2
0

functions.inc.php 75 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607
  1. <?php
  2. function hash_password($password) {
  3. $salt_str = bin2hex(openssl_random_pseudo_bytes(8));
  4. return "{SSHA256}".base64_encode(hash('sha256', $password . $salt_str, true) . $salt_str);
  5. }
  6. function hasDomainAccess($username, $role, $domain) {
  7. global $pdo;
  8. if (!filter_var($username, FILTER_VALIDATE_EMAIL) && !ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
  9. return false;
  10. }
  11. if (!is_valid_domain_name($domain)) {
  12. return false;
  13. }
  14. try {
  15. $stmt = $pdo->prepare("SELECT `domain` FROM `domain_admins`
  16. WHERE (
  17. `active`='1'
  18. AND `username` = :username
  19. AND `domain` = :domain
  20. )
  21. OR 'admin' = :role");
  22. $stmt->execute(array(':username' => $username, ':domain' => $domain, ':role' => $role));
  23. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  24. } catch(PDOException $e) {
  25. error_log($e);
  26. return false;
  27. }
  28. if ($num_results != 0 && !empty($num_results)) {
  29. return true;
  30. }
  31. return false;
  32. }
  33. function init_db_schema() {
  34. global $pdo;
  35. try {
  36. $stmt = $pdo->prepare("SELECT `username` FROM `admin`");
  37. $stmt->execute();
  38. }
  39. catch (Exception $e) {
  40. $lines = file('/web/inc/init.sql');
  41. $data = '';
  42. foreach ($lines as $line) {
  43. if (substr($line, 0, 2) == '--' || $line == '') {
  44. continue;
  45. }
  46. $data .= $line;
  47. if (substr(trim($line), -1, 1) == ';') {
  48. $pdo->query($data);
  49. $data = '';
  50. }
  51. }
  52. $stmt = $pdo->query("SHOW INDEX FROM sogo_acl WHERE KEY_NAME = 'sogo_acl_c_folder_id_idx'");
  53. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  54. if ($num_results == 0) {
  55. $pdo->query("CREATE INDEX sogo_acl_c_folder_id_idx ON sogo_acl(c_folder_id)");
  56. }
  57. $stmt = $pdo->query("SHOW INDEX FROM sogo_acl WHERE KEY_NAME = 'sogo_acl_c_uid_idx'");
  58. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  59. if ($num_results == 0) {
  60. $pdo->query("CREATE INDEX sogo_acl_c_uid_idx ON sogo_acl(c_uid)");
  61. }
  62. $_SESSION['return'] = array(
  63. 'type' => 'success',
  64. 'msg' => 'Database initialization completed.'
  65. );
  66. }
  67. }
  68. function verify_ssha256($hash, $password) {
  69. // Remove tag if any
  70. $hash = ltrim($hash, '{SSHA256}');
  71. // Decode hash
  72. $dhash = base64_decode($hash);
  73. // Get first 32 bytes of binary which equals a SHA256 hash
  74. $ohash = substr($dhash, 0, 32);
  75. // Remove SHA256 hash from decoded hash to get original salt string
  76. $osalt = str_replace($ohash, '', $dhash);
  77. // Check single salted SHA256 hash against extracted hash
  78. if (hash('sha256', $password . $osalt, true) == $ohash) {
  79. return true;
  80. }
  81. else {
  82. return false;
  83. }
  84. }
  85. function doveadm_authenticate($hash, $algorithm, $password) {
  86. $descr = array(0 => array('pipe', 'r'), 1 => array('pipe', 'w'), 2 => array('pipe', 'w'));
  87. $pipes = array();
  88. $process = proc_open("/usr/bin/doveadm pw -s ".$algorithm." -t '".$hash."'", $descr, $pipes);
  89. if (is_resource($process)) {
  90. fputs($pipes[0], $password);
  91. fclose($pipes[0]);
  92. while ($f = fgets($pipes[1])) {
  93. if (preg_match('/(verified)/', $f)) {
  94. proc_close($process);
  95. return true;
  96. }
  97. return false;
  98. }
  99. fclose($pipes[1]);
  100. while ($f = fgets($pipes[2])) {
  101. proc_close($process);
  102. return false;
  103. }
  104. fclose($pipes[2]);
  105. proc_close($process);
  106. }
  107. return false;
  108. }
  109. function check_login($user, $pass) {
  110. global $pdo;
  111. if (!filter_var($user, FILTER_VALIDATE_EMAIL) && !ctype_alnum(str_replace(array('_', '.', '-'), '', $user))) {
  112. return false;
  113. }
  114. $user = strtolower(trim($user));
  115. $stmt = $pdo->prepare("SELECT `password` FROM `admin`
  116. WHERE `superadmin` = '1'
  117. AND `username` = :user");
  118. $stmt->execute(array(':user' => $user));
  119. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  120. foreach ($rows as $row) {
  121. if (verify_ssha256($row['password'], $pass) !== false) {
  122. unset($_SESSION['ldelay']);
  123. return "admin";
  124. }
  125. }
  126. $stmt = $pdo->prepare("SELECT `password` FROM `admin`
  127. WHERE `superadmin` = '0'
  128. AND `active`='1'
  129. AND `username` = :user");
  130. $stmt->execute(array(':user' => $user));
  131. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  132. foreach ($rows as $row) {
  133. if (verify_ssha256($row['password'], $pass) !== false) {
  134. unset($_SESSION['ldelay']);
  135. return "domainadmin";
  136. }
  137. }
  138. $stmt = $pdo->prepare("SELECT `password` FROM `mailbox`
  139. WHERE `active`='1'
  140. AND `username` = :user");
  141. $stmt->execute(array(':user' => $user));
  142. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  143. foreach ($rows as $row) {
  144. if (verify_ssha256($row['password'], $pass) !== false) {
  145. unset($_SESSION['ldelay']);
  146. return "user";
  147. }
  148. }
  149. if (!isset($_SESSION['ldelay'])) {
  150. $_SESSION['ldelay'] = "0";
  151. }
  152. elseif (!isset($_SESSION['mailcow_cc_username'])) {
  153. $_SESSION['ldelay'] = $_SESSION['ldelay']+0.5;
  154. }
  155. sleep($_SESSION['ldelay']);
  156. }
  157. function formatBytes($size, $precision = 2) {
  158. if(!is_numeric($size)) {
  159. return "0";
  160. }
  161. $base = log($size, 1024);
  162. $suffixes = array(' Byte', ' KiB', ' MiB', ' GiB', ' TiB');
  163. if ($size == "0") {
  164. return "0";
  165. }
  166. return round(pow(1024, $base - floor($base)), $precision) . $suffixes[floor($base)];
  167. }
  168. function dkim_table($action, $item) {
  169. global $lang;
  170. switch ($action) {
  171. case "delete":
  172. $domain = preg_replace('/[^A-Za-z0-9._\-]/', '_', $item['dkim']['domain']);
  173. if (!is_valid_domain_name($domain)) {
  174. $_SESSION['return'] = array(
  175. 'type' => 'danger',
  176. 'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid'])
  177. );
  178. break;
  179. }
  180. exec('rm ' . escapeshellarg($GLOBALS['MC_DKIM_TXTS'] . '/' . $domain . '.dkim'), $out, $return);
  181. if ($return != "0") {
  182. $_SESSION['return'] = array(
  183. 'type' => 'danger',
  184. 'msg' => sprintf($lang['danger']['dkim_remove_failed'])
  185. );
  186. break;
  187. }
  188. exec('rm ' . escapeshellarg($GLOBALS['MC_DKIM_KEYS'] . '/' . $domain . '.dkim'), $out, $return);
  189. if ($return != "0") {
  190. $_SESSION['return'] = array(
  191. 'type' => 'danger',
  192. 'msg' => sprintf($lang['danger']['dkim_remove_failed'])
  193. );
  194. break;
  195. }
  196. $_SESSION['return'] = array(
  197. 'type' => 'success',
  198. 'msg' => sprintf($lang['success']['dkim_removed'])
  199. );
  200. break;
  201. case "add":
  202. $domain = preg_replace('/[^A-Za-z0-9._\-]/', '_', $item['dkim']['domain']);
  203. $key_length = intval($item['dkim']['key_size']);
  204. if (!is_valid_domain_name($domain) || !is_numeric($key_length)) {
  205. $_SESSION['return'] = array(
  206. 'type' => 'danger',
  207. 'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid'])
  208. );
  209. break;
  210. }
  211. if (!empty(glob($GLOBALS['MC_DKIM_TXTS'] . '/' . $domain . '.dkim'))) {
  212. $_SESSION['return'] = array(
  213. 'type' => 'danger',
  214. 'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid'])
  215. );
  216. break;
  217. }
  218. $config = array(
  219. "digest_alg" => "sha256",
  220. "private_key_bits" => $key_length,
  221. "private_key_type" => OPENSSL_KEYTYPE_RSA,
  222. );
  223. $keypair_ressource = openssl_pkey_new($config);
  224. $key_details = openssl_pkey_get_details($keypair_ressource);
  225. $pubKey = implode(array_slice(
  226. array_filter(
  227. explode(PHP_EOL, $key_details['key'])
  228. ), 1, -1)
  229. );
  230. // Save public key to file
  231. file_put_contents($GLOBALS['MC_DKIM_TXTS'] . '/' . $domain . '.dkim', $pubKey);
  232. // Save private key to file
  233. openssl_pkey_export_to_file($keypair_ressource, $GLOBALS['MC_DKIM_KEYS'] . '/' . $domain . '.dkim');
  234. $_SESSION['return'] = array(
  235. 'type' => 'success',
  236. 'msg' => sprintf($lang['success']['dkim_added'])
  237. );
  238. break;
  239. }
  240. }
  241. function mailbox_add_domain($postarray) {
  242. global $pdo;
  243. global $lang;
  244. if ($_SESSION['mailcow_cc_role'] != "admin") {
  245. $_SESSION['return'] = array(
  246. 'type' => 'danger',
  247. 'msg' => sprintf($lang['danger']['access_denied'])
  248. );
  249. return false;
  250. }
  251. $domain = idn_to_ascii(strtolower(trim($postarray['domain'])));
  252. $description = $postarray['description'];
  253. $aliases = $postarray['aliases'];
  254. $mailboxes = $postarray['mailboxes'];
  255. $maxquota = $postarray['maxquota'];
  256. $quota = $postarray['quota'];
  257. if ($maxquota > $quota) {
  258. $_SESSION['return'] = array(
  259. 'type' => 'danger',
  260. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeds_domain_quota'])
  261. );
  262. return false;
  263. }
  264. isset($postarray['active']) ? $active = '1' : $active = '0';
  265. isset($postarray['relay_all_recipients']) ? $relay_all_recipients = '1' : $relay_all_recipients = '0';
  266. isset($postarray['backupmx']) ? $backupmx = '1' : $backupmx = '0';
  267. isset($postarray['relay_all_recipients']) ? $backupmx = '1' : true;
  268. if (!is_valid_domain_name($domain)) {
  269. $_SESSION['return'] = array(
  270. 'type' => 'danger',
  271. 'msg' => sprintf($lang['danger']['domain_invalid'])
  272. );
  273. return false;
  274. }
  275. foreach (array($quota, $maxquota, $mailboxes, $aliases) as $data) {
  276. if (!is_numeric($data)) {
  277. $_SESSION['return'] = array(
  278. 'type' => 'danger',
  279. 'msg' => sprintf($lang['danger']['object_is_not_numeric'], htmlspecialchars($data))
  280. );
  281. return false;
  282. }
  283. }
  284. try {
  285. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  286. WHERE `domain` = :domain");
  287. $stmt->execute(array(':domain' => $domain));
  288. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  289. }
  290. catch(PDOException $e) {
  291. $_SESSION['return'] = array(
  292. 'type' => 'danger',
  293. 'msg' => 'MySQL: '.$e
  294. );
  295. return false;
  296. }
  297. if ($num_results != 0) {
  298. $_SESSION['return'] = array(
  299. 'type' => 'danger',
  300. 'msg' => sprintf($lang['danger']['domain_exists'], htmlspecialchars($domain))
  301. );
  302. return false;
  303. }
  304. try {
