domainadmin.inc.php 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381
  1. <?php
  2. function add_domain_admin($postarray) {
  3. global $lang;
  4. global $pdo;
  5. $username = strtolower(trim($postarray['username']));
  6. $password = $postarray['password'];
  7. $password2 = $postarray['password2'];
  8. isset($postarray['active']) ? $active = '1' : $active = '0';
  9. if ($_SESSION['mailcow_cc_role'] != "admin") {
  10. $_SESSION['return'] = array(
  11. 'type' => 'danger',
  12. 'msg' => sprintf($lang['danger']['access_denied'])
  13. );
  14. return false;
  15. }
  16. if (empty($postarray['domain'])) {
  17. $_SESSION['return'] = array(
  18. 'type' => 'danger',
  19. 'msg' => sprintf($lang['danger']['domain_invalid'])
  20. );
  21. return false;
  22. }
  23. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username)) || empty ($username)) {
  24. $_SESSION['return'] = array(
  25. 'type' => 'danger',
  26. 'msg' => sprintf($lang['danger']['username_invalid'])
  27. );
  28. return false;
  29. }
  30. try {
  31. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox`
  32. WHERE `username` = :username");
  33. $stmt->execute(array(':username' => $username));
  34. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  35. $stmt = $pdo->prepare("SELECT `username` FROM `admin`
  36. WHERE `username` = :username");
  37. $stmt->execute(array(':username' => $username));
  38. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  39. $stmt = $pdo->prepare("SELECT `username` FROM `domain_admins`
  40. WHERE `username` = :username");
  41. $stmt->execute(array(':username' => $username));
  42. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  43. }
  44. catch(PDOException $e) {
  45. $_SESSION['return'] = array(
  46. 'type' => 'danger',
  47. 'msg' => 'MySQL: '.$e
  48. );
  49. return false;
  50. }
  51. foreach ($num_results as $num_results_each) {
  52. if ($num_results_each != 0) {
  53. $_SESSION['return'] = array(
  54. 'type' => 'danger',
  55. 'msg' => sprintf($lang['danger']['object_exists'], htmlspecialchars($username))
  56. );
  57. return false;
  58. }
  59. }
  60. if (!empty($password) && !empty($password2)) {
  61. if ($password != $password2) {
  62. $_SESSION['return'] = array(
  63. 'type' => 'danger',
  64. 'msg' => sprintf($lang['danger']['password_mismatch'])
  65. );
  66. return false;
  67. }
  68. $password_hashed = hash_password($password);
  69. foreach ($postarray['domain'] as $domain) {
  70. if (!is_valid_domain_name($domain)) {
  71. $_SESSION['return'] = array(
  72. 'type' => 'danger',
  73. 'msg' => sprintf($lang['danger']['domain_invalid'])
  74. );
  75. return false;
  76. }
  77. try {
  78. $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
  79. VALUES (:username, :domain, :created, :active)");
  80. $stmt->execute(array(
  81. ':username' => $username,
  82. ':domain' => $domain,
  83. ':created' => date('Y-m-d H:i:s'),
  84. ':active' => $active
  85. ));
  86. }
  87. catch (PDOException $e) {
  88. delete_domain_admin(array('username' => $username));
  89. $_SESSION['return'] = array(
  90. 'type' => 'danger',
  91. 'msg' => 'MySQL: '.$e
  92. );
  93. return false;
  94. }
  95. }
  96. try {
  97. $stmt = $pdo->prepare("INSERT INTO `admin` (`username`, `password`, `superadmin`, `created`, `modified`, `active`)
  98. VALUES (:username, :password_hashed, '0', :created, :modified, :active)");
  99. $stmt->execute(array(
  100. ':username' => $username,
  101. ':password_hashed' => $password_hashed,
  102. ':created' => date('Y-m-d H:i:s'),
  103. ':modified' => date('Y-m-d H:i:s'),
  104. ':active' => $active
  105. ));
  106. }
  107. catch (PDOException $e) {
  108. $_SESSION['return'] = array(
  109. 'type' => 'danger',
  110. 'msg' => 'MySQL: '.$e
  111. );
  112. return false;
  113. }
  114. }
  115. else {
  116. $_SESSION['return'] = array(
  117. 'type' => 'danger',
  118. 'msg' => sprintf($lang['danger']['password_empty'])
  119. );
