730783079308030813082308330843085308630873088308930903091309230933094309530963097309830993100310131023103310431053106310731083109311031113112311331143115311631173118311931203121312231233124312531263127312831293130313131323133313431353136313731383139314031413142314331443145314631473148314931503151315231533154315531563157315831593160316131623163316431653166316731683169317031713172317331743175317631773178317931803181318231833184318531863187318831893190319131923193319431953196319731983199320032013202320332043205320632073208320932103211321232133214321532163217321832193220322132223223322432253226322732283229323032313232323332343235323632373238323932403241324232433244324532463247324832493250325132523253325432553256325732583259326032613262326332643265326632673268326932703271327232733274327532763277327832793280328132823283328432853286328732883289329032913292329332943295329632973298329933003301330233033304330533063307330833093310331133123313331433153316331733183319332033213322332333243325332633273328332933303331333233333334333533363337333833393340334133423343334433453346334733483349335033513352335333543355335633573358335933603361336233633364336533663367336833693370337133723373337433753376337733783379338033813382338333843385338633873388338933903391339233933394339533963397339833993400340134023403340434053406340734083409341034113412341334143415341634173418341934203421342234233424342534263427342834293430343134323433343434353436343734383439344034413442344334443445344634473448344934503451345234533454345534563457345834593460346134623463346434653466346734683469347034713472347334743475347634773478347934803481348234833484348534863487348834893490349134923493349434953496349734983499350035013502350335043505350635073508350935103511351235133514351535163517351835193520352135223523352435253526352735283529353035313532353335343535353635373538353935403541354235433544354535463547354835493550355135523553355435553556355735583559356035613562356335643565356635673568356935703571357235733574357535763577357835793580358135823583358435853586358735883589359035913592359335943595359635973598359936003601360236033604360536063607360836093610361136123613361436153616361736183619362036213622362336243625362636273628362936303631363236333634363536363637363836393640364136423643364436453646364736483649365036513652365336543655365636573658365936603661366236633664366536663667366836693670367136723673367436753676367736783679368036813682368336843685368636873688368936903691369236933694369536963697369836993700370137023703370437053706370737083709371037113712371337143715371637173718371937203721372237233724372537263727372837293730373137323733373437353736373737383739374037413742374337443745374637473748374937503751375237533754375537563757375837593760376137623763376437653766376737683769377037713772377337743775377637773778377937803781378237833784378537863787378837893790379137923793379437953796379737983799380038013802380338043805380638073808380938103811381238133814381538163817381838193820382138223823382438253826382738283829383038313832383338343835383638373838383938403841384238433844384538463847384838493850385138523853385438553856385738583859386038613862386338643865386638673868386938703871387238733874387538763877387838793880388138823883388438853886388738883889389038913892389338943895389638973898389939003901390239033904390539063907390839093910391139123913391439153916391739183919392039213922392339243925392639273928392939303931393239333934393539363937393839393940394139423943394439453946394739483949395039513952395339543955395639573958395939603961396239633964396539663967396839693970397139723973397439753976397739783979398039813982398339843985398639873988398939903991399239933994399539963997399839994000400140024003400440054006400740084009401040114012401340144015401640174018401940204021402240234024402540264027402840294030403140324033403440354036403740384039404040414042404340444045404640474048404940504051405240534054405540564057405840594060406140624063406440654066406740684069407040714072407340744075407640774078407940804081408240834084408540864087408840894090409140924093409440954096409740984099410041014102410341044105410641074108410941104111411241134114411541164117411841194120412141224123412441254126412741284129413041314132413341344135413641374138413941404141414241434144414541464147414841494150415141524153415441554156415741584159416041614162416341644165416641674168416941704171417241734174417541764177417841794180418141824183418441854186418741884189419041914192419341944195419641974198419942004201420242034204420542064207420842094210421142124213421442154216421742184219422042214222422342244225422642274228422942304231423242334234423542364237423842394240424142424243424442454246424742484249425042514252425342544255425642574258425942604261426242634264426542664267426842694270427142724273427442754276427742784279428042814282428342844285428642874288428942904291429242934294429542964297429842994300430143024303430443054306430743084309431043114312431343144315431643174318431943204321432243234324432543264327432843294330433143324333433443354336433743384339434043414342434343444345434643474348434943504351435243534354435543564357435843594360436143624363436443654366436743684369437043714372437343744375437643774378437943804381438243834384
  1. <?php
  2. function hash_password($password) {
  3. $salt_str = bin2hex(openssl_random_pseudo_bytes(8));
  4. return "{SSHA256}".base64_encode(hash('sha256', $password . $salt_str, true) . $salt_str);
  5. }
  6. function hasDomainAccess($username, $role, $domain) {
  7. global $pdo;
  8. if (!filter_var($username, FILTER_VALIDATE_EMAIL) && !ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
  9. return false;
  10. }
  11. if (empty($domain) || !is_valid_domain_name($domain)) {
  12. return false;
  13. }
  14. if ($role != 'admin' && $role != 'domainadmin' && $role != 'user') {
  15. return false;
  16. }
  17. try {
  18. $stmt = $pdo->prepare("SELECT `domain` FROM `domain_admins`
  19. WHERE (
  20. `active`='1'
  21. AND `username` = :username
  22. AND (`domain` = :domain1 OR `domain` = (SELECT `target_domain` FROM `alias_domain` WHERE `alias_domain` = :domain2))
  23. )
  24. OR 'admin' = :role");
  25. $stmt->execute(array(':username' => $username, ':domain1' => $domain, ':domain2' => $domain, ':role' => $role));
  26. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  27. }
  28. catch(PDOException $e) {
  29. $_SESSION['return'] = array(
  30. 'type' => 'danger',
  31. 'msg' => 'MySQL: '.$e
  32. );
  33. return false;
  34. }
  35. if (!empty($num_results)) {
  36. return true;
  37. }
  38. return false;
  39. }
  40. function hasMailboxObjectAccess($username, $role, $object) {
  41. global $pdo;
  42. if (!filter_var($username, FILTER_VALIDATE_EMAIL) && !ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
  43. return false;
  44. }
  45. if ($role != 'admin' && $role != 'domainadmin' && $role != 'user') {
  46. return false;
  47. }
  48. if ($username == $object) {
  49. return true;
  50. }
  51. try {
  52. $stmt = $pdo->prepare("SELECT `domain` FROM `mailbox` WHERE `username` = :object");
  53. $stmt->execute(array(':object' => $object));
  54. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  55. if (isset($row['domain']) && hasDomainAccess($username, $role, $row['domain'])) {
  56. return true;
  57. }
  58. }
  59. catch(PDOException $e) {
  60. error_log($e);
  61. return false;
  62. }
  63. return false;
  64. }
  65. function init_db_schema() {
  66. global $pdo;
  67. try {
  68. $stmt = $pdo->prepare("SELECT NULL FROM `admin`, `imapsync`, `tfa`");
  69. $stmt->execute();
  70. }
  71. catch (Exception $e) {
  72. $lines = file('/web/inc/init.sql');
  73. $data = '';
  74. foreach ($lines as $line) {
  75. if (substr($line, 0, 2) == '--' || $line == '') {
  76. continue;
  77. }
  78. $data .= $line;
  79. if (substr(trim($line), -1, 1) == ';') {
  80. $pdo->query($data);
  81. $data = '';
  82. }
  83. }
  84. // Create index if not exists
  85. $stmt = $pdo->query("SHOW INDEX FROM sogo_acl WHERE KEY_NAME = 'sogo_acl_c_folder_id_idx'");
  86. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  87. if ($num_results == 0) {
  88. $pdo->query("CREATE INDEX sogo_acl_c_folder_id_idx ON sogo_acl(c_folder_id)");
  89. }
  90. $stmt = $pdo->query("SHOW INDEX FROM sogo_acl WHERE KEY_NAME = 'sogo_acl_c_uid_idx'");
  91. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  92. if ($num_results == 0) {
  93. $pdo->query("CREATE INDEX sogo_acl_c_uid_idx ON sogo_acl(c_uid)");
  94. }
  95. $_SESSION['return'] = array(
  96. 'type' => 'success',
  97. 'msg' => 'Database initialization completed.'
  98. );
  99. }
  100. // Add newly added columns
  101. $stmt = $pdo->query("SHOW COLUMNS FROM `mailbox` LIKE 'kind'");
  102. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  103. if ($num_results == 0) {
  104. $pdo->query("ALTER TABLE `mailbox` ADD `kind` varchar(100) NOT NULL DEFAULT ''");
  105. }
  106. $stmt = $pdo->query("SHOW COLUMNS FROM `mailbox` LIKE 'multiple_bookings'");
  107. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  108. if ($num_results == 0) {
  109. $pdo->query("ALTER TABLE `mailbox` ADD `multiple_bookings` tinyint(1) NOT NULL DEFAULT '0'");
  110. }
  111. $stmt = $pdo->query("SHOW COLUMNS FROM `mailbox` LIKE 'wants_tagged_subject'");
  112. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  113. if ($num_results == 0) {
  114. $pdo->query("ALTER TABLE `mailbox` ADD `wants_tagged_subject` tinyint(1) NOT NULL DEFAULT '0'");
  115. }
  116. }
  117. function verify_ssha256($hash, $password) {
  118. // Remove tag if any
  119. $hash = ltrim($hash, '{SSHA256}');
  120. // Decode hash
  121. $dhash = base64_decode($hash);
  122. // Get first 32 bytes of binary which equals a SHA256 hash
  123. $ohash = substr($dhash, 0, 32);
  124. // Remove SHA256 hash from decoded hash to get original salt string
  125. $osalt = str_replace($ohash, '', $dhash);
  126. // Check single salted SHA256 hash against extracted hash
  127. if (hash('sha256', $password . $osalt, true) == $ohash) {
  128. return true;
  129. }
  130. else {
  131. return false;
  132. }
  133. }
  134. function doveadm_authenticate($hash, $algorithm, $password) {
  135. $descr = array(0 => array('pipe', 'r'), 1 => array('pipe', 'w'), 2 => array('pipe', 'w'));
  136. $pipes = array();
  137. $process = proc_open("/usr/bin/doveadm pw -s ".$algorithm." -t '".$hash."'", $descr, $pipes);
  138. if (is_resource($process)) {
  139. fputs($pipes[0], $password);
  140. fclose($pipes[0]);
  141. while ($f = fgets($pipes[1])) {
  142. if (preg_match('/(verified)/', $f)) {
  143. proc_close($process);
  144. return true;
  145. }
  146. return false;
  147. }
  148. fclose($pipes[1]);
  149. while ($f = fgets($pipes[2])) {
  150. proc_close($process);
  151. return false;
  152. }
  153. fclose($pipes[2]);
  154. proc_close($process);
  155. }
  156. return false;
  157. }
  158. function check_login($user, $pass) {
  159. global $pdo;
  160. if (!filter_var($user, FILTER_VALIDATE_EMAIL) && !ctype_alnum(str_replace(array('_', '.', '-'), '', $user))) {
  161. return false;
  162. }
  163. $user = strtolower(trim($user));
  164. $stmt = $pdo->prepare("SELECT `password` FROM `admin`
  165. WHERE `superadmin` = '1'
  166. AND `username` = :user");
  167. $stmt->execute(array(':user' => $user));
  168. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  169. foreach ($rows as $row) {
  170. if (verify_ssha256($row['password'], $pass)) {
  171. if (get_tfa($user)['name'] != "none") {
  172. $_SESSION['pending_mailcow_cc_username'] = $user;
  173. $_SESSION['pending_mailcow_cc_role'] = "admin";
  174. $_SESSION['pending_tfa_method'] = get_tfa($user)['name'];
  175. unset($_SESSION['ldelay']);
  176. return "pending";
  177. }
  178. else {
  179. unset($_SESSION['ldelay']);
  180. return "admin";
  181. }
  182. }
  183. }
  184. $stmt = $pdo->prepare("SELECT `password` FROM `admin`
  185. WHERE `superadmin` = '0'
  186. AND `active`='1'
  187. AND `username` = :user");
  188. $stmt->execute(array(':user' => $user));
  189. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  190. foreach ($rows as $row) {
  191. if (verify_ssha256($row['password'], $pass) !== false) {
  192. if (get_tfa($user)['name'] != "none") {
  193. $_SESSION['pending_mailcow_cc_username'] = $user;
  194. $_SESSION['pending_mailcow_cc_role'] = "domainadmin";
  195. $_SESSION['pending_tfa_method'] = get_tfa($user)['name'];
  196. unset($_SESSION['ldelay']);
  197. return "pending";
  198. }
  199. else {
  200. unset($_SESSION['ldelay']);
  201. return "domainadmin";
  202. }
  203. }
  204. }
  205. $stmt = $pdo->prepare("SELECT `password` FROM `mailbox`
  206. WHERE `active`='1'
  207. AND `username` = :user");
  208. $stmt->execute(array(':user' => $user));
  209. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  210. foreach ($rows as $row) {
  211. if (verify_ssha256($row['password'], $pass) !== false) {
  212. unset($_SESSION['ldelay']);
  213. return "user";
  214. }
  215. }
  216. if (!isset($_SESSION['ldelay'])) {
  217. $_SESSION['ldelay'] = "0";
  218. }
  219. elseif (!isset($_SESSION['mailcow_cc_username'])) {
  220. $_SESSION['ldelay'] = $_SESSION['ldelay']+0.5;
  221. }
  222. sleep($_SESSION['ldelay']);
  223. }
  224. function formatBytes($size, $precision = 2) {
  225. if(!is_numeric($size)) {
  226. return "0";
  227. }
  228. $base = log($size, 1024);
  229. $suffixes = array(' Byte', ' KiB', ' MiB', ' GiB', ' TiB');
  230. if ($size == "0") {
  231. return "0";
  232. }
  233. return round(pow(1024, $base - floor($base)), $precision) . $suffixes[floor($base)];
  234. }
  235. function edit_admin_account($postarray) {
  236. global $lang;
  237. global $pdo;
  238. if ($_SESSION['mailcow_cc_role'] != "admin") {
  239. $_SESSION['return'] = array(
  240. 'type' => 'danger',
  241. 'msg' => sprintf($lang['danger']['access_denied'])
  242. );
  243. return false;
  244. }
  245. $username = $postarray['admin_user'];
  246. $username_now = $_SESSION['mailcow_cc_username'];
  247. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username)) || empty ($username)) {
  248. $_SESSION['return'] = array(
  249. 'type' => 'danger',
  250. 'msg' => sprintf($lang['danger']['username_invalid'])
  251. );
  252. return false;
  253. }
  254. if (!empty($postarray['admin_pass']) && !empty($postarray['admin_pass2'])) {
  255. if ($postarray['admin_pass'] != $postarray['admin_pass2']) {
  256. $_SESSION['return'] = array(
  257. 'type' => 'danger',
  258. 'msg' => sprintf($lang['danger']['password_mismatch'])
  259. );
  260. return false;
  261. }
  262. $password_hashed = hash_password($postarray['admin_pass']);
  263. try {
  264. $stmt = $pdo->prepare("UPDATE `admin` SET
  265. `modified` = :modified,
  266. `password` = :password_hashed,
  267. `username` = :username1
  268. WHERE `username` = :username2");
  269. $stmt->execute(array(
  270. ':password_hashed' => $password_hashed,
  271. ':modified' => date('Y-m-d H:i:s'),
  272. ':username1' => $username,
  273. ':username2' => $username_now
  274. ));
  275. }
  276. catch (PDOException $e) {
  277. $_SESSION['return'] = array(
  278. 'type' => 'danger',
  279. 'msg' => 'MySQL: '.$e
  280. );
  281. return false;
  282. }
  283. }
  284. else {
  285. try {
  286. $stmt = $pdo->prepare("UPDATE `admin` SET
  287. `modified` = :modified,
  288. `username` = :username1
  289. WHERE `username` = :username2");
  290. $stmt->execute(array(
  291. ':username1' => $username,
  292. ':modified' => date('Y-m-d H:i:s'),
  293. ':username2' => $username_now
  294. ));
  295. }
  296. catch (PDOException $e) {
  297. $_SESSION['return'] = array(
  298. 'type' => 'danger',
  299. 'msg' => 'MySQL: '.$e
  300. );
  301. return false;
  302. }
  303. }
  304. try {
  305. $stmt = $pdo->prepare("UPDATE `domain_admins` SET `domain` = 'ALL', `username` = :username1 WHERE `username` = :username2");
  306. $stmt->execute(array(':username1' => $username, ':username2' => $username_now));
  307. $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username1 WHERE `username` = :username2");
  308. $stmt->execute(array(':username1' => $username, ':username2' => $username_now));
  309. }
  310. catch (PDOException $e) {
  311. $_SESSION['return'] = array(
  312. 'type' => 'danger',
  313. 'msg' => 'MySQL: '.$e
  314. );
  315. return false;
  316. }
  317. $_SESSION['mailcow_cc_username'] = $username;
  318. $_SESSION['return'] = array(
  319. 'type' => 'success',
  320. 'msg' => sprintf($lang['success']['admin_modified'])
  321. );
  322. }
  323. function set_time_limited_aliases($postarray) {
  324. global $lang;
  325. global $pdo;
  326. (isset($postarray['username'])) ? $username = $postarray['username'] : $username = $_SESSION['mailcow_cc_username'];
  327. if ($_SESSION['mailcow_cc_role'] != "user" &&
  328. $_SESSION['mailcow_cc_role'] != "admin") {
  329. $_SESSION['return'] = array(
  330. 'type' => 'danger',
  331. 'msg' => sprintf($lang['danger']['access_denied'])
  332. );
  333. return false;
  334. }
  335. if (filter_var($username, FILTER_VALIDATE_EMAIL)) {
  336. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $username)) {
  337. $_SESSION['return'] = array(
  338. 'type' => 'danger',
  339. 'msg' => sprintf($lang['danger']['access_denied'])
  340. );
  341. return false;
  342. }
  343. }
  344. try {
  345. $stmt = $pdo->prepare("SELECT `domain` FROM `mailbox` WHERE `username` = :username");
  346. $stmt->execute(array(':username' => $username));
  347. $domain = $stmt->fetch(PDO::FETCH_ASSOC)['domain'];
  348. }
  349. catch (PDOException $e) {
  350. $_SESSION['return'] = array(
  351. 'type' => 'danger',
  352. 'msg' => 'MySQL: '.$e
  353. );
  354. return false;
  355. }
  356. switch ($postarray["set_time_limited_aliases"]) {
  357. case "generate":
  358. if (!is_numeric($postarray["validity"]) || $postarray["validity"] > 672) {
  359. $_SESSION['return'] = array(
  360. 'type' => 'danger',
  361. 'msg' => sprintf($lang['danger']['validity_missing'])
  362. );
  363. return false;
  364. }
  365. $validity = strtotime("+".$postarray["validity"]." hour");
  366. $letters = 'abcefghijklmnopqrstuvwxyz1234567890';
  367. $random_name = substr(str_shuffle($letters), 0, 24);
  368. try {
  369. $stmt = $pdo->prepare("INSERT INTO `spamalias` (`address`, `goto`, `validity`) VALUES
  370. (:address, :goto, :validity)");
  371. $stmt->execute(array(
  372. ':address' => $random_name . '@' . $domain,
  373. ':goto' => $username,
  374. ':validity' => $validity
  375. ));
  376. }
  377. catch (PDOException $e) {
  378. $_SESSION['return'] = array(
  379. 'type' => 'danger',
  380. 'msg' => 'MySQL: '.$e
  381. );
  382. return false;
  383. }
  384. $_SESSION['return'] = array(
  385. 'type' => 'success',
  386. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username))
  387. );
  388. break;
  389. case "deleteall":
  390. try {
  391. $stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `goto` = :username");
  392. $stmt->execute(array(
  393. ':username' => $username
  394. ));
  395. }
  396. catch (PDOException $e) {
  397. $_SESSION['return'] = array(
  398. 'type' => 'danger',
  399. 'msg' => 'MySQL: '.$e
  400. );
  401. return false;
  402. }
  403. $_SESSION['return'] = array(
  404. 'type' => 'success',
  405. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username))
  406. );
  407. break;
  408. case "delete":
  409. if (empty($postarray['item']) || !filter_var($postarray['item'], FILTER_VALIDATE_EMAIL)) {
  410. $_SESSION['return'] = array(
  411. 'type' => 'danger',
  412. 'msg' => sprintf($lang['danger']['access_denied'])
  413. );
  414. return false;
  415. }
  416. $item = $postarray['item'];
  417. try {
  418. $stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `goto` = :username AND `address` = :item");
