functions.app_passwd.inc.php 8.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230
  1. <?php
  2. function app_passwd($_action, $_data = null) {
  3. global $pdo;
  4. global $lang;
  5. $_data_log = $_data;
  6. !isset($_data_log['app_passwd']) ?: $_data_log['app_passwd'] = '*';
  7. !isset($_data_log['app_passwd2']) ?: $_data_log['app_passwd2'] = '*';
  8. if (isset($_data['username']) && filter_var($_data['username'], FILTER_VALIDATE_EMAIL)) {
  9. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data['username'])) {
  10. $_SESSION['return'][] = array(
  11. 'type' => 'danger',
  12. 'log' => array(__FUNCTION__, $_action, $_data_log),
  13. 'msg' => 'access_denied'
  14. );
  15. return false;
  16. }
  17. else {
  18. $username = $_data['username'];
  19. }
  20. }
  21. else {
  22. $username = $_SESSION['mailcow_cc_username'];
  23. }
  24. switch ($_action) {
  25. case 'add':
  26. $app_name = htmlspecialchars(trim($_data['app_name']));
  27. $password = $_data['app_passwd'];
  28. $password2 = $_data['app_passwd2'];
  29. $active = intval($_data['active']);
  30. $protocols = (array)$_data['protocols'];
  31. $imap_access = (in_array('imap_access', $protocols)) ? 1 : 0;
  32. $dav_access = (in_array('dav_access', $protocols)) ? 1 : 0;
  33. $smtp_access = (in_array('smtp_access', $protocols)) ? 1 : 0;
  34. $eas_access = (in_array('eas_access', $protocols)) ? 1 : 0;
  35. $domain = mailbox('get', 'mailbox_details', $username)['domain'];
  36. if (empty($domain)) {
  37. $_SESSION['return'][] = array(
  38. 'type' => 'danger',
  39. 'log' => array(__FUNCTION__, $_action, $_data_log),
  40. 'msg' => 'access_denied'
  41. );
  42. return false;
  43. }
  44. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) {
  45. $_SESSION['return'][] = array(
  46. 'type' => 'danger',
  47. 'log' => array(__FUNCTION__, $_action, $_data_log),
  48. 'msg' => 'password_complexity'
  49. );
  50. return false;
  51. }
  52. if ($password != $password2) {
  53. $_SESSION['return'][] = array(
  54. 'type' => 'danger',
  55. 'log' => array(__FUNCTION__, $_action, $_data_log),
  56. 'msg' => 'password_mismatch'
  57. );
  58. return false;
  59. }
  60. $password_hashed = hash_password($password);
  61. if (empty($app_name)) {
  62. $_SESSION['return'][] = array(
  63. 'type' => 'danger',
  64. 'log' => array(__FUNCTION__, $_action, $_data_log),
  65. 'msg' => 'app_name_empty'
  66. );
  67. return false;
  68. }
  69. $stmt = $pdo->prepare("INSERT INTO `app_passwd` (`name`, `mailbox`, `domain`, `password`, `imap_access`, `smtp_access`, `eas_access`, `dav_access`, `active`)
  70. VALUES (:app_name, :mailbox, :domain, :password, :imap_access, :smtp_access, :eas_access, :dav_access, :active)");
  71. $stmt->execute(array(
  72. ':app_name' => $app_name,
  73. ':mailbox' => $username,
  74. ':domain' => $domain,
  75. ':password' => $password_hashed,
  76. ':imap_access' => $imap_access,
  77. ':smtp_access' => $smtp_access,
  78. ':eas_access' => $eas_access,
  79. ':dav_access' => $dav_access,
  80. ':active' => $active
  81. ));
  82. $_SESSION['return'][] = array(
  83. 'type' => 'success',
  84. 'log' => array(__FUNCTION__, $_action, $_data_log),
  85. 'msg' => 'app_passwd_added'
  86. );
  87. break;
  88. case 'edit':
  89. $ids = (array)$_data['id'];
  90. foreach ($ids as $id) {
  91. $is_now = app_passwd('details', $id);
  92. if (!empty($is_now)) {
  93. $app_name = (!empty($_data['app_name'])) ? $_data['app_name'] : $is_now['name'];
  94. $password = (!empty($_data['password'])) ? $_data['password'] : null;
  95. $password2 = (!empty($_data['password2'])) ? $_data['password2'] : null;
  96. if (isset($_data['protocols'])) {
  97. $protocols = (array)$_data['protocols'];
  98. $imap_access = (in_array('imap_access', $protocols)) ? 1 : 0;
  99. $dav_access = (in_array('dav_access', $protocols)) ? 1 : 0;
  100. $smtp_access = (in_array('smtp_access', $protocols)) ? 1 : 0;
  101. $eas_access = (in_array('eas_access', $protocols)) ? 1 : 0;
  102. }
  103. else {
  104. $imap_access = $is_now['imap_access'];
  105. $smtp_access = $is_now['smtp_access'];
  106. $dav_access = $is_now['dav_access'];
  107. $eas_access = $is_now['eas_access'];