  305. $stmt = $pdo->prepare("INSERT INTO `domain` (`domain`, `description`, `aliases`, `mailboxes`, `maxquota`, `quota`, `transport`, `backupmx`, `created`, `modified`, `active`, `relay_all_recipients`)
  306. VALUES (:domain, :description, :aliases, :mailboxes, :maxquota, :quota, 'virtual', :backupmx, :created, :modified, :active, :relay_all_recipients)");
  307. $stmt->execute(array(
  308. ':domain' => $domain,
  309. ':description' => $description,
  310. ':aliases' => $aliases,
  311. ':mailboxes' => $mailboxes,
  312. ':maxquota' => $maxquota,
  313. ':quota' => $quota,
  314. ':backupmx' => $backupmx,
  315. ':active' => $active,
  316. ':created' => date('Y-m-d H:i:s'),
  317. ':modified' => date('Y-m-d H:i:s'),
  318. ':relay_all_recipients' => $relay_all_recipients
  319. ));
  320. $_SESSION['return'] = array(
  321. 'type' => 'success',
  322. 'msg' => sprintf($lang['success']['domain_added'], htmlspecialchars($domain))
  323. );
  324. }
  325. catch (PDOException $e) {
  326. $_SESSION['return'] = array(
  327. 'type' => 'danger',
  328. 'msg' => 'MySQL: '.$e
  329. );
  330. return false;
  331. }
  332. }
  333. function mailbox_add_alias($postarray) {
  334. global $lang;
  335. global $pdo;
  336. $addresses = array_map('trim', preg_split( "/( |,|;|\n)/", $postarray['address']));
  337. $gotos = array_map('trim', preg_split( "/( |,|;|\n)/", $postarray['goto']));
  338. isset($postarray['active']) ? $active = '1' : $active = '0';
  339. if (empty($addresses[0])) {
  340. $_SESSION['return'] = array(
  341. 'type' => 'danger',
  342. 'msg' => sprintf($lang['danger']['alias_empty'])
  343. );
  344. return false;
  345. }
  346. if (empty($gotos[0])) {
  347. $_SESSION['return'] = array(
  348. 'type' => 'danger',
  349. 'msg' => sprintf($lang['danger']['goto_empty'])
  350. );
  351. return false;
  352. }
  353. foreach ($addresses as $address) {
  354. if (empty($address)) {
  355. continue;
  356. }
  357. $domain = idn_to_ascii(substr(strstr($address, '@'), 1));
  358. $local_part = strstr($address, '@', true);
  359. $address = $local_part.'@'.$domain;
  360. if ((!filter_var($address, FILTER_VALIDATE_EMAIL) === true) && !empty($local_part)) {
  361. $_SESSION['return'] = array(
  362. 'type' => 'danger',
  363. 'msg' => sprintf($lang['danger']['alias_invalid'])
  364. );
  365. return false;
  366. }
  367. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  368. $_SESSION['return'] = array(
  369. 'type' => 'danger',
  370. 'msg' => sprintf($lang['danger']['access_denied'])
  371. );
  372. return false;
  373. }
  374. try {
  375. $stmt = $pdo->prepare("SELECT `address` FROM `alias`
  376. WHERE `address`= :address");
  377. $stmt->execute(array(':address' => $address));
  378. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  379. }
  380. catch(PDOException $e) {
  381. $_SESSION['return'] = array(
  382. 'type' => 'danger',
  383. 'msg' => 'MySQL: '.$e
  384. );
  385. return false;
  386. }
  387. if ($num_results != 0) {
  388. $_SESSION['return'] = array(
  389. 'type' => 'danger',
  390. 'msg' => sprintf($lang['danger']['is_alias_or_mailbox'], htmlspecialchars($address))
  391. );
  392. return false;
  393. }
  394. try {
  395. $stmt = $pdo->prepare("SELECT `address` FROM `spamalias`
  396. WHERE `address`= :address");
  397. $stmt->execute(array(':address' => $address));
  398. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  399. }
  400. catch(PDOException $e) {
  401. $_SESSION['return'] = array(
  402. 'type' => 'danger',
  403. 'msg' => 'MySQL: '.$e
  404. );
  405. return false;
  406. }
  407. if ($num_results != 0) {
  408. $_SESSION['return'] = array(
  409. 'type' => 'danger',
  410. 'msg' => sprintf($lang['danger']['is_spam_alias'], htmlspecialchars($address))
  411. );
  412. return false;
  413. }
  414. foreach ($gotos as &$goto) {
  415. if (empty($goto)) {
  416. continue;
  417. }
  418. $goto_domain = idn_to_ascii(substr(strstr($goto, '@'), 1));
  419. $goto_local_part = strstr($goto, '@', true);
  420. $goto = $goto_local_part.'@'.$goto_domain;
  421. if (!filter_var($goto, FILTER_VALIDATE_EMAIL) === true) {
  422. $_SESSION['return'] = array(
  423. 'type' => 'danger',
  424. 'msg' => sprintf($lang['danger']['goto_invalid'])
  425. );
  426. return false;
  427. }
  428. if ($goto == $address) {
  429. $_SESSION['return'] = array(
  430. 'type' => 'danger',
  431. 'msg' => sprintf($lang['danger']['alias_goto_identical'])
  432. );
  433. return false;
  434. }
  435. }
  436. $gotos = array_filter($gotos);
  437. $goto = implode(",", $gotos);
  438. try {
  439. $stmt = $pdo->prepare("INSERT INTO `alias` (`address`, `goto`, `domain`, `created`, `modified`, `active`)
  440. VALUES (:address, :goto, :domain, :created, :modified, :active)");
  441. if (!filter_var($address, FILTER_VALIDATE_EMAIL) === true) {
  442. $stmt->execute(array(
  443. ':address' => '@'.$domain,
  444. ':goto' => $goto,
  445. ':domain' => $domain,
  446. ':created' => date('Y-m-d H:i:s'),
  447. ':modified' => date('Y-m-d H:i:s'),
  448. ':active' => $active
  449. ));
  450. }
  451. else {
  452. $stmt->execute(array(
  453. ':address' => $address,
  454. ':goto' => $goto,
  455. ':domain' => $domain,
  456. ':created' => date('Y-m-d H:i:s'),
  457. ':modified' => date('Y-m-d H:i:s'),
  458. ':active' => $active
  459. ));
  460. }
  461. $_SESSION['return'] = array(
  462. 'type' => 'success',
  463. 'msg' => sprintf($lang['success']['alias_added'])
  464. );
  465. }
  466. catch (PDOException $e) {
  467. $_SESSION['return'] = array(
  468. 'type' => 'danger',
  469. 'msg' => 'MySQL: '.$e
  470. );
  471. return false;
  472. }
  473. }
  474. $_SESSION['return'] = array(
  475. 'type' => 'success',
  476. 'msg' => sprintf($lang['success']['alias_added'])
  477. );
  478. }
  479. function mailbox_add_alias_domain($postarray) {
  480. global $lang;
  481. global $pdo;
  482. isset($postarray['active']) ? $active = '1' : $active = '0';
  483. if (!is_valid_domain_name($postarray['alias_domain'])) {
  484. $_SESSION['return'] = array(
  485. 'type' => 'danger',
  486. 'msg' => sprintf($lang['danger']['alias_domain_invalid'])
  487. );
  488. return false;
  489. }
  490. if (!is_valid_domain_name($postarray['target_domain'])) {
  491. $_SESSION['return'] = array(
  492. 'type' => 'danger',
  493. 'msg' => sprintf($lang['danger']['target_domain_invalid'])
  494. );
  495. return false;
  496. }
  497. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $postarray['target_domain'])) {
  498. $_SESSION['return'] = array(
  499. 'type' => 'danger',
  500. 'msg' => sprintf($lang['danger']['access_denied'])
  501. );
  502. return false;
  503. }
  504. if ($postarray['alias_domain'] == $postarray['target_domain']) {
  505. $_SESSION['return'] = array(
  506. 'type' => 'danger',
  507. 'msg' => sprintf($lang['danger']['aliasd_targetd_identical'])
  508. );
  509. return false;
  510. }
  511. $alias_domain = strtolower(trim($postarray['alias_domain']));
  512. $target_domain = strtolower(trim($postarray['target_domain']));
  513. try {
  514. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  515. WHERE `domain`= :target_domain");
  516. $stmt->execute(array(':target_domain' => $target_domain));
  517. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  518. }
  519. catch(PDOException $e) {
  520. $_SESSION['return'] = array(
  521. 'type' => 'danger',
  522. 'msg' => 'MySQL: '.$e
  523. );
  524. return false;
  525. }
  526. if ($num_results == 0) {
  527. $_SESSION['return'] = array(
  528. 'type' => 'danger',
  529. 'msg' => sprintf($lang['danger']['targetd_not_found'])
  530. );
  531. return false;
  532. }
  533. try {
  534. $stmt = $pdo->prepare("SELECT `alias_domain` FROM `alias_domain` WHERE `alias_domain`= :alias_domain
  535. UNION
  536. SELECT `alias_domain` FROM `alias_domain` WHERE `alias_domain`= :alias_domain_in_domain");
  537. $stmt->execute(array(':alias_domain' => $alias_domain, ':alias_domain_in_domain' => $alias_domain));
  538. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  539. }
  540. catch(PDOException $e) {
  541. $_SESSION['return'] = array(
  542. 'type' => 'danger',
  543. 'msg' => 'MySQL: '.$e
  544. );
  545. return false;
  546. }
  547. if ($num_results != 0) {
  548. $_SESSION['return'] = array(
  549. 'type' => 'danger',
  550. 'msg' => sprintf($lang['danger']['aliasd_exists'])
  551. );
  552. return false;
  553. }
  554. try {
  555. $stmt = $pdo->prepare("INSERT INTO `alias_domain` (`alias_domain`, `target_domain`, `created`, `modified`, `active`)
  556. VALUES (:alias_domain, :target_domain, :created, :modified, :active)");
  557. $stmt->execute(array(
  558. ':alias_domain' => $alias_domain,
  559. ':target_domain' => $target_domain,
  560. ':created' => date('Y-m-d H:i:s'),
  561. ':modified' => date('Y-m-d H:i:s'),
  562. ':active' => $active
  563. ));
  564. $_SESSION['return'] = array(
  565. 'type' => 'success',
  566. 'msg' => sprintf($lang['success']['aliasd_added'], htmlspecialchars($alias_domain))
  567. );
  568. }
  569. catch (PDOException $e) {
  570. $_SESSION['return'] = array(
  571. 'type' => 'danger',
  572. 'msg' => 'MySQL: '.$e
  573. );
  574. return false;
  575. }
  576. }
  577. function mailbox_edit_alias_domain($postarray) {
  578. global $lang;
  579. global $pdo;
  580. isset($postarray['active']) ? $active = '1' : $active = '0';
  581. $alias_domain = idn_to_ascii($postarray['alias_domain']);
  582. $alias_domain = strtolower(trim($alias_domain));
  583. $alias_domain_now = strtolower(trim($postarray['alias_domain_now']));
  584. if (!is_valid_domain_name($alias_domain)) {
  585. $_SESSION['return'] = array(
  586. 'type' => 'danger',
  587. 'msg' => sprintf($lang['danger']['alias_domain_invalid'])
  588. );
  589. return false;
  590. }
  591. if (!is_valid_domain_name($alias_domain_now)) {
  592. $_SESSION['return'] = array(
  593. 'type' => 'danger',
  594. 'msg' => sprintf($lang['danger']['alias_domain_invalid'])
  595. );
  596. return false;
  597. }
  598. try {
  599. $stmt = $pdo->prepare("SELECT `target_domain` FROM `alias_domain`
  600. WHERE `alias_domain`= :alias_domain_now");
  601. $stmt->execute(array(':alias_domain_now' => $alias_domain_now));
  602. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  603. }
  604. catch(PDOException $e) {
  605. $_SESSION['return'] = array(
  606. 'type' => 'danger',
  607. 'msg' => 'MySQL: '.$e
  608. );
  609. return false;
  610. }
  611. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $DomainData['target_domain'])) {
  612. $_SESSION['return'] = array(
  613. 'type' => 'danger',
  614. 'msg' => sprintf($lang['danger']['access_denied'])
