functions.inc.php 47 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463
  1. <?php
  2. require_once 'dkim.inc.php';
  3. require_once 'mailbox.inc.php';
  4. require_once 'domainadmin.inc.php';
  5. function hash_password($password) {
  6. $salt_str = bin2hex(openssl_random_pseudo_bytes(8));
  7. return "{SSHA256}".base64_encode(hash('sha256', $password . $salt_str, true) . $salt_str);
  8. }
  9. function hasDomainAccess($username, $role, $domain) {
  10. global $pdo;
  11. if (!filter_var($username, FILTER_VALIDATE_EMAIL) && !ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
  12. return false;
  13. }
  14. if (empty($domain) || !is_valid_domain_name($domain)) {
  15. return false;
  16. }
  17. if ($role != 'admin' && $role != 'domainadmin' && $role != 'user') {
  18. return false;
  19. }
  20. try {
  21. $stmt = $pdo->prepare("SELECT `domain` FROM `domain_admins`
  22. WHERE (
  23. `active`='1'
  24. AND `username` = :username
  25. AND (`domain` = :domain1 OR `domain` = (SELECT `target_domain` FROM `alias_domain` WHERE `alias_domain` = :domain2))
  26. )
  27. OR 'admin' = :role");
  28. $stmt->execute(array(':username' => $username, ':domain1' => $domain, ':domain2' => $domain, ':role' => $role));
  29. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  30. }
  31. catch(PDOException $e) {
  32. $_SESSION['return'] = array(
  33. 'type' => 'danger',
  34. 'msg' => 'MySQL: '.$e
  35. );
  36. return false;
  37. }
  38. if (!empty($num_results)) {
  39. return true;
  40. }
  41. return false;
  42. }
  43. function hasMailboxObjectAccess($username, $role, $object) {
  44. global $pdo;
  45. if (!filter_var($username, FILTER_VALIDATE_EMAIL) && !ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
  46. return false;
  47. }
  48. if ($role != 'admin' && $role != 'domainadmin' && $role != 'user') {
  49. return false;
  50. }
  51. if ($username == $object) {
  52. return true;
  53. }
  54. try {
  55. $stmt = $pdo->prepare("SELECT `domain` FROM `mailbox` WHERE `username` = :object");
  56. $stmt->execute(array(':object' => $object));
  57. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  58. if (isset($row['domain']) && hasDomainAccess($username, $role, $row['domain'])) {
  59. return true;
  60. }
  61. }
  62. catch(PDOException $e) {
  63. error_log($e);
  64. return false;
  65. }
  66. return false;
  67. }
  68. function init_db_schema() {
  69. global $pdo;
  70. try {
  71. $stmt = $pdo->prepare("SELECT NULL FROM `admin`, `imapsync`");
  72. $stmt->execute();
  73. }
  74. catch (Exception $e) {
  75. $lines = file('/web/inc/init.sql');
  76. $data = '';
  77. foreach ($lines as $line) {
  78. if (substr($line, 0, 2) == '--' || $line == '') {
  79. continue;
  80. }
  81. $data .= $line;
  82. if (substr(trim($line), -1, 1) == ';') {
  83. $pdo->query($data);
  84. $data = '';
  85. }
  86. }
  87. // Create index if not exists
  88. $stmt = $pdo->query("SHOW INDEX FROM sogo_acl WHERE KEY_NAME = 'sogo_acl_c_folder_id_idx'");
  89. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  90. if ($num_results == 0) {
  91. $pdo->query("CREATE INDEX sogo_acl_c_folder_id_idx ON sogo_acl(c_folder_id)");
  92. }
  93. $stmt = $pdo->query("SHOW INDEX FROM sogo_acl WHERE KEY_NAME = 'sogo_acl_c_uid_idx'");
  94. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  95. if ($num_results == 0) {
  96. $pdo->query("CREATE INDEX sogo_acl_c_uid_idx ON sogo_acl(c_uid)");
  97. }
  98. $_SESSION['return'] = array(
  99. 'type' => 'success',
  100. 'msg' => 'Database initialization completed.'
  101. );
  102. }
  103. // Add newly added columns
  104. $stmt = $pdo->query("SHOW COLUMNS FROM `mailbox` LIKE 'kind'");
  105. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  106. if ($num_results == 0) {
  107. $pdo->query("ALTER TABLE `mailbox` ADD `kind` varchar(100) NOT NULL DEFAULT ''");
  108. }
  109. $stmt = $pdo->query("SHOW COLUMNS FROM `mailbox` LIKE 'multiple_bookings'");
  110. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  111. if ($num_results == 0) {
  112. $pdo->query("ALTER TABLE `mailbox` ADD `multiple_bookings` tinyint(1) NOT NULL DEFAULT '0'");
  113. }
  114. $stmt = $pdo->query("SHOW COLUMNS FROM `mailbox` LIKE 'wants_tagged_subject'");
  115. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  116. if ($num_results == 0) {
  117. $pdo->query("ALTER TABLE `mailbox` ADD `wants_tagged_subject` tinyint(1) NOT NULL DEFAULT '0'");
  118. }
  119. }
  120. function verify_ssha256($hash, $password) {
  121. // Remove tag if any
  122. $hash = ltrim($hash, '{SSHA256}');
  123. // Decode hash
  124. $dhash = base64_decode($hash);
  125. // Get first 32 bytes of binary which equals a SHA256 hash
  126. $ohash = substr($dhash, 0, 32);
  127. // Remove SHA256 hash from decoded hash to get original salt string
  128. $osalt = str_replace($ohash, '', $dhash);
  129. // Check single salted SHA256 hash against extracted hash
  130. if (hash('sha256', $password . $osalt, true) == $ohash) {
  131. return true;
  132. }
  133. else {
  134. return false;
  135. }
  136. }
  137. function doveadm_authenticate($hash, $algorithm, $password) {
  138. $descr = array(0 => array('pipe', 'r'), 1 => array('pipe', 'w'), 2 => array('pipe', 'w'));
  139. $pipes = array();
  140. $process = proc_open("/usr/bin/doveadm pw -s ".$algorithm." -t '".$hash."'", $descr, $pipes);
  141. if (is_resource($process)) {
  142. fputs($pipes[0], $password);
  143. fclose($pipes[0]);
  144. while ($f = fgets($pipes[1])) {
  145. if (preg_match('/(verified)/', $f)) {
  146. proc_close($process);
  147. return true;
  148. }
  149. return false;
  150. }
  151. fclose($pipes[1]);
  152. while ($f = fgets($pipes[2])) {
  153. proc_close($process);
  154. return false;
  155. }
  156. fclose($pipes[2]);
  157. proc_close($process);
  158. }
  159. return false;
  160. }
  161. function check_login($user, $pass) {
  162. global $pdo;
  163. if (!filter_var($user, FILTER_VALIDATE_EMAIL) && !ctype_alnum(str_replace(array('_', '.', '-'), '', $user))) {
  164. return false;
  165. }
  166. $user = strtolower(trim($user));
  167. $stmt = $pdo->prepare("SELECT `password` FROM `admin`
  168. WHERE `superadmin` = '1'
  169. AND `username` = :user");
  170. $stmt->execute(array(':user' => $user));
  171. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  172. foreach ($rows as $row) {