  419. $stmt->execute(array(
  420. ':username' => $username,
  421. ':item' => $item
  422. ));
  423. }
  424. catch (PDOException $e) {
  425. $_SESSION['return'] = array(
  426. 'type' => 'danger',
  427. 'msg' => 'MySQL: '.$e
  428. );
  429. return false;
  430. }
  431. $_SESSION['return'] = array(
  432. 'type' => 'success',
  433. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username))
  434. );
  435. break;
  436. case "extendall":
  437. try {
  438. $stmt = $pdo->prepare("UPDATE `spamalias` SET `validity` = (`validity` + 3600) WHERE
  439. `goto` = :username AND
  440. `validity` >= :validity");
  441. $stmt->execute(array(
  442. ':username' => $username,
  443. ':validity' => time(),
  444. ));
  445. }
  446. catch (PDOException $e) {
  447. $_SESSION['return'] = array(
  448. 'type' => 'danger',
  449. 'msg' => 'MySQL: '.$e
  450. );
  451. return false;
  452. }
  453. $_SESSION['return'] = array(
  454. 'type' => 'success',
  455. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username))
  456. );
  457. break;
  458. case "extend":
  459. if (empty($postarray['item']) || !filter_var($postarray['item'], FILTER_VALIDATE_EMAIL)) {
  460. $_SESSION['return'] = array(
  461. 'type' => 'danger',
  462. 'msg' => sprintf($lang['danger']['access_denied'])
  463. );
  464. return false;
  465. }
  466. $item = $postarray['item'];
  467. try {
  468. $stmt = $pdo->prepare("UPDATE `spamalias` SET `validity` = (`validity` + 3600) WHERE
  469. `goto` = :username AND
  470. `address` = :item AND
  471. `validity` >= :validity");
  472. $stmt->execute(array(
  473. ':username' => $username,
  474. ':item' => $item,
  475. ':validity' => time(),
  476. ));
  477. }
  478. catch (PDOException $e) {
  479. $_SESSION['return'] = array(
  480. 'type' => 'danger',
  481. 'msg' => 'MySQL: '.$e
  482. );
  483. return false;
  484. }
  485. $_SESSION['return'] = array(
  486. 'type' => 'success',
  487. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username))
  488. );
  489. break;
  490. }
  491. }
  492. function get_time_limited_aliases($username = null) {
  493. // 'username' can be be set, if not, default to mailcow_cc_username
  494. global $lang;
  495. global $pdo;
  496. $data = array();
  497. if (isset($username) && filter_var($username, FILTER_VALIDATE_EMAIL)) {
  498. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $username)) {
  499. $_SESSION['return'] = array(
  500. 'type' => 'danger',
  501. 'msg' => sprintf($lang['danger']['access_denied'])
  502. );
  503. return false;
  504. }
  505. }
  506. else {
  507. $username = $_SESSION['mailcow_cc_username'];
  508. }
  509. try {
  510. $stmt = $pdo->prepare("SELECT `address`,
  511. `goto`,
  512. `validity`
  513. FROM `spamalias`
  514. WHERE `goto` = :username
  515. AND `validity` >= :unixnow");
  516. $stmt->execute(array(':username' => $username, ':unixnow' => time()));
  517. $data = $stmt->fetchAll(PDO::FETCH_ASSOC);
  518. }
  519. catch(PDOException $e) {
  520. $_SESSION['return'] = array(
  521. 'type' => 'danger',
  522. 'msg' => 'MySQL: '.$e
  523. );
  524. }
  525. return $data;
  526. }
  527. function edit_user_account($postarray) {
  528. global $lang;
  529. global $pdo;
  530. if (isset($postarray['username']) && filter_var($postarray['username'], FILTER_VALIDATE_EMAIL)) {
  531. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $postarray['username'])) {
  532. $_SESSION['return'] = array(
  533. 'type' => 'danger',
  534. 'msg' => sprintf($lang['danger']['access_denied'])
  535. );
  536. return false;
  537. }
  538. else {
  539. $username = $postarray['username'];
  540. }
  541. }
  542. else {
  543. $username = $_SESSION['mailcow_cc_username'];
  544. }
  545. $password_old = $postarray['user_old_pass'];
  546. if (isset($postarray['user_new_pass']) && isset($postarray['user_new_pass2'])) {
  547. $password_new = $postarray['user_new_pass'];
  548. $password_new2 = $postarray['user_new_pass2'];
  549. }
  550. $stmt = $pdo->prepare("SELECT `password` FROM `mailbox`
  551. WHERE `username` = :user");
  552. $stmt->execute(array(':user' => $username));
  553. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  554. if (!verify_ssha256($row['password'], $password_old)) {
  555. $_SESSION['return'] = array(
  556. 'type' => 'danger',
  557. 'msg' => sprintf($lang['danger']['access_denied'])
  558. );
  559. return false;
  560. }
  561. if (isset($password_new) && isset($password_new2)) {
  562. if (!empty($password_new2) && !empty($password_new)) {
  563. if ($password_new2 != $password_new) {
  564. $_SESSION['return'] = array(
  565. 'type' => 'danger',
  566. 'msg' => sprintf($lang['danger']['password_mismatch'])
  567. );
  568. return false;
  569. }
  570. if (strlen($password_new) < "6" ||
  571. !preg_match('/[A-Za-z]/', $password_new) ||
  572. !preg_match('/[0-9]/', $password_new)) {
  573. $_SESSION['return'] = array(
  574. 'type' => 'danger',
  575. 'msg' => sprintf($lang['danger']['password_complexity'])
  576. );
  577. return false;
  578. }
  579. $password_hashed = hash_password($password_new);
  580. try {
  581. $stmt = $pdo->prepare("UPDATE `mailbox` SET `modified` = :modified, `password` = :password_hashed WHERE `username` = :username");
  582. $stmt->execute(array(
  583. ':password_hashed' => $password_hashed,
  584. ':modified' => date('Y-m-d H:i:s'),
  585. ':username' => $username
  586. ));
  587. }
  588. catch (PDOException $e) {
  589. $_SESSION['return'] = array(
  590. 'type' => 'danger',
  591. 'msg' => 'MySQL: '.$e
  592. );
  593. return false;
  594. }
  595. }
  596. }
  597. $_SESSION['return'] = array(
  598. 'type' => 'success',
  599. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username))
  600. );
  601. }
  602. function get_spam_score($username = null) {
  603. global $pdo;
  604. $default = "5, 15";
  605. if (isset($username) && filter_var($username, FILTER_VALIDATE_EMAIL)) {
  606. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $username)) {
  607. return false;
  608. }
  609. }
  610. else {
  611. $username = $_SESSION['mailcow_cc_username'];
  612. }
  613. try {
  614. $stmt = $pdo->prepare("SELECT `value` FROM `filterconf` WHERE `object` = :username AND
  615. (`option` = 'lowspamlevel' OR `option` = 'highspamlevel')");
  616. $stmt->execute(array(':username' => $username));
  617. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  618. }
  619. catch(PDOException $e) {
  620. $_SESSION['return'] = array(
  621. 'type' => 'danger',
  622. 'msg' => 'MySQL: '.$e
  623. );
  624. return false;
  625. }
  626. if (empty($num_results)) {
  627. return $default;
  628. }
  629. else {
  630. try {
  631. $stmt = $pdo->prepare("SELECT `value` FROM `filterconf` WHERE `option` = 'highspamlevel' AND `object` = :username");
  632. $stmt->execute(array(':username' => $username));
  633. $highspamlevel = $stmt->fetch(PDO::FETCH_ASSOC);
  634. $stmt = $pdo->prepare("SELECT `value` FROM `filterconf` WHERE `option` = 'lowspamlevel' AND `object` = :username");
  635. $stmt->execute(array(':username' => $username));
  636. $lowspamlevel = $stmt->fetch(PDO::FETCH_ASSOC);
  637. return $lowspamlevel['value'].', '.$highspamlevel['value'];
  638. }
  639. catch(PDOException $e) {
  640. $_SESSION['return'] = array(
  641. 'type' => 'danger',
  642. 'msg' => 'MySQL: '.$e
  643. );
  644. return false;
  645. }
  646. }
  647. }
  648. function edit_spam_score($postarray) {
  649. // Array items
  650. // 'username' can be set, defaults to mailcow_cc_username
  651. // 'lowspamlevel'
  652. // 'highspamlevel'
  653. global $lang;
  654. global $pdo;
  655. if (isset($postarray['username']) && filter_var($postarray['username'], FILTER_VALIDATE_EMAIL)) {
  656. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $postarray['username'])) {
  657. $_SESSION['return'] = array(
  658. 'type' => 'danger',
  659. 'msg' => sprintf($lang['danger']['access_denied'])
  660. );
  661. return false;
  662. }
  663. else {
  664. $username = $postarray['username'];
  665. }
  666. }
  667. else {
  668. $username = $_SESSION['mailcow_cc_username'];
  669. }
  670. $lowspamlevel = explode(',', $postarray['score'])[0];
  671. $highspamlevel = explode(',', $postarray['score'])[1];
  672. if (!is_numeric($lowspamlevel) || !is_numeric($highspamlevel)) {
  673. $_SESSION['return'] = array(
  674. 'type' => 'danger',
  675. 'msg' => sprintf($lang['danger']['access_denied'])
  676. );
  677. return false;
  678. }
  679. try {
  680. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :username
  681. AND (`option` = 'lowspamlevel' OR `option` = 'highspamlevel')");
  682. $stmt->execute(array(
  683. ':username' => $username
  684. ));
  685. $stmt = $pdo->prepare("INSERT INTO `filterconf` (`object`, `option`, `value`)
  686. VALUES (:username, 'highspamlevel', :highspamlevel)");
  687. $stmt->execute(array(
  688. ':username' => $username,
  689. ':highspamlevel' => $highspamlevel
  690. ));
  691. $stmt = $pdo->prepare("INSERT INTO `filterconf` (`object`, `option`, `value`)
  692. VALUES (:username, 'lowspamlevel', :lowspamlevel)");
  693. $stmt->execute(array(
  694. ':username' => $username,
  695. ':lowspamlevel' => $lowspamlevel
  696. ));
  697. }
  698. catch (PDOException $e) {
  699. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :username
  700. AND (`option` = 'lowspamlevel' OR `option` = 'highspamlevel')");
  701. $stmt->execute(array(
  702. ':username' => $username
  703. ));
  704. $_SESSION['return'] = array(
  705. 'type' => 'danger',
  706. 'msg' => 'MySQL: '.$e
  707. );
  708. return false;
  709. }
  710. $_SESSION['return'] = array(
  711. 'type' => 'success',
  712. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  713. );
  714. }
  715. function get_policy_list($object = null) {
  716. // 'object' can be be set, if not, default to mailcow_cc_username
  717. global $lang;
  718. global $pdo;
  719. if (isset($object)) {
  720. if (!filter_var($object, FILTER_VALIDATE_EMAIL) && is_valid_domain_name($object)) {
  721. $object = idn_to_ascii(strtolower(trim($object)));
  722. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $object)) {
  723. $_SESSION['return'] = array(
  724. 'type' => 'danger',
  725. 'msg' => sprintf($lang['danger']['access_denied'])
  726. );
  727. return false;
  728. }
  729. }
  730. elseif (filter_var($object, FILTER_VALIDATE_EMAIL)) {
  731. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $object)) {
  732. $_SESSION['return'] = array(
  733. 'type' => 'danger',
  734. 'msg' => sprintf($lang['danger']['access_denied'])
  735. );
  736. return false;
  737. }
  738. }
  739. }
  740. else {
  741. $object = $_SESSION['mailcow_cc_username'];
  742. }
  743. try {
  744. // WHITELIST
  745. $stmt = $pdo->prepare("SELECT `object`, `value`, `prefid` FROM `filterconf` WHERE `option`='whitelist_from' AND (`object` = :username OR `object` = SUBSTRING_INDEX(:username_domain, '@' ,-1))");
  746. $stmt->execute(array(':username' => $object, ':username_domain' => $object));
  747. $rows['whitelist'] = $stmt->fetchAll(PDO::FETCH_ASSOC);
  748. // BLACKLIST
  749. $stmt = $pdo->prepare("SELECT `object`, `value`, `prefid` FROM `filterconf` WHERE `option`='blacklist_from' AND (`object` = :username OR `object` = SUBSTRING_INDEX(:username_domain, '@' ,-1))");
  750. $stmt->execute(array(':username' => $object, ':username_domain' => $object));
  751. $rows['blacklist'] = $stmt->fetchAll(PDO::FETCH_ASSOC);
  752. }
  753. catch(PDOException $e) {
  754. $_SESSION['return'] = array(
  755. 'type' => 'danger',
  756. 'msg' => 'MySQL: '.$e
  757. );
  758. }
  759. return $rows;
  760. }
  761. function add_policy_list_item($postarray) {
  762. // Array data
  763. // Either 'domain' or 'username' can be be set
  764. // If none of the above is set, default to mailcow_cc_username
  765. //
  766. // If 'delete_prefid' then delete item id
  767. global $lang;
  768. global $pdo;
  769. (isset($postarray['username'])) ? $object = $postarray['username'] : null;
  770. (isset($postarray['domain'])) ? $object = $postarray['domain'] : null;
  771. (!isset($object)) ? $object = $_SESSION['mailcow_cc_username'] : null;
  772. if (is_valid_domain_name($object)) {
  773. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $object)) {
  774. $_SESSION['return'] = array(
  775. 'type' => 'danger',
  776. 'msg' => sprintf($lang['danger']['access_denied'])
  777. );
  778. return false;
  779. }
  780. $object = idn_to_ascii(strtolower(trim($object)));
  781. }
  782. else {
  783. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $object)) {
  784. $_SESSION['return'] = array(
  785. 'type' => 'danger',
  786. 'msg' => sprintf($lang['danger']['access_denied'])
  787. );
  788. return false;
  789. }
  790. }
  791. ($postarray['object_list'] == "bl") ? $object_list = "blacklist_from" : null;
  792. ($postarray['object_list'] == "wl") ? $object_list = "whitelist_from" : null;
  793. $object_from = preg_replace('/\.+/', '.', rtrim(preg_replace("/\.\*/", "*", trim(strtolower($postarray['object_from']))), '.'));
  794. if (!ctype_alnum(str_replace(array('@', '.', '-', '*'), '', $object_from))) {
  795. $_SESSION['return'] = array(
  796. 'type' => 'danger',
  797. 'msg' => sprintf($lang['danger']['policy_list_from_invalid'])
  798. );
  799. return false;
  800. }
  801. if ($object_list != "blacklist_from" && $object_list != "whitelist_from") {
  802. $_SESSION['return'] = array(
  803. 'type' => 'danger',
  804. 'msg' => sprintf($lang['danger']['access_denied'])
  805. );
  806. return false;
  807. }
  808. try {
  809. $stmt = $pdo->prepare("SELECT `object` FROM `filterconf`
  810. WHERE (`option` = 'whitelist_from' OR `option` = 'blacklist_from')
  811. AND `object` = :object
  812. AND `value` = :object_from");
  813. $stmt->execute(array(':object' => $object, ':object_from' => $object_from));
  814. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  815. if ($num_results != 0) {
  816. $_SESSION['return'] = array(
  817. 'type' => 'danger',
  818. 'msg' => sprintf($lang['danger']['policy_list_from_exists'])
  819. );
  820. return false;
  821. }
  822. }
  823. catch(PDOException $e) {
  824. $_SESSION['return'] = array(
  825. 'type' => 'danger',
  826. 'msg' => 'MySQL: '.$e
  827. );
  828. return false;
  829. }
  830. try {
  831. $stmt = $pdo->prepare("INSERT INTO `filterconf` (`object`, `option` ,`value`)
  832. VALUES (:object, :object_list, :object_from)");
  833. $stmt->execute(array(
  834. ':object' => $object,
  835. ':object_list' => $object_list,
  836. ':object_from' => $object_from
  837. ));
  838. }
  839. catch (PDOException $e) {
  840. $_SESSION['return'] = array(
  841. 'type' => 'danger',
  842. 'msg' => 'MySQL: '.$e
  843. );
  844. return false;
  845. }
  846. $_SESSION['return'] = array(
  847. 'type' => 'success',
  848. 'msg' => sprintf($lang['success']['object_modified'], $object)
  849. );
  850. }
  851. function delete_policy_list_item($postarray) {
  852. // Array data
  853. // Either 'domain' or 'username' can be be set
  854. // If none of the above is set, default to mailcow_cc_username
  855. //
  856. // 'delete_prefid' is item to be deleted
  857. global $lang;
  858. global $pdo;
  859. (isset($postarray['username'])) ? $object = $postarray['username'] : null;
  860. (isset($postarray['domain'])) ? $object = $postarray['domain'] : null;
  861. (!isset($object)) ? $object = $_SESSION['mailcow_cc_username'] : null;
  862. if (is_valid_domain_name($object)) {
  863. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $object)) {
  864. $_SESSION['return'] = array(
  865. 'type' => 'danger',
  866. 'msg' => sprintf($lang['danger']['access_denied'])
  867. );
  868. return false;
  869. }
  870. $object = idn_to_ascii(strtolower(trim($object)));
  871. }
  872. else {
  873. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $object)) {
  874. $_SESSION['return'] = array(
  875. 'type' => 'danger',
  876. 'msg' => sprintf($lang['danger']['access_denied'])
  877. );
  878. return false;
  879. }
  880. }
  881. if (!is_numeric($postarray['delete_prefid'])) {
  882. $_SESSION['return'] = array(
  883. 'type' => 'danger',
  884. 'msg' => sprintf($lang['danger']['access_denied'])
  885. );
  886. return false;
  887. }
  888. try {
  889. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :object AND `prefid` = :prefid");
  890. $stmt->execute(array(
  891. ':object' => $object,
  892. ':prefid' => $postarray['delete_prefid']
  893. ));
  894. }
  895. catch (PDOException $e) {
  896. $_SESSION['return'] = array(
  897. 'type' => 'danger',
  898. 'msg' => 'MySQL: '.$e
  899. );
  900. return false;
  901. }
  902. $_SESSION['return'] = array(
  903. 'type' => 'success',
  904. 'msg' => sprintf($lang['success']['object_modified'], $object)
  905. );
  906. return true;
  907. }
  908. function get_syncjobs($username = null) {
  909. // 'username' can be be set, if not, default to mailcow_cc_username
  910. global $lang;
  911. global $pdo;
  912. $data = array();
  913. if (isset($username) && filter_var($username, FILTER_VALIDATE_EMAIL)) {
  914. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $username)) {
  915. $_SESSION['return'] = array(
  916. 'type' => 'danger',
  917. 'msg' => sprintf($lang['danger']['access_denied'])
  918. );
  919. return false;
  920. }
  921. }
  922. else {
  923. $username = $_SESSION['mailcow_cc_username'];
  924. }
  925. try {
  926. $stmt = $pdo->prepare("SELECT *, CONCAT(LEFT(`password1`, 3), '…') as `password1_short`
  927. FROM `imapsync`
  928. WHERE `user2` = :username");
  929. $stmt->execute(array(':username' => $username));
  930. $data = $stmt->fetchAll(PDO::FETCH_ASSOC);
  931. }
  932. catch(PDOException $e) {
  933. $_SESSION['return'] = array(
  934. 'type' => 'danger',
  935. 'msg' => 'MySQL: '.$e
  936. );
  937. }
  938. return $data;
  939. }
  940. function get_syncjob_details($id) {
  941. global $lang;
  942. global $pdo;
  943. $syncjobdetails = array();
  944. if ($_SESSION['mailcow_cc_role'] != "user" &&
  945. $_SESSION['mailcow_cc_role'] != "admin") {
  946. $_SESSION['return'] = array(
  947. 'type' => 'danger',
  948. 'msg' => sprintf($lang['danger']['access_denied'])
  949. );
  950. return false;
  951. }
  952. if (!is_numeric($id)) {
  953. $_SESSION['return'] = array(
  954. 'type' => 'danger',
  955. 'msg' => sprintf($lang['danger']['access_denied'])
  956. );
  957. return false;
  958. }
  959. try {
  960. $stmt = $pdo->prepare("SELECT * FROM `imapsync` WHERE (`user2` = :username OR 'admin' = :role) AND id = :id");
  961. $stmt->execute(array(':id' => $id, ':role' => $_SESSION['mailcow_cc_role'], ':username' => $_SESSION['mailcow_cc_username']));
  962. $syncjobdetails = $stmt->fetch(PDO::FETCH_ASSOC);
  963. }
  964. catch(PDOException $e) {
  965. $_SESSION['return'] = array(
  966. 'type' => 'danger',
  967. 'msg' => 'MySQL: '.$e
  968. );
  969. }
  970. return $syncjobdetails;
  971. }
  972. function delete_syncjob($postarray) {
  973. // Array items
  974. // 'username' can be set, defaults to mailcow_cc_username
  975. global $lang;
  976. global $pdo;
  977. if (isset($postarray['username']) && filter_var($postarray['username'], FILTER_VALIDATE_EMAIL)) {
  978. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $postarray['username'])) {
  979. $_SESSION['return'] = array(
  980. 'type' => 'danger',
  981. 'msg' => sprintf($lang['danger']['access_denied'])
  982. );
  983. return false;
  984. }
  985. else {
  986. $username = $postarray['username'];
  987. }
  988. }
  989. else {
  990. $username = $_SESSION['mailcow_cc_username'];
  991. }
  992. $id = $postarray['id'];
  993. if (!is_numeric($id)) {