  615. );
  616. return false;
  617. }
  618. try {
  619. $stmt = $pdo->prepare("SELECT `target_domain` FROM `alias_domain`
  620. WHERE `target_domain`= :alias_domain");
  621. $stmt->execute(array(':alias_domain' => $alias_domain));
  622. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  623. }
  624. catch(PDOException $e) {
  625. $_SESSION['return'] = array(
  626. 'type' => 'danger',
  627. 'msg' => 'MySQL: '.$e
  628. );
  629. return false;
  630. }
  631. if ($num_results != 0) {
  632. $_SESSION['return'] = array(
  633. 'type' => 'danger',
  634. 'msg' => sprintf($lang['danger']['aliasd_targetd_identical'])
  635. );
  636. return false;
  637. }
  638. try {
  639. $stmt = $pdo->prepare("UPDATE `alias_domain` SET `alias_domain` = :alias_domain, `active` = :active WHERE `alias_domain` = :alias_domain_now");
  640. $stmt->execute(array(
  641. ':alias_domain' => $alias_domain,
  642. ':alias_domain_now' => $alias_domain_now,
  643. ':active' => $active
  644. ));
  645. }
  646. catch (PDOException $e) {
  647. $_SESSION['return'] = array(
  648. 'type' => 'danger',
  649. 'msg' => 'MySQL: '.$e
  650. );
  651. return false;
  652. }
  653. $_SESSION['return'] = array(
  654. 'type' => 'success',
  655. 'msg' => sprintf($lang['success']['aliasd_modified'], htmlspecialchars($alias_domain))
  656. );
  657. }
  658. function mailbox_add_mailbox($postarray) {
  659. global $pdo;
  660. global $lang;
  661. $username = strtolower(trim($postarray['local_part'])).'@'.strtolower(trim($postarray['domain']));
  662. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  663. $_SESSION['return'] = array(
  664. 'type' => 'danger',
  665. 'msg' => sprintf($lang['danger']['mailbox_invalid'])
  666. );
  667. return false;
  668. }
  669. if (empty($postarray['local_part'])) {
  670. $_SESSION['return'] = array(
  671. 'type' => 'danger',
  672. 'msg' => sprintf($lang['danger']['mailbox_invalid'])
  673. );
  674. return false;
  675. }
  676. $domain = strtolower(trim($postarray['domain']));
  677. $password = $postarray['password'];
  678. $password2 = $postarray['password2'];
  679. $local_part = strtolower(trim($postarray['local_part']));
  680. $name = $postarray['name'];
  681. $quota_m = $postarray['quota'];
  682. if (empty($name)) {
  683. $name = $local_part;
  684. }
  685. isset($postarray['active']) ? $active = '1' : $active = '0';
  686. $quota_b = ($quota_m * 1048576);
  687. $maildir = $domain."/".$local_part."/";
  688. if (!is_valid_domain_name($domain)) {
  689. $_SESSION['return'] = array(
  690. 'type' => 'danger',
  691. 'msg' => sprintf($lang['danger']['domain_invalid'])
  692. );
  693. return false;
  694. }
  695. try {
  696. $stmt = $pdo->prepare("SELECT `mailboxes`, `maxquota`, `quota` FROM `domain`
  697. WHERE `domain` = :domain");
  698. $stmt->execute(array(':domain' => $domain));
  699. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  700. }
  701. catch(PDOException $e) {
  702. $_SESSION['return'] = array(
  703. 'type' => 'danger',
  704. 'msg' => 'MySQL: '.$e
  705. );
  706. return false;
  707. }
  708. try {
  709. $stmt = $pdo->prepare("SELECT
  710. COUNT(*) as count,
  711. COALESCE(ROUND(SUM(`quota`)/1048576), 0) as `quota`
  712. FROM `mailbox`
  713. WHERE `domain` = :domain");
  714. $stmt->execute(array(':domain' => $domain));
  715. $MailboxData = $stmt->fetch(PDO::FETCH_ASSOC);
  716. }
  717. catch(PDOException $e) {
  718. $_SESSION['return'] = array(
  719. 'type' => 'danger',
  720. 'msg' => 'MySQL: '.$e
  721. );
  722. return false;
  723. }
  724. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  725. $_SESSION['return'] = array(
  726. 'type' => 'danger',
  727. 'msg' => sprintf($lang['danger']['access_denied'])
  728. );
  729. return false;
  730. }
  731. try {
  732. $stmt = $pdo->prepare("SELECT `local_part` FROM `mailbox` WHERE `local_part` = :local_part and `domain`= :domain");
  733. $stmt->execute(array(':local_part' => $local_part, ':domain' => $domain));
  734. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  735. }
  736. catch(PDOException $e) {
  737. $_SESSION['return'] = array(
  738. 'type' => 'danger',
  739. 'msg' => 'MySQL: '.$e
  740. );
  741. return false;
  742. }
  743. if ($num_results != 0) {
  744. $_SESSION['return'] = array(
  745. 'type' => 'danger',
  746. 'msg' => sprintf($lang['danger']['object_exists'], htmlspecialchars($username))
  747. );
  748. return false;
  749. }
  750. try {
  751. $stmt = $pdo->prepare("SELECT `address` FROM `alias` WHERE address= :username");
  752. $stmt->execute(array(':username' => $username));
  753. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  754. }
  755. catch(PDOException $e) {
  756. $_SESSION['return'] = array(
  757. 'type' => 'danger',
  758. 'msg' => 'MySQL: '.$e
  759. );
  760. return false;
  761. }
  762. if ($num_results != 0) {
  763. $_SESSION['return'] = array(
  764. 'type' => 'danger',
  765. 'msg' => sprintf($lang['danger']['is_alias'], htmlspecialchars($username))
  766. );
  767. return false;
  768. }
  769. try {
  770. $stmt = $pdo->prepare("SELECT `address` FROM `spamalias` WHERE `address`= :username");
  771. $stmt->execute(array(':username' => $username));
  772. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  773. }
  774. catch(PDOException $e) {
  775. $_SESSION['return'] = array(
  776. 'type' => 'danger',
  777. 'msg' => 'MySQL: '.$e
  778. );
  779. return false;
  780. }
  781. if ($num_results != 0) {
  782. $_SESSION['return'] = array(
  783. 'type' => 'danger',
  784. 'msg' => sprintf($lang['danger']['is_spam_alias'], htmlspecialchars($username))
  785. );
  786. return false;
  787. }
  788. if (!is_numeric($quota_m) || $quota_m == "0") {
  789. $_SESSION['return'] = array(
  790. 'type' => 'danger',
  791. 'msg' => sprintf($lang['danger']['quota_not_0_not_numeric'])
  792. );
  793. return false;
  794. }
  795. if (!empty($password) && !empty($password2)) {
  796. if ($password != $password2) {
  797. $_SESSION['return'] = array(
  798. 'type' => 'danger',
  799. 'msg' => sprintf($lang['danger']['password_mismatch'])
  800. );
  801. return false;
  802. }
  803. $password_hashed = hash_password($password);
  804. }
  805. else {
  806. $_SESSION['return'] = array(
  807. 'type' => 'danger',
  808. 'msg' => sprintf($lang['danger']['password_empty'])
  809. );
  810. return false;
  811. }
  812. if ($MailboxData['count'] >= $DomainData['mailboxes']) {
  813. $_SESSION['return'] = array(
  814. 'type' => 'danger',
  815. 'msg' => sprintf($lang['danger']['max_mailbox_exceeded'], $MailboxData['count'], $DomainData['mailboxes'])
  816. );
  817. return false;
  818. }
  819. try {
  820. $stmt = $pdo->prepare("SELECT `domain` FROM `domain` WHERE `domain`= :domain");
  821. $stmt->execute(array(':domain' => $domain));
  822. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  823. }
  824. catch(PDOException $e) {
  825. $_SESSION['return'] = array(
  826. 'type' => 'danger',
  827. 'msg' => 'MySQL: '.$e
  828. );
  829. return false;
  830. }
  831. if ($num_results == 0) {
  832. $_SESSION['return'] = array(
  833. 'type' => 'danger',
  834. 'msg' => $lang['danger']['domain_not_found']
  835. );
  836. return false;
  837. }
  838. if ($quota_m > $DomainData['maxquota']) {
  839. $_SESSION['return'] = array(
  840. 'type' => 'danger',
  841. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeded'], $DomainData['maxquota'])
  842. );
  843. return false;
  844. }
  845. if (($MailboxData['quota'] + $quota_m) > $DomainData['quota']) {
  846. $quota_left_m = ($DomainData['quota'] - $MailboxData['quota']);
  847. $_SESSION['return'] = array(
  848. 'type' => 'danger',
  849. 'msg' => sprintf($lang['danger']['mailbox_quota_left_exceeded'], $quota_left_m)
  850. );
  851. return false;
  852. }
  853. try {
  854. $stmt = $pdo->prepare("INSERT INTO `mailbox` (`username`, `password`, `name`, `maildir`, `quota`, `local_part`, `domain`, `created`, `modified`, `active`)
  855. VALUES (:username, :password_hashed, :name, :maildir, :quota_b, :local_part, :domain, :created, :modified, :active)");
  856. $stmt->execute(array(
  857. ':username' => $username,
  858. ':password_hashed' => $password_hashed,
  859. ':name' => $name,
  860. ':maildir' => $maildir,
  861. ':quota_b' => $quota_b,
  862. ':local_part' => $local_part,
  863. ':domain' => $domain,
  864. ':created' => date('Y-m-d H:i:s'),
  865. ':modified' => date('Y-m-d H:i:s'),
  866. ':active' => $active
  867. ));
  868. $stmt = $pdo->prepare("INSERT INTO `quota2` (`username`, `bytes`, `messages`)
  869. VALUES (:username, '0', '0')");
  870. $stmt->execute(array(':username' => $username));
  871. $stmt = $pdo->prepare("INSERT INTO `alias` (`address`, `goto`, `domain`, `created`, `modified`, `active`)
  872. VALUES (:username1, :username2, :domain, :created, :modified, :active)");
  873. $stmt->execute(array(
  874. ':username1' => $username,
  875. ':username2' => $username,
  876. ':domain' => $domain,
  877. ':created' => date('Y-m-d H:i:s'),
  878. ':modified' => date('Y-m-d H:i:s'),
  879. ':active' => $active
  880. ));
  881. $_SESSION['return'] = array(
  882. 'type' => 'success',
  883. 'msg' => sprintf($lang['success']['mailbox_added'], htmlspecialchars($username))
  884. );
  885. }
  886. catch (PDOException $e) {
  887. $_SESSION['return'] = array(
  888. 'type' => 'danger',
  889. 'msg' => 'MySQL: '.$e
  890. );
  891. return false;
  892. }
  893. }
  894. function mailbox_edit_alias($postarray) {
  895. global $lang;
  896. global $pdo;
  897. $address = $postarray['address'];
  898. $domain = idn_to_ascii(substr(strstr($address, '@'), 1));
  899. $local_part = strstr($address, '@', true);
  900. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  901. $_SESSION['return'] = array(
  902. 'type' => 'danger',
  903. 'msg' => sprintf($lang['danger']['access_denied'])
  904. );
  905. return false;
  906. }
  907. if (empty($postarray['goto'])) {
  908. $_SESSION['return'] = array(
  909. 'type' => 'danger',
  910. 'msg' => sprintf($lang['danger']['goto_empty'])
  911. );
  912. return false;
  913. }
  914. $gotos = array_map('trim', preg_split( "/( |,|;|\n)/", $postarray['goto']));
  915. foreach ($gotos as &$goto) {
  916. if (empty($goto)) {
  917. continue;
  918. }
  919. if (!filter_var($goto, FILTER_VALIDATE_EMAIL)) {
  920. $_SESSION['return'] = array(
  921. 'type' => 'danger',
  922. 'msg' =>sprintf($lang['danger']['goto_invalid'])
  923. );
  924. return false;
  925. }
  926. if ($goto == $address) {
  927. $_SESSION['return'] = array(
  928. 'type' => 'danger',
  929. 'msg' => sprintf($lang['danger']['alias_goto_identical'])