  173. if (verify_ssha256($row['password'], $pass) !== false) {
  174. unset($_SESSION['ldelay']);
  175. return "admin";
  176. }
  177. }
  178. $stmt = $pdo->prepare("SELECT `password` FROM `admin`
  179. WHERE `superadmin` = '0'
  180. AND `active`='1'
  181. AND `username` = :user");
  182. $stmt->execute(array(':user' => $user));
  183. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  184. foreach ($rows as $row) {
  185. if (verify_ssha256($row['password'], $pass) !== false) {
  186. unset($_SESSION['ldelay']);
  187. return "domainadmin";
  188. }
  189. }
  190. $stmt = $pdo->prepare("SELECT `password` FROM `mailbox`
  191. WHERE `active`='1'
  192. AND `username` = :user");
  193. $stmt->execute(array(':user' => $user));
  194. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  195. foreach ($rows as $row) {
  196. if (verify_ssha256($row['password'], $pass) !== false) {
  197. unset($_SESSION['ldelay']);
  198. return "user";
  199. }
  200. }
  201. if (!isset($_SESSION['ldelay'])) {
  202. $_SESSION['ldelay'] = "0";
  203. }
  204. elseif (!isset($_SESSION['mailcow_cc_username'])) {
  205. $_SESSION['ldelay'] = $_SESSION['ldelay']+0.5;
  206. }
  207. sleep($_SESSION['ldelay']);
  208. }
  209. function formatBytes($size, $precision = 2) {
  210. if(!is_numeric($size)) {
  211. return "0";
  212. }
  213. $base = log($size, 1024);
  214. $suffixes = array(' Byte', ' KiB', ' MiB', ' GiB', ' TiB');
  215. if ($size == "0") {
  216. return "0";
  217. }
  218. return round(pow(1024, $base - floor($base)), $precision) . $suffixes[floor($base)];
  219. }
  220. function set_admin_account($postarray) {
  221. global $lang;
  222. global $pdo;
  223. if ($_SESSION['mailcow_cc_role'] != "admin") {
  224. $_SESSION['return'] = array(
  225. 'type' => 'danger',
  226. 'msg' => sprintf($lang['danger']['access_denied'])
  227. );
  228. return false;
  229. }
  230. $name = $postarray['admin_user'];
  231. $name_now = $postarray['admin_user_now'];
  232. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $name)) || empty ($name)) {
  233. $_SESSION['return'] = array(
  234. 'type' => 'danger',
  235. 'msg' => sprintf($lang['danger']['username_invalid'])
  236. );
  237. return false;
  238. }
  239. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $name_now)) || empty ($name_now)) {
  240. $_SESSION['return'] = array(
  241. 'type' => 'danger',
  242. 'msg' => sprintf($lang['danger']['username_invalid'])
  243. );
  244. return false;
  245. }
  246. if (!empty($postarray['admin_pass']) && !empty($postarray['admin_pass2'])) {
  247. if ($postarray['admin_pass'] != $postarray['admin_pass2']) {
  248. $_SESSION['return'] = array(
  249. 'type' => 'danger',
  250. 'msg' => sprintf($lang['danger']['password_mismatch'])
  251. );
  252. return false;
  253. }
  254. $password_hashed = hash_password($postarray['admin_pass']);
  255. try {
  256. $stmt = $pdo->prepare("UPDATE `admin` SET
  257. `modified` = :modified,
  258. `password` = :password_hashed,
  259. `username` = :name
  260. WHERE `username` = :username");
  261. $stmt->execute(array(
  262. ':password_hashed' => $password_hashed,
  263. ':modified' => date('Y-m-d H:i:s'),
  264. ':name' => $name,
  265. ':username' => $name_now
  266. ));
  267. }
  268. catch (PDOException $e) {
  269. $_SESSION['return'] = array(
  270. 'type' => 'danger',
  271. 'msg' => 'MySQL: '.$e
  272. );
  273. return false;
  274. }
  275. }
  276. else {
  277. try {
  278. $stmt = $pdo->prepare("UPDATE `admin` SET
  279. `modified` = :modified,
  280. `username` = :name
  281. WHERE `username` = :name_now");
  282. $stmt->execute(array(
  283. ':name' => $name,
  284. ':modified' => date('Y-m-d H:i:s'),
  285. ':name_now' => $name_now
  286. ));
  287. }
  288. catch (PDOException $e) {
  289. $_SESSION['return'] = array(
  290. 'type' => 'danger',
  291. 'msg' => 'MySQL: '.$e
  292. );
  293. return false;
  294. }
  295. }
  296. try {
  297. $stmt = $pdo->prepare("UPDATE `domain_admins` SET
  298. `domain` = :domain,
  299. `username` = :name
  300. WHERE `username` = :name_now");
  301. $stmt->execute(array(
  302. ':domain' => 'ALL',
  303. ':name' => $name,
  304. ':name_now' => $name_now
  305. ));
  306. }
  307. catch (PDOException $e) {
  308. $_SESSION['return'] = array(
  309. 'type' => 'danger',
  310. 'msg' => 'MySQL: '.$e
  311. );
  312. return false;
  313. }
  314. $_SESSION['return'] = array(
  315. 'type' => 'success',
  316. 'msg' => sprintf($lang['success']['admin_modified'])
  317. );
  318. }
  319. function set_time_limited_aliases($postarray) {
  320. global $lang;
  321. global $pdo;
  322. (isset($postarray['username'])) ? $username = $postarray['username'] : $username = $_SESSION['mailcow_cc_username'];
  323. if ($_SESSION['mailcow_cc_role'] != "user" &&
  324. $_SESSION['mailcow_cc_role'] != "admin") {
  325. $_SESSION['return'] = array(
  326. 'type' => 'danger',
  327. 'msg' => sprintf($lang['danger']['access_denied'])
  328. );
  329. return false;
  330. }
  331. if (filter_var($username, FILTER_VALIDATE_EMAIL)) {
  332. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $username)) {
  333. $_SESSION['return'] = array(
  334. 'type' => 'danger',
  335. 'msg' => sprintf($lang['danger']['access_denied'])
  336. );
  337. return false;
  338. }
  339. }
  340. try {
  341. $stmt = $pdo->prepare("SELECT `domain` FROM `mailbox` WHERE `username` = :username");
  342. $stmt->execute(array(':username' => $username));
  343. $domain = $stmt->fetch(PDO::FETCH_ASSOC)['domain'];
  344. }
  345. catch (PDOException $e) {
  346. $_SESSION['return'] = array(
  347. 'type' => 'danger',
  348. 'msg' => 'MySQL: '.$e
  349. );
  350. return false;
  351. }
  352. switch ($postarray["trigger_set_time_limited_aliases"]) {
  353. case "generate":
  354. if (!is_numeric($postarray["validity"]) || $postarray["validity"] > 672) {
  355. $_SESSION['return'] = array(
  356. 'type' => 'danger',
  357. 'msg' => sprintf($lang['danger']['validity_missing'])
  358. );
  359. return false;
  360. }
  361. $validity = strtotime("+".$postarray["validity"]." hour");
  362. $letters = 'abcefghijklmnopqrstuvwxyz1234567890';
  363. $random_name = substr(str_shuffle($letters), 0, 24);
  364. try {
  365. $stmt = $pdo->prepare("INSERT INTO `spamalias` (`address`, `goto`, `validity`) VALUES
  366. (:address, :goto, :validity)");