  994. $_SESSION['return'] = array(
  995. 'type' => 'danger',
  996. 'msg' => sprintf($lang['danger']['access_denied'])
  997. );
  998. return false;
  999. }
  1000. try {
  1001. $stmt = $pdo->prepare("DELETE FROM `imapsync` WHERE `user2` = :username AND `id`= :id");
  1002. $stmt->execute(array(
  1003. ':username' => $username,
  1004. ':id' => $id,
  1005. ));
  1006. }
  1007. catch (PDOException $e) {
  1008. $_SESSION['return'] = array(
  1009. 'type' => 'danger',
  1010. 'msg' => 'MySQL: '.$e
  1011. );
  1012. return false;
  1013. }
  1014. $_SESSION['return'] = array(
  1015. 'type' => 'success',
  1016. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username))
  1017. );
  1018. return true;
  1019. }
  1020. function add_syncjob($postarray) {
  1021. // Array items
  1022. // 'username' can be set, defaults to mailcow_cc_username
  1023. global $lang;
  1024. global $pdo;
  1025. if (isset($postarray['username']) && filter_var($postarray['username'], FILTER_VALIDATE_EMAIL)) {
  1026. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $postarray['username'])) {
  1027. $_SESSION['return'] = array(
  1028. 'type' => 'danger',
  1029. 'msg' => sprintf($lang['danger']['access_denied'])
  1030. );
  1031. return false;
  1032. }
  1033. else {
  1034. $username = $postarray['username'];
  1035. }
  1036. }
  1037. else {
  1038. $username = $_SESSION['mailcow_cc_username'];
  1039. }
  1040. isset($postarray['active']) ? $active = '1' : $active = '0';
  1041. isset($postarray['delete2duplicates']) ? $delete2duplicates = '1' : $delete2duplicates = '0';
  1042. $port1 = $postarray['port1'];
  1043. $host1 = $postarray['host1'];
  1044. $password1 = $postarray['password1'];
  1045. $exclude = $postarray['exclude'];
  1046. $maxage = $postarray['maxage'];
  1047. $subfolder2 = $postarray['subfolder2'];
  1048. $user1 = $postarray['user1'];
  1049. $mins_interval = $postarray['mins_interval'];
  1050. $enc1 = $postarray['enc1'];
  1051. if (empty($subfolder2)) {
  1052. $subfolder2 = "";
  1053. }
  1054. if (!isset($maxage) || !filter_var($maxage, FILTER_VALIDATE_INT, array('options' => array('min_range' => 1, 'max_range' => 32767)))) {
  1055. $maxage = "0";
  1056. }
  1057. if (!filter_var($port1, FILTER_VALIDATE_INT, array('options' => array('min_range' => 1, 'max_range' => 65535)))) {
  1058. $_SESSION['return'] = array(
  1059. 'type' => 'danger',
  1060. 'msg' => sprintf($lang['danger']['access_denied'])
  1061. );
  1062. return false;
  1063. }
  1064. if (!filter_var($mins_interval, FILTER_VALIDATE_INT, array('options' => array('min_range' => 10, 'max_range' => 3600)))) {
  1065. $_SESSION['return'] = array(
  1066. 'type' => 'danger',
  1067. 'msg' => sprintf($lang['danger']['access_denied'])
  1068. );
  1069. return false;
  1070. }
  1071. if (!is_valid_domain_name($host1)) {
  1072. $_SESSION['return'] = array(
  1073. 'type' => 'danger',
  1074. 'msg' => sprintf($lang['danger']['access_denied'])
  1075. );
  1076. return false;
  1077. }
  1078. if ($enc1 != "TLS" && $enc1 != "SSL" && $enc1 != "PLAIN") {
  1079. $_SESSION['return'] = array(
  1080. 'type' => 'danger',
  1081. 'msg' => sprintf($lang['danger']['access_denied'])
  1082. );
  1083. return false;
  1084. }
  1085. if (@preg_match("/" . $exclude . "/", null) === false) {
  1086. $_SESSION['return'] = array(
  1087. 'type' => 'danger',
  1088. 'msg' => sprintf($lang['danger']['access_denied'])
  1089. );
  1090. return false;
  1091. }
  1092. try {
  1093. $stmt = $pdo->prepare("SELECT `user2`, `user1` FROM `imapsync`
  1094. WHERE `user2` = :user2 AND `user1` = :user1");
  1095. $stmt->execute(array(':user1' => $user1, ':user2' => $username));
  1096. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  1097. }
  1098. catch(PDOException $e) {
  1099. $_SESSION['return'] = array(
  1100. 'type' => 'danger',
  1101. 'msg' => 'MySQL: '.$e
  1102. );
  1103. return false;
  1104. }
  1105. if ($num_results != 0) {
  1106. $_SESSION['return'] = array(
  1107. 'type' => 'danger',
  1108. 'msg' => sprintf($lang['danger']['object_exists'], htmlspecialchars($host1 . ' / ' . $user1))
  1109. );
  1110. return false;
  1111. }
  1112. try {
  1113. $stmt = $pdo->prepare("INSERT INTO `imapsync` (`user2`, `exclude`, `maxage`, `subfolder2`, `host1`, `authmech1`, `user1`, `password1`, `mins_interval`, `port1`, `enc1`, `delete2duplicates`, `active`)
  1114. VALUES (:user2, :exclude, :maxage, :subfolder2, :host1, :authmech1, :user1, :password1, :mins_interval, :port1, :enc1, :delete2duplicates, :active)");
  1115. $stmt->execute(array(
  1116. ':user2' => $username,
  1117. ':exclude' => $exclude,
  1118. ':maxage' => $maxage,
  1119. ':subfolder2' => $subfolder2,
  1120. ':host1' => $host1,
  1121. ':authmech1' => 'PLAIN',
  1122. ':user1' => $user1,
  1123. ':password1' => $password1,
  1124. ':mins_interval' => $mins_interval,
  1125. ':port1' => $port1,
  1126. ':enc1' => $enc1,
  1127. ':delete2duplicates' => $delete2duplicates,
  1128. ':active' => $active,
  1129. ));
  1130. }
  1131. catch(PDOException $e) {
  1132. $_SESSION['return'] = array(
  1133. 'type' => 'danger',
  1134. 'msg' => 'MySQL: '.$e
  1135. );
  1136. return false;
  1137. }
  1138. $_SESSION['return'] = array(
  1139. 'type' => 'success',
  1140. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  1141. );
  1142. return true;
  1143. }
  1144. function edit_syncjob($postarray) {
  1145. // Array items
  1146. // 'username' can be set, defaults to mailcow_cc_username
  1147. global $lang;
  1148. global $pdo;
  1149. if (isset($postarray['username']) && filter_var($postarray['username'], FILTER_VALIDATE_EMAIL)) {
  1150. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $postarray['username'])) {
  1151. $_SESSION['return'] = array(
  1152. 'type' => 'danger',
  1153. 'msg' => sprintf($lang['danger']['access_denied'])
  1154. );
  1155. return false;
  1156. }
  1157. else {
  1158. $username = $postarray['username'];
  1159. }
  1160. }
  1161. else {
  1162. $username = $_SESSION['mailcow_cc_username'];
  1163. }
  1164. isset($postarray['active']) ? $active = '1' : $active = '0';
  1165. isset($postarray['delete2duplicates']) ? $delete2duplicates = '1' : $delete2duplicates = '0';
  1166. $id = $postarray['id'];
  1167. $port1 = $postarray['port1'];
  1168. $host1 = $postarray['host1'];
  1169. $password1 = $postarray['password1'];
  1170. $exclude = $postarray['exclude'];
  1171. $maxage = $postarray['maxage'];
  1172. $subfolder2 = $postarray['subfolder2'];
  1173. $user1 = $postarray['user1'];
  1174. $mins_interval = $postarray['mins_interval'];
  1175. $enc1 = $postarray['enc1'];
  1176. if (empty($subfolder2)) {
  1177. $subfolder2 = "";
  1178. }
  1179. if (!isset($maxage) || !filter_var($maxage, FILTER_VALIDATE_INT, array('options' => array('min_range' => 1, 'max_range' => 32767)))) {
  1180. $maxage = "0";
  1181. }
  1182. if (!filter_var($port1, FILTER_VALIDATE_INT, array('options' => array('min_range' => 1, 'max_range' => 65535)))) {
  1183. $_SESSION['return'] = array(
  1184. 'type' => 'danger',
  1185. 'msg' => sprintf($lang['danger']['access_denied'])
  1186. );
  1187. return false;
  1188. }
  1189. if (!filter_var($mins_interval, FILTER_VALIDATE_INT, array('options' => array('min_range' => 10, 'max_range' => 3600)))) {
  1190. $_SESSION['return'] = array(
  1191. 'type' => 'danger',
  1192. 'msg' => sprintf($lang['danger']['access_denied'])
  1193. );
  1194. return false;
  1195. }
  1196. if (!is_valid_domain_name($host1)) {
  1197. $_SESSION['return'] = array(
  1198. 'type' => 'danger',
  1199. 'msg' => sprintf($lang['danger']['access_denied'])
  1200. );
  1201. return false;
  1202. }
  1203. if ($enc1 != "TLS" && $enc1 != "SSL" && $enc1 != "PLAIN") {
  1204. $_SESSION['return'] = array(
  1205. 'type' => 'danger',
  1206. 'msg' => sprintf($lang['danger']['access_denied'])
  1207. );
  1208. return false;
  1209. }
  1210. if (@preg_match("/" . $exclude . "/", null) === false) {
  1211. $_SESSION['return'] = array(
  1212. 'type' => 'danger',
  1213. 'msg' => sprintf($lang['danger']['access_denied'])
  1214. );
  1215. return false;
  1216. }
  1217. try {
  1218. $stmt = $pdo->prepare("SELECT `user2` FROM `imapsync`
  1219. WHERE `user2` = :user2 AND `id` = :id");
  1220. $stmt->execute(array(':user2' => $username, ':id' => $id));
  1221. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  1222. }
  1223. catch(PDOException $e) {
  1224. $_SESSION['return'] = array(
  1225. 'type' => 'danger',
  1226. 'msg' => 'MySQL: '.$e
  1227. );
  1228. return false;
  1229. }
  1230. if (empty($num_results)) {
  1231. $_SESSION['return'] = array(
  1232. 'type' => 'danger',
  1233. 'msg' => sprintf($lang['danger']['access_denied'])
  1234. );
  1235. return false;
  1236. }
  1237. try {
  1238. $stmt = $pdo->prepare("UPDATE `imapsync` set `maxage` = :maxage, `subfolder2` = :subfolder2, `exclude` = :exclude, `host1` = :host1, `user1` = :user1, `password1` = :password1, `mins_interval` = :mins_interval, `port1` = :port1, `enc1` = :enc1, `delete2duplicates` = :delete2duplicates, `active` = :active
  1239. WHERE `user2` = :user2 AND `id` = :id");
  1240. $stmt->execute(array(
  1241. ':user2' => $username,
  1242. ':id' => $id,
  1243. ':exclude' => $exclude,
  1244. ':maxage' => $maxage,
  1245. ':subfolder2' => $subfolder2,
  1246. ':host1' => $host1,
  1247. ':user1' => $user1,
  1248. ':password1' => $password1,
  1249. ':mins_interval' => $mins_interval,
  1250. ':port1' => $port1,
  1251. ':enc1' => $enc1,
  1252. ':delete2duplicates' => $delete2duplicates,
  1253. ':active' => $active,
  1254. ));
  1255. }
  1256. catch(PDOException $e) {
  1257. $_SESSION['return'] = array(
  1258. 'type' => 'danger',
  1259. 'msg' => 'MySQL: '.$e
  1260. );
  1261. return false;
  1262. }
  1263. $_SESSION['return'] = array(
  1264. 'type' => 'success',
  1265. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  1266. );
  1267. return true;
  1268. }
  1269. function edit_tls_policy($postarray) {
  1270. global $lang;
  1271. global $pdo;
  1272. if (isset($postarray['username']) && filter_var($postarray['username'], FILTER_VALIDATE_EMAIL)) {
  1273. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $postarray['username'])) {
  1274. $_SESSION['return'] = array(
  1275. 'type' => 'danger',
  1276. 'msg' => sprintf($lang['danger']['access_denied'])
  1277. );
  1278. return false;
  1279. }
  1280. else {
  1281. $username = $postarray['username'];
  1282. }
  1283. }
  1284. else {
  1285. $username = $_SESSION['mailcow_cc_username'];
  1286. }
  1287. isset($postarray['tls_in']) ? $tls_in = '1' : $tls_in = '0';
  1288. isset($postarray['tls_out']) ? $tls_out = '1' : $tls_out = '0';
  1289. $username = $_SESSION['mailcow_cc_username'];
  1290. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  1291. $_SESSION['return'] = array(
  1292. 'type' => 'danger',
  1293. 'msg' => sprintf($lang['danger']['username_invalid'])
  1294. );
  1295. return false;
  1296. }
  1297. try {
  1298. $stmt = $pdo->prepare("UPDATE `mailbox` SET `tls_enforce_out` = :tls_out, `tls_enforce_in` = :tls_in WHERE `username` = :username");
  1299. $stmt->execute(array(
  1300. ':tls_out' => $tls_out,
  1301. ':tls_in' => $tls_in,
  1302. ':username' => $username
  1303. ));
  1304. }
  1305. catch (PDOException $e) {
  1306. $_SESSION['return'] = array(
  1307. 'type' => 'danger',
  1308. 'msg' => 'MySQL: '.$e
  1309. );
  1310. return false;
  1311. }
  1312. $_SESSION['return'] = array(
  1313. 'type' => 'success',
  1314. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  1315. );
  1316. }
  1317. function get_tls_policy($username = null) {
  1318. global $lang;
  1319. global $pdo;
  1320. $data = array();
  1321. if (isset($username) && filter_var($username, FILTER_VALIDATE_EMAIL)) {
  1322. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $username)) {
  1323. $_SESSION['return'] = array(
  1324. 'type' => 'danger',
  1325. 'msg' => sprintf($lang['danger']['access_denied'])
  1326. );
  1327. return false;
  1328. }
  1329. }
  1330. else {
  1331. $username = $_SESSION['mailcow_cc_username'];
  1332. }
  1333. try {
  1334. $stmt = $pdo->prepare("SELECT `tls_enforce_out`, `tls_enforce_in` FROM `mailbox` WHERE `username` = :username");
  1335. $stmt->execute(array(':username' => $username));
  1336. $data = $stmt->fetch(PDO::FETCH_ASSOC);
  1337. }
  1338. catch(PDOException $e) {
  1339. $_SESSION['return'] = array(
  1340. 'type' => 'danger',
  1341. 'msg' => 'MySQL: '.$e
  1342. );
  1343. return false;
  1344. }
  1345. return $data;
  1346. }
  1347. function edit_delimiter_action($postarray) {
  1348. // Array items
  1349. // 'username' can be set, defaults to mailcow_cc_username
  1350. global $lang;
  1351. global $pdo;
  1352. if (isset($postarray['username']) && filter_var($postarray['username'], FILTER_VALIDATE_EMAIL)) {
  1353. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $postarray['username'])) {
  1354. $_SESSION['return'] = array(
  1355. 'type' => 'danger',
  1356. 'msg' => sprintf($lang['danger']['access_denied'])
  1357. );
  1358. return false;
  1359. }
  1360. else {
  1361. $username = $postarray['username'];
  1362. }
  1363. }
  1364. else {
  1365. $username = $_SESSION['mailcow_cc_username'];
  1366. }
  1367. ($postarray['tagged_mail_handler'] == "subject") ? $wants_tagged_subject = '1' : $wants_tagged_subject = '0';
  1368. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  1369. $_SESSION['return'] = array(
  1370. 'type' => 'danger',
  1371. 'msg' => sprintf($lang['danger']['username_invalid'])
  1372. );
  1373. return false;
  1374. }
  1375. try {
  1376. $stmt = $pdo->prepare("UPDATE `mailbox` SET `wants_tagged_subject` = :wants_tagged_subject WHERE `username` = :username");
  1377. $stmt->execute(array(':username' => $username, ':wants_tagged_subject' => $wants_tagged_subject));
  1378. $SelectData = $stmt->fetch(PDO::FETCH_ASSOC);
  1379. }
  1380. catch(PDOException $e) {
  1381. $_SESSION['return'] = array(
  1382. 'type' => 'danger',
  1383. 'msg' => 'MySQL: '.$e
  1384. );
  1385. return false;
  1386. }
  1387. $_SESSION['return'] = array(
  1388. 'type' => 'success',
  1389. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  1390. );
  1391. return true;
  1392. }
  1393. function get_delimiter_action($username = null) {
  1394. // 'username' can be set, defaults to mailcow_cc_username
  1395. global $lang;
  1396. global $pdo;
  1397. $data = array();
  1398. if (isset($username) && filter_var($username, FILTER_VALIDATE_EMAIL)) {
  1399. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $username)) {
  1400. return false;
  1401. }
  1402. }
  1403. else {
  1404. $username = $_SESSION['mailcow_cc_username'];
  1405. }
  1406. try {
  1407. $stmt = $pdo->prepare("SELECT `wants_tagged_subject` FROM `mailbox` WHERE `username` = :username");
  1408. $stmt->execute(array(':username' => $username));
  1409. $data = $stmt->fetch(PDO::FETCH_ASSOC);
  1410. }
  1411. catch(PDOException $e) {
  1412. $_SESSION['return'] = array(
  1413. 'type' => 'danger',
  1414. 'msg' => 'MySQL: '.$e
  1415. );
  1416. return false;
  1417. }
  1418. return $data;
  1419. }
  1420. function user_get_alias_details($username) {
  1421. global $lang;
  1422. global $pdo;
  1423. if ($_SESSION['mailcow_cc_role'] == "user") {
  1424. $username = $_SESSION['mailcow_cc_username'];
  1425. }
  1426. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  1427. return false;
  1428. }
  1429. try {
  1430. $data['address'] = $username;
  1431. $stmt = $pdo->prepare("SELECT IFNULL(GROUP_CONCAT(`address` SEPARATOR ', '), '&#10008;') AS `aliases` FROM `alias` WHERE `goto` = :username_goto AND `address` NOT LIKE '@%' AND `address` != :username_address");
  1432. $stmt->execute(array(':username_goto' => $username, ':username_address' => $username));
  1433. $run = $stmt->fetchAll(PDO::FETCH_ASSOC);
  1434. while ($row = array_shift($run)) {
  1435. $data['aliases'] = $row['aliases'];
  1436. }
  1437. $stmt = $pdo->prepare("SELECT IFNULL(GROUP_CONCAT(local_part, '@', alias_domain SEPARATOR ', '), '&#10008;') AS `ad_alias` FROM `mailbox`
  1438. LEFT OUTER JOIN `alias_domain` on `target_domain` = `domain`
  1439. WHERE `username` = :username ;");
  1440. $stmt->execute(array(':username' => $username));
  1441. $run = $stmt->fetchAll(PDO::FETCH_ASSOC);
  1442. while ($row = array_shift($run)) {
  1443. $data['ad_alias'] = $row['ad_alias'];
  1444. }
  1445. $stmt = $pdo->prepare("SELECT IFNULL(GROUP_CONCAT(`send_as` SEPARATOR ', '), '&#10008;') AS `send_as` FROM `sender_acl` WHERE `logged_in_as` = :username AND `send_as` NOT LIKE '@%';");
  1446. $stmt->execute(array(':username' => $username));
  1447. $run = $stmt->fetchAll(PDO::FETCH_ASSOC);
  1448. while ($row = array_shift($run)) {
  1449. $data['aliases_also_send_as'] = $row['send_as'];
  1450. }
  1451. $stmt = $pdo->prepare("SELECT IFNULL(GROUP_CONCAT(`send_as` SEPARATOR ', '), '&#10008;') AS `send_as` FROM `sender_acl` WHERE `logged_in_as` = :username AND `send_as` LIKE '@%';");
  1452. $stmt->execute(array(':username' => $username));
  1453. $run = $stmt->fetchAll(PDO::FETCH_ASSOC);
  1454. while ($row = array_shift($run)) {
  1455. $data['aliases_send_as_all'] = $row['send_as'];
  1456. }
  1457. $stmt = $pdo->prepare("SELECT IFNULL(GROUP_CONCAT(`address` SEPARATOR ', '), '&#10008;') as `address` FROM `alias` WHERE `goto` = :username AND `address` LIKE '@%';");
  1458. $stmt->execute(array(':username' => $username));
  1459. $run = $stmt->fetchAll(PDO::FETCH_ASSOC);
  1460. while ($row = array_shift($run)) {
  1461. $data['is_catch_all'] = $row['address'];
  1462. }
  1463. return $data;
  1464. }
  1465. catch(PDOException $e) {
  1466. $_SESSION['return'] = array(
  1467. 'type' => 'danger',
  1468. 'msg' => 'MySQL: '.$e
  1469. );
  1470. return false;
  1471. }
  1472. }
  1473. function is_valid_domain_name($domain_name) {
  1474. if (empty($domain_name)) {
  1475. return false;
  1476. }
  1477. $domain_name = idn_to_ascii($domain_name);
  1478. return (preg_match("/^([a-z\d](-*[a-z\d])*)(\.([a-z\d](-*[a-z\d])*))*$/i", $domain_name)
  1479. && preg_match("/^.{1,253}$/", $domain_name)
  1480. && preg_match("/^[^\.]{1,63}(\.[^\.]{1,63})*$/", $domain_name));
  1481. }
  1482. function add_domain_admin($postarray) {
  1483. global $lang;
  1484. global $pdo;
  1485. $username = strtolower(trim($postarray['username']));
  1486. $password = $postarray['password'];
  1487. $password2 = $postarray['password2'];
  1488. isset($postarray['active']) ? $active = '1' : $active = '0';
  1489. if ($_SESSION['mailcow_cc_role'] != "admin") {
  1490. $_SESSION['return'] = array(
  1491. 'type' => 'danger',
  1492. 'msg' => sprintf($lang['danger']['access_denied'])
  1493. );
  1494. return false;
  1495. }
  1496. if (empty($postarray['domain'])) {
  1497. $_SESSION['return'] = array(
  1498. 'type' => 'danger',
  1499. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1500. );
  1501. return false;
  1502. }
  1503. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username)) || empty ($username)) {
  1504. $_SESSION['return'] = array(
  1505. 'type' => 'danger',
  1506. 'msg' => sprintf($lang['danger']['username_invalid'])
  1507. );
  1508. return false;
  1509. }
  1510. try {
  1511. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox`
  1512. WHERE `username` = :username");
  1513. $stmt->execute(array(':username' => $username));
  1514. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  1515. $stmt = $pdo->prepare("SELECT `username` FROM `admin`
  1516. WHERE `username` = :username");
  1517. $stmt->execute(array(':username' => $username));
  1518. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  1519. $stmt = $pdo->prepare("SELECT `username` FROM `domain_admins`