  930. );
  931. return false;
  932. }
  933. }
  934. $gotos = array_filter($gotos);
  935. $goto = implode(",", $gotos);
  936. isset($postarray['active']) ? $active = '1' : $active = '0';
  937. if ((!filter_var($address, FILTER_VALIDATE_EMAIL) === true) && !empty($local_part)) {
  938. $_SESSION['return'] = array(
  939. 'type' => 'danger',
  940. 'msg' => sprintf($lang['danger']['alias_invalid'])
  941. );
  942. return false;
  943. }
  944. try {
  945. $stmt = $pdo->prepare("UPDATE `alias` SET `goto` = :goto, `active`= :active WHERE `address` = :address");
  946. $stmt->execute(array(
  947. ':goto' => $goto,
  948. ':active' => $active,
  949. ':address' => $address
  950. ));
  951. $_SESSION['return'] = array(
  952. 'type' => 'success',
  953. 'msg' => sprintf($lang['success']['alias_modified'], htmlspecialchars($address))
  954. );
  955. }
  956. catch (PDOException $e) {
  957. $_SESSION['return'] = array(
  958. 'type' => 'danger',
  959. 'msg' => 'MySQL: '.$e
  960. );
  961. return false;
  962. }
  963. }
  964. function mailbox_edit_domain($postarray) {
  965. global $lang;
  966. global $pdo;
  967. $domain = $postarray['domain'];
  968. $description = $postarray['description'];
  969. $aliases = filter_var($postarray['aliases'], FILTER_SANITIZE_NUMBER_FLOAT);
  970. $mailboxes = filter_var($postarray['mailboxes'], FILTER_SANITIZE_NUMBER_FLOAT);
  971. $maxquota = filter_var($postarray['maxquota'], FILTER_SANITIZE_NUMBER_FLOAT);
  972. $quota = filter_var($postarray['quota'], FILTER_SANITIZE_NUMBER_FLOAT);
  973. isset($postarray['relay_all_recipients']) ? $relay_all_recipients = '1' : $relay_all_recipients = '0';
  974. isset($postarray['backupmx']) ? $backupmx = '1' : $backupmx = '0';
  975. isset($postarray['relay_all_recipients']) ? $backupmx = '1' : true;
  976. isset($postarray['active']) ? $active = '1' : $active = '0';
  977. try {
  978. $stmt = $pdo->prepare("SELECT
  979. COUNT(*) AS count,
  980. MAX(COALESCE(ROUND(`quota`/1048576), 0)) AS `maxquota`,
  981. COALESCE(ROUND(SUM(`quota`)/1048576), 0) AS `quota`
  982. FROM `mailbox`
  983. WHERE domain= :domain");
  984. $stmt->execute(array(':domain' => $domain));
  985. $MailboxData = $stmt->fetch(PDO::FETCH_ASSOC);
  986. }
  987. catch(PDOException $e) {
  988. $_SESSION['return'] = array(
  989. 'type' => 'danger',
  990. 'msg' => 'MySQL: '.$e
  991. );
  992. return false;
  993. }
  994. try {
  995. $stmt = $pdo->prepare("SELECT COUNT(*) AS `count` FROM `alias`
  996. WHERE domain = :domain
  997. AND address NOT IN (
  998. SELECT `username` FROM `mailbox`
  999. )");
  1000. $stmt->execute(array(':domain' => $domain));
  1001. $AliasData = $stmt->fetch(PDO::FETCH_ASSOC);
  1002. }
  1003. catch(PDOException $e) {
  1004. $_SESSION['return'] = array(
  1005. 'type' => 'danger',
  1006. 'msg' => 'MySQL: '.$e
  1007. );
  1008. return false;
  1009. }
  1010. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  1011. $_SESSION['return'] = array(
  1012. 'type' => 'danger',
  1013. 'msg' => sprintf($lang['danger']['access_denied'])
  1014. );
  1015. return false;
  1016. }
  1017. if ($maxquota > $quota) {
  1018. $_SESSION['return'] = array(
  1019. 'type' => 'danger',
  1020. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeds_domain_quota'])
  1021. );
  1022. return false;
  1023. }
  1024. if ($MailboxData['maxquota'] > $maxquota) {
  1025. $_SESSION['return'] = array(
  1026. 'type' => 'danger',
  1027. 'msg' => sprintf($lang['danger']['max_quota_in_use'], $MailboxData['maxquota'])
  1028. );
  1029. return false;
  1030. }
  1031. if ($MailboxData['quota'] > $quota) {
  1032. $_SESSION['return'] = array(
  1033. 'type' => 'danger',
  1034. 'msg' => sprintf($lang['danger']['domain_quota_m_in_use'], $MailboxData['quota'])
  1035. );
  1036. return false;
  1037. }
  1038. if ($MailboxData['count'] > $mailboxes) {
  1039. $_SESSION['return'] = array(
  1040. 'type' => 'danger',
  1041. 'msg' => sprintf($lang['danger']['mailboxes_in_use'], $MailboxData['count'])
  1042. );
  1043. return false;
  1044. }
  1045. if ($AliasData['count'] > $aliases) {
  1046. $_SESSION['return'] = array(
  1047. 'type' => 'danger',
  1048. 'msg' => sprintf($lang['danger']['aliases_in_use'], $AliasData['count'])
  1049. );
  1050. return false;
  1051. }
  1052. if (!is_valid_domain_name($domain)) {
  1053. $_SESSION['return'] = array(
  1054. 'type' => 'danger',
  1055. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1056. );
  1057. return false;
  1058. }
  1059. try {
  1060. $stmt = $pdo->prepare("UPDATE `domain` SET
  1061. `modified`= :modified,
  1062. `relay_all_recipients` = :relay_all_recipients,
  1063. `backupmx` = :backupmx,
  1064. `active` = :active,
  1065. `quota` = :quota,
  1066. `maxquota` = :maxquota,
  1067. `mailboxes` = :mailboxes,
  1068. `aliases` = :aliases,
  1069. `description` = :description
  1070. WHERE `domain` = :domain");
  1071. $stmt->execute(array(
  1072. ':relay_all_recipients' => $relay_all_recipients,
  1073. ':backupmx' => $backupmx,
  1074. ':active' => $active,
  1075. ':quota' => $quota,
  1076. ':maxquota' => $maxquota,
  1077. ':mailboxes' => $mailboxes,
  1078. ':aliases' => $aliases,
  1079. ':modified' => date('Y-m-d H:i:s'),
  1080. ':description' => $description,
  1081. ':domain' => $domain
  1082. ));
  1083. $_SESSION['return'] = array(
  1084. 'type' => 'success',
  1085. 'msg' => sprintf($lang['success']['domain_modified'], htmlspecialchars($domain))
  1086. );
  1087. }
  1088. catch (PDOException $e) {
  1089. $_SESSION['return'] = array(
  1090. 'type' => 'danger',
  1091. 'msg' => 'MySQL: '.$e
  1092. );
  1093. return false;
  1094. }
  1095. }
  1096. function edit_domain_admin($postarray) {
  1097. global $lang;
  1098. global $pdo;
  1099. $username = $postarray['username'];
  1100. $password = $postarray['password'];
  1101. $password2 = $postarray['password2'];
  1102. isset($postarray['active']) ? $active = '1' : $active = '0';
  1103. if ($_SESSION['mailcow_cc_role'] != "admin") {
  1104. $_SESSION['return'] = array(
  1105. 'type' => 'danger',
  1106. 'msg' => sprintf($lang['danger']['access_denied'])
  1107. );
  1108. return false;
  1109. }
  1110. foreach ($postarray['domain'] as $domain) {
  1111. if (!is_valid_domain_name($domain)) {
  1112. $_SESSION['return'] = array(
  1113. 'type' => 'danger',
  1114. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1115. );
  1116. return false;
  1117. }
  1118. }
  1119. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
  1120. $_SESSION['return'] = array(
  1121. 'type' => 'danger',
  1122. 'msg' => sprintf($lang['danger']['username_invalid'])
  1123. );
  1124. return false;
  1125. }
  1126. try {
  1127. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
  1128. $stmt->execute(array(
  1129. ':username' => $username,
  1130. ));
  1131. }
  1132. catch (PDOException $e) {
  1133. $_SESSION['return'] = array(
  1134. 'type' => 'danger',
  1135. 'msg' => 'MySQL: '.$e
  1136. );
  1137. return false;
  1138. }
  1139. foreach ($postarray['domain'] as $domain) {
  1140. try {
  1141. $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
  1142. VALUES (:username, :domain, :created, :active)");
  1143. $stmt->execute(array(
  1144. ':username' => $username,
  1145. ':domain' => $domain,
  1146. ':created' => date('Y-m-d H:i:s'),
  1147. ':active' => $active
  1148. ));
  1149. }
  1150. catch (PDOException $e) {
  1151. $_SESSION['return'] = array(
  1152. 'type' => 'danger',
  1153. 'msg' => 'MySQL: '.$e
  1154. );
  1155. return false;
  1156. }
  1157. }
  1158. if (!empty($password) && !empty($password2)) {
  1159. if ($password != $password2) {
  1160. $_SESSION['return'] = array(
  1161. 'type' => 'danger',
  1162. 'msg' => sprintf($lang['danger']['password_mismatch'])
  1163. );
  1164. return false;
  1165. }
  1166. $password_hashed = hash_password($password);
  1167. try {
  1168. $stmt = $pdo->prepare("UPDATE `admin` SET `modified` = :modified, `active` = :active, `password` = :password_hashed WHERE `username` = :username");
  1169. $stmt->execute(array(
  1170. ':password_hashed' => $password_hashed,
  1171. ':username' => $username,
  1172. ':modified' => date('Y-m-d H:i:s'),
  1173. ':active' => $active
  1174. ));
  1175. }
  1176. catch (PDOException $e) {
  1177. $_SESSION['return'] = array(
  1178. 'type' => 'danger',
  1179. 'msg' => 'MySQL: '.$e
  1180. );
  1181. return false;
  1182. }
  1183. }
  1184. else {
  1185. try {
  1186. $stmt = $pdo->prepare("UPDATE `admin` SET `modified` = :modified, `active` = :active WHERE `username` = :username");
  1187. $stmt->execute(array(
  1188. ':username' => $username,
  1189. ':modified' => date('Y-m-d H:i:s'),
  1190. ':active' => $active
  1191. ));
  1192. }
  1193. catch (PDOException $e) {
  1194. $_SESSION['return'] = array(
  1195. 'type' => 'danger',
  1196. 'msg' => 'MySQL: '.$e
  1197. );
  1198. return false;
  1199. }
  1200. }
  1201. $_SESSION['return'] = array(
  1202. 'type' => 'success',
  1203. 'msg' => sprintf($lang['success']['domain_admin_modified'], htmlspecialchars($username))
  1204. );
  1205. }
  1206. function mailbox_edit_mailbox($postarray) {
  1207. global $lang;
  1208. global $pdo;
  1209. isset($postarray['active']) ? $active = '1' : $active = '0';
  1210. if (!filter_var($postarray['username'], FILTER_VALIDATE_EMAIL)) {
  1211. $_SESSION['return'] = array(
  1212. 'type' => 'danger',
  1213. 'msg' => sprintf($lang['danger']['username_invalid'])
  1214. );
  1215. return false;
  1216. }
  1217. $quota_m = $postarray['quota'];
  1218. $quota_b = $quota_m*1048576;
  1219. $username = $postarray['username'];
  1220. $name = $postarray['name'];
  1221. $password = $postarray['password'];
  1222. $password2 = $postarray['password2'];
  1223. try {
  1224. $stmt = $pdo->prepare("SELECT `domain`
  1225. FROM `mailbox`
  1226. WHERE username = :username");
  1227. $stmt->execute(array(':username' => $username));
  1228. $MailboxData1 = $stmt->fetch(PDO::FETCH_ASSOC);
  1229. $stmt = $pdo->prepare("SELECT
  1230. COALESCE(ROUND(SUM(`quota`)/1048576), 0) as `quota_m_now`
  1231. FROM `mailbox`
  1232. WHERE `username` = :username");
  1233. $stmt->execute(array(':username' => $username));
  1234. $MailboxData2 = $stmt->fetch(PDO::FETCH_ASSOC);
  1235. $stmt = $pdo->prepare("SELECT
  1236. COALESCE(ROUND(SUM(`quota`)/1048576), 0) as `quota_m_in_use`
  1237. FROM `mailbox`
  1238. WHERE `domain` = :domain");
  1239. $stmt->execute(array(':domain' => $MailboxData1['domain']));
  1240. $MailboxData3 = $stmt->fetch(PDO::FETCH_ASSOC);
  1241. $stmt = $pdo->prepare("SELECT `quota`, `maxquota`
  1242. FROM `domain`