  367. $stmt->execute(array(
  368. ':address' => $random_name . '@' . $domain,
  369. ':goto' => $username,
  370. ':validity' => $validity
  371. ));
  372. }
  373. catch (PDOException $e) {
  374. $_SESSION['return'] = array(
  375. 'type' => 'danger',
  376. 'msg' => 'MySQL: '.$e
  377. );
  378. return false;
  379. }
  380. $_SESSION['return'] = array(
  381. 'type' => 'success',
  382. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username))
  383. );
  384. break;
  385. case "deleteall":
  386. try {
  387. $stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `goto` = :username");
  388. $stmt->execute(array(
  389. ':username' => $username
  390. ));
  391. }
  392. catch (PDOException $e) {
  393. $_SESSION['return'] = array(
  394. 'type' => 'danger',
  395. 'msg' => 'MySQL: '.$e
  396. );
  397. return false;
  398. }
  399. $_SESSION['return'] = array(
  400. 'type' => 'success',
  401. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username))
  402. );
  403. break;
  404. case "delete":
  405. if (empty($postarray['item']) || !filter_var($postarray['item'], FILTER_VALIDATE_EMAIL)) {
  406. $_SESSION['return'] = array(
  407. 'type' => 'danger',
  408. 'msg' => sprintf($lang['danger']['access_denied'])
  409. );
  410. return false;
  411. }
  412. $item = $postarray['item'];
  413. try {
  414. $stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `goto` = :username AND `address` = :item");
  415. $stmt->execute(array(
  416. ':username' => $username,
  417. ':item' => $item
  418. ));
  419. }
  420. catch (PDOException $e) {
  421. $_SESSION['return'] = array(
  422. 'type' => 'danger',
  423. 'msg' => 'MySQL: '.$e
  424. );
  425. return false;
  426. }
  427. $_SESSION['return'] = array(
  428. 'type' => 'success',
  429. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username))
  430. );
  431. break;
  432. case "extend":
  433. try {
  434. $stmt = $pdo->prepare("UPDATE `spamalias` SET `validity` = (`validity` + 3600)
  435. WHERE `goto` = :username
  436. AND `validity` >= :validity");
  437. $stmt->execute(array(
  438. ':username' => $username,
  439. ':validity' => time(),
  440. ));
  441. }
  442. catch (PDOException $e) {
  443. $_SESSION['return'] = array(
  444. 'type' => 'danger',
  445. 'msg' => 'MySQL: '.$e
  446. );
  447. return false;
  448. }
  449. $_SESSION['return'] = array(
  450. 'type' => 'success',
  451. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username))
  452. );
  453. break;
  454. }
  455. }
  456. function get_time_limited_aliases($username = null) {
  457. // 'username' can be be set, if not, default to mailcow_cc_username
  458. global $lang;
  459. global $pdo;
  460. $data = array();
  461. if (isset($username) && filter_var($username, FILTER_VALIDATE_EMAIL)) {
  462. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $username)) {
  463. $_SESSION['return'] = array(
  464. 'type' => 'danger',
  465. 'msg' => sprintf($lang['danger']['access_denied'])
  466. );
  467. return false;
  468. }
  469. }
  470. else {
  471. $username = $_SESSION['mailcow_cc_username'];
  472. }
  473. try {
  474. $stmt = $pdo->prepare("SELECT `address`,
  475. `goto`,
  476. `validity`
  477. FROM `spamalias`
  478. WHERE `goto` = :username
  479. AND `validity` >= :unixnow");
  480. $stmt->execute(array(':username' => $username, ':unixnow' => time()));
  481. $data = $stmt->fetchAll(PDO::FETCH_ASSOC);
  482. }
  483. catch(PDOException $e) {
  484. $_SESSION['return'] = array(
  485. 'type' => 'danger',
  486. 'msg' => 'MySQL: '.$e
  487. );
  488. }
  489. return $data;
  490. }
  491. function edit_user_account($postarray) {
  492. global $lang;
  493. global $pdo;
  494. if (isset($postarray['username']) && filter_var($postarray['username'], FILTER_VALIDATE_EMAIL)) {
  495. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $postarray['username'])) {
  496. $_SESSION['return'] = array(
  497. 'type' => 'danger',
  498. 'msg' => sprintf($lang['danger']['access_denied'])
  499. );
  500. return false;
  501. }
  502. else {
  503. $username = $postarray['username'];
  504. }
  505. }
  506. else {
  507. $username = $_SESSION['mailcow_cc_username'];
  508. }
  509. $password_old = $postarray['user_old_pass'];
  510. isset($postarray['togglePwNew']) ? $pwnew_active = '1' : $pwnew_active = '0';
  511. if (isset($pwnew_active) && $pwnew_active == "1") {
  512. $password_new = $postarray['user_new_pass'];
  513. $password_new2 = $postarray['user_new_pass2'];
  514. }
  515. if (!check_login($username, $password_old) == "user") {
  516. $_SESSION['return'] = array(
  517. 'type' => 'danger',
  518. 'msg' => sprintf($lang['danger']['access_denied'])
  519. );
  520. return false;
  521. }
  522. if (isset($password_new) && isset($password_new2)) {
  523. if (!empty($password_new2) && !empty($password_new)) {
  524. if ($password_new2 != $password_new) {
  525. $_SESSION['return'] = array(
  526. 'type' => 'danger',
  527. 'msg' => sprintf($lang['danger']['password_mismatch'])
  528. );
  529. return false;
  530. }
  531. if (strlen($password_new) < "6" ||
  532. !preg_match('/[A-Za-z]/', $password_new) ||
  533. !preg_match('/[0-9]/', $password_new)) {
  534. $_SESSION['return'] = array(
  535. 'type' => 'danger',
  536. 'msg' => sprintf($lang['danger']['password_complexity'])
  537. );
  538. return false;
  539. }
  540. $password_hashed = hash_password($password_new);
  541. try {
  542. $stmt = $pdo->prepare("UPDATE `mailbox` SET `modified` = :modified, `password` = :password_hashed WHERE `username` = :username");
  543. $stmt->execute(array(
  544. ':password_hashed' => $password_hashed,
  545. ':modified' => date('Y-m-d H:i:s'),
  546. ':username' => $username
  547. ));
  548. }
  549. catch (PDOException $e) {
  550. $_SESSION['return'] = array(
  551. 'type' => 'danger',
  552. 'msg' => 'MySQL: '.$e
  553. );
  554. return false;
  555. }
  556. }
  557. }
  558. $_SESSION['return'] = array(
  559. 'type' => 'success',
  560. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  561. );
  562. }
  563. function get_spam_score($username = null) {
  564. global $pdo;
  565. $default = "5, 15";
  566. if (isset($username) && filter_var($username, FILTER_VALIDATE_EMAIL)) {
  567. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $username)) {
  568. return false;
  569. }
  570. }
  571. else {