  120. return false;
  121. }
  122. $_SESSION['return'] = array(
  123. 'type' => 'success',
  124. 'msg' => sprintf($lang['success']['domain_admin_added'], htmlspecialchars($username))
  125. );
  126. }
  127. function delete_domain_admin($postarray) {
  128. global $pdo;
  129. global $lang;
  130. if ($_SESSION['mailcow_cc_role'] != "admin") {
  131. $_SESSION['return'] = array(
  132. 'type' => 'danger',
  133. 'msg' => sprintf($lang['danger']['access_denied'])
  134. );
  135. return false;
  136. }
  137. $username = $postarray['username'];
  138. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
  139. $_SESSION['return'] = array(
  140. 'type' => 'danger',
  141. 'msg' => sprintf($lang['danger']['username_invalid'])
  142. );
  143. return false;
  144. }
  145. try {
  146. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
  147. $stmt->execute(array(
  148. ':username' => $username,
  149. ));
  150. $stmt = $pdo->prepare("DELETE FROM `admin` WHERE `username` = :username");
  151. $stmt->execute(array(
  152. ':username' => $username,
  153. ));
  154. }
  155. catch (PDOException $e) {
  156. $_SESSION['return'] = array(
  157. 'type' => 'danger',
  158. 'msg' => 'MySQL: '.$e
  159. );
  160. return false;
  161. }
  162. $_SESSION['return'] = array(
  163. 'type' => 'success',
  164. 'msg' => sprintf($lang['success']['domain_admin_removed'], htmlspecialchars($username))
  165. );
  166. }
  167. function get_domain_admins() {
  168. global $pdo;
  169. global $lang;
  170. $domainadmins = array();
  171. if ($_SESSION['mailcow_cc_role'] != "admin") {
  172. $_SESSION['return'] = array(
  173. 'type' => 'danger',
  174. 'msg' => sprintf($lang['danger']['access_denied'])
  175. );
  176. return false;
  177. }
  178. try {
  179. $stmt = $pdo->query("SELECT DISTINCT
  180. `username`
  181. FROM `domain_admins`
  182. WHERE `username` IN (
  183. SELECT `username` FROM `admin`
  184. WHERE `superadmin`!='1'
  185. )");
  186. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  187. while ($row = array_shift($rows)) {
  188. $domainadmins[] = $row['username'];
  189. }
  190. }
  191. catch(PDOException $e) {
  192. $_SESSION['return'] = array(
  193. 'type' => 'danger',
  194. 'msg' => 'MySQL: '.$e
  195. );
  196. }
  197. return $domainadmins;
  198. }
  199. function get_domain_admin_details($domain_admin) {
  200. global $pdo;
  201. global $lang;
  202. $domainadmindata = array();
  203. if ($_SESSION['mailcow_cc_role'] != "admin") {
  204. $_SESSION['return'] = array(
  205. 'type' => 'danger',
  206. 'msg' => sprintf($lang['danger']['access_denied'])
  207. );
  208. return false;
  209. }
  210. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $domain_admin))) {
  211. $_SESSION['return'] = array(
  212. 'type' => 'danger',
  213. 'msg' => sprintf($lang['danger']['username_invalid'])
  214. );
  215. return false;
  216. }
  217. try {
  218. $stmt = $pdo->prepare("SELECT
  219. `created`,
  220. `active` AS `active_int`,
  221. CASE `active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`
  222. FROM `domain_admins`
  223. WHERE `username`= :domain_admin");
  224. $stmt->execute(array(
  225. ':domain_admin' => $domain_admin
  226. ));
  227. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  228. $domainadmindata['active'] = $row['active'];
  229. $domainadmindata['active_int'] = $row['active_int'];
  230. $domainadmindata['created'] = $row['created'];
  231. // GET SELECTED
  232. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  233. WHERE `domain` IN (
  234. SELECT `domain` FROM `domain_admins`
  235. WHERE `username`= :domain_admin)");
  236. $stmt->execute(array(':domain_admin' => $domain_admin));
  237. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  238. while($row = array_shift($rows)) {
  239. $domainadmindata['selected_domains'][] = $row['domain'];
  240. }
  241. // GET UNSELECTED
  242. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  243. WHERE `domain` NOT IN (