  1520. WHERE `username` = :username");
  1521. $stmt->execute(array(':username' => $username));
  1522. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  1523. }
  1524. catch(PDOException $e) {
  1525. $_SESSION['return'] = array(
  1526. 'type' => 'danger',
  1527. 'msg' => 'MySQL: '.$e
  1528. );
  1529. return false;
  1530. }
  1531. foreach ($num_results as $num_results_each) {
  1532. if ($num_results_each != 0) {
  1533. $_SESSION['return'] = array(
  1534. 'type' => 'danger',
  1535. 'msg' => sprintf($lang['danger']['object_exists'], htmlspecialchars($username))
  1536. );
  1537. return false;
  1538. }
  1539. }
  1540. if (!empty($password) && !empty($password2)) {
  1541. if ($password != $password2) {
  1542. $_SESSION['return'] = array(
  1543. 'type' => 'danger',
  1544. 'msg' => sprintf($lang['danger']['password_mismatch'])
  1545. );
  1546. return false;
  1547. }
  1548. $password_hashed = hash_password($password);
  1549. foreach ($postarray['domain'] as $domain) {
  1550. if (!is_valid_domain_name($domain)) {
  1551. $_SESSION['return'] = array(
  1552. 'type' => 'danger',
  1553. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1554. );
  1555. return false;
  1556. }
  1557. try {
  1558. $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
  1559. VALUES (:username, :domain, :created, :active)");
  1560. $stmt->execute(array(
  1561. ':username' => $username,
  1562. ':domain' => $domain,
  1563. ':created' => date('Y-m-d H:i:s'),
  1564. ':active' => $active
  1565. ));
  1566. }
  1567. catch (PDOException $e) {
  1568. delete_domain_admin(array('username' => $username));
  1569. $_SESSION['return'] = array(
  1570. 'type' => 'danger',
  1571. 'msg' => 'MySQL: '.$e
  1572. );
  1573. return false;
  1574. }
  1575. }
  1576. try {
  1577. $stmt = $pdo->prepare("INSERT INTO `admin` (`username`, `password`, `superadmin`, `created`, `modified`, `active`)
  1578. VALUES (:username, :password_hashed, '0', :created, :modified, :active)");
  1579. $stmt->execute(array(
  1580. ':username' => $username,
  1581. ':password_hashed' => $password_hashed,
  1582. ':created' => date('Y-m-d H:i:s'),
  1583. ':modified' => date('Y-m-d H:i:s'),
  1584. ':active' => $active
  1585. ));
  1586. }
  1587. catch (PDOException $e) {
  1588. $_SESSION['return'] = array(
  1589. 'type' => 'danger',
  1590. 'msg' => 'MySQL: '.$e
  1591. );
  1592. return false;
  1593. }
  1594. }
  1595. else {
  1596. $_SESSION['return'] = array(
  1597. 'type' => 'danger',
  1598. 'msg' => sprintf($lang['danger']['password_empty'])
  1599. );
  1600. return false;
  1601. }
  1602. $_SESSION['return'] = array(
  1603. 'type' => 'success',
  1604. 'msg' => sprintf($lang['success']['domain_admin_added'], htmlspecialchars($username))
  1605. );
  1606. }
  1607. function delete_domain_admin($postarray) {
  1608. global $pdo;
  1609. global $lang;
  1610. if ($_SESSION['mailcow_cc_role'] != "admin") {
  1611. $_SESSION['return'] = array(
  1612. 'type' => 'danger',
  1613. 'msg' => sprintf($lang['danger']['access_denied'])
  1614. );
  1615. return false;
  1616. }
  1617. $username = $postarray['username'];
  1618. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
  1619. $_SESSION['return'] = array(
  1620. 'type' => 'danger',
  1621. 'msg' => sprintf($lang['danger']['username_invalid'])
  1622. );
  1623. return false;
  1624. }
  1625. try {
  1626. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
  1627. $stmt->execute(array(
  1628. ':username' => $username,
  1629. ));
  1630. $stmt = $pdo->prepare("DELETE FROM `admin` WHERE `username` = :username");
  1631. $stmt->execute(array(
  1632. ':username' => $username,
  1633. ));
  1634. }
  1635. catch (PDOException $e) {
  1636. $_SESSION['return'] = array(
  1637. 'type' => 'danger',
  1638. 'msg' => 'MySQL: '.$e
  1639. );
  1640. return false;
  1641. }
  1642. $_SESSION['return'] = array(
  1643. 'type' => 'success',
  1644. 'msg' => sprintf($lang['success']['domain_admin_removed'], htmlspecialchars($username))
  1645. );
  1646. }
  1647. function get_domain_admins() {
  1648. global $pdo;
  1649. global $lang;
  1650. $domainadmins = array();
  1651. if ($_SESSION['mailcow_cc_role'] != "admin") {
  1652. $_SESSION['return'] = array(
  1653. 'type' => 'danger',
  1654. 'msg' => sprintf($lang['danger']['access_denied'])
  1655. );
  1656. return false;
  1657. }
  1658. try {
  1659. $stmt = $pdo->query("SELECT DISTINCT
  1660. `username`
  1661. FROM `domain_admins`
  1662. WHERE `username` IN (
  1663. SELECT `username` FROM `admin`
  1664. WHERE `superadmin`!='1'
  1665. )");
  1666. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  1667. while ($row = array_shift($rows)) {
  1668. $domainadmins[] = $row['username'];
  1669. }
  1670. }
  1671. catch(PDOException $e) {
  1672. $_SESSION['return'] = array(
  1673. 'type' => 'danger',
  1674. 'msg' => 'MySQL: '.$e
  1675. );
  1676. }
  1677. return $domainadmins;
  1678. }
  1679. function get_domain_admin_details($domain_admin) {
  1680. global $pdo;
  1681. global $lang;
  1682. $domainadmindata = array();
  1683. if (isset($domain_admin) && $_SESSION['mailcow_cc_role'] != "admin") {
  1684. $_SESSION['return'] = array(
  1685. 'type' => 'danger',
  1686. 'msg' => sprintf($lang['danger']['access_denied'])
  1687. );
  1688. return false;
  1689. }
  1690. if (!isset($domain_admin) && $_SESSION['mailcow_cc_role'] != "domainadmin") {
  1691. $_SESSION['return'] = array(
  1692. 'type' => 'danger',
  1693. 'msg' => sprintf($lang['danger']['access_denied'])
  1694. );
  1695. return false;
  1696. }
  1697. (!isset($domain_admin)) ? $domain_admin = $_SESSION['mailcow_cc_username'] : null;
  1698. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $domain_admin))) {
  1699. $_SESSION['return'] = array(
  1700. 'type' => 'danger',
  1701. 'msg' => sprintf($lang['danger']['username_invalid'])
  1702. );
  1703. return false;
  1704. }
  1705. try {
  1706. $stmt = $pdo->prepare("SELECT
  1707. `tfa`.`active` AS `tfa_active_int`,
  1708. `domain_admins`.`username`,
  1709. `domain_admins`.`created`,
  1710. `domain_admins`.`active` AS `active_int`,
  1711. CASE `domain_admins`.`active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`
  1712. FROM `domain_admins`
  1713. LEFT OUTER JOIN `tfa` ON `tfa`.`username`=`domain_admins`.`username`
  1714. WHERE `domain_admins`.`username`= :domain_admin");
  1715. $stmt->execute(array(
  1716. ':domain_admin' => $domain_admin
  1717. ));
  1718. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  1719. $domainadmindata['username'] = $row['username'];
  1720. $domainadmindata['active'] = $row['active'];
  1721. $domainadmindata['active_int'] = $row['active_int'];
  1722. $domainadmindata['tfa_active_int'] = $row['tfa_active_int'];
  1723. $domainadmindata['created'] = $row['created'];
  1724. // GET SELECTED
  1725. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  1726. WHERE `domain` IN (
  1727. SELECT `domain` FROM `domain_admins`
  1728. WHERE `username`= :domain_admin)");
  1729. $stmt->execute(array(':domain_admin' => $domain_admin));
  1730. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  1731. while($row = array_shift($rows)) {
  1732. $domainadmindata['selected_domains'][] = $row['domain'];
  1733. }
  1734. // GET UNSELECTED
  1735. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  1736. WHERE `domain` NOT IN (
  1737. SELECT `domain` FROM `domain_admins`
  1738. WHERE `username`= :domain_admin)");
  1739. $stmt->execute(array(':domain_admin' => $domain_admin));
  1740. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  1741. while($row = array_shift($rows)) {
  1742. $domainadmindata['unselected_domains'][] = $row['domain'];
  1743. }
  1744. }
  1745. catch(PDOException $e) {
  1746. $_SESSION['return'] = array(
  1747. 'type' => 'danger',
  1748. 'msg' => 'MySQL: '.$e
  1749. );
  1750. }
  1751. return $domainadmindata;
  1752. }
  1753. function set_tfa($postarray) {
  1754. global $lang;
  1755. global $pdo;
  1756. global $yubi;
  1757. global $u2f;
  1758. if ($_SESSION['mailcow_cc_role'] != "domainadmin" &&
  1759. $_SESSION['mailcow_cc_role'] != "admin") {
  1760. $_SESSION['return'] = array(
  1761. 'type' => 'danger',
  1762. 'msg' => sprintf($lang['danger']['access_denied'])
  1763. );
  1764. return false;
  1765. }
  1766. $username = $_SESSION['mailcow_cc_username'];
  1767. $stmt = $pdo->prepare("SELECT `password` FROM `admin`
  1768. WHERE `username` = :user");
  1769. $stmt->execute(array(':user' => $username));
  1770. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  1771. if (!verify_ssha256($row['password'], $postarray["confirm_password"])) {
  1772. $_SESSION['return'] = array(
  1773. 'type' => 'danger',
  1774. 'msg' => sprintf($lang['danger']['access_denied'])
  1775. );
  1776. return false;
  1777. }
  1778. switch ($postarray["tfa_method"]) {
  1779. case "yubi_otp":
  1780. if (!ctype_alnum($postarray["otp_token"]) || strlen($postarray["otp_token"]) != 44) {
  1781. $_SESSION['return'] = array(
  1782. 'type' => 'danger',
  1783. 'msg' => sprintf($lang['danger']['tfa_token_invalid'])
  1784. );
  1785. return false;
  1786. }
  1787. $yauth = $yubi->verify($postarray["otp_token"]);
  1788. if (PEAR::isError($yauth)) {
  1789. $_SESSION['return'] = array(
  1790. 'type' => 'danger',
  1791. 'msg' => 'Yubico Authentication error: ' . $yauth->getMessage()
  1792. );
  1793. return false;
  1794. }
  1795. try {
  1796. $stmt = $pdo->prepare("DELETE FROM `tfa` WHERE `authmech` = 'yubi_otp' AND `username` = :username");
  1797. $stmt->execute(array(':username' => $username));
  1798. $stmt = $pdo->prepare("INSERT INTO `tfa` (`username`, `authmech`, `active`) VALUES
  1799. (:username, 'yubi_otp', 1)");
  1800. $stmt->execute(array(':username' => $username));
  1801. }
  1802. catch (PDOException $e) {
  1803. $_SESSION['return'] = array(
  1804. 'type' => 'danger',
  1805. 'msg' => 'MySQL: '.$e
  1806. );
  1807. return false;
  1808. }
  1809. $_SESSION['return'] = array(
  1810. 'type' => 'success',
  1811. 'msg' => sprintf($lang['success']['object_modified'], htmlspecialchars($username))
  1812. );
  1813. break;
  1814. case "u2f":
  1815. try {
  1816. $reg = $u2f->doRegister(json_decode($_SESSION['regReq']), json_decode($postarray['token']));
  1817. $stmt = $pdo->prepare("INSERT INTO `tfa` (`username`, `authmech`, `keyHandle`, `publicKey`, `certificate`, `counter`) values (?, 'u2f', ?, ?, ?, ?)");
  1818. $stmt->execute(array($username, $reg->keyHandle, $reg->publicKey, $reg->certificate, $reg->counter));
  1819. $_SESSION['return'] = array(
  1820. 'type' => 'success',
  1821. 'msg' => sprintf($lang['success']['object_modified'], $username)
  1822. );
  1823. $_SESSION['regReq'] = null;
  1824. }
  1825. catch (Exception $e) {
  1826. $_SESSION['return'] = array(
  1827. 'type' => 'danger',
  1828. 'msg' => "U2F: " . $e->getMessage()
  1829. );
  1830. $_SESSION['regReq'] = null;
  1831. }
  1832. break;
  1833. case "none":
  1834. try {
  1835. $stmt = $pdo->prepare("DELETE FROM `tfa` WHERE `username` = :username");
  1836. $stmt->execute(array(':username' => $username));
  1837. }
  1838. catch (PDOException $e) {
  1839. $_SESSION['return'] = array(
  1840. 'type' => 'danger',
  1841. 'msg' => 'MySQL: '.$e
  1842. );
  1843. return false;
  1844. }
  1845. $_SESSION['return'] = array(
  1846. 'type' => 'success',
  1847. 'msg' => sprintf($lang['success']['object_modified'], htmlspecialchars($username))
  1848. );
  1849. break;
  1850. }
  1851. }
  1852. function get_tfa($username = null) {
  1853. global $pdo;
  1854. if (isset($_SESSION['mailcow_cc_username'])) {
  1855. $username = $_SESSION['mailcow_cc_username'];
  1856. }
  1857. elseif (empty($username)) {
  1858. return false;
  1859. }
  1860. $stmt = $pdo->prepare("SELECT `authmech` FROM `tfa`
  1861. WHERE `username` = :username");
  1862. $stmt->execute(array(':username' => $username));
  1863. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  1864. switch ($row["authmech"]) {
  1865. case "yubi_otp":
  1866. $data['name'] = "yubi_otp";
  1867. $data['pretty'] = "Yubico OTP";
  1868. return $data;
  1869. break;
  1870. case "u2f":
  1871. $data['name'] = "u2f";
  1872. $data['pretty'] = "Fido U2F";
  1873. return $data;
  1874. break;
  1875. case "hotp":
  1876. $data['name'] = "hotp";
  1877. $data['pretty'] = "HMAC-based OTP";
  1878. return $data;
  1879. break;
  1880. case "totp":
  1881. $data['name'] = "totp";
  1882. $data['pretty'] = "Time-based OTP";
  1883. return $data;
  1884. break;
  1885. default:
  1886. $data['name'] = 'none';
  1887. $data['pretty'] = "-";
  1888. return $data;
  1889. break;
  1890. }
  1891. }
  1892. function verify_tfa_login($username, $token) {
  1893. global $pdo;
  1894. global $lang;
  1895. global $yubi;
  1896. $stmt = $pdo->prepare("SELECT `authmech` FROM `tfa`
  1897. WHERE `username` = :username");
  1898. $stmt->execute(array(':username' => $username));
  1899. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  1900. switch ($row["authmech"]) {
  1901. case "yubi_otp":
  1902. if (!ctype_alnum($token) || strlen($token) != 44) {
  1903. return false;
  1904. }
  1905. $yauth = $yubi->verify($token);
  1906. if (PEAR::isError($yauth)) {
  1907. $_SESSION['return'] = array(
  1908. 'type' => 'danger',
  1909. 'msg' => 'Yubico Authentication error: ' . $yauth->getMessage()
  1910. );
  1911. return false;
  1912. }
  1913. else {
  1914. return true;
  1915. }
  1916. return false;
  1917. break;
  1918. case "u2f":
  1919. try {
  1920. global $u2f;
  1921. $reg = $u2f->doAuthenticate(json_decode($_SESSION['authReq']), get_u2f_registrations($username), json_decode($token));
  1922. $stmt = $pdo->prepare("UPDATE `tfa` SET `counter` = ? WHERE `id` = ?");
  1923. $stmt->execute(array($reg->counter, $reg->id));
  1924. $_SESSION['authReq'] = null;
  1925. return true;
  1926. }
  1927. catch (Exception $e) {
  1928. $_SESSION['return'] = array(
  1929. 'type' => 'danger',
  1930. 'msg' => "U2F: " . $e->getMessage()
  1931. );
  1932. $_SESSION['regReq'] = null;
  1933. return false;
  1934. }
  1935. return false;
  1936. break;
  1937. case "hotp":
  1938. return false;
  1939. break;
  1940. case "totp":
  1941. return false;
  1942. break;
  1943. default:
  1944. return false;
  1945. break;
  1946. }
  1947. return false;
  1948. }
  1949. function edit_domain_admin($postarray) {
  1950. global $lang;
  1951. global $pdo;
  1952. if ($_SESSION['mailcow_cc_role'] != "admin" && $_SESSION['mailcow_cc_role'] != "domainadmin") {
  1953. $_SESSION['return'] = array(
  1954. 'type' => 'danger',
  1955. 'msg' => sprintf($lang['danger']['access_denied'])
  1956. );
  1957. return false;
  1958. }
  1959. // Administrator
  1960. if ($_SESSION['mailcow_cc_role'] == "admin") {
  1961. $username = $postarray['username'];
  1962. $username_now = $postarray['username_now'];
  1963. $password = $postarray['password'];
  1964. $password2 = $postarray['password2'];
  1965. isset($postarray['active']) ? $active = '1' : $active = '0';
  1966. if(isset($postarray['domain'])) {
  1967. foreach ($postarray['domain'] as $domain) {
  1968. if (!is_valid_domain_name($domain)) {
  1969. $_SESSION['return'] = array(
  1970. 'type' => 'danger',
  1971. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1972. );
  1973. return false;
  1974. }
  1975. }
  1976. }
  1977. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
  1978. $_SESSION['return'] = array(
  1979. 'type' => 'danger',
  1980. 'msg' => sprintf($lang['danger']['username_invalid'])
  1981. );
  1982. return false;
  1983. }
  1984. if ($username != $username_now) {
  1985. if (empty(get_domain_admin_details($username_now)['username']) || !empty(get_domain_admin_details($username)['username'])) {
  1986. $_SESSION['return'] = array(
  1987. 'type' => 'danger',
  1988. 'msg' => sprintf($lang['danger']['username_invalid'])
  1989. );
  1990. return false;
  1991. }
  1992. }
  1993. try {
  1994. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
  1995. $stmt->execute(array(
  1996. ':username' => $username_now,
  1997. ));
  1998. }
  1999. catch (PDOException $e) {
  2000. $_SESSION['return'] = array(
  2001. 'type' => 'danger',
  2002. 'msg' => 'MySQL: '.$e
  2003. );
  2004. return false;
  2005. }
  2006. if(isset($postarray['domain'])) {
  2007. foreach ($postarray['domain'] as $domain) {
  2008. try {
  2009. $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
  2010. VALUES (:username, :domain, :created, :active)");
  2011. $stmt->execute(array(
  2012. ':username' => $username,
  2013. ':domain' => $domain,
  2014. ':created' => date('Y-m-d H:i:s'),
  2015. ':active' => $active
  2016. ));
  2017. }
  2018. catch (PDOException $e) {
  2019. $_SESSION['return'] = array(
  2020. 'type' => 'danger',
  2021. 'msg' => 'MySQL: '.$e
  2022. );
  2023. return false;
  2024. }
  2025. }
  2026. }
  2027. if (!empty($password) && !empty($password2)) {
  2028. if ($password != $password2) {
  2029. $_SESSION['return'] = array(
  2030. 'type' => 'danger',
  2031. 'msg' => sprintf($lang['danger']['password_mismatch'])
  2032. );
  2033. return false;
  2034. }
  2035. $password_hashed = hash_password($password);
  2036. try {
  2037. $stmt = $pdo->prepare("UPDATE `admin` SET `username` = :username1, `modified` = :modified, `active` = :active, `password` = :password_hashed WHERE `username` = :username2");
  2038. $stmt->execute(array(
  2039. ':password_hashed' => $password_hashed,
  2040. ':username1' => $username,
  2041. ':username2' => $username_now,
  2042. ':modified' => date('Y-m-d H:i:s'),
  2043. ':active' => $active
  2044. ));
  2045. if (isset($postarray['delete_tfa'])) {
  2046. $stmt = $pdo->prepare("DELETE FROM `tfa` WHERE `username` = :username");
  2047. $stmt->execute(array(':username' => $username_now));
  2048. }
  2049. else {
  2050. $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username WHERE `username` = :username_now");
  2051. $stmt->execute(array(':username' => $username, ':username_now' => $username_now));
  2052. }
  2053. }
  2054. catch (PDOException $e) {
  2055. $_SESSION['return'] = array(
  2056. 'type' => 'danger',
  2057. 'msg' => 'MySQL: '.$e
  2058. );
  2059. return false;
  2060. }
  2061. }
  2062. else {
  2063. try {
  2064. $stmt = $pdo->prepare("UPDATE `admin` SET `username` = :username1, `modified` = :modified, `active` = :active WHERE `username` = :username2");
  2065. $stmt->execute(array(
  2066. ':username1' => $username,
  2067. ':username2' => $username_now,
  2068. ':modified' => date('Y-m-d H:i:s'),
  2069. ':active' => $active
  2070. ));
  2071. if (isset($postarray['delete_tfa'])) {
  2072. $stmt = $pdo->prepare("DELETE FROM `tfa` WHERE `username` = :username");
  2073. $stmt->execute(array(':username' => $username));
  2074. }
  2075. else {
  2076. $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username WHERE `username` = :username_now");
  2077. $stmt->execute(array(':username' => $username, ':username_now' => $username_now));
  2078. }
  2079. }
  2080. catch (PDOException $e) {
  2081. $_SESSION['return'] = array(
  2082. 'type' => 'danger',
  2083. 'msg' => 'MySQL: '.$e
  2084. );
  2085. return false;
  2086. }
  2087. }
  2088. $_SESSION['return'] = array(
  2089. 'type' => 'success',
  2090. 'msg' => sprintf($lang['success']['domain_admin_modified'], htmlspecialchars($username))
  2091. );
  2092. }
  2093. // Domain administrator
  2094. // Can only edit itself
  2095. elseif ($_SESSION['mailcow_cc_role'] == "domainadmin") {
  2096. $username = $_SESSION['mailcow_cc_username'];
  2097. $password_old = $postarray['user_old_pass'];