  572. $username = $_SESSION['mailcow_cc_username'];
  573. }
  574. try {
  575. $stmt = $pdo->prepare("SELECT `value` FROM `filterconf` WHERE `object` = :username AND
  576. (`option` = 'lowspamlevel' OR `option` = 'highspamlevel')");
  577. $stmt->execute(array(':username' => $username));
  578. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  579. }
  580. catch(PDOException $e) {
  581. $_SESSION['return'] = array(
  582. 'type' => 'danger',
  583. 'msg' => 'MySQL: '.$e
  584. );
  585. return false;
  586. }
  587. if (empty($num_results)) {
  588. return $default;
  589. }
  590. else {
  591. try {
  592. $stmt = $pdo->prepare("SELECT `value` FROM `filterconf` WHERE `option` = 'highspamlevel' AND `object` = :username");
  593. $stmt->execute(array(':username' => $username));
  594. $highspamlevel = $stmt->fetch(PDO::FETCH_ASSOC);
  595. $stmt = $pdo->prepare("SELECT `value` FROM `filterconf` WHERE `option` = 'lowspamlevel' AND `object` = :username");
  596. $stmt->execute(array(':username' => $username));
  597. $lowspamlevel = $stmt->fetch(PDO::FETCH_ASSOC);
  598. return $lowspamlevel['value'].', '.$highspamlevel['value'];
  599. }
  600. catch(PDOException $e) {
  601. $_SESSION['return'] = array(
  602. 'type' => 'danger',
  603. 'msg' => 'MySQL: '.$e
  604. );
  605. return false;
  606. }
  607. }
  608. }
  609. function edit_spam_score($postarray) {
  610. // Array items
  611. // 'username' can be set, defaults to mailcow_cc_username
  612. // 'lowspamlevel'
  613. // 'highspamlevel'
  614. global $lang;
  615. global $pdo;
  616. if (isset($postarray['username']) && filter_var($postarray['username'], FILTER_VALIDATE_EMAIL)) {
  617. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $postarray['username'])) {
  618. $_SESSION['return'] = array(
  619. 'type' => 'danger',
  620. 'msg' => sprintf($lang['danger']['access_denied'])
  621. );
  622. return false;
  623. }
  624. else {
  625. $username = $postarray['username'];
  626. }
  627. }
  628. else {
  629. $username = $_SESSION['mailcow_cc_username'];
  630. }
  631. $lowspamlevel = explode(',', $postarray['score'])[0];
  632. $highspamlevel = explode(',', $postarray['score'])[1];
  633. if (!is_numeric($lowspamlevel) || !is_numeric($highspamlevel)) {
  634. $_SESSION['return'] = array(
  635. 'type' => 'danger',
  636. 'msg' => sprintf($lang['danger']['access_denied'])
  637. );
  638. return false;
  639. }
  640. try {
  641. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :username
  642. AND (`option` = 'lowspamlevel' OR `option` = 'highspamlevel')");
  643. $stmt->execute(array(
  644. ':username' => $username
  645. ));
  646. $stmt = $pdo->prepare("INSERT INTO `filterconf` (`object`, `option`, `value`)
  647. VALUES (:username, 'highspamlevel', :highspamlevel)");
  648. $stmt->execute(array(
  649. ':username' => $username,
  650. ':highspamlevel' => $highspamlevel
  651. ));
  652. $stmt = $pdo->prepare("INSERT INTO `filterconf` (`object`, `option`, `value`)
  653. VALUES (:username, 'lowspamlevel', :lowspamlevel)");
  654. $stmt->execute(array(
  655. ':username' => $username,
  656. ':lowspamlevel' => $lowspamlevel
  657. ));
  658. }
  659. catch (PDOException $e) {
  660. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :username
  661. AND (`option` = 'lowspamlevel' OR `option` = 'highspamlevel')");
  662. $stmt->execute(array(
  663. ':username' => $username
  664. ));
  665. $_SESSION['return'] = array(
  666. 'type' => 'danger',
  667. 'msg' => 'MySQL: '.$e
  668. );
  669. return false;
  670. }
  671. $_SESSION['return'] = array(
  672. 'type' => 'success',
  673. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  674. );
  675. }
  676. function get_policy_list($object = null) {
  677. // 'object' can be be set, if not, default to mailcow_cc_username
  678. global $lang;
  679. global $pdo;
  680. if (isset($object)) {
  681. if (!filter_var($object, FILTER_VALIDATE_EMAIL) && is_valid_domain_name($object)) {
  682. $object = idn_to_ascii(strtolower(trim($object)));
  683. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $object)) {
  684. $_SESSION['return'] = array(
  685. 'type' => 'danger',
  686. 'msg' => sprintf($lang['danger']['access_denied'])
  687. );
  688. return false;
  689. }
  690. }
  691. elseif (filter_var($object, FILTER_VALIDATE_EMAIL)) {
  692. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $object)) {
  693. $_SESSION['return'] = array(
  694. 'type' => 'danger',
  695. 'msg' => sprintf($lang['danger']['access_denied'])
  696. );
  697. return false;
  698. }
  699. }
  700. }
  701. else {
  702. $object = $_SESSION['mailcow_cc_username'];
  703. }
  704. try {
  705. // WHITELIST
  706. $stmt = $pdo->prepare("SELECT `object`, `value`, `prefid` FROM `filterconf` WHERE `option`='whitelist_from' AND (`object` = :username OR `object` = SUBSTRING_INDEX(:username_domain, '@' ,-1))");
  707. $stmt->execute(array(':username' => $object, ':username_domain' => $object));
  708. $rows['whitelist'] = $stmt->fetchAll(PDO::FETCH_ASSOC);
  709. // BLACKLIST
  710. $stmt = $pdo->prepare("SELECT `object`, `value`, `prefid` FROM `filterconf` WHERE `option`='blacklist_from' AND (`object` = :username OR `object` = SUBSTRING_INDEX(:username_domain, '@' ,-1))");
  711. $stmt->execute(array(':username' => $object, ':username_domain' => $object));
  712. $rows['blacklist'] = $stmt->fetchAll(PDO::FETCH_ASSOC);
  713. }
  714. catch(PDOException $e) {
  715. $_SESSION['return'] = array(
  716. 'type' => 'danger',
  717. 'msg' => 'MySQL: '.$e
  718. );
  719. }
  720. return $rows;
  721. }
  722. function add_policy_list_item($postarray) {
  723. // Array data
  724. // Either 'domain' or 'username' can be be set
  725. // If none of the above is set, default to mailcow_cc_username
  726. //
  727. // If 'delete_prefid' then delete item id
  728. global $lang;
  729. global $pdo;
  730. (isset($postarray['username'])) ? $object = $postarray['username'] : null;
  731. (isset($postarray['domain'])) ? $object = $postarray['domain'] : null;
  732. (!isset($object)) ? $object = $_SESSION['mailcow_cc_username'] : null;
  733. if (is_valid_domain_name($object)) {
  734. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $object)) {
  735. $_SESSION['return'] = array(
  736. 'type' => 'danger',
  737. 'msg' => sprintf($lang['danger']['access_denied'])
  738. );
  739. return false;
  740. }