  244. SELECT `domain` FROM `domain_admins`
  245. WHERE `username`= :domain_admin)");
  246. $stmt->execute(array(':domain_admin' => $domain_admin));
  247. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  248. while($row = array_shift($rows)) {
  249. $domainadmindata['unselected_domains'][] = $row['domain'];
  250. }
  251. }
  252. catch(PDOException $e) {
  253. $_SESSION['return'] = array(
  254. 'type' => 'danger',
  255. 'msg' => 'MySQL: '.$e
  256. );
  257. }
  258. return $domainadmindata;
  259. }
  260. function edit_domain_admin($postarray) {
  261. global $lang;
  262. global $pdo;
  263. $username = $postarray['username'];
  264. $password = $postarray['password'];
  265. $password2 = $postarray['password2'];
  266. isset($postarray['active']) ? $active = '1' : $active = '0';
  267. if ($_SESSION['mailcow_cc_role'] != "admin") {
  268. $_SESSION['return'] = array(
  269. 'type' => 'danger',
  270. 'msg' => sprintf($lang['danger']['access_denied'])
  271. );
  272. return false;
  273. }
  274. if(isset($postarray['domain'])) {
  275. foreach ($postarray['domain'] as $domain) {
  276. if (!is_valid_domain_name($domain)) {
  277. $_SESSION['return'] = array(
  278. 'type' => 'danger',
  279. 'msg' => sprintf($lang['danger']['domain_invalid'])
  280. );
  281. return false;
  282. }
  283. }
  284. }
  285. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
  286. $_SESSION['return'] = array(
  287. 'type' => 'danger',
  288. 'msg' => sprintf($lang['danger']['username_invalid'])
  289. );
  290. return false;
  291. }
  292. try {
  293. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
  294. $stmt->execute(array(
  295. ':username' => $username,
  296. ));
  297. }
  298. catch (PDOException $e) {
  299. $_SESSION['return'] = array(
  300. 'type' => 'danger',
  301. 'msg' => 'MySQL: '.$e
  302. );
  303. return false;
  304. }
  305. if(isset($postarray['domain'])) {
  306. foreach ($postarray['domain'] as $domain) {
  307. try {
  308. $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
  309. VALUES (:username, :domain, :created, :active)");
  310. $stmt->execute(array(
  311. ':username' => $username,
  312. ':domain' => $domain,
  313. ':created' => date('Y-m-d H:i:s'),
  314. ':active' => $active
  315. ));
  316. }
  317. catch (PDOException $e) {
  318. $_SESSION['return'] = array(
  319. 'type' => 'danger',
  320. 'msg' => 'MySQL: '.$e
  321. );
  322. return false;
  323. }
  324. }
  325. }
  326. if (!empty($password) && !empty($password2)) {
  327. if ($password != $password2) {
  328. $_SESSION['return'] = array(
  329. 'type' => 'danger',
  330. 'msg' => sprintf($lang['danger']['password_mismatch'])
  331. );
  332. return false;
  333. }
  334. $password_hashed = hash_password($password);
  335. try {
  336. $stmt = $pdo->prepare("UPDATE `admin` SET `modified` = :modified, `active` = :active, `password` = :password_hashed WHERE `username` = :username");
  337. $stmt->execute(array(
  338. ':password_hashed' => $password_hashed,
  339. ':username' => $username,
  340. ':modified' => date('Y-m-d H:i:s'),
  341. ':active' => $active
  342. ));
  343. }
  344. catch (PDOException $e) {
  345. $_SESSION['return'] = array(
  346. 'type' => 'danger',
  347. 'msg' => 'MySQL: '.$e
  348. );
  349. return false;
  350. }
  351. }
  352. else {
  353. try {
  354. $stmt = $pdo->prepare("UPDATE `admin` SET `modified` = :modified, `active` = :active WHERE `username` = :username");
  355. $stmt->execute(array(
  356. ':username' => $username,
  357. ':modified' => date('Y-m-d H:i:s'),
  358. ':active' => $active
  359. ));
  360. }
  361. catch (PDOException $e) {
  362. $_SESSION['return'] = array(
  363. 'type' => 'danger',
  364. 'msg' => 'MySQL: '.$e
  365. );
  366. return false;
  367. }
  368. }
  369. $_SESSION['return'] = array(
  370. 'type' => 'success',
  371. 'msg' => sprintf($lang['success']['domain_admin_modified'], htmlspecialchars($username))
  372. );
  373. }