  1243. WHERE `domain` = :domain");
  1244. $stmt->execute(array(':domain' => $MailboxData1['domain']));
  1245. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  1246. }
  1247. catch(PDOException $e) {
  1248. $_SESSION['return'] = array(
  1249. 'type' => 'danger',
  1250. 'msg' => 'MySQL: '.$e
  1251. );
  1252. return false;
  1253. }
  1254. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $MailboxData1['domain'])) {
  1255. $_SESSION['return'] = array(
  1256. 'type' => 'danger',
  1257. 'msg' => sprintf($lang['danger']['access_denied'])
  1258. );
  1259. return false;
  1260. }
  1261. if (!is_numeric($quota_m) || $quota_m == "0") {
  1262. $_SESSION['return'] = array(
  1263. 'type' => 'danger',
  1264. 'msg' => sprintf($lang['danger']['quota_not_0_not_numeric'], htmlspecialchars($quota_m))
  1265. );
  1266. return false;
  1267. }
  1268. if ($quota_m > $DomainData['maxquota']) {
  1269. $_SESSION['return'] = array(
  1270. 'type' => 'danger',
  1271. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeded'], $DomainData['maxquota'])
  1272. );
  1273. return false;
  1274. }
  1275. if (($MailboxData3['quota_m_in_use'] - $MailboxData2['quota_m_now'] + $quota_m) > $DomainData['quota']) {
  1276. $quota_left_m = ($DomainData['quota'] - $MailboxData3['quota_m_in_use'] + $MailboxData2['quota_m_now']);
  1277. $_SESSION['return'] = array(
  1278. 'type' => 'danger',
  1279. 'msg' => sprintf($lang['danger']['mailbox_quota_left_exceeded'], $quota_left_m)
  1280. );
  1281. return false;
  1282. }
  1283. try {
  1284. $stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` = :username");
  1285. $stmt->execute(array(
  1286. ':username' => $username
  1287. ));
  1288. }
  1289. catch (PDOException $e) {
  1290. $_SESSION['return'] = array(
  1291. 'type' => 'danger',
  1292. 'msg' => 'MySQL: '.$e
  1293. );
  1294. return false;
  1295. }
  1296. if (isset($postarray['sender_acl']) && is_array($postarray['sender_acl'])) {
  1297. foreach ($postarray['sender_acl'] as $sender_acl) {
  1298. if (!filter_var($sender_acl, FILTER_VALIDATE_EMAIL) &&
  1299. !is_valid_domain_name(str_replace('@', '', $sender_acl))) {
  1300. $_SESSION['return'] = array(
  1301. 'type' => 'danger',
  1302. 'msg' => sprintf($lang['danger']['sender_acl_invalid'])
  1303. );
  1304. return false;
  1305. }
  1306. }
  1307. foreach ($postarray['sender_acl'] as $sender_acl) {
  1308. try {
  1309. $stmt = $pdo->prepare("INSERT INTO `sender_acl` (`send_as`, `logged_in_as`)
  1310. VALUES (:sender_acl, :username)");
  1311. $stmt->execute(array(
  1312. ':sender_acl' => $sender_acl,
  1313. ':username' => $username
  1314. ));
  1315. }
  1316. catch (PDOException $e) {
  1317. $_SESSION['return'] = array(
  1318. 'type' => 'danger',
  1319. 'msg' => 'MySQL: '.$e
  1320. );
  1321. return false;
  1322. }
  1323. }
  1324. }
  1325. if (!empty($password) && !empty($password2)) {
  1326. if ($password != $password2) {
  1327. $_SESSION['return'] = array(
  1328. 'type' => 'danger',
  1329. 'msg' => sprintf($lang['danger']['password_mismatch'])
  1330. );
  1331. return false;
  1332. }
  1333. $password_hashed = hash_password($password);
  1334. try {
  1335. $stmt = $pdo->prepare("UPDATE `alias` SET
  1336. `modified` = :modified,
  1337. `active` = :active
  1338. WHERE `address` = :address");
  1339. $stmt->execute(array(
  1340. ':address' => $username,
  1341. ':modified' => date('Y-m-d H:i:s'),
  1342. ':active' => $active
  1343. ));
  1344. $stmt = $pdo->prepare("UPDATE `mailbox` SET
  1345. `modified` = :modified,
  1346. `active` = :active,
  1347. `password` = :password_hashed,
  1348. `name`= :name,
  1349. `quota` = :quota_b
  1350. WHERE `username` = :username");
  1351. $stmt->execute(array(
  1352. ':modified' => date('Y-m-d H:i:s'),
  1353. ':password_hashed' => $password_hashed,
  1354. ':active' => $active,
  1355. ':name' => $name,
  1356. ':quota_b' => $quota_b,
  1357. ':username' => $username
  1358. ));
  1359. $_SESSION['return'] = array(
  1360. 'type' => 'success',
  1361. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  1362. );
  1363. return true;
  1364. }
  1365. catch (PDOException $e) {
  1366. $_SESSION['return'] = array(
  1367. 'type' => 'danger',
  1368. 'msg' => 'MySQL: '.$e
  1369. );
  1370. return false;
  1371. }
  1372. }
  1373. try {
  1374. $stmt = $pdo->prepare("UPDATE `alias` SET
  1375. `modified` = :modified,
  1376. `active` = :active
  1377. WHERE `address` = :address");
  1378. $stmt->execute(array(
  1379. ':address' => $username,
  1380. ':modified' => date('Y-m-d H:i:s'),
  1381. ':active' => $active
  1382. ));
  1383. $stmt = $pdo->prepare("UPDATE `mailbox` SET
  1384. `modified` = :modified,
  1385. `active` = :active,
  1386. `name`= :name,
  1387. `quota` = :quota_b
  1388. WHERE `username` = :username");
  1389. $stmt->execute(array(
  1390. ':active' => $active,
  1391. ':modified' => date('Y-m-d H:i:s'),
  1392. ':name' => $name,
  1393. ':quota_b' => $quota_b,
  1394. ':username' => $username
  1395. ));
  1396. $_SESSION['return'] = array(
  1397. 'type' => 'success',
  1398. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  1399. );
  1400. return true;
  1401. }
  1402. catch (PDOException $e) {
  1403. $_SESSION['return'] = array(
  1404. 'type' => 'danger',
  1405. 'msg' => 'MySQL: '.$e
  1406. );
  1407. return false;
  1408. }
  1409. }
  1410. function mailbox_delete_domain($postarray) {
  1411. global $lang;
  1412. global $pdo;
  1413. $domain = $postarray['domain'];
  1414. if ($_SESSION['mailcow_cc_role'] != "admin") {
  1415. $_SESSION['return'] = array(
  1416. 'type' => 'danger',
  1417. 'msg' => sprintf($lang['danger']['access_denied'])
  1418. );
  1419. return false;
  1420. }
  1421. if (!is_valid_domain_name($domain)) {
  1422. $_SESSION['return'] = array(
  1423. 'type' => 'danger',
  1424. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1425. );
  1426. return false;
  1427. }
  1428. $domain = strtolower(trim($domain));
  1429. try {
  1430. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox`
  1431. WHERE `domain` = :domain");
  1432. $stmt->execute(array(':domain' => $domain));
  1433. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  1434. }
  1435. catch(PDOException $e) {
  1436. $_SESSION['return'] = array(
  1437. 'type' => 'danger',
  1438. 'msg' => 'MySQL: '.$e
  1439. );
  1440. return false;
  1441. }
  1442. if ($num_results != 0 || !empty($num_results)) {
  1443. $_SESSION['return'] = array(
  1444. 'type' => 'danger',
  1445. 'msg' => sprintf($lang['danger']['domain_not_empty'])
  1446. );
  1447. return false;
  1448. }
  1449. try {
  1450. $stmt = $pdo->prepare("DELETE FROM `domain` WHERE `domain` = :domain");
  1451. $stmt->execute(array(
  1452. ':domain' => $domain,
  1453. ));
  1454. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `domain` = :domain");
  1455. $stmt->execute(array(
  1456. ':domain' => $domain,
  1457. ));
  1458. $stmt = $pdo->prepare("DELETE FROM `alias` WHERE `domain` = :domain");
  1459. $stmt->execute(array(
  1460. ':domain' => $domain,
  1461. ));
  1462. $stmt = $pdo->prepare("DELETE FROM `alias_domain` WHERE `target_domain` = :domain");
  1463. $stmt->execute(array(
  1464. ':domain' => $domain,
  1465. ));
  1466. $stmt = $pdo->prepare("DELETE FROM `mailbox` WHERE `domain` = :domain");
  1467. $stmt->execute(array(
  1468. ':domain' => $domain,
  1469. ));
  1470. $stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` LIKE :domain");
  1471. $stmt->execute(array(
  1472. ':domain' => '%@'.$domain,
  1473. ));
  1474. $stmt = $pdo->prepare("DELETE FROM `quota2` WHERE `username` = :domain");
  1475. $stmt->execute(array(
  1476. ':domain' => '%@'.$domain,
  1477. ));
  1478. $stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `address` = :domain");
  1479. $stmt->execute(array(
  1480. ':domain' => '%@'.$domain,
  1481. ));
  1482. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :domain");
  1483. $stmt->execute(array(
  1484. ':domain' => '%@'.$domain,
  1485. ));
  1486. }
  1487. catch (PDOException $e) {
  1488. $_SESSION['return'] = array(
  1489. 'type' => 'danger',
  1490. 'msg' => 'MySQL: '.$e
  1491. );
  1492. return false;
  1493. }
  1494. $_SESSION['return'] = array(
  1495. 'type' => 'success',
  1496. 'msg' => sprintf($lang['success']['domain_removed'], htmlspecialchars($domain))
  1497. );
  1498. return true;
  1499. }
  1500. function mailbox_delete_alias($postarray) {
  1501. global $lang;
  1502. global $pdo;
  1503. $address = $postarray['address'];
  1504. $local_part = strstr($address, '@', true);
  1505. $domain = substr(strrchr($address, "@"), 1);
  1506. try {
  1507. $stmt = $pdo->prepare("SELECT `goto` FROM `alias` WHERE `address` = :address");
  1508. $stmt->execute(array(':address' => $address));
  1509. $gotos = $stmt->fetch(PDO::FETCH_ASSOC);
  1510. }
  1511. catch(PDOException $e) {
  1512. $_SESSION['return'] = array(
  1513. 'type' => 'danger',
  1514. 'msg' => 'MySQL: '.$e
  1515. );
  1516. return false;
  1517. }
  1518. $goto_array = explode(',', $gotos['goto']);
  1519. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  1520. $_SESSION['return'] = array(
  1521. 'type' => 'danger',
  1522. 'msg' => sprintf($lang['danger']['access_denied'])
  1523. );
  1524. return false;
  1525. }
  1526. try {
  1527. $stmt = $pdo->prepare("DELETE FROM `alias` WHERE `address` = :address AND `address` NOT IN (SELECT `username` FROM `mailbox`)");
  1528. $stmt->execute(array(
  1529. ':address' => $address
  1530. ));
  1531. }
  1532. catch (PDOException $e) {
  1533. $_SESSION['return'] = array(
  1534. 'type' => 'danger',
  1535. 'msg' => 'MySQL: '.$e
  1536. );
  1537. return false;
  1538. }
  1539. $_SESSION['return'] = array(
  1540. 'type' => 'success',
  1541. 'msg' => sprintf($lang['success']['alias_removed'], htmlspecialchars($address))
  1542. );
  1543. }
  1544. function mailbox_delete_alias_domain($postarray) {
  1545. global $lang;
  1546. global $pdo;
  1547. if (!is_valid_domain_name($postarray['alias_domain'])) {
  1548. $_SESSION['return'] = array(
  1549. 'type' => 'danger',
  1550. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1551. );
  1552. return false;
  1553. }
  1554. $alias_domain = $postarray['alias_domain'];
  1555. try {
  1556. $stmt = $pdo->prepare("SELECT `target_domain` FROM `alias_domain`
  1557. WHERE `alias_domain`= :alias_domain");
  1558. $stmt->execute(array(':alias_domain' => $alias_domain));
  1559. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  1560. }
  1561. catch(PDOException $e) {
  1562. $_SESSION['return'] = array(
  1563. 'type' => 'danger',