  741. $object = idn_to_ascii(strtolower(trim($object)));
  742. }
  743. else {
  744. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $object)) {
  745. $_SESSION['return'] = array(
  746. 'type' => 'danger',
  747. 'msg' => sprintf($lang['danger']['access_denied'])
  748. );
  749. return false;
  750. }
  751. }
  752. ($postarray['object_list'] == "bl") ? $object_list = "blacklist_from" : null;
  753. ($postarray['object_list'] == "wl") ? $object_list = "whitelist_from" : null;
  754. $object_from = preg_replace('/\.+/', '.', rtrim(preg_replace("/\.\*/", "*", trim(strtolower($postarray['object_from']))), '.'));
  755. if (!ctype_alnum(str_replace(array('@', '.', '-', '*'), '', $object_from))) {
  756. $_SESSION['return'] = array(
  757. 'type' => 'danger',
  758. 'msg' => sprintf($lang['danger']['policy_list_from_invalid'])
  759. );
  760. return false;
  761. }
  762. if ($object_list != "blacklist_from" && $object_list != "whitelist_from") {
  763. $_SESSION['return'] = array(
  764. 'type' => 'danger',
  765. 'msg' => sprintf($lang['danger']['access_denied'])
  766. );
  767. return false;
  768. }
  769. try {
  770. $stmt = $pdo->prepare("SELECT `object` FROM `filterconf`
  771. WHERE (`option` = 'whitelist_from' OR `option` = 'blacklist_from')
  772. AND `object` = :object
  773. AND `value` = :object_from");
  774. $stmt->execute(array(':object' => $object, ':object_from' => $object_from));
  775. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  776. if ($num_results != 0) {
  777. $_SESSION['return'] = array(
  778. 'type' => 'danger',
  779. 'msg' => sprintf($lang['danger']['policy_list_from_exists'])
  780. );
  781. return false;
  782. }
  783. }
  784. catch(PDOException $e) {
  785. $_SESSION['return'] = array(
  786. 'type' => 'danger',
  787. 'msg' => 'MySQL: '.$e
  788. );
  789. return false;
  790. }
  791. try {
  792. $stmt = $pdo->prepare("INSERT INTO `filterconf` (`object`, `option` ,`value`)
  793. VALUES (:object, :object_list, :object_from)");
  794. $stmt->execute(array(
  795. ':object' => $object,
  796. ':object_list' => $object_list,
  797. ':object_from' => $object_from
  798. ));
  799. }
  800. catch (PDOException $e) {
  801. $_SESSION['return'] = array(
  802. 'type' => 'danger',
  803. 'msg' => 'MySQL: '.$e
  804. );
  805. return false;
  806. }
  807. $_SESSION['return'] = array(
  808. 'type' => 'success',
  809. 'msg' => sprintf($lang['success']['object_modified'], $object)
  810. );
  811. }
  812. function delete_policy_list_item($postarray) {
  813. // Array data
  814. // Either 'domain' or 'username' can be be set
  815. // If none of the above is set, default to mailcow_cc_username
  816. //
  817. // 'delete_prefid' is item to be deleted
  818. global $lang;
  819. global $pdo;
  820. (isset($postarray['username'])) ? $object = $postarray['username'] : null;
  821. (isset($postarray['domain'])) ? $object = $postarray['domain'] : null;
  822. (!isset($object)) ? $object = $_SESSION['mailcow_cc_username'] : null;
  823. if (is_valid_domain_name($object)) {
  824. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $object)) {
  825. $_SESSION['return'] = array(
  826. 'type' => 'danger',
  827. 'msg' => sprintf($lang['danger']['access_denied'])
  828. );
  829. return false;
  830. }
  831. $object = idn_to_ascii(strtolower(trim($object)));
  832. }
  833. else {
  834. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $object)) {
  835. $_SESSION['return'] = array(
  836. 'type' => 'danger',
  837. 'msg' => sprintf($lang['danger']['access_denied'])
  838. );
  839. return false;
  840. }
  841. }
  842. if (!is_numeric($postarray['delete_prefid'])) {
  843. $_SESSION['return'] = array(
  844. 'type' => 'danger',
  845. 'msg' => sprintf($lang['danger']['access_denied'])
  846. );
  847. return false;
  848. }
  849. try {
  850. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :object AND `prefid` = :prefid");
  851. $stmt->execute(array(
  852. ':object' => $object,
  853. ':prefid' => $postarray['delete_prefid']
  854. ));
  855. }
  856. catch (PDOException $e) {
  857. $_SESSION['return'] = array(
  858. 'type' => 'danger',
  859. 'msg' => 'MySQL: '.$e
  860. );
  861. return false;
  862. }
  863. $_SESSION['return'] = array(
  864. 'type' => 'success',
  865. 'msg' => sprintf($lang['success']['object_modified'], $object)
  866. );
  867. return true;
  868. }
  869. function get_syncjobs($username = null) {
  870. // 'username' can be be set, if not, default to mailcow_cc_username
  871. global $lang;
  872. global $pdo;
  873. $data = array();
  874. if (isset($username) && filter_var($username, FILTER_VALIDATE_EMAIL)) {
  875. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $username)) {
  876. $_SESSION['return'] = array(
  877. 'type' => 'danger',
  878. 'msg' => sprintf($lang['danger']['access_denied'])
  879. );
  880. return false;
  881. }
  882. }
  883. else {
  884. $username = $_SESSION['mailcow_cc_username'];
  885. }
  886. try {
  887. $stmt = $pdo->prepare("SELECT *, CONCAT(LEFT(`password1`, 3), '…') as `password1_short`
  888. FROM `imapsync`
  889. WHERE `user2` = :username");
  890. $stmt->execute(array(':username' => $username));
  891. $data = $stmt->fetchAll(PDO::FETCH_ASSOC);
  892. }
  893. catch(PDOException $e) {
  894. $_SESSION['return'] = array(
  895. 'type' => 'danger',
  896. 'msg' => 'MySQL: '.$e
  897. );
  898. }
  899. return $data;
  900. }
  901. function get_syncjob_details($id) {
  902. global $lang;
  903. global $pdo;
  904. $syncjobdetails = array();
  905. if ($_SESSION['mailcow_cc_role'] != "user" &&
  906. $_SESSION['mailcow_cc_role'] != "admin") {
  907. $_SESSION['return'] = array(
  908. 'type' => 'danger',
  909. 'msg' => sprintf($lang['danger']['access_denied'])
  910. );
  911. return false;
  912. }
  913. if (!is_numeric($id)) {
  914. $_SESSION['return'] = array(
  915. 'type' => 'danger',
  916. 'msg' => sprintf($lang['danger']['access_denied'])
  917. );
  918. return false;
  919. }
  920. try {
  921. $stmt = $pdo->prepare("SELECT * FROM `imapsync` WHERE (`user2` = :username OR 'admin' = :role) AND id = :id");
  922. $stmt->execute(array(':id' => $id, ':role' => $_SESSION['mailcow_cc_role'], ':username' => $_SESSION['mailcow_cc_username']));
  923. $syncjobdetails = $stmt->fetch(PDO::FETCH_ASSOC);
  924. }
  925. catch(PDOException $e) {
  926. $_SESSION['return'] = array(