  2098. $password_new = $postarray['user_new_pass'];
  2099. $password_new2 = $postarray['user_new_pass2'];
  2100. $stmt = $pdo->prepare("SELECT `password` FROM `admin`
  2101. WHERE `username` = :user");
  2102. $stmt->execute(array(':user' => $username));
  2103. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  2104. if (!verify_ssha256($row['password'], $password_old)) {
  2105. $_SESSION['return'] = array(
  2106. 'type' => 'danger',
  2107. 'msg' => sprintf($lang['danger']['access_denied'])
  2108. );
  2109. return false;
  2110. }
  2111. if (!empty($password_new2) && !empty($password_new)) {
  2112. if ($password_new2 != $password_new) {
  2113. $_SESSION['return'] = array(
  2114. 'type' => 'danger',
  2115. 'msg' => sprintf($lang['danger']['password_mismatch'])
  2116. );
  2117. return false;
  2118. }
  2119. if (strlen($password_new) < "6" ||
  2120. !preg_match('/[A-Za-z]/', $password_new) ||
  2121. !preg_match('/[0-9]/', $password_new)) {
  2122. $_SESSION['return'] = array(
  2123. 'type' => 'danger',
  2124. 'msg' => sprintf($lang['danger']['password_complexity'])
  2125. );
  2126. return false;
  2127. }
  2128. $password_hashed = hash_password($password_new);
  2129. try {
  2130. $stmt = $pdo->prepare("UPDATE `admin` SET `modified` = :modified, `password` = :password_hashed WHERE `username` = :username");
  2131. $stmt->execute(array(
  2132. ':password_hashed' => $password_hashed,
  2133. ':modified' => date('Y-m-d H:i:s'),
  2134. ':username' => $username
  2135. ));
  2136. }
  2137. catch (PDOException $e) {
  2138. $_SESSION['return'] = array(
  2139. 'type' => 'danger',
  2140. 'msg' => 'MySQL: '.$e
  2141. );
  2142. return false;
  2143. }
  2144. }
  2145. $_SESSION['return'] = array(
  2146. 'type' => 'success',
  2147. 'msg' => sprintf($lang['success']['domain_admin_modified'], htmlspecialchars($username))
  2148. );
  2149. }
  2150. }
  2151. function get_admin_details() {
  2152. // No parameter to be given, only one admin should exist
  2153. global $pdo;
  2154. global $lang;
  2155. $data = array();
  2156. if ($_SESSION['mailcow_cc_role'] != 'admin') {
  2157. $_SESSION['return'] = array(
  2158. 'type' => 'danger',
  2159. 'msg' => sprintf($lang['danger']['access_denied'])
  2160. );
  2161. return false;
  2162. }
  2163. try {
  2164. $stmt = $pdo->prepare("SELECT `username`, `modified`, `created` FROM `admin`WHERE `superadmin`='1' AND active='1'");
  2165. $stmt->execute();
  2166. $data = $stmt->fetch(PDO::FETCH_ASSOC);
  2167. }
  2168. catch(PDOException $e) {
  2169. $_SESSION['return'] = array(
  2170. 'type' => 'danger',
  2171. 'msg' => 'MySQL: '.$e
  2172. );
  2173. }
  2174. return $data;
  2175. }
  2176. function dkim_add_key($postarray) {
  2177. global $lang;
  2178. global $pdo;
  2179. if ($_SESSION['mailcow_cc_role'] != "admin") {
  2180. $_SESSION['return'] = array(
  2181. 'type' => 'danger',
  2182. 'msg' => sprintf($lang['danger']['access_denied'])
  2183. );
  2184. return false;
  2185. }
  2186. // if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  2187. // $_SESSION['return'] = array(
  2188. // 'type' => 'danger',
  2189. // 'msg' => sprintf($lang['danger']['access_denied'])
  2190. // );
  2191. // return false;
  2192. // }
  2193. $key_length = intval($postarray['key_size']);
  2194. $domain = $postarray['domain'];
  2195. if (!is_valid_domain_name($domain) || !is_numeric($key_length)) {
  2196. $_SESSION['return'] = array(
  2197. 'type' => 'danger',
  2198. 'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid'])
  2199. );
  2200. return false;
  2201. }
  2202. if (!empty(glob($GLOBALS['MC_DKIM_TXTS'] . '/' . $domain . '.dkim'))) {
  2203. $_SESSION['return'] = array(
  2204. 'type' => 'danger',
  2205. 'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid'])
  2206. );
  2207. return false;
  2208. }
  2209. $config = array(
  2210. "digest_alg" => "sha256",
  2211. "private_key_bits" => $key_length,
  2212. "private_key_type" => OPENSSL_KEYTYPE_RSA,
  2213. );
  2214. if ($keypair_ressource = openssl_pkey_new($config)) {
  2215. $key_details = openssl_pkey_get_details($keypair_ressource);
  2216. $pubKey = implode(array_slice(
  2217. array_filter(
  2218. explode(PHP_EOL, $key_details['key'])
  2219. ), 1, -1)
  2220. );
  2221. // Save public key to file
  2222. file_put_contents($GLOBALS['MC_DKIM_TXTS'] . '/' . $domain . '.dkim', $pubKey);
  2223. // Save private key to file
  2224. openssl_pkey_export_to_file($keypair_ressource, $GLOBALS['MC_DKIM_KEYS'] . '/' . $domain . '.dkim');
  2225. $_SESSION['return'] = array(
  2226. 'type' => 'success',
  2227. 'msg' => sprintf($lang['success']['dkim_added'])
  2228. );
  2229. return true;
  2230. }
  2231. else {
  2232. $_SESSION['return'] = array(
  2233. 'type' => 'danger',
  2234. 'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid'])
  2235. );
  2236. return false;
  2237. }
  2238. }
  2239. function dkim_get_key_details($domain) {
  2240. $data = array();
  2241. if (hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  2242. $dkim_pubkey_file = escapeshellarg($GLOBALS["MC_DKIM_TXTS"]. "/" . $domain . "." . "dkim");
  2243. if (file_exists(substr($dkim_pubkey_file, 1, -1))) {
  2244. $data['pubkey'] = file_get_contents($GLOBALS["MC_DKIM_TXTS"]. "/" . $domain . "." . "dkim");
  2245. $data['length'] = (strlen($data['pubkey']) < 391) ? 1024 : 2048;
  2246. $data['dkim_txt'] = 'v=DKIM1;k=rsa;t=s;s=email;p=' . file_get_contents($GLOBALS["MC_DKIM_TXTS"]. "/" . $domain . "." . "dkim");
  2247. }
  2248. }
  2249. return $data;
  2250. }
  2251. function dkim_get_blind_keys() {
  2252. global $lang;
  2253. if ($_SESSION['mailcow_cc_role'] != "admin") {
  2254. $_SESSION['return'] = array(
  2255. 'type' => 'danger',
  2256. 'msg' => sprintf($lang['danger']['access_denied'])
  2257. );
  2258. return false;
  2259. }
  2260. $domains = array();
  2261. $dnstxt_folder = scandir($GLOBALS["MC_DKIM_TXTS"]);
  2262. $dnstxt_files = array_diff($dnstxt_folder, array('.', '..'));
  2263. foreach($dnstxt_files as $file) {
  2264. $domains[] = substr($file, 0, -5);
  2265. }
  2266. return array_diff($domains, array_merge(mailbox_get_domains(), mailbox_get_alias_domains()));
  2267. }
  2268. function dkim_delete_key($postarray) {
  2269. global $lang;
  2270. $domain = $postarray['domain'];
  2271. if ($_SESSION['mailcow_cc_role'] != "admin") {
  2272. $_SESSION['return'] = array(
  2273. 'type' => 'danger',
  2274. 'msg' => sprintf($lang['danger']['access_denied'])
  2275. );
  2276. return false;
  2277. }
  2278. // if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  2279. // $_SESSION['return'] = array(
  2280. // 'type' => 'danger',
  2281. // 'msg' => sprintf($lang['danger']['access_denied'])
  2282. // );
  2283. // return false;
  2284. // }
  2285. if (!is_valid_domain_name($domain)) {
  2286. $_SESSION['return'] = array(
  2287. 'type' => 'danger',
  2288. 'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid'])
  2289. );
  2290. return false;
  2291. }
  2292. exec('rm ' . escapeshellarg($GLOBALS['MC_DKIM_TXTS'] . '/' . $domain . '.dkim'), $out, $return);
  2293. if ($return != "0") {
  2294. $_SESSION['return'] = array(
  2295. 'type' => 'danger',
  2296. 'msg' => sprintf($lang['danger']['dkim_remove_failed'])
  2297. );
  2298. return false;
  2299. }
  2300. exec('rm ' . escapeshellarg($GLOBALS['MC_DKIM_KEYS'] . '/' . $domain . '.dkim'), $out, $return);
  2301. if ($return != "0") {
  2302. $_SESSION['return'] = array(
  2303. 'type' => 'danger',
  2304. 'msg' => sprintf($lang['danger']['dkim_remove_failed'])
  2305. );
  2306. return false;
  2307. }
  2308. $_SESSION['return'] = array(
  2309. 'type' => 'success',
  2310. 'msg' => sprintf($lang['success']['dkim_removed'])
  2311. );
  2312. return true;
  2313. }
  2314. function mailbox_add_domain($postarray) {
  2315. // Array elements
  2316. // domain string
  2317. // description string
  2318. // aliases int
  2319. // mailboxes int
  2320. // maxquota int
  2321. // quota int
  2322. // active int
  2323. // relay_all_recipients int
  2324. // backupmx int
  2325. global $pdo;
  2326. global $lang;
  2327. if ($_SESSION['mailcow_cc_role'] != "admin") {
  2328. $_SESSION['return'] = array(
  2329. 'type' => 'danger',
  2330. 'msg' => sprintf($lang['danger']['access_denied'])
  2331. );
  2332. return false;
  2333. }
  2334. $domain = idn_to_ascii(strtolower(trim($postarray['domain'])));
  2335. $description = $postarray['description'];
  2336. $aliases = $postarray['aliases'];
  2337. $mailboxes = $postarray['mailboxes'];
  2338. $maxquota = $postarray['maxquota'];
  2339. $quota = $postarray['quota'];
  2340. if ($maxquota > $quota) {
  2341. $_SESSION['return'] = array(
  2342. 'type' => 'danger',
  2343. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeds_domain_quota'])
  2344. );
  2345. return false;
  2346. }
  2347. isset($postarray['active']) ? $active = '1' : $active = '0';
  2348. isset($postarray['relay_all_recipients']) ? $relay_all_recipients = '1' : $relay_all_recipients = '0';
  2349. isset($postarray['backupmx']) ? $backupmx = '1' : $backupmx = '0';
  2350. isset($postarray['relay_all_recipients']) ? $backupmx = '1' : true;
  2351. if (!is_valid_domain_name($domain)) {
  2352. $_SESSION['return'] = array(
  2353. 'type' => 'danger',
  2354. 'msg' => sprintf($lang['danger']['domain_invalid'])
  2355. );
  2356. return false;
  2357. }
  2358. foreach (array($quota, $maxquota, $mailboxes, $aliases) as $data) {
  2359. if (!is_numeric($data)) {
  2360. $_SESSION['return'] = array(
  2361. 'type' => 'danger',
  2362. 'msg' => sprintf($lang['danger']['object_is_not_numeric'], htmlspecialchars($data))
  2363. );
  2364. return false;
  2365. }
  2366. }
  2367. try {
  2368. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  2369. WHERE `domain` = :domain");
  2370. $stmt->execute(array(':domain' => $domain));
  2371. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  2372. $stmt = $pdo->prepare("SELECT `alias_domain` FROM `alias_domain`
  2373. WHERE `alias_domain` = :domain");
  2374. $stmt->execute(array(':domain' => $domain));
  2375. $num_results = $num_results + count($stmt->fetchAll(PDO::FETCH_ASSOC));
  2376. }
  2377. catch(PDOException $e) {
  2378. $_SESSION['return'] = array(
  2379. 'type' => 'danger',
  2380. 'msg' => 'MySQL: '.$e
  2381. );
  2382. return false;
  2383. }
  2384. if ($num_results != 0) {
  2385. $_SESSION['return'] = array(
  2386. 'type' => 'danger',
  2387. 'msg' => sprintf($lang['danger']['domain_exists'], htmlspecialchars($domain))
  2388. );
  2389. return false;
  2390. }
  2391. try {
  2392. $stmt = $pdo->prepare("INSERT INTO `domain` (`domain`, `description`, `aliases`, `mailboxes`, `maxquota`, `quota`, `transport`, `backupmx`, `created`, `modified`, `active`, `relay_all_recipients`)
  2393. VALUES (:domain, :description, :aliases, :mailboxes, :maxquota, :quota, 'virtual', :backupmx, :created, :modified, :active, :relay_all_recipients)");
  2394. $stmt->execute(array(
  2395. ':domain' => $domain,
  2396. ':description' => $description,
  2397. ':aliases' => $aliases,
  2398. ':mailboxes' => $mailboxes,
  2399. ':maxquota' => $maxquota,
  2400. ':quota' => $quota,
  2401. ':backupmx' => $backupmx,
  2402. ':active' => $active,
  2403. ':created' => date('Y-m-d H:i:s'),
  2404. ':modified' => date('Y-m-d H:i:s'),
  2405. ':relay_all_recipients' => $relay_all_recipients
  2406. ));
  2407. $_SESSION['return'] = array(
  2408. 'type' => 'success',
  2409. 'msg' => sprintf($lang['success']['domain_added'], htmlspecialchars($domain))
  2410. );
  2411. }
  2412. catch (PDOException $e) {
  2413. mailbox_delete_domain(array('domain' => $domain));
  2414. $_SESSION['return'] = array(
  2415. 'type' => 'danger',
  2416. 'msg' => 'MySQL: '.$e
  2417. );
  2418. return false;
  2419. }
  2420. }
  2421. function mailbox_add_alias($postarray) {
  2422. // Array elements
  2423. // address string (separated by " ", "," ";" "\n") - email address or domain
  2424. // goto string (separated by " ", "," ";" "\n")
  2425. // active int
  2426. global $lang;
  2427. global $pdo;
  2428. $addresses = array_map('trim', preg_split( "/( |,|;|\n)/", $postarray['address']));
  2429. $gotos = array_map('trim', preg_split( "/( |,|;|\n)/", $postarray['goto']));
  2430. isset($postarray['active']) ? $active = '1' : $active = '0';
  2431. if (empty($addresses[0])) {
  2432. $_SESSION['return'] = array(
  2433. 'type' => 'danger',
  2434. 'msg' => sprintf($lang['danger']['alias_empty'])
  2435. );
  2436. return false;
  2437. }
  2438. if (empty($gotos[0])) {
  2439. $_SESSION['return'] = array(
  2440. 'type' => 'danger',
  2441. 'msg' => sprintf($lang['danger']['goto_empty'])
  2442. );
  2443. return false;
  2444. }
  2445. foreach ($addresses as $address) {
  2446. if (empty($address)) {
  2447. continue;
  2448. }
  2449. $domain = idn_to_ascii(substr(strstr($address, '@'), 1));
  2450. $local_part = strstr($address, '@', true);
  2451. $address = $local_part.'@'.$domain;
  2452. try {
  2453. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  2454. WHERE `domain`= :domain1 OR `domain` = (SELECT `target_domain` FROM `alias_domain` WHERE `alias_domain` = :domain2)");
  2455. $stmt->execute(array(':domain1' => $domain, ':domain2' => $domain));
  2456. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  2457. if ($num_results == 0) {
  2458. $_SESSION['return'] = array(
  2459. 'type' => 'danger',
  2460. 'msg' => sprintf($lang['danger']['domain_not_found'], $domain)
  2461. );
  2462. return false;
  2463. }
  2464. $stmt = $pdo->prepare("SELECT `address` FROM `alias`
  2465. WHERE `address`= :address");
  2466. $stmt->execute(array(':address' => $address));
  2467. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  2468. if ($num_results != 0) {
  2469. $_SESSION['return'] = array(
  2470. 'type' => 'danger',
  2471. 'msg' => sprintf($lang['danger']['is_alias_or_mailbox'], htmlspecialchars($address))
  2472. );
  2473. return false;
  2474. }
  2475. $stmt = $pdo->prepare("SELECT `address` FROM `spamalias`
  2476. WHERE `address`= :address");
  2477. $stmt->execute(array(':address' => $address));
  2478. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  2479. if ($num_results != 0) {
  2480. $_SESSION['return'] = array(
  2481. 'type' => 'danger',
  2482. 'msg' => sprintf($lang['danger']['is_spam_alias'], htmlspecialchars($address))
  2483. );
  2484. return false;
  2485. }
  2486. }
  2487. catch(PDOException $e) {
  2488. $_SESSION['return'] = array(
  2489. 'type' => 'danger',
  2490. 'msg' => 'MySQL: '.$e
  2491. );
  2492. return false;
  2493. }
  2494. if ((!filter_var($address, FILTER_VALIDATE_EMAIL) === true) && !empty($local_part)) {
  2495. $_SESSION['return'] = array(
  2496. 'type' => 'danger',
  2497. 'msg' => sprintf($lang['danger']['alias_invalid'])
  2498. );
  2499. return false;
  2500. }
  2501. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  2502. $_SESSION['return'] = array(
  2503. 'type' => 'danger',
  2504. 'msg' => sprintf($lang['danger']['access_denied'])
  2505. );
  2506. return false;
  2507. }
  2508. foreach ($gotos as &$goto) {
  2509. if (empty($goto)) {
  2510. continue;
  2511. }
  2512. $goto_domain = idn_to_ascii(substr(strstr($goto, '@'), 1));
  2513. $goto_local_part = strstr($goto, '@', true);
  2514. $goto = $goto_local_part.'@'.$goto_domain;
  2515. if (!filter_var($goto, FILTER_VALIDATE_EMAIL) === true) {
  2516. $_SESSION['return'] = array(
  2517. 'type' => 'danger',
  2518. 'msg' => sprintf($lang['danger']['goto_invalid'])
  2519. );
  2520. return false;
  2521. }
  2522. if ($goto == $address) {
  2523. $_SESSION['return'] = array(
  2524. 'type' => 'danger',
  2525. 'msg' => sprintf($lang['danger']['alias_goto_identical'])
  2526. );
  2527. return false;
  2528. }
  2529. }
  2530. $gotos = array_filter($gotos);
  2531. $goto = implode(",", $gotos);
  2532. try {
  2533. $stmt = $pdo->prepare("INSERT INTO `alias` (`address`, `goto`, `domain`, `created`, `modified`, `active`)
  2534. VALUES (:address, :goto, :domain, :created, :modified, :active)");
  2535. if (!filter_var($address, FILTER_VALIDATE_EMAIL) === true) {
  2536. $stmt->execute(array(
  2537. ':address' => '@'.$domain,
  2538. ':goto' => $goto,
  2539. ':domain' => $domain,
  2540. ':created' => date('Y-m-d H:i:s'),
  2541. ':modified' => date('Y-m-d H:i:s'),
  2542. ':active' => $active
  2543. ));
  2544. }
  2545. else {
  2546. $stmt->execute(array(
  2547. ':address' => $address,
  2548. ':goto' => $goto,
  2549. ':domain' => $domain,
  2550. ':created' => date('Y-m-d H:i:s'),
  2551. ':modified' => date('Y-m-d H:i:s'),
  2552. ':active' => $active
  2553. ));
  2554. }
  2555. $_SESSION['return'] = array(
  2556. 'type' => 'success',
  2557. 'msg' => sprintf($lang['success']['alias_added'])
  2558. );
  2559. }
  2560. catch (PDOException $e) {
  2561. mailbox_delete_alias(array('address' => $address));
  2562. $_SESSION['return'] = array(
  2563. 'type' => 'danger',
  2564. 'msg' => 'MySQL: '.$e
  2565. );
  2566. return false;
  2567. }
  2568. }
  2569. $_SESSION['return'] = array(
  2570. 'type' => 'success',
  2571. 'msg' => sprintf($lang['success']['alias_added'])
  2572. );
  2573. }
  2574. function mailbox_add_alias_domain($postarray) {
  2575. // Array elements
  2576. // active int
  2577. // alias_domain string
  2578. // target_domain string
  2579. global $lang;
  2580. global $pdo;
  2581. isset($postarray['active']) ? $active = '1' : $active = '0';
  2582. $alias_domain = idn_to_ascii(strtolower(trim($postarray['alias_domain'])));
  2583. $target_domain = idn_to_ascii(strtolower(trim($postarray['target_domain'])));
  2584. if (!is_valid_domain_name($alias_domain)) {
  2585. $_SESSION['return'] = array(
  2586. 'type' => 'danger',
  2587. 'msg' => sprintf($lang['danger']['alias_domain_invalid'])
  2588. );
  2589. return false;
  2590. }
  2591. if (!is_valid_domain_name($target_domain)) {
  2592. $_SESSION['return'] = array(
  2593. 'type' => 'danger',
  2594. 'msg' => sprintf($lang['danger']['target_domain_invalid'])
  2595. );
  2596. return false;
  2597. }
  2598. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $target_domain)) {
  2599. $_SESSION['return'] = array(
  2600. 'type' => 'danger',
  2601. 'msg' => sprintf($lang['danger']['access_denied'])
  2602. );
  2603. return false;
  2604. }
  2605. if ($alias_domain == $target_domain) {
  2606. $_SESSION['return'] = array(
  2607. 'type' => 'danger',
  2608. 'msg' => sprintf($lang['danger']['aliasd_targetd_identical'])
  2609. );
  2610. return false;
  2611. }
  2612. try {
  2613. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  2614. WHERE `domain`= :target_domain");
  2615. $stmt->execute(array(':target_domain' => $target_domain));
  2616. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  2617. if ($num_results == 0) {
  2618. $_SESSION['return'] = array(
  2619. 'type' => 'danger',
  2620. 'msg' => sprintf($lang['danger']['targetd_not_found'])
  2621. );
  2622. return false;
  2623. }
  2624. $stmt = $pdo->prepare("SELECT `alias_domain` FROM `alias_domain` WHERE `alias_domain`= :alias_domain
  2625. UNION
  2626. SELECT `alias_domain` FROM `alias_domain` WHERE `alias_domain`= :alias_domain_in_domain");
  2627. $stmt->execute(array(':alias_domain' => $alias_domain, ':alias_domain_in_domain' => $alias_domain));
  2628. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  2629. if ($num_results != 0) {
  2630. $_SESSION['return'] = array(
  2631. 'type' => 'danger',
  2632. 'msg' => sprintf($lang['danger']['aliasd_exists'])
  2633. );
  2634. return false;
  2635. }
  2636. }
  2637. catch(PDOException $e) {
  2638. $_SESSION['return'] = array(
  2639. 'type' => 'danger',
