triggers.inc.php 6.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191
  1. <?php
  2. // handle keycloak authentication
  3. if ($keycloak_provider){
  4. if (isset($_GET['keycloak_sso'])){
  5. // redirect to keycloak for sso
  6. $redirect_uri = keycloak_get_redirect();
  7. header('Location: ' . $redirect_uri);
  8. die();
  9. }
  10. if ($_SESSION['keycloak_token'] && $_SESSION['keycloak_refresh_token']) {
  11. // Session found, try to refresh
  12. $isRefreshed = keycloak_refresh();
  13. if (!$isRefreshed){
  14. // Session could not be refreshed, clear and redirect to keycloak
  15. unset_auth_session();
  16. $redirect_uri = keycloak_get_redirect();
  17. header('Location: ' . $redirect_uri);
  18. die();
  19. }
  20. } elseif ($_GET['code'] && $_GET['state'] === $_SESSION['oauth2state']) {
  21. // Check given state against previously stored one to mitigate CSRF attack
  22. // Recieved access token in $_GET['code']
  23. // extract info and verify user
  24. $isValid = keycloak_verify_token();
  25. if (!$isValid){
  26. // Token could not be verified, redirect to keycloak
  27. $_SESSION['invalid_keycloak_sso'] = true;
  28. }
  29. }
  30. }
  31. // SSO Domain Admin
  32. if (!empty($_GET['sso_token'])) {
  33. $username = domain_admin_sso('check', $_GET['sso_token']);
  34. if ($username !== false) {
  35. $_SESSION['mailcow_cc_username'] = $username;
  36. $_SESSION['mailcow_cc_role'] = 'domainadmin';
  37. header('Location: /mailbox');
  38. }
  39. }
  40. if (isset($_POST["verify_tfa_login"])) {
  41. if (verify_tfa_login($_SESSION['pending_mailcow_cc_username'], $_POST)) {
  42. $_SESSION['mailcow_cc_username'] = $_SESSION['pending_mailcow_cc_username'];
  43. $_SESSION['mailcow_cc_role'] = $_SESSION['pending_mailcow_cc_role'];
  44. unset($_SESSION['pending_mailcow_cc_username']);
  45. unset($_SESSION['pending_mailcow_cc_role']);
  46. unset($_SESSION['pending_tfa_methods']);
  47. header("Location: /user");
  48. } else {
  49. unset($_SESSION['pending_mailcow_cc_username']);
  50. unset($_SESSION['pending_mailcow_cc_role']);
  51. unset($_SESSION['pending_tfa_methods']);
  52. }
  53. }
  54. if (isset($_GET["cancel_tfa_login"])) {
  55. unset($_SESSION['pending_mailcow_cc_username']);
  56. unset($_SESSION['pending_mailcow_cc_role']);
  57. unset($_SESSION['pending_tfa_methods']);
  58. header("Location: /");
  59. }
  60. if (isset($_POST["quick_release"])) {
  61. quarantine('quick_release', $_POST["quick_release"]);
  62. }
  63. if (isset($_POST["quick_delete"])) {
  64. quarantine('quick_delete', $_POST["quick_delete"]);
  65. }
  66. if (isset($_POST["login_user"]) && isset($_POST["pass_user"])) {
  67. $login_user = strtolower(trim($_POST["login_user"]));
  68. $as = check_login($login_user, $_POST["pass_user"]);
  69. if ($as == "admin") {
  70. $_SESSION['mailcow_cc_username'] = $login_user;
  71. $_SESSION['mailcow_cc_role'] = "admin";
  72. header("Location: /admin");
  73. }
  74. elseif ($as == "domainadmin") {
  75. $_SESSION['mailcow_cc_username'] = $login_user;
  76. $_SESSION['mailcow_cc_role'] = "domainadmin";
  77. header("Location: /mailbox");
  78. }
  79. elseif ($as == "user") {
  80. $_SESSION['mailcow_cc_username'] = $login_user;
  81. $_SESSION['mailcow_cc_role'] = "user";
  82. $http_parameters = explode('&', $_SESSION['index_query_string']);
  83. unset($_SESSION['index_query_string']);