  108. }
  109. $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active'];
  110. }
  111. else {
  112. $_SESSION['return'][] = array(
  113. 'type' => 'danger',
  114. 'log' => array(__FUNCTION__, $_action, $_data_log),
  115. 'msg' => array('app_passwd_id_invalid', $id)
  116. );
  117. continue;
  118. }
  119. $app_name = htmlspecialchars(trim($app_name));
  120. if (!empty($password) && !empty($password2)) {
  121. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) {
  122. $_SESSION['return'][] = array(
  123. 'type' => 'danger',
  124. 'log' => array(__FUNCTION__, $_action, $_type, $_data_log, $_attr),
  125. 'msg' => 'password_complexity'
  126. );
  127. continue;
  128. }
  129. if ($password != $password2) {
  130. $_SESSION['return'][] = array(
  131. 'type' => 'danger',
  132. 'log' => array(__FUNCTION__, $_action, $_type, $_data_log, $_attr),
  133. 'msg' => 'password_mismatch'
  134. );
  135. continue;
  136. }
  137. $password_hashed = hash_password($password);
  138. $stmt = $pdo->prepare("UPDATE `app_passwd` SET
  139. `password` = :password_hashed
  140. WHERE `mailbox` = :username AND `id` = :id");
  141. $stmt->execute(array(
  142. ':password_hashed' => $password_hashed,
  143. ':username' => $username,
  144. ':id' => $id
  145. ));
  146. }
  147. $stmt = $pdo->prepare("UPDATE `app_passwd` SET
  148. `name` = :app_name,
  149. `mailbox` = :username,
  150. `imap_access` = :imap_access,
  151. `smtp_access` = :smtp_access,
  152. `eas_access` = :eas_access,
  153. `dav_access` = :dav_access,
  154. `active` = :active
  155. WHERE `id` = :id");
  156. $stmt->execute(array(
  157. ':app_name' => $app_name,
  158. ':username' => $username,
  159. ':imap_access' => $imap_access,
  160. ':smtp_access' => $smtp_access,
  161. ':eas_access' => $eas_access,
  162. ':dav_access' => $dav_access,
  163. ':active' => $active,
  164. ':id' => $id
  165. ));
  166. $_SESSION['return'][] = array(
  167. 'type' => 'success',
  168. 'log' => array(__FUNCTION__, $_action, $_data_log),
  169. 'msg' => array('object_modified', htmlspecialchars(implode(', ', $ids)))
  170. );
  171. }
  172. break;
  173. case 'delete':
  174. $ids = (array)$_data['id'];
  175. foreach ($ids as $id) {
  176. $stmt = $pdo->prepare("SELECT `mailbox` FROM `app_passwd` WHERE `id` = :id");
  177. $stmt->execute(array(':id' => $id));
  178. $mailbox = $stmt->fetch(PDO::FETCH_ASSOC)['mailbox'];
  179. if (empty($mailbox)) {
  180. $_SESSION['return'][] = array(
  181. 'type' => 'danger',
  182. 'log' => array(__FUNCTION__, $_action, $_data_log),
  183. 'msg' => 'app_passwd_id_invalid'
  184. );
  185. return false;
  186. }
  187. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $mailbox)) {
  188. $_SESSION['return'][] = array(
  189. 'type' => 'danger',
  190. 'log' => array(__FUNCTION__, $_action, $_data_log),
  191. 'msg' => 'access_denied'
  192. );
  193. return false;
  194. }
  195. $stmt = $pdo->prepare("DELETE FROM `app_passwd` WHERE `id`= :id");
  196. $stmt->execute(array(':id' => $id));
  197. $_SESSION['return'][] = array(
  198. 'type' => 'success',
  199. 'log' => array(__FUNCTION__, $_action, $_data_log),
  200. 'msg' => array('app_passwd_removed', htmlspecialchars($id))
  201. );
  202. }
  203. break;
  204. case 'get':
  205. $app_passwds = array();
  206. $stmt = $pdo->prepare("SELECT `id`, `name` FROM `app_passwd` WHERE `mailbox` = :username");
  207. $stmt->execute(array(':username' => $username));
  208. $app_passwds = $stmt->fetchAll(PDO::FETCH_ASSOC);
  209. return $app_passwds;
  210. break;
  211. case 'details':
  212. $app_passwd_data = array();
  213. $stmt = $pdo->prepare("SELECT *
  214. FROM `app_passwd`
  215. WHERE `id` = :id");
  216. $stmt->execute(array(':id' => $_data));
  217. $app_passwd_data = $stmt->fetch(PDO::FETCH_ASSOC);
  218. if (empty($app_passwd_data)) {
  219. return false;
  220. }
  221. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $app_passwd_data['mailbox'])) {
  222. $app_passwd_data = array();
  223. return false;
  224. }
  225. $app_passwd_data['name'] = htmlspecialchars(trim($app_passwd_data['name']));
  226. return $app_passwd_data;
  227. break;
  228. }
  229. }