  2640. 'msg' => 'MySQL: '.$e
  2641. );
  2642. return false;
  2643. }
  2644. try {
  2645. $stmt = $pdo->prepare("INSERT INTO `alias_domain` (`alias_domain`, `target_domain`, `created`, `modified`, `active`)
  2646. VALUES (:alias_domain, :target_domain, :created, :modified, :active)");
  2647. $stmt->execute(array(
  2648. ':alias_domain' => $alias_domain,
  2649. ':target_domain' => $target_domain,
  2650. ':created' => date('Y-m-d H:i:s'),
  2651. ':modified' => date('Y-m-d H:i:s'),
  2652. ':active' => $active
  2653. ));
  2654. $_SESSION['return'] = array(
  2655. 'type' => 'success',
  2656. 'msg' => sprintf($lang['success']['aliasd_added'], htmlspecialchars($alias_domain))
  2657. );
  2658. }
  2659. catch (PDOException $e) {
  2660. mailbox_delete_alias_domain(array('alias_domain' => $alias_domain));
  2661. $_SESSION['return'] = array(
  2662. 'type' => 'danger',
  2663. 'msg' => 'MySQL: '.$e
  2664. );
  2665. return false;
  2666. }
  2667. }
  2668. function mailbox_add_mailbox($postarray) {
  2669. // Array elements
  2670. // active int
  2671. // local_part string
  2672. // domain string
  2673. // name string (username if empty)
  2674. // password string
  2675. // password2 string
  2676. // quota int (MiB)
  2677. // active int
  2678. global $pdo;
  2679. global $lang;
  2680. $local_part = strtolower(trim($postarray['local_part']));
  2681. $domain = idn_to_ascii(strtolower(trim($postarray['domain'])));
  2682. $username = $local_part . '@' . $domain;
  2683. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  2684. $_SESSION['return'] = array(
  2685. 'type' => 'danger',
  2686. 'msg' => sprintf($lang['danger']['mailbox_invalid'])
  2687. );
  2688. return false;
  2689. }
  2690. if (empty($postarray['local_part'])) {
  2691. $_SESSION['return'] = array(
  2692. 'type' => 'danger',
  2693. 'msg' => sprintf($lang['danger']['mailbox_invalid'])
  2694. );
  2695. return false;
  2696. }
  2697. $password = $postarray['password'];
  2698. $password2 = $postarray['password2'];
  2699. $name = $postarray['name'];
  2700. $quota_m = filter_var($postarray['quota'], FILTER_SANITIZE_NUMBER_FLOAT);
  2701. if (empty($name)) {
  2702. $name = $local_part;
  2703. }
  2704. isset($postarray['active']) ? $active = '1' : $active = '0';
  2705. $quota_b = ($quota_m * 1048576);
  2706. $maildir = $domain."/".$local_part."/";
  2707. if (!is_valid_domain_name($domain)) {
  2708. $_SESSION['return'] = array(
  2709. 'type' => 'danger',
  2710. 'msg' => sprintf($lang['danger']['domain_invalid'])
  2711. );
  2712. return false;
  2713. }
  2714. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  2715. $_SESSION['return'] = array(
  2716. 'type' => 'danger',
  2717. 'msg' => sprintf($lang['danger']['access_denied'])
  2718. );
  2719. return false;
  2720. }
  2721. try {
  2722. $stmt = $pdo->prepare("SELECT `mailboxes`, `maxquota`, `quota` FROM `domain`
  2723. WHERE `domain` = :domain");
  2724. $stmt->execute(array(':domain' => $domain));
  2725. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  2726. $stmt = $pdo->prepare("SELECT
  2727. COUNT(*) as count,
  2728. COALESCE(ROUND(SUM(`quota`)/1048576), 0) as `quota`
  2729. FROM `mailbox`
  2730. WHERE `domain` = :domain");
  2731. $stmt->execute(array(':domain' => $domain));
  2732. $MailboxData = $stmt->fetch(PDO::FETCH_ASSOC);
  2733. $stmt = $pdo->prepare("SELECT `local_part` FROM `mailbox` WHERE `local_part` = :local_part and `domain`= :domain");
  2734. $stmt->execute(array(':local_part' => $local_part, ':domain' => $domain));
  2735. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  2736. if ($num_results != 0) {
  2737. $_SESSION['return'] = array(
  2738. 'type' => 'danger',
  2739. 'msg' => sprintf($lang['danger']['object_exists'], htmlspecialchars($username))
  2740. );
  2741. return false;
  2742. }
  2743. $stmt = $pdo->prepare("SELECT `address` FROM `alias` WHERE address= :username");
  2744. $stmt->execute(array(':username' => $username));
  2745. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  2746. if ($num_results != 0) {
  2747. $_SESSION['return'] = array(
  2748. 'type' => 'danger',
  2749. 'msg' => sprintf($lang['danger']['is_alias'], htmlspecialchars($username))
  2750. );
  2751. return false;
  2752. }
  2753. $stmt = $pdo->prepare("SELECT `address` FROM `spamalias` WHERE `address`= :username");
  2754. $stmt->execute(array(':username' => $username));
  2755. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  2756. if ($num_results != 0) {
  2757. $_SESSION['return'] = array(
  2758. 'type' => 'danger',
  2759. 'msg' => sprintf($lang['danger']['is_spam_alias'], htmlspecialchars($username))
  2760. );
  2761. return false;
  2762. }
  2763. $stmt = $pdo->prepare("SELECT `domain` FROM `domain` WHERE `domain`= :domain");
  2764. $stmt->execute(array(':domain' => $domain));
  2765. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  2766. if ($num_results == 0) {
  2767. $_SESSION['return'] = array(
  2768. 'type' => 'danger',
  2769. 'msg' => sprintf($lang['danger']['domain_not_found'], $domain)
  2770. );
  2771. return false;
  2772. }
  2773. }
  2774. catch(PDOException $e) {
  2775. $_SESSION['return'] = array(
  2776. 'type' => 'danger',
  2777. 'msg' => 'MySQL: '.$e
  2778. );
  2779. return false;
  2780. }
  2781. if (!is_numeric($quota_m) || $quota_m == "0") {
  2782. $_SESSION['return'] = array(
  2783. 'type' => 'danger',
  2784. 'msg' => sprintf($lang['danger']['quota_not_0_not_numeric'])
  2785. );
  2786. return false;
  2787. }
  2788. if (!empty($password) && !empty($password2)) {
  2789. if ($password != $password2) {
  2790. $_SESSION['return'] = array(
  2791. 'type' => 'danger',
  2792. 'msg' => sprintf($lang['danger']['password_mismatch'])
  2793. );
  2794. return false;
  2795. }
  2796. $password_hashed = hash_password($password);
  2797. }
  2798. else {
  2799. $_SESSION['return'] = array(
  2800. 'type' => 'danger',
  2801. 'msg' => sprintf($lang['danger']['password_empty'])
  2802. );
  2803. return false;
  2804. }
  2805. if ($MailboxData['count'] >= $DomainData['mailboxes']) {
  2806. $_SESSION['return'] = array(
  2807. 'type' => 'danger',
  2808. 'msg' => sprintf($lang['danger']['max_mailbox_exceeded'], $MailboxData['count'], $DomainData['mailboxes'])
  2809. );
  2810. return false;
  2811. }
  2812. if ($quota_m > $DomainData['maxquota']) {
  2813. $_SESSION['return'] = array(
  2814. 'type' => 'danger',
  2815. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeded'], $DomainData['maxquota'])
  2816. );
  2817. return false;
  2818. }
  2819. if (($MailboxData['quota'] + $quota_m) > $DomainData['quota']) {
  2820. $quota_left_m = ($DomainData['quota'] - $MailboxData['quota']);
  2821. $_SESSION['return'] = array(
  2822. 'type' => 'danger',
  2823. 'msg' => sprintf($lang['danger']['mailbox_quota_left_exceeded'], $quota_left_m)
  2824. );
  2825. return false;
  2826. }
  2827. try {
  2828. $stmt = $pdo->prepare("INSERT INTO `mailbox` (`username`, `password`, `name`, `maildir`, `quota`, `local_part`, `domain`, `created`, `modified`, `active`)
  2829. VALUES (:username, :password_hashed, :name, :maildir, :quota_b, :local_part, :domain, :created, :modified, :active)");
  2830. $stmt->execute(array(
  2831. ':username' => $username,
  2832. ':password_hashed' => $password_hashed,
  2833. ':name' => $name,
  2834. ':maildir' => $maildir,
  2835. ':quota_b' => $quota_b,
  2836. ':local_part' => $local_part,
  2837. ':domain' => $domain,
  2838. ':created' => date('Y-m-d H:i:s'),
  2839. ':modified' => date('Y-m-d H:i:s'),
  2840. ':active' => $active
  2841. ));
  2842. $stmt = $pdo->prepare("INSERT INTO `quota2` (`username`, `bytes`, `messages`)
  2843. VALUES (:username, '0', '0')");
  2844. $stmt->execute(array(':username' => $username));
  2845. $stmt = $pdo->prepare("INSERT INTO `alias` (`address`, `goto`, `domain`, `created`, `modified`, `active`)
  2846. VALUES (:username1, :username2, :domain, :created, :modified, :active)");
  2847. $stmt->execute(array(
  2848. ':username1' => $username,
  2849. ':username2' => $username,
  2850. ':domain' => $domain,
  2851. ':created' => date('Y-m-d H:i:s'),
  2852. ':modified' => date('Y-m-d H:i:s'),
  2853. ':active' => $active
  2854. ));
  2855. $_SESSION['return'] = array(
  2856. 'type' => 'success',
  2857. 'msg' => sprintf($lang['success']['mailbox_added'], htmlspecialchars($username))
  2858. );
  2859. }
  2860. catch (PDOException $e) {
  2861. mailbox_delete_mailbox(array('address' => $username));
  2862. $_SESSION['return'] = array(
  2863. 'type' => 'danger',
  2864. 'msg' => 'MySQL: '.$e
  2865. );
  2866. return false;
  2867. }
  2868. }
  2869. function mailbox_edit_alias_domain($postarray) {
  2870. // Array elements
  2871. // active int
  2872. // alias_domain_now string
  2873. // alias_domain string
  2874. global $lang;
  2875. global $pdo;
  2876. isset($postarray['active']) ? $active = '1' : $active = '0';
  2877. $alias_domain = idn_to_ascii(strtolower(trim($postarray['alias_domain'])));
  2878. $alias_domain_now = strtolower(trim($postarray['alias_domain_now']));
  2879. if (!is_valid_domain_name($alias_domain)) {
  2880. $_SESSION['return'] = array(
  2881. 'type' => 'danger',
  2882. 'msg' => sprintf($lang['danger']['alias_domain_invalid'])
  2883. );
  2884. return false;
  2885. }
  2886. if (!is_valid_domain_name($alias_domain_now)) {
  2887. $_SESSION['return'] = array(
  2888. 'type' => 'danger',
  2889. 'msg' => sprintf($lang['danger']['alias_domain_invalid'])
  2890. );
  2891. return false;
  2892. }
  2893. try {
  2894. $stmt = $pdo->prepare("SELECT `target_domain` FROM `alias_domain`
  2895. WHERE `alias_domain`= :alias_domain_now");
  2896. $stmt->execute(array(':alias_domain_now' => $alias_domain_now));
  2897. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  2898. }
  2899. catch(PDOException $e) {
  2900. $_SESSION['return'] = array(
  2901. 'type' => 'danger',
  2902. 'msg' => 'MySQL: '.$e
  2903. );
  2904. return false;
  2905. }
  2906. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $DomainData['target_domain'])) {
  2907. $_SESSION['return'] = array(
  2908. 'type' => 'danger',
  2909. 'msg' => sprintf($lang['danger']['access_denied'])
  2910. );
  2911. return false;
  2912. }
  2913. try {
  2914. $stmt = $pdo->prepare("SELECT `target_domain` FROM `alias_domain`
  2915. WHERE `target_domain`= :alias_domain");
  2916. $stmt->execute(array(':alias_domain' => $alias_domain));
  2917. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  2918. }
  2919. catch(PDOException $e) {
  2920. $_SESSION['return'] = array(
  2921. 'type' => 'danger',
  2922. 'msg' => 'MySQL: '.$e
  2923. );
  2924. return false;
  2925. }
  2926. if ($num_results != 0) {
  2927. $_SESSION['return'] = array(
  2928. 'type' => 'danger',
  2929. 'msg' => sprintf($lang['danger']['aliasd_targetd_identical'])
  2930. );
  2931. return false;
  2932. }
  2933. try {
  2934. $stmt = $pdo->prepare("UPDATE `alias_domain` SET
  2935. `alias_domain` = :alias_domain,
  2936. `active` = :active,
  2937. `modified` = :modified,
  2938. WHERE `alias_domain` = :alias_domain_now");
  2939. $stmt->execute(array(
  2940. ':alias_domain' => $alias_domain,
  2941. ':modified' => date('Y-m-d H:i:s'),
  2942. ':alias_domain_now' => $alias_domain_now,
  2943. ':active' => $active
  2944. ));
  2945. }
  2946. catch (PDOException $e) {
  2947. $_SESSION['return'] = array(
  2948. 'type' => 'danger',
  2949. 'msg' => 'MySQL: '.$e
  2950. );
  2951. return false;
  2952. }
  2953. $_SESSION['return'] = array(
  2954. 'type' => 'success',
  2955. 'msg' => sprintf($lang['success']['aliasd_modified'], htmlspecialchars($alias_domain))
  2956. );
  2957. }
  2958. function mailbox_edit_alias($postarray) {
  2959. // Array elements
  2960. // address string
  2961. // goto string (separated by " ", "," ";" "\n") - email address or domain
  2962. // active int
  2963. global $lang;
  2964. global $pdo;
  2965. $address = $postarray['address'];
  2966. $domain = idn_to_ascii(substr(strstr($address, '@'), 1));
  2967. $local_part = strstr($address, '@', true);
  2968. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  2969. $_SESSION['return'] = array(
  2970. 'type' => 'danger',
  2971. 'msg' => sprintf($lang['danger']['access_denied'])
  2972. );
  2973. return false;
  2974. }
  2975. if (empty($postarray['goto'])) {
  2976. $_SESSION['return'] = array(
  2977. 'type' => 'danger',
  2978. 'msg' => sprintf($lang['danger']['goto_empty'])
  2979. );
  2980. return false;
  2981. }
  2982. $gotos = array_map('trim', preg_split( "/( |,|;|\n)/", $postarray['goto']));
  2983. foreach ($gotos as &$goto) {
  2984. if (empty($goto)) {
  2985. continue;
  2986. }
  2987. if (!filter_var($goto, FILTER_VALIDATE_EMAIL)) {
  2988. $_SESSION['return'] = array(
  2989. 'type' => 'danger',
  2990. 'msg' =>sprintf($lang['danger']['goto_invalid'])
  2991. );
  2992. return false;
  2993. }
  2994. if ($goto == $address) {
  2995. $_SESSION['return'] = array(
  2996. 'type' => 'danger',
  2997. 'msg' => sprintf($lang['danger']['alias_goto_identical'])
  2998. );
  2999. return false;
  3000. }
  3001. }
  3002. $gotos = array_filter($gotos);
  3003. $goto = implode(",", $gotos);
  3004. isset($postarray['active']) ? $active = '1' : $active = '0';
  3005. if ((!filter_var($address, FILTER_VALIDATE_EMAIL) === true) && !empty($local_part)) {
  3006. $_SESSION['return'] = array(
  3007. 'type' => 'danger',
  3008. 'msg' => sprintf($lang['danger']['alias_invalid'])
  3009. );
  3010. return false;
  3011. }
  3012. try {
  3013. $stmt = $pdo->prepare("UPDATE `alias` SET
  3014. `goto` = :goto,
  3015. `active`= :active,
  3016. `modified` = :modified,
  3017. WHERE `address` = :address");
  3018. $stmt->execute(array(
  3019. ':goto' => $goto,
  3020. ':active' => $active,
  3021. ':address' => $address,
  3022. ':modified' => date('Y-m-d H:i:s'),
  3023. ));
  3024. $_SESSION['return'] = array(
  3025. 'type' => 'success',
  3026. 'msg' => sprintf($lang['success']['alias_modified'], htmlspecialchars($address))
  3027. );
  3028. }
  3029. catch (PDOException $e) {
  3030. $_SESSION['return'] = array(
  3031. 'type' => 'danger',
  3032. 'msg' => 'MySQL: '.$e
  3033. );
  3034. return false;
  3035. }
  3036. }
  3037. function mailbox_edit_domain($postarray) {
  3038. // Array elements
  3039. // domain string
  3040. // description string
  3041. // active int
  3042. // relay_all_recipients int
  3043. // backupmx int
  3044. // aliases float
  3045. // mailboxes float
  3046. // maxquota float
  3047. // quota float (Byte)
  3048. // active int
  3049. global $lang;
  3050. global $pdo;
  3051. $domain = idn_to_ascii($postarray['domain']);
  3052. if (!is_valid_domain_name($domain)) {
  3053. $_SESSION['return'] = array(
  3054. 'type' => 'danger',
  3055. 'msg' => sprintf($lang['danger']['domain_invalid'])
  3056. );
  3057. return false;
  3058. }
  3059. if ($_SESSION['mailcow_cc_role'] == "domainadmin" && hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  3060. $description = $postarray['description'];
  3061. isset($postarray['active']) ? $active = '1' : $active = '0';
  3062. try {
  3063. $stmt = $pdo->prepare("UPDATE `domain` SET
  3064. `modified`= :modified,
  3065. `description` = :description
  3066. WHERE `domain` = :domain");
  3067. $stmt->execute(array(
  3068. ':modified' => date('Y-m-d H:i:s'),
  3069. ':description' => $description,
  3070. ':domain' => $domain
  3071. ));
  3072. $_SESSION['return'] = array(
  3073. 'type' => 'success',
  3074. 'msg' => sprintf($lang['success']['domain_modified'], htmlspecialchars($domain))
  3075. );
  3076. }
  3077. catch (PDOException $e) {
  3078. $_SESSION['return'] = array(
  3079. 'type' => 'danger',
  3080. 'msg' => 'MySQL: '.$e
  3081. );
  3082. return false;
  3083. }
  3084. }
  3085. elseif ($_SESSION['mailcow_cc_role'] == "admin") {
  3086. $description = $postarray['description'];
  3087. isset($postarray['active']) ? $active = '1' : $active = '0';
  3088. $aliases = filter_var($postarray['aliases'], FILTER_SANITIZE_NUMBER_FLOAT);
  3089. $mailboxes = filter_var($postarray['mailboxes'], FILTER_SANITIZE_NUMBER_FLOAT);
  3090. $maxquota = filter_var($postarray['maxquota'], FILTER_SANITIZE_NUMBER_FLOAT);
  3091. $quota = filter_var($postarray['quota'], FILTER_SANITIZE_NUMBER_FLOAT);
  3092. isset($postarray['relay_all_recipients']) ? $relay_all_recipients = '1' : $relay_all_recipients = '0';
  3093. isset($postarray['backupmx']) ? $backupmx = '1' : $backupmx = '0';
  3094. isset($postarray['relay_all_recipients']) ? $backupmx = '1' : true;
  3095. try {
  3096. // GET MAILBOX DATA
  3097. $stmt = $pdo->prepare("SELECT
  3098. COUNT(*) AS count,
  3099. MAX(COALESCE(ROUND(`quota`/1048576), 0)) AS `maxquota`,
  3100. COALESCE(ROUND(SUM(`quota`)/1048576), 0) AS `quota`
  3101. FROM `mailbox`
  3102. WHERE domain= :domain");
  3103. $stmt->execute(array(':domain' => $domain));
  3104. $MailboxData = $stmt->fetch(PDO::FETCH_ASSOC);
  3105. // GET ALIAS DATA
  3106. $stmt = $pdo->prepare("SELECT COUNT(*) AS `count` FROM `alias`
  3107. WHERE domain = :domain
  3108. AND address NOT IN (
  3109. SELECT `username` FROM `mailbox`
  3110. )");
  3111. $stmt->execute(array(':domain' => $domain));
  3112. $AliasData = $stmt->fetch(PDO::FETCH_ASSOC);
  3113. }
  3114. catch(PDOException $e) {
  3115. $_SESSION['return'] = array(
  3116. 'type' => 'danger',
  3117. 'msg' => 'MySQL: '.$e
  3118. );
  3119. return false;
  3120. }
  3121. if ($maxquota > $quota) {
  3122. $_SESSION['return'] = array(
  3123. 'type' => 'danger',
  3124. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeds_domain_quota'])
  3125. );
  3126. return false;
  3127. }
  3128. if ($MailboxData['maxquota'] > $maxquota) {
  3129. echo $MailboxData['maxquota'];
  3130. die();
  3131. $_SESSION['return'] = array(
  3132. 'type' => 'danger',
  3133. 'msg' => sprintf($lang['danger']['max_quota_in_use'], $MailboxData['maxquota'])
  3134. );
  3135. return false;
  3136. }
  3137. if ($MailboxData['quota'] > $quota) {
  3138. $_SESSION['return'] = array(
  3139. 'type' => 'danger',
  3140. 'msg' => sprintf($lang['danger']['domain_quota_m_in_use'], $MailboxData['quota'])
  3141. );
  3142. return false;
  3143. }
  3144. if ($MailboxData['count'] > $mailboxes) {
  3145. $_SESSION['return'] = array(
  3146. 'type' => 'danger',
  3147. 'msg' => sprintf($lang['danger']['mailboxes_in_use'], $MailboxData['count'])
  3148. );
  3149. return false;
  3150. }
  3151. if ($AliasData['count'] > $aliases) {
  3152. $_SESSION['return'] = array(
  3153. 'type' => 'danger',
  3154. 'msg' => sprintf($lang['danger']['aliases_in_use'], $AliasData['count'])
  3155. );
  3156. return false;
  3157. }
  3158. try {
  3159. $stmt = $pdo->prepare("UPDATE `domain` SET
  3160. `modified`= :modified,
  3161. `relay_all_recipients` = :relay_all_recipients,
  3162. `backupmx` = :backupmx,
  3163. `active` = :active,
  3164. `quota` = :quota,
  3165. `maxquota` = :maxquota,
  3166. `modified` = :modified,
  3167. `mailboxes` = :mailboxes,
  3168. `aliases` = :aliases,
  3169. `description` = :description
  3170. WHERE `domain` = :domain");
  3171. $stmt->execute(array(
  3172. ':relay_all_recipients' => $relay_all_recipients,
  3173. ':backupmx' => $backupmx,
  3174. ':active' => $active,
  3175. ':quota' => $quota,
  3176. ':maxquota' => $maxquota,
  3177. ':modified' => date('Y-m-d H:i:s'),
  3178. ':mailboxes' => $mailboxes,
  3179. ':aliases' => $aliases,
  3180. ':modified' => date('Y-m-d H:i:s'),
  3181. ':description' => $description,
  3182. ':domain' => $domain
  3183. ));
  3184. $_SESSION['return'] = array(
  3185. 'type' => 'success',
  3186. 'msg' => sprintf($lang['success']['domain_modified'], htmlspecialchars($domain))