  84. if (in_array('mobileconfig', $http_parameters)) {
  85. if (in_array('only_email', $http_parameters)) {
  86. header("Location: /mobileconfig.php?only_email");
  87. die();
  88. }
  89. header("Location: /mobileconfig.php");
  90. die();
  91. }
  92. header("Location: /user");
  93. }
  94. elseif ($as != "pending") {
  95. unset($_SESSION['pending_mailcow_cc_username']);
  96. unset($_SESSION['pending_mailcow_cc_role']);
  97. unset($_SESSION['pending_tfa_methods']);
  98. unset($_SESSION['mailcow_cc_username']);
  99. unset($_SESSION['mailcow_cc_role']);
  100. }
  101. }
  102. if (isset($_SESSION['mailcow_cc_role']) && (isset($_SESSION['acl']['login_as']) && $_SESSION['acl']['login_as'] == "1")) {
  103. if (isset($_GET["duallogin"])) {
  104. $duallogin = html_entity_decode(rawurldecode($_GET["duallogin"]));
  105. if (filter_var($duallogin, FILTER_VALIDATE_EMAIL)) {
  106. if (!empty(mailbox('get', 'mailbox_details', $duallogin))) {
  107. $_SESSION["dual-login"]["username"] = $_SESSION['mailcow_cc_username'];
  108. $_SESSION["dual-login"]["role"] = $_SESSION['mailcow_cc_role'];
  109. $_SESSION['mailcow_cc_username'] = $duallogin;
  110. $_SESSION['mailcow_cc_role'] = "user";
  111. header("Location: /user");
  112. }
  113. }
  114. else {
  115. if (!empty(domain_admin('details', $duallogin))) {
  116. $_SESSION["dual-login"]["username"] = $_SESSION['mailcow_cc_username'];
  117. $_SESSION["dual-login"]["role"] = $_SESSION['mailcow_cc_role'];
  118. $_SESSION['mailcow_cc_username'] = $duallogin;
  119. $_SESSION['mailcow_cc_role'] = "domainadmin";
  120. header("Location: /user");
  121. }
  122. }
  123. }
  124. }
  125. if (isset($_SESSION['mailcow_cc_role'])) {
  126. if (isset($_POST["set_tfa"])) {
  127. set_tfa($_POST);
  128. }
  129. if (isset($_POST["unset_tfa_key"])) {
  130. unset_tfa_key($_POST);
  131. }
  132. if (isset($_POST["unset_fido2_key"])) {
  133. fido2(array("action" => "unset_fido2_key", "post_data" => $_POST));
  134. }
  135. }
  136. if (isset($_SESSION['mailcow_cc_role']) && $_SESSION['mailcow_cc_role'] == "admin" && !isset($_SESSION['mailcow_cc_api'])) {
  137. // TODO: Move file upload to API?
  138. if (isset($_POST["submit_main_logo"])) {
  139. if ($_FILES['main_logo']['error'] == 0) {
  140. customize('add', 'main_logo', $_FILES);
  141. }
  142. if ($_FILES['main_logo_dark']['error'] == 0) {
  143. customize('add', 'main_logo_dark', $_FILES);
  144. }
  145. }
  146. if (isset($_POST["reset_main_logo"])) {
  147. customize('delete', 'main_logo');
  148. customize('delete', 'main_logo_dark');
  149. }
  150. // Some actions will not be available via API
  151. if (isset($_POST["license_validate_now"])) {
  152. license('verify');
  153. }
  154. if (isset($_POST["admin_api"])) {
  155. if (isset($_POST["admin_api"]["ro"])) {
  156. admin_api('ro', 'edit', $_POST);
  157. }
  158. elseif (isset($_POST["admin_api"]["rw"])) {
  159. admin_api('rw', 'edit', $_POST);
  160. }
  161. }
  162. if (isset($_POST["admin_api_regen_key"])) {
  163. if (isset($_POST["admin_api_regen_key"]["ro"])) {
  164. admin_api('ro', 'regen_key', $_POST);
  165. }
  166. elseif (isset($_POST["admin_api_regen_key"]["rw"])) {
  167. admin_api('rw', 'regen_key', $_POST);
  168. }
  169. }
  170. if (isset($_POST["rspamd_ui"])) {
  171. rspamd_ui('edit', $_POST);
  172. }
  173. if (isset($_POST["mass_send"])) {
  174. sys_mail($_POST);
  175. }
  176. }
  177. ?>