  1564. 'msg' => 'MySQL: '.$e
  1565. );
  1566. return false;
  1567. }
  1568. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $DomainData['target_domain'])) {
  1569. $_SESSION['return'] = array(
  1570. 'type' => 'danger',
  1571. 'msg' => sprintf($lang['danger']['access_denied'])
  1572. );
  1573. return false;
  1574. }
  1575. try {
  1576. $stmt = $pdo->prepare("DELETE FROM `alias_domain` WHERE `alias_domain` = :alias_domain");
  1577. $stmt->execute(array(
  1578. ':alias_domain' => $alias_domain,
  1579. ));
  1580. }
  1581. catch (PDOException $e) {
  1582. $_SESSION['return'] = array(
  1583. 'type' => 'danger',
  1584. 'msg' => 'MySQL: '.$e
  1585. );
  1586. return false;
  1587. }
  1588. $_SESSION['return'] = array(
  1589. 'type' => 'success',
  1590. 'msg' => sprintf($lang['success']['alias_domain_removed'], htmlspecialchars($alias_domain))
  1591. );
  1592. }
  1593. function mailbox_delete_mailbox($postarray) {
  1594. global $lang;
  1595. global $pdo;
  1596. $domain = substr(strrchr($postarray['username'], "@"), 1);
  1597. $username = $postarray['username'];
  1598. if (!filter_var($postarray['username'], FILTER_VALIDATE_EMAIL)) {
  1599. $_SESSION['return'] = array(
  1600. 'type' => 'danger',
  1601. 'msg' => sprintf($lang['danger']['access_denied'])
  1602. );
  1603. return false;
  1604. }
  1605. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  1606. $_SESSION['return'] = array(
  1607. 'type' => 'danger',
  1608. 'msg' => sprintf($lang['danger']['access_denied'])
  1609. );
  1610. return false;
  1611. }
  1612. try {
  1613. $stmt = $pdo->prepare("DELETE FROM `alias` WHERE `goto` = :username");
  1614. $stmt->execute(array(
  1615. ':username' => $username
  1616. ));
  1617. $stmt = $pdo->prepare("DELETE FROM `quota2` WHERE `username` = :username");
  1618. $stmt->execute(array(
  1619. ':username' => $username
  1620. ));
  1621. $stmt = $pdo->prepare("DELETE FROM `mailbox` WHERE `username` = :username");
  1622. $stmt->execute(array(
  1623. ':username' => $username
  1624. ));
  1625. $stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` = :username");
  1626. $stmt->execute(array(
  1627. ':username' => $username
  1628. ));
  1629. $stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `goto` = :username");
  1630. $stmt->execute(array(
  1631. ':username' => $username
  1632. ));
  1633. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :username");
  1634. $stmt->execute(array(
  1635. ':username' => $username
  1636. ));
  1637. $stmt = $pdo->prepare("SELECT `address`, `goto` FROM `alias`
  1638. WHERE `goto` LIKE :username");
  1639. $stmt->execute(array(':username' => '%'.$username.'%'));
  1640. $GotoData = $stmt->fetchAll(PDO::FETCH_ASSOC);
  1641. foreach ($GotoData as $gotos) {
  1642. $goto_exploded = explode(',', $gotos['goto']);
  1643. if (($key = array_search($username, $goto_exploded)) !== false) {
  1644. unset($goto_exploded[$key]);
  1645. }
  1646. $gotos_rebuild = implode(',', $goto_exploded);
  1647. $stmt = $pdo->prepare("UPDATE `alias` SET `goto` = :goto WHERE `address` = :address");
  1648. $stmt->execute(array(
  1649. ':goto' => $gotos_rebuild,
  1650. ':address' => $gotos['address']
  1651. ));
  1652. }
  1653. }
  1654. catch (PDOException $e) {
  1655. $_SESSION['return'] = array(
  1656. 'type' => 'danger',
  1657. 'msg' => 'MySQL: '.$e
  1658. );
  1659. return false;
  1660. }
  1661. $_SESSION['return'] = array(
  1662. 'type' => 'success',
  1663. 'msg' => sprintf($lang['success']['mailbox_removed'], htmlspecialchars($username))
  1664. );
  1665. }
  1666. function set_admin_account($postarray) {
  1667. global $lang;
  1668. global $pdo;
  1669. if ($_SESSION['mailcow_cc_role'] != "admin") {
  1670. $_SESSION['return'] = array(
  1671. 'type' => 'danger',
  1672. 'msg' => sprintf($lang['danger']['access_denied'])
  1673. );
  1674. return false;
  1675. }
  1676. $name = $postarray['admin_user'];
  1677. $name_now = $postarray['admin_user_now'];
  1678. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $name)) || empty ($name)) {
  1679. $_SESSION['return'] = array(
  1680. 'type' => 'danger',
  1681. 'msg' => sprintf($lang['danger']['username_invalid'])
  1682. );
  1683. return false;
  1684. }
  1685. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $name_now)) || empty ($name_now)) {
  1686. $_SESSION['return'] = array(
  1687. 'type' => 'danger',
  1688. 'msg' => sprintf($lang['danger']['username_invalid'])
  1689. );
  1690. return false;
  1691. }
  1692. if (!empty($postarray['admin_pass']) && !empty($postarray['admin_pass2'])) {
  1693. if ($postarray['admin_pass'] != $postarray['admin_pass2']) {
  1694. $_SESSION['return'] = array(
  1695. 'type' => 'danger',
  1696. 'msg' => sprintf($lang['danger']['password_mismatch'])
  1697. );
  1698. return false;
  1699. }
  1700. $password_hashed = hash_password($postarray['admin_pass']);
  1701. try {
  1702. $stmt = $pdo->prepare("UPDATE `admin` SET
  1703. `modified` = :modified,
  1704. `password` = :password_hashed,
  1705. `username` = :name
  1706. WHERE `username` = :username");
  1707. $stmt->execute(array(
  1708. ':password_hashed' => $password_hashed,
  1709. ':modified' => date('Y-m-d H:i:s'),
  1710. ':name' => $name,
  1711. ':username' => $name_now
  1712. ));
  1713. }
  1714. catch (PDOException $e) {
  1715. $_SESSION['return'] = array(
  1716. 'type' => 'danger',
  1717. 'msg' => 'MySQL: '.$e
  1718. );
  1719. return false;
  1720. }
  1721. }
  1722. else {
  1723. try {
  1724. $stmt = $pdo->prepare("UPDATE `admin` SET
  1725. `modified` = :modified,
  1726. `username` = :name
  1727. WHERE `username` = :name_now");
  1728. $stmt->execute(array(
  1729. ':name' => $name,
  1730. ':modified' => date('Y-m-d H:i:s'),
  1731. ':name_now' => $name_now
  1732. ));
  1733. }
  1734. catch (PDOException $e) {
  1735. $_SESSION['return'] = array(
  1736. 'type' => 'danger',
  1737. 'msg' => 'MySQL: '.$e
  1738. );
  1739. return false;
  1740. }
  1741. }
  1742. try {
  1743. $stmt = $pdo->prepare("UPDATE `domain_admins` SET
  1744. `domain` = :domain,
  1745. `username` = :name
  1746. WHERE `username` = :name_now");
  1747. $stmt->execute(array(
  1748. ':domain' => 'ALL',
  1749. ':name' => $name,
  1750. ':name_now' => $name_now
  1751. ));
  1752. }
  1753. catch (PDOException $e) {
  1754. $_SESSION['return'] = array(
  1755. 'type' => 'danger',
  1756. 'msg' => 'MySQL: '.$e
  1757. );
  1758. return false;
  1759. }
  1760. $_SESSION['return'] = array(
  1761. 'type' => 'success',
  1762. 'msg' => sprintf($lang['success']['admin_modified'])
  1763. );
  1764. }
  1765. function set_time_limited_aliases($postarray) {
  1766. global $lang;
  1767. global $pdo;
  1768. $username = $_SESSION['mailcow_cc_username'];
  1769. $domain = substr($username, strpos($username, '@'));
  1770. if (($_SESSION['mailcow_cc_role'] != "user" &&
  1771. $_SESSION['mailcow_cc_role'] != "domainadmin") ||
  1772. empty($username) ||
  1773. empty($domain)) {
  1774. $_SESSION['return'] = array(
  1775. 'type' => 'danger',
  1776. 'msg' => sprintf($lang['danger']['access_denied'])
  1777. );
  1778. return false;
  1779. }
  1780. switch ($postarray["trigger_set_time_limited_aliases"]) {
  1781. case "generate":
  1782. if (!is_numeric($postarray["validity"]) || $postarray["validity"] > 672) {
  1783. $_SESSION['return'] = array(
  1784. 'type' => 'danger',
  1785. 'msg' => sprintf($lang['danger']['validity_missing'])
  1786. );
  1787. return false;
  1788. }
  1789. $validity = strtotime("+".$postarray["validity"]." hour");
  1790. $letters = 'abcefghijklmnopqrstuvwxyz1234567890';
  1791. $random_name = substr(str_shuffle($letters), 0, 24);
  1792. try {
  1793. $stmt = $pdo->prepare("INSERT INTO `spamalias` (`address`, `goto`, `validity`) VALUES
  1794. (:address, :goto, :validity)");
  1795. $stmt->execute(array(
  1796. ':address' => $random_name.$domain,
  1797. ':goto' => $username,
  1798. ':validity' => $validity
  1799. ));
  1800. }
  1801. catch (PDOException $e) {
  1802. $_SESSION['return'] = array(
  1803. 'type' => 'danger',
  1804. 'msg' => 'MySQL: '.$e
  1805. );
  1806. return false;
  1807. }
  1808. $_SESSION['return'] = array(
  1809. 'type' => 'success',
  1810. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username))
  1811. );
  1812. break;
  1813. case "delete":
  1814. try {
  1815. $stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `goto` = :username");
  1816. $stmt->execute(array(
  1817. ':username' => $username
  1818. ));
  1819. }
  1820. catch (PDOException $e) {
  1821. $_SESSION['return'] = array(
  1822. 'type' => 'danger',
  1823. 'msg' => 'MySQL: '.$e
  1824. );
  1825. return false;
  1826. }
  1827. $_SESSION['return'] = array(
  1828. 'type' => 'success',
  1829. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username))
  1830. );
  1831. break;
  1832. case "extend":
  1833. try {
  1834. $stmt = $pdo->prepare("UPDATE `spamalias` SET `validity` = (`validity` + 3600)
  1835. WHERE `goto` = :username
  1836. AND `validity` >= :validity");
  1837. $stmt->execute(array(
  1838. ':username' => $username,
  1839. ':validity' => time(),
  1840. ));
  1841. }
  1842. catch (PDOException $e) {
  1843. $_SESSION['return'] = array(
  1844. 'type' => 'danger',
  1845. 'msg' => 'MySQL: '.$e
  1846. );
  1847. return false;
  1848. }
  1849. $_SESSION['return'] = array(
  1850. 'type' => 'success',
  1851. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username))
  1852. );
  1853. break;
  1854. }
  1855. }
  1856. function set_user_account($postarray) {
  1857. global $lang;
  1858. global $pdo;
  1859. $username = $_SESSION['mailcow_cc_username'];
  1860. $password_old = $postarray['user_old_pass'];
  1861. isset($postarray['togglePwNew']) ? $pwnew_active = '1' : $pwnew_active = '0';
  1862. if (isset($pwnew_active) && $pwnew_active == "1") {
  1863. $password_new = $postarray['user_new_pass'];
  1864. $password_new2 = $postarray['user_new_pass2'];
  1865. }
  1866. if (!check_login($username, $password_old) == "user") {
  1867. $_SESSION['return'] = array(
  1868. 'type' => 'danger',
  1869. 'msg' => sprintf($lang['danger']['access_denied'])
  1870. );
  1871. return false;
  1872. }
  1873. if ($_SESSION['mailcow_cc_role'] != "user" &&
  1874. $_SESSION['mailcow_cc_role'] != "domainadmin") {
  1875. $_SESSION['return'] = array(
  1876. 'type' => 'danger',
  1877. 'msg' => sprintf($lang['danger']['access_denied'])
  1878. );
  1879. return false;
  1880. }
  1881. if (isset($password_new) && isset($password_new2)) {
  1882. if (!empty($password_new2) && !empty($password_new)) {
  1883. if ($password_new2 != $password_new) {