  927. 'type' => 'danger',
  928. 'msg' => 'MySQL: '.$e
  929. );
  930. }
  931. return $syncjobdetails;
  932. }
  933. function delete_syncjob($postarray) {
  934. // Array items
  935. // 'username' can be set, defaults to mailcow_cc_username
  936. global $lang;
  937. global $pdo;
  938. if (isset($postarray['username']) && filter_var($postarray['username'], FILTER_VALIDATE_EMAIL)) {
  939. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $postarray['username'])) {
  940. $_SESSION['return'] = array(
  941. 'type' => 'danger',
  942. 'msg' => sprintf($lang['danger']['access_denied'])
  943. );
  944. return false;
  945. }
  946. else {
  947. $username = $postarray['username'];
  948. }
  949. }
  950. else {
  951. $username = $_SESSION['mailcow_cc_username'];
  952. }
  953. $id = $postarray['id'];
  954. if (!is_numeric($id)) {
  955. $_SESSION['return'] = array(
  956. 'type' => 'danger',
  957. 'msg' => sprintf($lang['danger']['access_denied'])
  958. );
  959. return false;
  960. }
  961. try {
  962. $stmt = $pdo->prepare("DELETE FROM `imapsync` WHERE `user2` = :username AND `id`= :id");
  963. $stmt->execute(array(
  964. ':username' => $username,
  965. ':id' => $id,
  966. ));
  967. }
  968. catch (PDOException $e) {
  969. $_SESSION['return'] = array(
  970. 'type' => 'danger',
  971. 'msg' => 'MySQL: '.$e
  972. );
  973. return false;
  974. }
  975. $_SESSION['return'] = array(
  976. 'type' => 'success',
  977. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username))
  978. );
  979. return true;
  980. }
  981. function add_syncjob($postarray) {
  982. // Array items
  983. // 'username' can be set, defaults to mailcow_cc_username
  984. global $lang;
  985. global $pdo;
  986. if (isset($postarray['username']) && filter_var($postarray['username'], FILTER_VALIDATE_EMAIL)) {
  987. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $postarray['username'])) {
  988. $_SESSION['return'] = array(
  989. 'type' => 'danger',
  990. 'msg' => sprintf($lang['danger']['access_denied'])
  991. );
  992. return false;
  993. }
  994. else {
  995. $username = $postarray['username'];
  996. }
  997. }
  998. else {
  999. $username = $_SESSION['mailcow_cc_username'];
  1000. }
  1001. isset($postarray['active']) ? $active = '1' : $active = '0';
  1002. isset($postarray['delete2duplicates']) ? $delete2duplicates = '1' : $delete2duplicates = '0';
  1003. $port1 = $postarray['port1'];
  1004. $host1 = $postarray['host1'];
  1005. $password1 = $postarray['password1'];
  1006. $exclude = $postarray['exclude'];
  1007. $maxage = $postarray['maxage'];
  1008. $subfolder2 = $postarray['subfolder2'];
  1009. $user1 = $postarray['user1'];
  1010. $mins_interval = $postarray['mins_interval'];
  1011. $enc1 = $postarray['enc1'];
  1012. if (empty($subfolder2)) {
  1013. $subfolder2 = "";
  1014. }
  1015. if (!isset($maxage) || !filter_var($maxage, FILTER_VALIDATE_INT, array('options' => array('min_range' => 1, 'max_range' => 32767)))) {
  1016. $maxage = "0";
  1017. }
  1018. if (!filter_var($port1, FILTER_VALIDATE_INT, array('options' => array('min_range' => 1, 'max_range' => 65535)))) {
  1019. $_SESSION['return'] = array(
  1020. 'type' => 'danger',
  1021. 'msg' => sprintf($lang['danger']['access_denied'])
  1022. );
  1023. return false;
  1024. }
  1025. if (!filter_var($mins_interval, FILTER_VALIDATE_INT, array('options' => array('min_range' => 10, 'max_range' => 3600)))) {
  1026. $_SESSION['return'] = array(
  1027. 'type' => 'danger',
  1028. 'msg' => sprintf($lang['danger']['access_denied'])
  1029. );
  1030. return false;
  1031. }
  1032. if (!is_valid_domain_name($host1)) {
  1033. $_SESSION['return'] = array(
  1034. 'type' => 'danger',
  1035. 'msg' => sprintf($lang['danger']['access_denied'])
  1036. );
  1037. return false;
  1038. }
  1039. if ($enc1 != "TLS" && $enc1 != "SSL" && $enc1 != "PLAIN") {
  1040. $_SESSION['return'] = array(
  1041. 'type' => 'danger',
  1042. 'msg' => sprintf($lang['danger']['access_denied'])
  1043. );
  1044. return false;
  1045. }
  1046. if (@preg_match("/" . $exclude . "/", null) === false) {
  1047. $_SESSION['return'] = array(
  1048. 'type' => 'danger',
  1049. 'msg' => sprintf($lang['danger']['access_denied'])
  1050. );
  1051. return false;
  1052. }
  1053. try {
  1054. $stmt = $pdo->prepare("SELECT `user2`, `user1` FROM `imapsync`
  1055. WHERE `user2` = :user2 AND `user1` = :user1");
  1056. $stmt->execute(array(':user1' => $user1, ':user2' => $username));
  1057. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  1058. }
  1059. catch(PDOException $e) {
  1060. $_SESSION['return'] = array(
  1061. 'type' => 'danger',
  1062. 'msg' => 'MySQL: '.$e
  1063. );
  1064. return false;
  1065. }
  1066. if ($num_results != 0) {
  1067. $_SESSION['return'] = array(
  1068. 'type' => 'danger',
  1069. 'msg' => sprintf($lang['danger']['object_exists'], htmlspecialchars($host1 . ' / ' . $user1))
  1070. );
  1071. return false;
  1072. }
  1073. try {
  1074. $stmt = $pdo->prepare("INSERT INTO `imapsync` (`user2`, `exclude`, `maxage`, `subfolder2`, `host1`, `authmech1`, `user1`, `password1`, `mins_interval`, `port1`, `enc1`, `delete2duplicates`, `active`)
  1075. VALUES (:user2, :exclude, :maxage, :subfolder2, :host1, :authmech1, :user1, :password1, :mins_interval, :port1, :enc1, :delete2duplicates, :active)");
  1076. $stmt->execute(array(
  1077. ':user2' => $username,
  1078. ':exclude' => $exclude,
  1079. ':maxage' => $maxage,
  1080. ':subfolder2' => $subfolder2,
  1081. ':host1' => $host1,
  1082. ':authmech1' => 'PLAIN',
  1083. ':user1' => $user1,
  1084. ':password1' => $password1,
  1085. ':mins_interval' => $mins_interval,
  1086. ':port1' => $port1,
  1087. ':enc1' => $enc1,
  1088. ':delete2duplicates' => $delete2duplicates,
  1089. ':active' => $active,
  1090. ));
  1091. }
  1092. catch(PDOException $e) {
  1093. $_SESSION['return'] = array(
  1094. 'type' => 'danger',
  1095. 'msg' => 'MySQL: '.$e
  1096. );
  1097. return false;
  1098. }
  1099. $_SESSION['return'] = array(
  1100. 'type' => 'success',
  1101. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  1102. );
  1103. return true;
  1104. }
  1105. function edit_syncjob($postarray) {
  1106. // Array items
  1107. // 'username' can be set, defaults to mailcow_cc_username
  1108. global $lang;
  1109. global $pdo;