  3187. );
  3188. }
  3189. catch (PDOException $e) {
  3190. $_SESSION['return'] = array(
  3191. 'type' => 'danger',
  3192. 'msg' => 'MySQL: '.$e
  3193. );
  3194. return false;
  3195. }
  3196. }
  3197. }
  3198. function mailbox_edit_mailbox($postarray) {
  3199. global $lang;
  3200. global $pdo;
  3201. isset($postarray['active']) ? $active = '1' : $active = '0';
  3202. if (!filter_var($postarray['username'], FILTER_VALIDATE_EMAIL)) {
  3203. $_SESSION['return'] = array(
  3204. 'type' => 'danger',
  3205. 'msg' => sprintf($lang['danger']['username_invalid'])
  3206. );
  3207. return false;
  3208. }
  3209. $quota_m = $postarray['quota'];
  3210. $quota_b = $quota_m*1048576;
  3211. $username = $postarray['username'];
  3212. $name = $postarray['name'];
  3213. $password = $postarray['password'];
  3214. $password2 = $postarray['password2'];
  3215. try {
  3216. $stmt = $pdo->prepare("SELECT `domain`
  3217. FROM `mailbox`
  3218. WHERE username = :username");
  3219. $stmt->execute(array(':username' => $username));
  3220. $MailboxData1 = $stmt->fetch(PDO::FETCH_ASSOC);
  3221. $stmt = $pdo->prepare("SELECT
  3222. COALESCE(ROUND(SUM(`quota`)/1048576), 0) as `quota_m_now`
  3223. FROM `mailbox`
  3224. WHERE `username` = :username");
  3225. $stmt->execute(array(':username' => $username));
  3226. $MailboxData2 = $stmt->fetch(PDO::FETCH_ASSOC);
  3227. $stmt = $pdo->prepare("SELECT
  3228. COALESCE(ROUND(SUM(`quota`)/1048576), 0) as `quota_m_in_use`
  3229. FROM `mailbox`
  3230. WHERE `domain` = :domain");
  3231. $stmt->execute(array(':domain' => $MailboxData1['domain']));
  3232. $MailboxData3 = $stmt->fetch(PDO::FETCH_ASSOC);
  3233. $stmt = $pdo->prepare("SELECT `quota`, `maxquota`
  3234. FROM `domain`
  3235. WHERE `domain` = :domain");
  3236. $stmt->execute(array(':domain' => $MailboxData1['domain']));
  3237. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  3238. }
  3239. catch(PDOException $e) {
  3240. $_SESSION['return'] = array(
  3241. 'type' => 'danger',
  3242. 'msg' => 'MySQL: '.$e
  3243. );
  3244. return false;
  3245. }
  3246. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $MailboxData1['domain'])) {
  3247. $_SESSION['return'] = array(
  3248. 'type' => 'danger',
  3249. 'msg' => sprintf($lang['danger']['access_denied'])
  3250. );
  3251. return false;
  3252. }
  3253. if (!is_numeric($quota_m) || $quota_m == "0") {
  3254. $_SESSION['return'] = array(
  3255. 'type' => 'danger',
  3256. 'msg' => sprintf($lang['danger']['quota_not_0_not_numeric'], htmlspecialchars($quota_m))
  3257. );
  3258. return false;
  3259. }
  3260. if ($quota_m > $DomainData['maxquota']) {
  3261. $_SESSION['return'] = array(
  3262. 'type' => 'danger',
  3263. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeded'], $DomainData['maxquota'])
  3264. );
  3265. return false;
  3266. }
  3267. if (($MailboxData3['quota_m_in_use'] - $MailboxData2['quota_m_now'] + $quota_m) > $DomainData['quota']) {
  3268. $quota_left_m = ($DomainData['quota'] - $MailboxData3['quota_m_in_use'] + $MailboxData2['quota_m_now']);
  3269. $_SESSION['return'] = array(
  3270. 'type' => 'danger',
  3271. 'msg' => sprintf($lang['danger']['mailbox_quota_left_exceeded'], $quota_left_m)
  3272. );
  3273. return false;
  3274. }
  3275. // Get sender_acl items set by admin
  3276. $sender_acl_admin = array_merge(
  3277. mailbox_get_sender_acl_handles($username)['sender_acl_domains']['ro'],
  3278. mailbox_get_sender_acl_handles($username)['sender_acl_addresses']['ro']
  3279. );
  3280. // Get sender_acl items from POST array
  3281. (isset($postarray['sender_acl'])) ? $sender_acl_domain_admin = $postarray['sender_acl'] : $sender_acl_domain_admin = array();
  3282. if (!empty($sender_acl_domain_admin) || !empty($sender_acl_admin)) {
  3283. // Check items in POST array
  3284. foreach ($sender_acl_domain_admin as $sender_acl) {
  3285. if (!filter_var($sender_acl, FILTER_VALIDATE_EMAIL) && !is_valid_domain_name(ltrim($sender_acl, '@'))) {
  3286. $_SESSION['return'] = array(
  3287. 'type' => 'danger',
  3288. 'msg' => sprintf($lang['danger']['sender_acl_invalid'])
  3289. );
  3290. return false;
  3291. }
  3292. if (is_valid_domain_name(ltrim($sender_acl, '@'))) {
  3293. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], ltrim($sender_acl, '@'))) {
  3294. $_SESSION['return'] = array(
  3295. 'type' => 'danger',
  3296. 'msg' => sprintf($lang['danger']['sender_acl_invalid'])
  3297. );
  3298. return false;
  3299. }
  3300. }
  3301. if (filter_var($sender_acl, FILTER_VALIDATE_EMAIL)) {
  3302. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $sender_acl)) {
  3303. $_SESSION['return'] = array(
  3304. 'type' => 'danger',
  3305. 'msg' => sprintf($lang['danger']['sender_acl_invalid'])
  3306. );
  3307. return false;
  3308. }
  3309. }
  3310. }
  3311. // Merge both arrays
  3312. $sender_acl_merged = array_merge($sender_acl_domain_admin, $sender_acl_admin);
  3313. try {
  3314. $stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` = :username");
  3315. $stmt->execute(array(
  3316. ':username' => $username
  3317. ));
  3318. }
  3319. catch (PDOException $e) {
  3320. $_SESSION['return'] = array(
  3321. 'type' => 'danger',
  3322. 'msg' => 'MySQL: '.$e
  3323. );
  3324. return false;
  3325. }
  3326. foreach ($sender_acl_merged as $sender_acl) {
  3327. $domain = ltrim($sender_acl, '@');
  3328. if (is_valid_domain_name($domain)) {
  3329. $sender_acl = '@' . $domain;
  3330. }
  3331. try {
  3332. $stmt = $pdo->prepare("INSERT INTO `sender_acl` (`send_as`, `logged_in_as`)
  3333. VALUES (:sender_acl, :username)");
  3334. $stmt->execute(array(
  3335. ':sender_acl' => $sender_acl,
  3336. ':username' => $username
  3337. ));
  3338. }
  3339. catch (PDOException $e) {
  3340. $_SESSION['return'] = array(
  3341. 'type' => 'danger',
  3342. 'msg' => 'MySQL: '.$e
  3343. );
  3344. return false;
  3345. }
  3346. }
  3347. }
  3348. else {
  3349. try {
  3350. $stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` = :username");
  3351. $stmt->execute(array(
  3352. ':username' => $username
  3353. ));
  3354. }
  3355. catch (PDOException $e) {
  3356. $_SESSION['return'] = array(
  3357. 'type' => 'danger',
  3358. 'msg' => 'MySQL: '.$e
  3359. );
  3360. return false;
  3361. }
  3362. }
  3363. if (!empty($password) && !empty($password2)) {
  3364. if ($password != $password2) {
  3365. $_SESSION['return'] = array(
  3366. 'type' => 'danger',
  3367. 'msg' => sprintf($lang['danger']['password_mismatch'])
  3368. );
  3369. return false;
  3370. }
  3371. $password_hashed = hash_password($password);
  3372. try {
  3373. $stmt = $pdo->prepare("UPDATE `alias` SET
  3374. `modified` = :modified,
  3375. `active` = :active
  3376. WHERE `address` = :address");
  3377. $stmt->execute(array(
  3378. ':address' => $username,
  3379. ':modified' => date('Y-m-d H:i:s'),
  3380. ':active' => $active
  3381. ));
  3382. $stmt = $pdo->prepare("UPDATE `mailbox` SET
  3383. `modified` = :modified,
  3384. `active` = :active,
  3385. `password` = :password_hashed,
  3386. `name`= :name,
  3387. `quota` = :quota_b
  3388. WHERE `username` = :username");
  3389. $stmt->execute(array(
  3390. ':modified' => date('Y-m-d H:i:s'),
  3391. ':password_hashed' => $password_hashed,
  3392. ':active' => $active,
  3393. ':name' => $name,
  3394. ':quota_b' => $quota_b,
  3395. ':username' => $username
  3396. ));
  3397. $_SESSION['return'] = array(
  3398. 'type' => 'success',
  3399. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  3400. );
  3401. return true;
  3402. }
  3403. catch (PDOException $e) {
  3404. $_SESSION['return'] = array(
  3405. 'type' => 'danger',
  3406. 'msg' => 'MySQL: '.$e
  3407. );
  3408. return false;
  3409. }
  3410. }
  3411. try {
  3412. $stmt = $pdo->prepare("UPDATE `alias` SET
  3413. `modified` = :modified,
  3414. `active` = :active
  3415. WHERE `address` = :address");
  3416. $stmt->execute(array(
  3417. ':address' => $username,
  3418. ':modified' => date('Y-m-d H:i:s'),
  3419. ':active' => $active
  3420. ));
  3421. $stmt = $pdo->prepare("UPDATE `mailbox` SET
  3422. `modified` = :modified,
  3423. `active` = :active,
  3424. `name`= :name,
  3425. `quota` = :quota_b
  3426. WHERE `username` = :username");
  3427. $stmt->execute(array(
  3428. ':active' => $active,
  3429. ':modified' => date('Y-m-d H:i:s'),
  3430. ':name' => $name,
  3431. ':quota_b' => $quota_b,
  3432. ':username' => $username
  3433. ));
  3434. $_SESSION['return'] = array(
  3435. 'type' => 'success',
  3436. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  3437. );
  3438. return true;
  3439. }
  3440. catch (PDOException $e) {
  3441. $_SESSION['return'] = array(
  3442. 'type' => 'danger',
  3443. 'msg' => 'MySQL: '.$e
  3444. );
  3445. return false;
  3446. }
  3447. }
  3448. function mailbox_get_mailboxes($domain = null) {
  3449. global $lang;
  3450. global $pdo;
  3451. $mailboxes = array();
  3452. if (isset($domain) && !hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  3453. $_SESSION['return'] = array(
  3454. 'type' => 'danger',
  3455. 'msg' => sprintf($lang['danger']['access_denied'])
  3456. );
  3457. return false;
  3458. }
  3459. elseif (isset($domain) && hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  3460. try {
  3461. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox` WHERE `domain` != 'ALL' AND `domain` = :domain");
  3462. $stmt->execute(array(
  3463. ':domain' => $domain,
  3464. ));
  3465. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  3466. while($row = array_shift($rows)) {
  3467. $mailboxes[] = $row['username'];
  3468. }
  3469. }
  3470. catch (PDOException $e) {
  3471. $_SESSION['return'] = array(
  3472. 'type' => 'danger',
  3473. 'msg' => 'MySQL: '.$e
  3474. );
  3475. return false;
  3476. }
  3477. }
  3478. else {
  3479. try {
  3480. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox` WHERE `domain` IN (SELECT `domain` FROM `domain_admins` WHERE `active` = '1' AND `username` = :username) OR 'admin' = :role");
  3481. $stmt->execute(array(
  3482. ':username' => $_SESSION['mailcow_cc_username'],
  3483. ':role' => $_SESSION['mailcow_cc_role'],
  3484. ));
  3485. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  3486. while($row = array_shift($rows)) {
  3487. $mailboxes[] = $row['username'];
  3488. }
  3489. }
  3490. catch (PDOException $e) {
  3491. $_SESSION['return'] = array(
  3492. 'type' => 'danger',
  3493. 'msg' => 'MySQL: '.$e
  3494. );
  3495. return false;
  3496. }
  3497. }
  3498. return $mailboxes;
  3499. }
  3500. function mailbox_get_alias_domains($domain = null) {
  3501. // Get all domains assigned to mailcow_cc_username or domain, if set
  3502. // Domain admin needs to be active
  3503. // Domain does not need to be active
  3504. global $lang;
  3505. global $pdo;
  3506. $aliasdomains = array();
  3507. if (isset($domain) && !hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  3508. $_SESSION['return'] = array(
  3509. 'type' => 'danger',
  3510. 'msg' => sprintf($lang['danger']['access_denied'])
  3511. );
  3512. return false;
  3513. }
  3514. elseif (isset($domain) && hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  3515. try {
  3516. $stmt = $pdo->prepare("SELECT `alias_domain` FROM `alias_domain` WHERE `target_domain` = :domain");
  3517. $stmt->execute(array(
  3518. ':domain' => $domain,
  3519. ));
  3520. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  3521. while($row = array_shift($rows)) {
  3522. $aliasdomains[] = $row['alias_domain'];
  3523. }
  3524. }
  3525. catch (PDOException $e) {
  3526. $_SESSION['return'] = array(
  3527. 'type' => 'danger',
  3528. 'msg' => 'MySQL: '.$e
  3529. );
  3530. return false;
  3531. }
  3532. }
  3533. else {
  3534. try {
  3535. $stmt = $pdo->prepare("SELECT `alias_domain` FROM `alias_domain` WHERE `target_domain` IN (SELECT `domain` FROM `domain_admins` WHERE `active` = '1' AND `username` = :username) OR 'admin' = :role");
  3536. $stmt->execute(array(
  3537. ':username' => $_SESSION['mailcow_cc_username'],
  3538. ':role' => $_SESSION['mailcow_cc_role'],
  3539. ));
  3540. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  3541. while($row = array_shift($rows)) {
  3542. $aliasdomains[] = $row['alias_domain'];
  3543. }
  3544. }
  3545. catch (PDOException $e) {
  3546. $_SESSION['return'] = array(
  3547. 'type' => 'danger',
  3548. 'msg' => 'MySQL: '.$e
  3549. );
  3550. return false;
  3551. }
  3552. }
  3553. return $aliasdomains;
  3554. }
  3555. function mailbox_get_aliases($domain) {
  3556. global $lang;
  3557. global $pdo;
  3558. $aliases = array();
  3559. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  3560. $_SESSION['return'] = array(
  3561. 'type' => 'danger',
  3562. 'msg' => sprintf($lang['danger']['access_denied'])
  3563. );
  3564. return false;
  3565. }
  3566. try {
  3567. $stmt = $pdo->prepare("SELECT `address` FROM `alias` WHERE `address` != `goto` AND `domain` = :domain");
  3568. $stmt->execute(array(
  3569. ':domain' => $domain,
  3570. ));
  3571. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  3572. while($row = array_shift($rows)) {
  3573. $aliases[] = $row['address'];
  3574. }
  3575. }
  3576. catch (PDOException $e) {
  3577. $_SESSION['return'] = array(
  3578. 'type' => 'danger',
  3579. 'msg' => 'MySQL: '.$e
  3580. );
  3581. return false;
  3582. }
  3583. return $aliases;
  3584. }
  3585. function mailbox_get_alias_details($address) {
  3586. global $lang;
  3587. global $pdo;
  3588. $aliasdata = array();
  3589. try {
  3590. $stmt = $pdo->prepare("SELECT
  3591. `domain`,
  3592. `goto`,
  3593. `address`,
  3594. `active` as `active_int`,
  3595. CASE `active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`,
  3596. `created`,
  3597. `modified`
  3598. FROM `alias`
  3599. WHERE `address` = :address AND `address` != `goto`");
  3600. $stmt->execute(array(
  3601. ':address' => $address,
  3602. ));
  3603. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  3604. $aliasdata['domain'] = $row['domain'];
  3605. $aliasdata['goto'] = $row['goto'];
  3606. $aliasdata['address'] = $row['address'];
  3607. (!filter_var($aliasdata['address'], FILTER_VALIDATE_EMAIL)) ? $aliasdata['is_catch_all'] = 1 : $aliasdata['is_catch_all'] = 0;
  3608. $aliasdata['active'] = $row['active'];
  3609. $aliasdata['active_int'] = $row['active_int'];
  3610. $aliasdata['created'] = $row['created'];
  3611. $aliasdata['modified'] = $row['modified'];
  3612. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $aliasdata['domain'])) {
  3613. $_SESSION['return'] = array(
  3614. 'type' => 'danger',
  3615. 'msg' => sprintf($lang['danger']['access_denied'])
  3616. );
  3617. return false;
  3618. }
  3619. }
  3620. catch (PDOException $e) {
  3621. $_SESSION['return'] = array(
  3622. 'type' => 'danger',
  3623. 'msg' => 'MySQL: '.$e
  3624. );
  3625. return false;
  3626. }
  3627. return $aliasdata;
  3628. }
  3629. function mailbox_get_alias_domain_details($aliasdomain) {
  3630. global $lang;
  3631. global $pdo;
  3632. $aliasdomaindata = array();
  3633. try {
  3634. $stmt = $pdo->prepare("SELECT
  3635. `alias_domain`,
  3636. `target_domain`,
  3637. `active` AS `active_int`,
  3638. CASE `active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`,
  3639. `created`,
  3640. `modified`
  3641. FROM `alias_domain`
  3642. WHERE `alias_domain` = :aliasdomain");
  3643. $stmt->execute(array(
  3644. ':aliasdomain' => $aliasdomain,
  3645. ));
  3646. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  3647. $aliasdomaindata['alias_domain'] = $row['alias_domain'];
  3648. $aliasdomaindata['target_domain'] = $row['target_domain'];
  3649. $aliasdomaindata['active'] = $row['active'];
  3650. $aliasdomaindata['active_int'] = $row['active_int'];
  3651. $aliasdomaindata['created'] = $row['created'];
  3652. $aliasdomaindata['modified'] = $row['modified'];
  3653. }
  3654. catch (PDOException $e) {
  3655. $_SESSION['return'] = array(
  3656. 'type' => 'danger',
  3657. 'msg' => 'MySQL: '.$e
  3658. );
  3659. return false;
  3660. }
  3661. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $aliasdomaindata['target_domain'])) {
  3662. $_SESSION['return'] = array(
  3663. 'type' => 'danger',
  3664. 'msg' => sprintf($lang['danger']['access_denied'])
  3665. );
  3666. return false;
  3667. }
  3668. return $aliasdomaindata;
  3669. }
  3670. function mailbox_get_domains() {
  3671. // Get all domains assigned to mailcow_cc_username
  3672. // Domain admin needs to be active
  3673. // Domain does not need to be active
  3674. global $lang;
  3675. global $pdo;
  3676. try {
  3677. $domains = array();
  3678. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  3679. WHERE (`domain` IN (
  3680. SELECT `domain` from `domain_admins`
  3681. WHERE (`active`='1' AND `username` = :username))
  3682. )
  3683. OR ('admin'= :role)
  3684. AND `domain` != 'ALL'");
  3685. $stmt->execute(array(
  3686. ':username' => $_SESSION['mailcow_cc_username'],
  3687. ':role' => $_SESSION['mailcow_cc_role'],
  3688. ));
  3689. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  3690. while($row = array_shift($rows)) {
  3691. $domains[] = $row['domain'];
  3692. }
  3693. }
  3694. catch (PDOException $e) {
  3695. $_SESSION['return'] = array(
  3696. 'type' => 'danger',
  3697. 'msg' => 'MySQL: '.$e
  3698. );
  3699. return false;
  3700. }
  3701. return $domains;
  3702. }
  3703. function mailbox_get_domain_details($domain) {
  3704. global $lang;
  3705. global $pdo;
  3706. $domaindata = array();
  3707. $domain = idn_to_ascii(strtolower(trim($domain)));
  3708. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  3709. $_SESSION['return'] = array(
  3710. 'type' => 'danger',
  3711. 'msg' => sprintf($lang['danger']['access_denied'])
  3712. );
  3713. return false;
  3714. }
  3715. try {
  3716. $stmt = $pdo->prepare("SELECT
  3717. `domain`,
  3718. `description`,
  3719. `aliases`,
  3720. `mailboxes`,
  3721. `maxquota`,
  3722. `quota`,
  3723. `relay_all_recipients` as `relay_all_recipients_int`,
  3724. `backupmx` as `backupmx_int`,
  3725. `active` as `active_int`,
  3726. CASE `relay_all_recipients` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `relay_all_recipients`,
  3727. CASE `backupmx` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `backupmx`,
  3728. CASE `active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`
  3729. FROM `domain` WHERE `domain`= :domain");
  3730. $stmt->execute(array(
  3731. ':domain' => $domain,
  3732. ));
  3733. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  3734. $stmt = $pdo->prepare("SELECT COUNT(*) AS `count`, COALESCE(SUM(`quota`), 0) as `in_use` FROM `mailbox` WHERE `domain` = :domain");
  3735. $stmt->execute(array(':domain' => $row['domain']));
  3736. $MailboxDataDomain = $stmt->fetch(PDO::FETCH_ASSOC);
  3737. $domaindata['max_new_mailbox_quota'] = ($row['quota'] * 1048576) - $MailboxDataDomain['in_use'];
  3738. if ($domaindata['max_new_mailbox_quota'] > ($row['maxquota'] * 1048576)) {
  3739. $domaindata['max_new_mailbox_quota'] = ($row['maxquota'] * 1048576);
  3740. }
  3741. $domaindata['quota_used_in_domain'] = $MailboxDataDomain['in_use'];
  3742. $domaindata['mboxes_in_domain'] = $MailboxDataDomain['count'];
  3743. $domaindata['mboxes_left'] = $row['mailboxes'] - $MailboxDataDomain['count'];
  3744. $domaindata['domain_name'] = $row['domain'];
  3745. $domaindata['description'] = $row['description'];
  3746. $domaindata['max_num_aliases_for_domain'] = $row['aliases'];
  3747. $domaindata['max_num_mboxes_for_domain'] = $row['mailboxes'];