  1884. $_SESSION['return'] = array(
  1885. 'type' => 'danger',
  1886. 'msg' => sprintf($lang['danger']['password_mismatch'])
  1887. );
  1888. return false;
  1889. }
  1890. if (strlen($password_new) < "6" ||
  1891. !preg_match('/[A-Za-z]/', $password_new) ||
  1892. !preg_match('/[0-9]/', $password_new)) {
  1893. $_SESSION['return'] = array(
  1894. 'type' => 'danger',
  1895. 'msg' => sprintf($lang['danger']['password_complexity'])
  1896. );
  1897. return false;
  1898. }
  1899. $password_hashed = hash_password($password_new);
  1900. try {
  1901. $stmt = $pdo->prepare("UPDATE `mailbox` SET `modified` = :modified, `password` = :password_hashed WHERE `username` = :username");
  1902. $stmt->execute(array(
  1903. ':password_hashed' => $password_hashed,
  1904. ':modified' => date('Y-m-d H:i:s'),
  1905. ':username' => $username
  1906. ));
  1907. }
  1908. catch (PDOException $e) {
  1909. $_SESSION['return'] = array(
  1910. 'type' => 'danger',
  1911. 'msg' => 'MySQL: '.$e
  1912. );
  1913. return false;
  1914. }
  1915. }
  1916. }
  1917. $_SESSION['return'] = array(
  1918. 'type' => 'success',
  1919. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  1920. );
  1921. }
  1922. function add_domain_admin($postarray) {
  1923. global $lang;
  1924. global $pdo;
  1925. $username = strtolower(trim($postarray['username']));
  1926. $password = $postarray['password'];
  1927. $password2 = $postarray['password2'];
  1928. isset($postarray['active']) ? $active = '1' : $active = '0';
  1929. if ($_SESSION['mailcow_cc_role'] != "admin") {
  1930. $_SESSION['return'] = array(
  1931. 'type' => 'danger',
  1932. 'msg' => sprintf($lang['danger']['access_denied'])
  1933. );
  1934. return false;
  1935. }
  1936. if (empty($postarray['domain'])) {
  1937. $_SESSION['return'] = array(
  1938. 'type' => 'danger',
  1939. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1940. );
  1941. return false;
  1942. }
  1943. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username)) || empty ($username)) {
  1944. $_SESSION['return'] = array(
  1945. 'type' => 'danger',
  1946. 'msg' => sprintf($lang['danger']['username_invalid'])
  1947. );
  1948. return false;
  1949. }
  1950. try {
  1951. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox`
  1952. WHERE `username` = :username");
  1953. $stmt->execute(array(':username' => $username));
  1954. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  1955. $stmt = $pdo->prepare("SELECT `username` FROM `admin`
  1956. WHERE `username` = :username");
  1957. $stmt->execute(array(':username' => $username));
  1958. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  1959. $stmt = $pdo->prepare("SELECT `username` FROM `domain_admins`
  1960. WHERE `username` = :username");
  1961. $stmt->execute(array(':username' => $username));
  1962. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  1963. }
  1964. catch(PDOException $e) {
  1965. $_SESSION['return'] = array(
  1966. 'type' => 'danger',
  1967. 'msg' => 'MySQL: '.$e
  1968. );
  1969. return false;
  1970. }
  1971. foreach ($num_results as $num_results_each) {
  1972. if ($num_results_each != 0) {
  1973. $_SESSION['return'] = array(
  1974. 'type' => 'danger',
  1975. 'msg' => sprintf($lang['danger']['object_exists'], htmlspecialchars($username))
  1976. );
  1977. return false;
  1978. }
  1979. }
  1980. if (!empty($password) && !empty($password2)) {
  1981. if ($password != $password2) {
  1982. $_SESSION['return'] = array(
  1983. 'type' => 'danger',
  1984. 'msg' => sprintf($lang['danger']['password_mismatch'])
  1985. );
  1986. return false;
  1987. }
  1988. $password_hashed = hash_password($password);
  1989. foreach ($postarray['domain'] as $domain) {
  1990. if (!is_valid_domain_name($domain)) {
  1991. $_SESSION['return'] = array(
  1992. 'type' => 'danger',
  1993. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1994. );
  1995. return false;
  1996. }
  1997. try {
  1998. $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
  1999. VALUES (:username, :domain, :created, :active)");
  2000. $stmt->execute(array(
  2001. ':username' => $username,
  2002. ':domain' => $domain,
  2003. ':created' => date('Y-m-d H:i:s'),
  2004. ':active' => $active
  2005. ));
  2006. }
  2007. catch (PDOException $e) {
  2008. $_SESSION['return'] = array(
  2009. 'type' => 'danger',
  2010. 'msg' => 'MySQL: '.$e
  2011. );
  2012. return false;
  2013. }
  2014. }
  2015. try {
  2016. $stmt = $pdo->prepare("INSERT INTO `admin` (`username`, `password`, `superadmin`, `created`, `modified`, `active`)
  2017. VALUES (:username, :password_hashed, '0', :created, :modified, :active)");
  2018. $stmt->execute(array(
  2019. ':username' => $username,
  2020. ':password_hashed' => $password_hashed,
  2021. ':created' => date('Y-m-d H:i:s'),
  2022. ':modified' => date('Y-m-d H:i:s'),
  2023. ':active' => $active
  2024. ));
  2025. }
  2026. catch (PDOException $e) {
  2027. $_SESSION['return'] = array(
  2028. 'type' => 'danger',
  2029. 'msg' => 'MySQL: '.$e
  2030. );
  2031. return false;
  2032. }
  2033. }
  2034. else {
  2035. $_SESSION['return'] = array(
  2036. 'type' => 'danger',
  2037. 'msg' => sprintf($lang['danger']['password_empty'])
  2038. );
  2039. return false;
  2040. }
  2041. $_SESSION['return'] = array(
  2042. 'type' => 'success',
  2043. 'msg' => sprintf($lang['success']['domain_admin_added'], htmlspecialchars($username))
  2044. );
  2045. }
  2046. function delete_domain_admin($postarray) {
  2047. global $pdo;
  2048. global $lang;
  2049. if ($_SESSION['mailcow_cc_role'] != "admin") {
  2050. $_SESSION['return'] = array(
  2051. 'type' => 'danger',
  2052. 'msg' => sprintf($lang['danger']['access_denied'])
  2053. );
  2054. return false;
  2055. }
  2056. $username = $postarray['username'];
  2057. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
  2058. $_SESSION['return'] = array(
  2059. 'type' => 'danger',
  2060. 'msg' => sprintf($lang['danger']['username_invalid'])
  2061. );
  2062. return false;
  2063. }
  2064. try {
  2065. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
  2066. $stmt->execute(array(
  2067. ':username' => $username,
  2068. ));
  2069. $stmt = $pdo->prepare("DELETE FROM `admin` WHERE `username` = :username");
  2070. $stmt->execute(array(
  2071. ':username' => $username,
  2072. ));
  2073. }
  2074. catch (PDOException $e) {
  2075. $_SESSION['return'] = array(
  2076. 'type' => 'danger',
  2077. 'msg' => 'MySQL: '.$e
  2078. );
  2079. return false;
  2080. }
  2081. $_SESSION['return'] = array(
  2082. 'type' => 'success',
  2083. 'msg' => sprintf($lang['success']['domain_admin_removed'], htmlspecialchars($username))
  2084. );
  2085. }
  2086. function get_spam_score($username) {
  2087. global $pdo;
  2088. $default = "5, 15";
  2089. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  2090. return $default;
  2091. }
  2092. try {
  2093. $stmt = $pdo->prepare("SELECT `value` FROM `filterconf` WHERE `object` = :username AND
  2094. (`option` = 'lowspamlevel' OR `option` = 'highspamlevel')");
  2095. $stmt->execute(array(':username' => $username));
  2096. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  2097. }
  2098. catch(PDOException $e) {
  2099. $_SESSION['return'] = array(
  2100. 'type' => 'danger',
  2101. 'msg' => 'MySQL: '.$e
  2102. );
  2103. return false;
  2104. }
  2105. if ($num_results == 0 || empty ($num_results)) {
  2106. return $default;
  2107. }
  2108. else {
  2109. try {
  2110. $stmt = $pdo->prepare("SELECT `value` FROM `filterconf` WHERE `option` = 'highspamlevel' AND `object` = :username");
  2111. $stmt->execute(array(':username' => $username));
  2112. $highspamlevel = $stmt->fetch(PDO::FETCH_ASSOC);
  2113. $stmt = $pdo->prepare("SELECT `value` FROM `filterconf` WHERE `option` = 'lowspamlevel' AND `object` = :username");
  2114. $stmt->execute(array(':username' => $username));
  2115. $lowspamlevel = $stmt->fetch(PDO::FETCH_ASSOC);
  2116. return $lowspamlevel['value'].', '.$highspamlevel['value'];
  2117. }
  2118. catch(PDOException $e) {
  2119. $_SESSION['return'] = array(
  2120. 'type' => 'danger',
  2121. 'msg' => 'MySQL: '.$e
  2122. );
  2123. return false;
  2124. }
  2125. }
  2126. }
  2127. function set_spam_score($postarray) {
  2128. global $lang;
  2129. global $pdo;
  2130. $username = $_SESSION['mailcow_cc_username'];
  2131. $lowspamlevel = explode(',', $postarray['score'])[0];
  2132. $highspamlevel = explode(',', $postarray['score'])[1];
  2133. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  2134. $_SESSION['return'] = array(
  2135. 'type' => 'danger',
  2136. 'msg' => sprintf($lang['danger']['username_invalid'])
  2137. );
  2138. return false;
  2139. }
  2140. if (!is_numeric($lowspamlevel) || !is_numeric($highspamlevel)) {
  2141. $_SESSION['return'] = array(
  2142. 'type' => 'danger',
  2143. 'msg' => sprintf($lang['danger']['access_denied'])
  2144. );
  2145. return false;
  2146. }
  2147. try {
  2148. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :username
  2149. AND (`option` = 'lowspamlevel' OR `option` = 'highspamlevel')");
  2150. $stmt->execute(array(
  2151. ':username' => $username
  2152. ));
  2153. $stmt = $pdo->prepare("INSERT INTO `filterconf` (`object`, `option`, `value`)
  2154. VALUES (:username, 'highspamlevel', :highspamlevel)");
  2155. $stmt->execute(array(
  2156. ':username' => $username,
  2157. ':highspamlevel' => $highspamlevel
  2158. ));
  2159. $stmt = $pdo->prepare("INSERT INTO `filterconf` (`object`, `option`, `value`)
  2160. VALUES (:username, 'lowspamlevel', :lowspamlevel)");
  2161. $stmt->execute(array(
  2162. ':username' => $username,
  2163. ':lowspamlevel' => $lowspamlevel
  2164. ));
  2165. }
  2166. catch (PDOException $e) {
  2167. $_SESSION['return'] = array(
  2168. 'type' => 'danger',
  2169. 'msg' => 'MySQL: '.$e
  2170. );
  2171. return false;
  2172. }
  2173. $_SESSION['return'] = array(
  2174. 'type' => 'success',
  2175. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  2176. );
  2177. }
  2178. function set_policy_list($postarray) {
  2179. global $lang;
  2180. global $pdo;
  2181. (isset($postarray['domain'])) ? $object = $postarray['domain'] : $object = $_SESSION['mailcow_cc_username'];
  2182. ($postarray['object_list'] == "bl") ? $object_list = "blacklist_from" : $object_list = "whitelist_from";
  2183. $object_from = preg_replace('/\.+/', '.', rtrim(preg_replace("/\.\*/", "*", trim(strtolower($postarray['object_from']))), '.'));
  2184. if (!filter_var($object, FILTER_VALIDATE_EMAIL) && !is_valid_domain_name($object)) {
  2185. $_SESSION['return'] = array(