  1110. if (isset($postarray['username']) && filter_var($postarray['username'], FILTER_VALIDATE_EMAIL)) {
  1111. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $postarray['username'])) {
  1112. $_SESSION['return'] = array(
  1113. 'type' => 'danger',
  1114. 'msg' => sprintf($lang['danger']['access_denied'])
  1115. );
  1116. return false;
  1117. }
  1118. else {
  1119. $username = $postarray['username'];
  1120. }
  1121. }
  1122. else {
  1123. $username = $_SESSION['mailcow_cc_username'];
  1124. }
  1125. isset($postarray['active']) ? $active = '1' : $active = '0';
  1126. isset($postarray['delete2duplicates']) ? $delete2duplicates = '1' : $delete2duplicates = '0';
  1127. $id = $postarray['id'];
  1128. $port1 = $postarray['port1'];
  1129. $host1 = $postarray['host1'];
  1130. $password1 = $postarray['password1'];
  1131. $exclude = $postarray['exclude'];
  1132. $maxage = $postarray['maxage'];
  1133. $subfolder2 = $postarray['subfolder2'];
  1134. $user1 = $postarray['user1'];
  1135. $mins_interval = $postarray['mins_interval'];
  1136. $enc1 = $postarray['enc1'];
  1137. if (empty($subfolder2)) {
  1138. $subfolder2 = "";
  1139. }
  1140. if (!isset($maxage) || !filter_var($maxage, FILTER_VALIDATE_INT, array('options' => array('min_range' => 1, 'max_range' => 32767)))) {
  1141. $maxage = "0";
  1142. }
  1143. if (!filter_var($port1, FILTER_VALIDATE_INT, array('options' => array('min_range' => 1, 'max_range' => 65535)))) {
  1144. $_SESSION['return'] = array(
  1145. 'type' => 'danger',
  1146. 'msg' => sprintf($lang['danger']['access_denied'])
  1147. );
  1148. return false;
  1149. }
  1150. if (!filter_var($mins_interval, FILTER_VALIDATE_INT, array('options' => array('min_range' => 10, 'max_range' => 3600)))) {
  1151. $_SESSION['return'] = array(
  1152. 'type' => 'danger',
  1153. 'msg' => sprintf($lang['danger']['access_denied'])
  1154. );
  1155. return false;
  1156. }
  1157. if (!is_valid_domain_name($host1)) {
  1158. $_SESSION['return'] = array(
  1159. 'type' => 'danger',
  1160. 'msg' => sprintf($lang['danger']['access_denied'])
  1161. );
  1162. return false;
  1163. }
  1164. if ($enc1 != "TLS" && $enc1 != "SSL" && $enc1 != "PLAIN") {
  1165. $_SESSION['return'] = array(
  1166. 'type' => 'danger',
  1167. 'msg' => sprintf($lang['danger']['access_denied'])
  1168. );
  1169. return false;
  1170. }
  1171. if (@preg_match("/" . $exclude . "/", null) === false) {
  1172. $_SESSION['return'] = array(
  1173. 'type' => 'danger',
  1174. 'msg' => sprintf($lang['danger']['access_denied'])
  1175. );
  1176. return false;
  1177. }
  1178. try {
  1179. $stmt = $pdo->prepare("SELECT `user2` FROM `imapsync`
  1180. WHERE `user2` = :user2 AND `id` = :id");
  1181. $stmt->execute(array(':user2' => $username, ':id' => $id));
  1182. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  1183. }
  1184. catch(PDOException $e) {
  1185. $_SESSION['return'] = array(
  1186. 'type' => 'danger',
  1187. 'msg' => 'MySQL: '.$e
  1188. );
  1189. return false;
  1190. }
  1191. if (empty($num_results)) {
  1192. $_SESSION['return'] = array(
  1193. 'type' => 'danger',
  1194. 'msg' => sprintf($lang['danger']['access_denied'])
  1195. );
  1196. return false;
  1197. }
  1198. try {
  1199. $stmt = $pdo->prepare("UPDATE `imapsync` set `maxage` = :maxage, `subfolder2` = :subfolder2, `exclude` = :exclude, `host1` = :host1, `user1` = :user1, `password1` = :password1, `mins_interval` = :mins_interval, `port1` = :port1, `enc1` = :enc1, `delete2duplicates` = :delete2duplicates, `active` = :active
  1200. WHERE `user2` = :user2 AND `id` = :id");
  1201. $stmt->execute(array(
  1202. ':user2' => $username,
  1203. ':id' => $id,
  1204. ':exclude' => $exclude,
  1205. ':maxage' => $maxage,
  1206. ':subfolder2' => $subfolder2,
  1207. ':host1' => $host1,
  1208. ':user1' => $user1,
  1209. ':password1' => $password1,
  1210. ':mins_interval' => $mins_interval,
  1211. ':port1' => $port1,
  1212. ':enc1' => $enc1,
  1213. ':delete2duplicates' => $delete2duplicates,
  1214. ':active' => $active,
  1215. ));
  1216. }
  1217. catch(PDOException $e) {
  1218. $_SESSION['return'] = array(
  1219. 'type' => 'danger',
  1220. 'msg' => 'MySQL: '.$e
  1221. );
  1222. return false;
  1223. }
  1224. $_SESSION['return'] = array(
  1225. 'type' => 'success',
  1226. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  1227. );
  1228. return true;
  1229. }
  1230. function edit_tls_policy($postarray) {
  1231. global $lang;
  1232. global $pdo;
  1233. if (isset($postarray['username']) && filter_var($postarray['username'], FILTER_VALIDATE_EMAIL)) {
  1234. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $postarray['username'])) {
  1235. $_SESSION['return'] = array(
  1236. 'type' => 'danger',
  1237. 'msg' => sprintf($lang['danger']['access_denied'])
  1238. );
  1239. return false;
  1240. }
  1241. else {
  1242. $username = $postarray['username'];
  1243. }
  1244. }
  1245. else {
  1246. $username = $_SESSION['mailcow_cc_username'];
  1247. }
  1248. isset($postarray['tls_in']) ? $tls_in = '1' : $tls_in = '0';
  1249. isset($postarray['tls_out']) ? $tls_out = '1' : $tls_out = '0';
  1250. $username = $_SESSION['mailcow_cc_username'];
  1251. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  1252. $_SESSION['return'] = array(
  1253. 'type' => 'danger',
  1254. 'msg' => sprintf($lang['danger']['username_invalid'])
  1255. );
  1256. return false;
  1257. }
  1258. try {
  1259. $stmt = $pdo->prepare("UPDATE `mailbox` SET `tls_enforce_out` = :tls_out, `tls_enforce_in` = :tls_in WHERE `username` = :username");
  1260. $stmt->execute(array(
  1261. ':tls_out' => $tls_out,
  1262. ':tls_in' => $tls_in,
  1263. ':username' => $username
  1264. ));
  1265. }
  1266. catch (PDOException $e) {
  1267. $_SESSION['return'] = array(
  1268. 'type' => 'danger',
  1269. 'msg' => 'MySQL: '.$e
  1270. );
  1271. return false;
  1272. }
  1273. $_SESSION['return'] = array(
  1274. 'type' => 'success',
  1275. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  1276. );
  1277. }
  1278. function get_tls_policy($username = null) {
  1279. global $lang;
  1280. global $pdo;
  1281. $data = array();
  1282. if (isset($username) && filter_var($username, FILTER_VALIDATE_EMAIL)) {
  1283. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $username)) {
  1284. $_SESSION['return'] = array(