  3748. $domaindata['max_quota_for_mbox'] = $row['maxquota'] * 1048576;
  3749. $domaindata['max_quota_for_domain'] = $row['quota'] * 1048576;
  3750. $domaindata['backupmx'] = $row['backupmx'];
  3751. $domaindata['backupmx_int'] = $row['backupmx_int'];
  3752. $domaindata['active'] = $row['active'];
  3753. $domaindata['active_int'] = $row['active_int'];
  3754. $domaindata['relay_all_recipients'] = $row['relay_all_recipients'];
  3755. $domaindata['relay_all_recipients_int'] = $row['relay_all_recipients_int'];
  3756. $stmt = $pdo->prepare("SELECT COUNT(*) AS `alias_count` FROM `alias`
  3757. WHERE `domain`= :domain
  3758. AND `address` NOT IN (
  3759. SELECT `username` FROM `mailbox`
  3760. )");
  3761. $stmt->execute(array(
  3762. ':domain' => $domain,
  3763. ));
  3764. $AliasData = $stmt->fetch(PDO::FETCH_ASSOC);
  3765. (isset($AliasData['alias_count'])) ? $domaindata['aliases_in_domain'] = $AliasData['alias_count'] : $domaindata['aliases_in_domain'] = "0";
  3766. }
  3767. catch (PDOException $e) {
  3768. $_SESSION['return'] = array(
  3769. 'type' => 'danger',
  3770. 'msg' => 'MySQL: '.$e
  3771. );
  3772. return false;
  3773. }
  3774. return $domaindata;
  3775. }
  3776. function mailbox_get_mailbox_details($mailbox) {
  3777. global $lang;
  3778. global $pdo;
  3779. $mailboxdata = array();
  3780. try {
  3781. $stmt = $pdo->prepare("SELECT
  3782. `domain`.`backupmx`,
  3783. `mailbox`.`username`,
  3784. `mailbox`.`name`,
  3785. `mailbox`.`active` AS `active_int`,
  3786. CASE `mailbox`.`active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`,
  3787. `mailbox`.`domain`,
  3788. `mailbox`.`quota`,
  3789. `quota2`.`bytes`,
  3790. `quota2`.`messages`
  3791. FROM `mailbox`, `quota2`, `domain`
  3792. WHERE `mailbox`.`username` = `quota2`.`username` AND `domain`.`domain` = `mailbox`.`domain` AND `mailbox`.`username` = :mailbox");
  3793. $stmt->execute(array(
  3794. ':mailbox' => $mailbox,
  3795. ));
  3796. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  3797. $stmt = $pdo->prepare("SELECT `maxquota`, `quota` FROM `domain` WHERE `domain` = :domain");
  3798. $stmt->execute(array(':domain' => $row['domain']));
  3799. $DomainQuota = $stmt->fetch(PDO::FETCH_ASSOC);
  3800. $stmt = $pdo->prepare("SELECT COUNT(*) AS `count`, COALESCE(SUM(`quota`), 0) as `in_use` FROM `mailbox` WHERE `domain` = :domain AND `username` != :username");
  3801. $stmt->execute(array(':domain' => $row['domain'], ':username' => $row['username']));
  3802. $MailboxUsage = $stmt->fetch(PDO::FETCH_ASSOC);
  3803. $mailboxdata['max_new_quota'] = ($DomainQuota['quota'] * 1048576) - $MailboxUsage['in_use'];
  3804. if ($mailboxdata['max_new_quota'] > ($DomainQuota['maxquota'] * 1048576)) {
  3805. $mailboxdata['max_new_quota'] = ($DomainQuota['maxquota'] * 1048576);
  3806. }
  3807. $mailboxdata['username'] = $row['username'];
  3808. $mailboxdata['is_relayed'] = $row['backupmx'];
  3809. $mailboxdata['name'] = $row['name'];
  3810. $mailboxdata['active'] = $row['active'];
  3811. $mailboxdata['active_int'] = $row['active_int'];
  3812. $mailboxdata['domain'] = $row['domain'];
  3813. $mailboxdata['quota'] = $row['quota'];
  3814. $mailboxdata['quota_used'] = intval($row['bytes']);
  3815. $mailboxdata['percent_in_use'] = round((intval($row['bytes']) / intval($row['quota'])) * 100);
  3816. $mailboxdata['messages'] = $row['messages'];
  3817. if ($mailboxdata['percent_in_use'] >= 90) {
  3818. $mailboxdata['percent_class'] = "danger";
  3819. }
  3820. elseif ($mailboxdata['percent_in_use'] >= 75) {
  3821. $mailboxdata['percent_class'] = "warning";
  3822. }
  3823. else {
  3824. $mailboxdata['percent_class'] = "success";
  3825. }
  3826. }
  3827. catch (PDOException $e) {
  3828. $_SESSION['return'] = array(
  3829. 'type' => 'danger',
  3830. 'msg' => 'MySQL: '.$e
  3831. );
  3832. return false;
  3833. }
  3834. if (!isset($mailboxdata['domain']) ||
  3835. (isset($mailboxdata['domain']) && !hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $mailboxdata['domain']))) {
  3836. $_SESSION['return'] = array(
  3837. 'type' => 'danger',
  3838. 'msg' => sprintf($lang['danger']['access_denied'])
  3839. );
  3840. return false;
  3841. }
  3842. return $mailboxdata;
  3843. }
  3844. function mailbox_delete_domain($postarray) {
  3845. global $lang;
  3846. global $pdo;
  3847. $domain = $postarray['domain'];
  3848. if ($_SESSION['mailcow_cc_role'] != "admin") {
  3849. $_SESSION['return'] = array(
  3850. 'type' => 'danger',
  3851. 'msg' => sprintf($lang['danger']['access_denied'])
  3852. );
  3853. return false;
  3854. }
  3855. if (!is_valid_domain_name($domain)) {
  3856. $_SESSION['return'] = array(
  3857. 'type' => 'danger',
  3858. 'msg' => sprintf($lang['danger']['domain_invalid'])
  3859. );
  3860. return false;
  3861. }
  3862. $domain = strtolower(trim($domain));
  3863. try {
  3864. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox`
  3865. WHERE `domain` = :domain");
  3866. $stmt->execute(array(':domain' => $domain));
  3867. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  3868. }
  3869. catch(PDOException $e) {
  3870. $_SESSION['return'] = array(
  3871. 'type' => 'danger',
  3872. 'msg' => 'MySQL: '.$e
  3873. );
  3874. return false;
  3875. }
  3876. if ($num_results != 0 || !empty($num_results)) {
  3877. $_SESSION['return'] = array(
  3878. 'type' => 'danger',
  3879. 'msg' => sprintf($lang['danger']['domain_not_empty'])
  3880. );
  3881. return false;
  3882. }
  3883. try {
  3884. $stmt = $pdo->prepare("DELETE FROM `domain` WHERE `domain` = :domain");
  3885. $stmt->execute(array(
  3886. ':domain' => $domain,
  3887. ));
  3888. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `domain` = :domain");
  3889. $stmt->execute(array(
  3890. ':domain' => $domain,
  3891. ));
  3892. $stmt = $pdo->prepare("DELETE FROM `alias` WHERE `domain` = :domain");
  3893. $stmt->execute(array(
  3894. ':domain' => $domain,
  3895. ));
  3896. $stmt = $pdo->prepare("DELETE FROM `alias_domain` WHERE `target_domain` = :domain");
  3897. $stmt->execute(array(
  3898. ':domain' => $domain,
  3899. ));
  3900. $stmt = $pdo->prepare("DELETE FROM `mailbox` WHERE `domain` = :domain");
  3901. $stmt->execute(array(
  3902. ':domain' => $domain,
  3903. ));
  3904. $stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` LIKE :domain");
  3905. $stmt->execute(array(
  3906. ':domain' => '%@'.$domain,
  3907. ));
  3908. $stmt = $pdo->prepare("DELETE FROM `quota2` WHERE `username` = :domain");
  3909. $stmt->execute(array(
  3910. ':domain' => '%@'.$domain,
  3911. ));
  3912. $stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `address` = :domain");
  3913. $stmt->execute(array(
  3914. ':domain' => '%@'.$domain,
  3915. ));
  3916. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :domain");
  3917. $stmt->execute(array(
  3918. ':domain' => '%@'.$domain,
  3919. ));
  3920. }
  3921. catch (PDOException $e) {
  3922. $_SESSION['return'] = array(
  3923. 'type' => 'danger',
  3924. 'msg' => 'MySQL: '.$e
  3925. );
  3926. return false;
  3927. }
  3928. $_SESSION['return'] = array(
  3929. 'type' => 'success',
  3930. 'msg' => sprintf($lang['success']['domain_removed'], htmlspecialchars($domain))
  3931. );
  3932. return true;
  3933. }
  3934. function mailbox_delete_alias($postarray) {
  3935. global $lang;
  3936. global $pdo;
  3937. $address = $postarray['address'];
  3938. $local_part = strstr($address, '@', true);
  3939. $domain = mailbox_get_alias_details($address)['domain'];
  3940. try {
  3941. $stmt = $pdo->prepare("SELECT `goto` FROM `alias` WHERE `address` = :address");
  3942. $stmt->execute(array(':address' => $address));
  3943. $gotos = $stmt->fetch(PDO::FETCH_ASSOC);
  3944. }
  3945. catch(PDOException $e) {
  3946. $_SESSION['return'] = array(
  3947. 'type' => 'danger',
  3948. 'msg' => 'MySQL: '.$e
  3949. );
  3950. return false;
  3951. }
  3952. $goto_array = explode(',', $gotos['goto']);
  3953. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  3954. $_SESSION['return'] = array(
  3955. 'type' => 'danger',
  3956. 'msg' => sprintf($lang['danger']['access_denied'])
  3957. );
  3958. return false;
  3959. }
  3960. try {
  3961. $stmt = $pdo->prepare("DELETE FROM `alias` WHERE `address` = :address AND `address` NOT IN (SELECT `username` FROM `mailbox`)");
  3962. $stmt->execute(array(
  3963. ':address' => $address
  3964. ));
  3965. }
  3966. catch (PDOException $e) {
  3967. $_SESSION['return'] = array(
  3968. 'type' => 'danger',
  3969. 'msg' => 'MySQL: '.$e
  3970. );
  3971. return false;
  3972. }
  3973. $_SESSION['return'] = array(
  3974. 'type' => 'success',
  3975. 'msg' => sprintf($lang['success']['alias_removed'], htmlspecialchars($address))
  3976. );
  3977. }
  3978. function mailbox_delete_alias_domain($postarray) {
  3979. global $lang;
  3980. global $pdo;
  3981. if (!is_valid_domain_name($postarray['alias_domain'])) {
  3982. $_SESSION['return'] = array(
  3983. 'type' => 'danger',
  3984. 'msg' => sprintf($lang['danger']['domain_invalid'])
  3985. );
  3986. return false;
  3987. }
  3988. $alias_domain = $postarray['alias_domain'];
  3989. try {
  3990. $stmt = $pdo->prepare("SELECT `target_domain` FROM `alias_domain`
  3991. WHERE `alias_domain`= :alias_domain");
  3992. $stmt->execute(array(':alias_domain' => $alias_domain));
  3993. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  3994. }
  3995. catch(PDOException $e) {
  3996. $_SESSION['return'] = array(
  3997. 'type' => 'danger',
  3998. 'msg' => 'MySQL: '.$e
  3999. );
  4000. return false;
  4001. }
  4002. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $DomainData['target_domain'])) {
  4003. $_SESSION['return'] = array(
  4004. 'type' => 'danger',
  4005. 'msg' => sprintf($lang['danger']['access_denied'])
  4006. );
  4007. return false;
  4008. }
  4009. try {
  4010. $stmt = $pdo->prepare("DELETE FROM `alias_domain` WHERE `alias_domain` = :alias_domain");
  4011. $stmt->execute(array(
  4012. ':alias_domain' => $alias_domain,
  4013. ));
  4014. $stmt = $pdo->prepare("DELETE FROM `alias` WHERE `domain` = :alias_domain");
  4015. $stmt->execute(array(
  4016. ':alias_domain' => $alias_domain,
  4017. ));
  4018. }
  4019. catch (PDOException $e) {
  4020. $_SESSION['return'] = array(
  4021. 'type' => 'danger',
  4022. 'msg' => 'MySQL: '.$e
  4023. );
  4024. return false;
  4025. }
  4026. $_SESSION['return'] = array(
  4027. 'type' => 'success',
  4028. 'msg' => sprintf($lang['success']['alias_domain_removed'], htmlspecialchars($alias_domain))
  4029. );
  4030. }
  4031. function mailbox_delete_mailbox($postarray) {
  4032. global $lang;
  4033. global $pdo;
  4034. $username = $postarray['username'];
  4035. $domain = mailbox_get_mailbox_details($username)['domain'];
  4036. if (!filter_var($postarray['username'], FILTER_VALIDATE_EMAIL)) {
  4037. $_SESSION['return'] = array(
  4038. 'type' => 'danger',
  4039. 'msg' => sprintf($lang['danger']['access_denied'])
  4040. );
  4041. return false;
  4042. }
  4043. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  4044. $_SESSION['return'] = array(
  4045. 'type' => 'danger',
  4046. 'msg' => sprintf($lang['danger']['access_denied'])
  4047. );
  4048. return false;
  4049. }
  4050. try {
  4051. $stmt = $pdo->prepare("DELETE FROM `alias` WHERE `goto` = :username");
  4052. $stmt->execute(array(
  4053. ':username' => $username
  4054. ));
  4055. $stmt = $pdo->prepare("DELETE FROM `quota2` WHERE `username` = :username");
  4056. $stmt->execute(array(
  4057. ':username' => $username
  4058. ));
  4059. $stmt = $pdo->prepare("DELETE FROM `mailbox` WHERE `username` = :username");
  4060. $stmt->execute(array(
  4061. ':username' => $username
  4062. ));
  4063. $stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` = :username");
  4064. $stmt->execute(array(
  4065. ':username' => $username
  4066. ));
  4067. $stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `goto` = :username");
  4068. $stmt->execute(array(
  4069. ':username' => $username
  4070. ));
  4071. $stmt = $pdo->prepare("DELETE FROM `imapsync` WHERE `user2` = :username");
  4072. $stmt->execute(array(
  4073. ':username' => $username
  4074. ));
  4075. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :username");
  4076. $stmt->execute(array(
  4077. ':username' => $username
  4078. ));
  4079. $stmt = $pdo->prepare("SELECT `address`, `goto` FROM `alias`
  4080. WHERE `goto` LIKE :username");
  4081. $stmt->execute(array(':username' => '%'.$username.'%'));
  4082. $GotoData = $stmt->fetchAll(PDO::FETCH_ASSOC);
  4083. foreach ($GotoData as $gotos) {
  4084. $goto_exploded = explode(',', $gotos['goto']);
  4085. if (($key = array_search($username, $goto_exploded)) !== false) {
  4086. unset($goto_exploded[$key]);
  4087. }
  4088. $gotos_rebuild = implode(',', $goto_exploded);
  4089. $stmt = $pdo->prepare("UPDATE `alias` SET
  4090. `goto` = :goto,
  4091. `modified` = :modified,
  4092. WHERE `address` = :address");
  4093. $stmt->execute(array(
  4094. ':goto' => $gotos_rebuild,
  4095. ':modified' => date('Y-m-d H:i:s'),
  4096. ':address' => $gotos['address']
  4097. ));
  4098. }
  4099. }
  4100. catch (PDOException $e) {
  4101. $_SESSION['return'] = array(
  4102. 'type' => 'danger',
  4103. 'msg' => 'MySQL: '.$e
  4104. );
  4105. return false;
  4106. }
  4107. $_SESSION['return'] = array(
  4108. 'type' => 'success',
  4109. 'msg' => sprintf($lang['success']['mailbox_removed'], htmlspecialchars($username))
  4110. );
  4111. }
  4112. function mailbox_get_sender_acl_handles($mailbox) {
  4113. global $pdo;
  4114. global $lang;
  4115. if ($_SESSION['mailcow_cc_role'] != "admin" && $_SESSION['mailcow_cc_role'] != "domainadmin") {
  4116. $_SESSION['return'] = array(
  4117. 'type' => 'danger',
  4118. 'msg' => sprintf($lang['danger']['access_denied'])
  4119. );
  4120. return false;
  4121. }
  4122. $data['sender_acl_domains']['ro'] = array();
  4123. $data['sender_acl_domains']['rw'] = array();
  4124. $data['sender_acl_domains']['selectable'] = array();
  4125. $data['sender_acl_addresses']['ro'] = array();
  4126. $data['sender_acl_addresses']['rw'] = array();
  4127. $data['sender_acl_addresses']['selectable'] = array();
  4128. $data['fixed_sender_aliases'] = array();
  4129. try {
  4130. $stmt = $pdo->prepare("SELECT `address` FROM `alias` WHERE `goto` = :goto AND `address` NOT LIKE '@%'");
  4131. $stmt->execute(array(':goto' => $mailbox));
  4132. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  4133. while ($row = array_shift($rows)) {
  4134. $data['fixed_sender_aliases'][] = $row['address'];
  4135. }
  4136. // Return array $data['sender_acl_domains/addresses']['ro'] with read-only objects
  4137. // Return array $data['sender_acl_domains/addresses']['rw'] with read-write objects (can be deleted)
  4138. $stmt = $pdo->prepare("SELECT REPLACE(`send_as`, '@', '') AS `send_as` FROM `sender_acl` WHERE `logged_in_as` = :logged_in_as AND `send_as` LIKE '@%'");
  4139. $stmt->execute(array(':logged_in_as' => $mailbox));
  4140. $domain_rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  4141. while ($domain_row = array_shift($domain_rows)) {
  4142. if (is_valid_domain_name($domain_row['send_as']) && !hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain_row['send_as'])) {
  4143. $data['sender_acl_domains']['ro'][] = $domain_row['send_as'];
  4144. continue;
  4145. }
  4146. if (is_valid_domain_name($domain_row['send_as']) && hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain_row['send_as'])) {
  4147. $data['sender_acl_domains']['rw'][] = $domain_row['send_as'];
  4148. continue;
  4149. }
  4150. }
  4151. $stmt = $pdo->prepare("SELECT `send_as` FROM `sender_acl` WHERE `logged_in_as` = :logged_in_as AND `send_as` NOT LIKE '@%'");
  4152. $stmt->execute(array(':logged_in_as' => $mailbox));
  4153. $address_rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  4154. while ($address_row = array_shift($address_rows)) {
  4155. if (filter_var($address_row['send_as'], FILTER_VALIDATE_EMAIL) && !hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $address_row['send_as'])) {
  4156. $data['sender_acl_addresses']['ro'][] = $address_row['send_as'];
  4157. continue;
  4158. }
  4159. if (filter_var($address_row['send_as'], FILTER_VALIDATE_EMAIL) && hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $address_row['send_as'])) {
  4160. $data['sender_acl_addresses']['rw'][] = $address_row['send_as'];
  4161. continue;
  4162. }
  4163. }
  4164. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  4165. WHERE `domain` NOT IN (
  4166. SELECT REPLACE(`send_as`, '@', '') FROM `sender_acl`
  4167. WHERE `logged_in_as` = :logged_in_as
  4168. AND `send_as` LIKE '@%')");
  4169. $stmt->execute(array(
  4170. ':logged_in_as' => $mailbox,
  4171. ));
  4172. $rows_domain = $stmt->fetchAll(PDO::FETCH_ASSOC);
  4173. while ($row_domain = array_shift($rows_domain)) {
  4174. if (is_valid_domain_name($row_domain['domain']) && hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $row_domain['domain'])) {
  4175. $data['sender_acl_domains']['selectable'][] = $row_domain['domain'];
  4176. $stmt = $pdo->prepare("SELECT `alias_domain` FROM `alias_domain`
  4177. WHERE `target_domain` = :target_domain
  4178. AND `alias_domain` NOT IN (
  4179. SELECT REPLACE(`send_as`, '@', '') FROM `sender_acl`
  4180. WHERE `logged_in_as` = :logged_in_as
  4181. AND `send_as` LIKE '@%')");
  4182. $stmt->execute(array(
  4183. ':target_domain' => $row_domain['domain'],
  4184. ':logged_in_as' => $mailbox,
  4185. ));
  4186. $rows_ad = $stmt->fetchAll(PDO::FETCH_ASSOC);
  4187. while ($row_ad = array_shift($rows_ad)) {
  4188. if (is_valid_domain_name($row_ad['alias_domain']) && hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $row_ad['alias_domain'])) {
  4189. $data['sender_acl_domains']['selectable'][] = $row_ad['alias_domain'];
  4190. }
  4191. }
  4192. }
  4193. }
  4194. $stmt = $pdo->prepare("SELECT `address` FROM `alias`
  4195. WHERE `goto` != :goto
  4196. AND `address` NOT IN (
  4197. SELECT `send_as` FROM `sender_acl`
  4198. WHERE `logged_in_as` = :logged_in_as
  4199. AND `send_as` NOT LIKE '@%')");
  4200. $stmt->execute(array(
  4201. ':logged_in_as' => $mailbox,
  4202. ':goto' => $mailbox
  4203. ));
  4204. while ($row = array_shift($rows)) {
  4205. if (filter_var($row['address'], FILTER_VALIDATE_EMAIL) && hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $row['address'])) {
  4206. $data['sender_acl_addresses']['selectable'][] = $row['address'];
  4207. }
  4208. }
  4209. }
  4210. catch(PDOException $e) {
  4211. $_SESSION['return'] = array(
  4212. 'type' => 'danger',
  4213. 'msg' => 'MySQL: '.$e
  4214. );
  4215. return false;
  4216. }
  4217. return $data;
  4218. }
  4219. function get_u2f_registrations($username) {
  4220. global $pdo;
  4221. $sel = $pdo->prepare("SELECT * FROM `tfa` WHERE `username` = ?");
  4222. $sel->execute(array($username));
  4223. return $sel->fetchAll(PDO::FETCH_OBJ);
  4224. }
  4225. function add_u2f_registration($username, $reg) {
  4226. global $pdo;
  4227. global $lang;
  4228. $ins = $pdo->prepare("INSERT INTO `tfa` (`username`, `authmech`, `keyHandle`, `publicKey`, `certificate`, `counter`) values (?, 'u2f', ?, ?, ?, ?)");
  4229. $ins->execute(array($username, $reg->keyHandle, $reg->publicKey, $reg->certificate, $reg->counter));
  4230. $_SESSION['return'] = array(
  4231. 'type' => 'success',
  4232. 'msg' => sprintf($lang['success']['object_modified'], $username)
  4233. );
  4234. }
  4235. function edit_u2f_registration($reg) {
  4236. global $pdo;
  4237. $upd = $pdo->prepare("update tfa set counter = ? where id = ?");
  4238. $upd->execute(array($reg->counter, $reg->id));
  4239. }
  4240. ?>