  2186. 'type' => 'danger',
  2187. 'msg' => sprintf($lang['danger']['username_invalid'])
  2188. );
  2189. return false;
  2190. }
  2191. if (is_valid_domain_name($object)) {
  2192. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $object)) {
  2193. $_SESSION['return'] = array(
  2194. 'type' => 'danger',
  2195. 'msg' => sprintf($lang['danger']['access_denied'])
  2196. );
  2197. return false;
  2198. }
  2199. }
  2200. if (isset($postarray['prefid'])) {
  2201. if (!is_numeric($postarray['prefid'])) {
  2202. $_SESSION['return'] = array(
  2203. 'type' => 'danger',
  2204. 'msg' => sprintf($lang['danger']['access_denied'])
  2205. );
  2206. return false;
  2207. }
  2208. try {
  2209. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :object AND `prefid` = :prefid");
  2210. $stmt->execute(array(
  2211. ':object' => $object,
  2212. ':prefid' => $postarray['prefid']
  2213. ));
  2214. }
  2215. catch (PDOException $e) {
  2216. $_SESSION['return'] = array(
  2217. 'type' => 'danger',
  2218. 'msg' => 'MySQL: '.$e
  2219. );
  2220. return false;
  2221. }
  2222. $_SESSION['return'] = array(
  2223. 'type' => 'success',
  2224. 'msg' => sprintf($lang['success']['mailbox_modified'], $object)
  2225. );
  2226. return true;
  2227. }
  2228. if (!ctype_alnum(str_replace(array('@', '.', '-', '*'), '', $object_from))) {
  2229. $_SESSION['return'] = array(
  2230. 'type' => 'danger',
  2231. 'msg' => sprintf($lang['danger']['policy_list_from_invalid'])
  2232. );
  2233. return false;
  2234. }
  2235. try {
  2236. $stmt = $pdo->prepare("SELECT `object` FROM `filterconf`
  2237. WHERE (`option` = 'whitelist_from' OR `option` = 'blacklist_from')
  2238. AND `object` = :object
  2239. AND `value` = :object_from");
  2240. $stmt->execute(array(':object' => $object, ':object_from' => $object_from));
  2241. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  2242. }
  2243. catch(PDOException $e) {
  2244. $_SESSION['return'] = array(
  2245. 'type' => 'danger',
  2246. 'msg' => 'MySQL: '.$e
  2247. );
  2248. return false;
  2249. }
  2250. if ($num_results != 0) {
  2251. $_SESSION['return'] = array(
  2252. 'type' => 'danger',
  2253. 'msg' => sprintf($lang['danger']['policy_list_from_exists'])
  2254. );
  2255. return false;
  2256. }
  2257. try {
  2258. $stmt = $pdo->prepare("INSERT INTO `filterconf` (`object`, `option` ,`value`)
  2259. VALUES (:object, :object_list, :object_from)");
  2260. $stmt->execute(array(
  2261. ':object' => $object,
  2262. ':object_list' => $object_list,
  2263. ':object_from' => $object_from
  2264. ));
  2265. }
  2266. catch (PDOException $e) {
  2267. $_SESSION['return'] = array(
  2268. 'type' => 'danger',
  2269. 'msg' => 'MySQL: '.$e
  2270. );
  2271. return false;
  2272. }
  2273. $_SESSION['return'] = array(
  2274. 'type' => 'success',
  2275. 'msg' => sprintf($lang['success']['mailbox_modified'], $object)
  2276. );
  2277. }
  2278. function set_tls_policy($postarray) {
  2279. global $lang;
  2280. global $pdo;
  2281. isset($postarray['tls_in']) ? $tls_in = '1' : $tls_in = '0';
  2282. isset($postarray['tls_out']) ? $tls_out = '1' : $tls_out = '0';
  2283. $username = $_SESSION['mailcow_cc_username'];
  2284. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  2285. $_SESSION['return'] = array(
  2286. 'type' => 'danger',
  2287. 'msg' => sprintf($lang['danger']['username_invalid'])
  2288. );
  2289. return false;
  2290. }
  2291. try {
  2292. $stmt = $pdo->prepare("UPDATE `mailbox` SET `tls_enforce_out` = :tls_out, `tls_enforce_in` = :tls_in WHERE `username` = :username");
  2293. $stmt->execute(array(
  2294. ':tls_out' => $tls_out,
  2295. ':tls_in' => $tls_in,
  2296. ':username' => $username
  2297. ));
  2298. }
  2299. catch (PDOException $e) {
  2300. $_SESSION['return'] = array(
  2301. 'type' => 'danger',
  2302. 'msg' => 'MySQL: '.$e
  2303. );
  2304. return false;
  2305. }
  2306. $_SESSION['return'] = array(
  2307. 'type' => 'success',
  2308. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  2309. );
  2310. }
  2311. function get_tls_policy($username) {
  2312. global $lang;
  2313. global $pdo;
  2314. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  2315. $_SESSION['return'] = array(
  2316. 'type' => 'danger',
  2317. 'msg' => sprintf($lang['danger']['username_invalid'])
  2318. );
  2319. return false;
  2320. }
  2321. try {
  2322. $stmt = $pdo->prepare("SELECT `tls_enforce_out`, `tls_enforce_in` FROM `mailbox` WHERE `username` = :username");
  2323. $stmt->execute(array(':username' => $username));
  2324. $TLSData = $stmt->fetch(PDO::FETCH_ASSOC);
  2325. }
  2326. catch(PDOException $e) {
  2327. $_SESSION['return'] = array(
  2328. 'type' => 'danger',
  2329. 'msg' => 'MySQL: '.$e
  2330. );
  2331. return false;
  2332. }
  2333. return $TLSData;
  2334. }
  2335. function remaining_specs($domain, $object = null, $js = null) {
  2336. // left_m without object given = MiB left in domain
  2337. // left_m with object given = Max. MiB we can assign to given object
  2338. // limit_m = Domain limit in MiB
  2339. // left_c = Mailboxes we can create depending on domain quota
  2340. global $pdo;
  2341. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  2342. return false;
  2343. }
  2344. try {
  2345. $stmt = $pdo->prepare("SELECT `mailboxes`, `maxquota`, `quota` FROM `domain` WHERE `domain` = :domain");
  2346. $stmt->execute(array(':domain' => $domain));
  2347. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  2348. $stmt = $pdo->prepare("SELECT COUNT(*) AS `count`, COALESCE(ROUND(SUM(`quota`)/1048576), 0) as `in_use_m` FROM `mailbox` WHERE `domain` = :domain AND `username` != :object");
  2349. $stmt->execute(array(':domain' => $domain, ':object' => $object));
  2350. $MailboxDataDomain = $stmt->fetch(PDO::FETCH_ASSOC);
  2351. $quota_left_m = $DomainData['quota'] - $MailboxDataDomain['in_use_m'];
  2352. $mboxs_left = $DomainData['mailboxes'] - $MailboxDataDomain['count'];
  2353. if ($quota_left_m > $DomainData['maxquota']) {
  2354. $quota_left_m = $DomainData['maxquota'];
  2355. }
  2356. }
  2357. catch (PDOException $e) {
  2358. return false;
  2359. }
  2360. if (is_numeric($quota_left_m)) {
  2361. $spec['left_m'] = $quota_left_m;
  2362. $spec['limit_m'] = $DomainData['maxquota'];
  2363. }
  2364. if (is_numeric($mboxs_left)) {
  2365. $spec['left_c'] = $mboxs_left;
  2366. }
  2367. if (!empty($js)) {
  2368. echo $quota_left_m;
  2369. exit;
  2370. }
  2371. return $spec;
  2372. }
  2373. function get_sender_acl_handles($mailbox, $which) {
  2374. global $pdo;
  2375. if ($_SESSION['mailcow_cc_role'] != "admin" && $_SESSION['mailcow_cc_role'] != "domainadmin") {
  2376. return false;
  2377. }
  2378. switch ($which) {
  2379. case "preselected":
  2380. try {
  2381. $stmt = $pdo->prepare("SELECT `address` FROM `alias` WHERE `goto` = :goto AND `address` NOT LIKE '@%'");
  2382. $stmt->execute(array(':goto' => $mailbox));
  2383. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2384. return $rows;
  2385. }
  2386. catch(PDOException $e) {
  2387. $_SESSION['return'] = array(
  2388. 'type' => 'danger',
  2389. 'msg' => 'MySQL: '.$e
  2390. );
  2391. return false;
  2392. }
  2393. break;
  2394. case "selected":
  2395. try {
  2396. $stmt = $pdo->prepare("SELECT `send_as` FROM `sender_acl` WHERE `logged_in_as` = :logged_in_as");
  2397. $stmt->execute(array(':logged_in_as' => $mailbox));
  2398. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2399. return $rows;
  2400. }
  2401. catch(PDOException $e) {
  2402. $_SESSION['return'] = array(
  2403. 'type' => 'danger',
  2404. 'msg' => 'MySQL: '.$e
  2405. );
  2406. return false;
  2407. }
  2408. break;
  2409. case "unselected-domains":
  2410. try {
  2411. if ($_SESSION['mailcow_cc_role'] == "admin" ) {
  2412. $stmt = $pdo->prepare("SELECT DISTINCT `domain` FROM `domain`
  2413. WHERE `domain` NOT IN (
  2414. SELECT REPLACE(`send_as`, '@', '') FROM `sender_acl`
  2415. WHERE `logged_in_as` = :logged_in_as)
  2416. AND `domain` NOT IN (
  2417. SELECT REPLACE(`address`, '@', '') FROM `alias`
  2418. WHERE `goto` = :goto)");
  2419. $stmt->execute(array(
  2420. ':logged_in_as' => $mailbox,
  2421. ':goto' => $mailbox,
  2422. ));
  2423. }
  2424. else {
  2425. $stmt = $pdo->prepare("SELECT DISTINCT `domain` FROM `domain_admins`
  2426. WHERE `username` = :username
  2427. AND `domain` != 'ALL'
  2428. AND `domain` NOT IN (
  2429. SELECT REPLACE(`send_as`, '@', '') FROM `sender_acl`
  2430. WHERE `logged_in_as` = :logged_in_as)");
  2431. $stmt->execute(array(
  2432. ':logged_in_as' => $mailbox,
  2433. ':username' => $_SESSION['mailcow_cc_username']
  2434. ));
  2435. }
  2436. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2437. return $rows;
  2438. }
  2439. catch(PDOException $e) {
  2440. $_SESSION['return'] = array(
  2441. 'type' => 'danger',
  2442. 'msg' => 'MySQL: '.$e
  2443. );
  2444. return false;
  2445. }
  2446. break;
  2447. case "unselected-addresses":
  2448. try {
  2449. if ($_SESSION['mailcow_cc_role'] == "admin" ) {
  2450. $stmt = $pdo->prepare("SELECT `address` FROM `alias`
  2451. WHERE `goto` != :goto
  2452. AND `address` NOT IN (
  2453. SELECT `send_as` FROM `sender_acl`
  2454. WHERE `logged_in_as` = :logged_in_as)");
  2455. $stmt->execute(array(
  2456. ':logged_in_as' => $mailbox,
  2457. ':goto' => $mailbox
  2458. ));
  2459. }
  2460. else {
  2461. $stmt = $pdo->prepare("SELECT `address` FROM `alias`
  2462. WHERE `goto` != :goto
  2463. AND `domain` IN (
  2464. SELECT `domain` FROM `domain_admins`
  2465. WHERE `username` = :username)
  2466. AND `address` NOT IN (
  2467. SELECT `send_as` FROM `sender_acl`
  2468. WHERE `logged_in_as` = :logged_in_as)");
  2469. $stmt->execute(array(
  2470. ':logged_in_as' => $mailbox,
  2471. ':goto' => $mailbox,
  2472. ':username' => $_SESSION['mailcow_cc_username']
  2473. ));
  2474. }
  2475. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2476. return $rows;
  2477. }
  2478. catch(PDOException $e) {
  2479. $_SESSION['return'] = array(
  2480. 'type' => 'danger',
  2481. 'msg' => 'MySQL: '.$e
  2482. );
  2483. return false;
  2484. }
  2485. break;
  2486. }
  2487. return false;
  2488. }
  2489. function is_valid_domain_name($domain_name) {
  2490. if (empty($domain_name)) {
  2491. return false;
  2492. }
  2493. $domain_name = idn_to_ascii($domain_name);
  2494. return (preg_match("/^([a-z\d](-*[a-z\d])*)(\.([a-z\d](-*[a-z\d])*))*$/i", $domain_name)
  2495. && preg_match("/^.{1,253}$/", $domain_name)
  2496. && preg_match("/^[^\.]{1,63}(\.[^\.]{1,63})*$/", $domain_name));
  2497. }
  2498. ?>