  1285. 'type' => 'danger',
  1286. 'msg' => sprintf($lang['danger']['access_denied'])
  1287. );
  1288. return false;
  1289. }
  1290. }
  1291. else {
  1292. $username = $_SESSION['mailcow_cc_username'];
  1293. }
  1294. try {
  1295. $stmt = $pdo->prepare("SELECT `tls_enforce_out`, `tls_enforce_in` FROM `mailbox` WHERE `username` = :username");
  1296. $stmt->execute(array(':username' => $username));
  1297. $data = $stmt->fetch(PDO::FETCH_ASSOC);
  1298. }
  1299. catch(PDOException $e) {
  1300. $_SESSION['return'] = array(
  1301. 'type' => 'danger',
  1302. 'msg' => 'MySQL: '.$e
  1303. );
  1304. return false;
  1305. }
  1306. return $data;
  1307. }
  1308. function edit_delimiter_action($postarray) {
  1309. // Array items
  1310. // 'username' can be set, defaults to mailcow_cc_username
  1311. global $lang;
  1312. global $pdo;
  1313. if (isset($postarray['username']) && filter_var($postarray['username'], FILTER_VALIDATE_EMAIL)) {
  1314. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $postarray['username'])) {
  1315. $_SESSION['return'] = array(
  1316. 'type' => 'danger',
  1317. 'msg' => sprintf($lang['danger']['access_denied'])
  1318. );
  1319. return false;
  1320. }
  1321. else {
  1322. $username = $postarray['username'];
  1323. }
  1324. }
  1325. else {
  1326. $username = $_SESSION['mailcow_cc_username'];
  1327. }
  1328. ($postarray['tagged_mail_handler'] == "subject") ? $wants_tagged_subject = '1' : $wants_tagged_subject = '0';
  1329. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  1330. $_SESSION['return'] = array(
  1331. 'type' => 'danger',
  1332. 'msg' => sprintf($lang['danger']['username_invalid'])
  1333. );
  1334. return false;
  1335. }
  1336. try {
  1337. $stmt = $pdo->prepare("UPDATE `mailbox` SET `wants_tagged_subject` = :wants_tagged_subject WHERE `username` = :username");
  1338. $stmt->execute(array(':username' => $username, ':wants_tagged_subject' => $wants_tagged_subject));
  1339. $SelectData = $stmt->fetch(PDO::FETCH_ASSOC);
  1340. }
  1341. catch(PDOException $e) {
  1342. $_SESSION['return'] = array(
  1343. 'type' => 'danger',
  1344. 'msg' => 'MySQL: '.$e
  1345. );
  1346. return false;
  1347. }
  1348. $_SESSION['return'] = array(
  1349. 'type' => 'success',
  1350. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  1351. );
  1352. return true;
  1353. }
  1354. function get_delimiter_action($username = null) {
  1355. // 'username' can be set, defaults to mailcow_cc_username
  1356. global $lang;
  1357. global $pdo;
  1358. $data = array();
  1359. if (isset($username) && filter_var($username, FILTER_VALIDATE_EMAIL)) {
  1360. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $username)) {
  1361. return false;
  1362. }
  1363. }
  1364. else {
  1365. $username = $_SESSION['mailcow_cc_username'];
  1366. }
  1367. try {
  1368. $stmt = $pdo->prepare("SELECT `wants_tagged_subject` FROM `mailbox` WHERE `username` = :username");
  1369. $stmt->execute(array(':username' => $username));
  1370. $data = $stmt->fetch(PDO::FETCH_ASSOC);
  1371. }
  1372. catch(PDOException $e) {
  1373. $_SESSION['return'] = array(
  1374. 'type' => 'danger',
  1375. 'msg' => 'MySQL: '.$e
  1376. );
  1377. return false;
  1378. }
  1379. return $data;
  1380. }
  1381. function user_get_alias_details($username) {
  1382. global $lang;
  1383. global $pdo;
  1384. if ($_SESSION['mailcow_cc_role'] == "user") {
  1385. $username = $_SESSION['mailcow_cc_username'];
  1386. }
  1387. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  1388. return false;
  1389. }
  1390. try {
  1391. $data['address'] = $username;
  1392. $stmt = $pdo->prepare("SELECT IFNULL(GROUP_CONCAT(`address` SEPARATOR ', '), '&#10008;') AS `aliases` FROM `alias` WHERE `goto` = :username_goto AND `address` NOT LIKE '@%' AND `address` != :username_address");
  1393. $stmt->execute(array(':username_goto' => $username, ':username_address' => $username));
  1394. $run = $stmt->fetchAll(PDO::FETCH_ASSOC);
  1395. while ($row = array_shift($run)) {
  1396. $data['aliases'] = $row['aliases'];
  1397. }
  1398. $stmt = $pdo->prepare("SELECT IFNULL(GROUP_CONCAT(local_part, '@', alias_domain SEPARATOR ', '), '&#10008;') AS `ad_alias` FROM `mailbox`
  1399. LEFT OUTER JOIN `alias_domain` on `target_domain` = `domain`
  1400. WHERE `username` = :username ;");
  1401. $stmt->execute(array(':username' => $username));
  1402. $run = $stmt->fetchAll(PDO::FETCH_ASSOC);
  1403. while ($row = array_shift($run)) {
  1404. $data['ad_alias'] = $row['ad_alias'];
  1405. }
  1406. $stmt = $pdo->prepare("SELECT IFNULL(GROUP_CONCAT(`send_as` SEPARATOR ', '), '&#10008;') AS `send_as` FROM `sender_acl` WHERE `logged_in_as` = :username AND `send_as` NOT LIKE '@%';");
  1407. $stmt->execute(array(':username' => $username));
  1408. $run = $stmt->fetchAll(PDO::FETCH_ASSOC);
  1409. while ($row = array_shift($run)) {
  1410. $data['aliases_also_send_as'] = $row['send_as'];
  1411. }
  1412. $stmt = $pdo->prepare("SELECT IFNULL(GROUP_CONCAT(`send_as` SEPARATOR ', '), '&#10008;') AS `send_as` FROM `sender_acl` WHERE `logged_in_as` = :username AND `send_as` LIKE '@%';");
  1413. $stmt->execute(array(':username' => $username));
  1414. $run = $stmt->fetchAll(PDO::FETCH_ASSOC);
  1415. while ($row = array_shift($run)) {
  1416. $data['aliases_send_as_all'] = $row['send_as'];
  1417. }
  1418. $stmt = $pdo->prepare("SELECT IFNULL(GROUP_CONCAT(`address` SEPARATOR ', '), '&#10008;') as `address` FROM `alias` WHERE `goto` = :username AND `address` LIKE '@%';");
  1419. $stmt->execute(array(':username' => $username));
  1420. $run = $stmt->fetchAll(PDO::FETCH_ASSOC);
  1421. while ($row = array_shift($run)) {
  1422. $data['is_catch_all'] = $row['address'];
  1423. }
  1424. return $data;
  1425. }
  1426. catch(PDOException $e) {
  1427. $_SESSION['return'] = array(
  1428. 'type' => 'danger',
  1429. 'msg' => 'MySQL: '.$e
  1430. );
  1431. return false;
  1432. }
  1433. }
  1434. function is_valid_domain_name($domain_name) {
  1435. if (empty($domain_name)) {
  1436. return false;
  1437. }
  1438. $domain_name = idn_to_ascii($domain_name);
  1439. return (preg_match("/^([a-z\d](-*[a-z\d])*)(\.([a-z\d](-*[a-z\d])*))*$/i", $domain_name)
  1440. && preg_match("/^.{1,253}$/", $domain_name)
  1441. && preg_match("/^[^\.]{1,63}(\.[^\.]{1,63})*$/", $domain_name));
  1442. }
  1443. ?>