functions.domain_admin.inc.php 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461
  1. <?php
  2. function domain_admin($_action, $_data = null) {
  3. global $pdo;
  4. global $lang;
  5. $_data_log = $_data;
  6. !isset($_data_log['password']) ?: $_data_log['password'] = '*';
  7. !isset($_data_log['password2']) ?: $_data_log['password2'] = '*';
  8. !isset($_data_log['user_old_pass']) ?: $_data_log['user_old_pass'] = '*';
  9. !isset($_data_log['user_new_pass']) ?: $_data_log['user_new_pass'] = '*';
  10. !isset($_data_log['user_new_pass2']) ?: $_data_log['user_new_pass2'] = '*';
  11. switch ($_action) {
  12. case 'add':
  13. $username = strtolower(trim($_data['username']));
  14. $password = $_data['password'];
  15. $password2 = $_data['password2'];
  16. $domains = (array)$_data['domains'];
  17. $active = intval($_data['active']);
  18. if ($_SESSION['mailcow_cc_role'] != "admin") {
  19. $_SESSION['return'][] = array(
  20. 'type' => 'danger',
  21. 'log' => array(__FUNCTION__, $_action, $_data_log),
  22. 'msg' => 'access_denied'
  23. );
  24. return false;
  25. }
  26. if (empty($domains)) {
  27. $_SESSION['return'][] = array(
  28. 'type' => 'danger',
  29. 'log' => array(__FUNCTION__, $_action, $_data_log),
  30. 'msg' => 'domain_invalid'
  31. );
  32. return false;
  33. }
  34. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username)) || empty ($username)) {
  35. $_SESSION['return'][] = array(
  36. 'type' => 'danger',
  37. 'log' => array(__FUNCTION__, $_action, $_data_log),
  38. 'msg' => 'username_invalid'
  39. );
  40. return false;
  41. }
  42. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox`
  43. WHERE `username` = :username");
  44. $stmt->execute(array(':username' => $username));
  45. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  46. $stmt = $pdo->prepare("SELECT `username` FROM `admin`
  47. WHERE `username` = :username");
  48. $stmt->execute(array(':username' => $username));
  49. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  50. $stmt = $pdo->prepare("SELECT `username` FROM `domain_admins`
  51. WHERE `username` = :username");
  52. $stmt->execute(array(':username' => $username));
  53. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  54. foreach ($num_results as $num_results_each) {
  55. if ($num_results_each != 0) {
  56. $_SESSION['return'][] = array(
  57. 'type' => 'danger',
  58. 'log' => array(__FUNCTION__, $_action, $_data_log),
  59. 'msg' => array('object_exists', htmlspecialchars($username))
  60. );
  61. return false;
  62. }
  63. }
  64. if (!empty($password) && !empty($password2)) {
  65. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) {
  66. $_SESSION['return'][] = array(
  67. 'type' => 'danger',
  68. 'log' => array(__FUNCTION__, $_action, $_data_log),
  69. 'msg' => 'password_complexity'
  70. );
  71. return false;
  72. }
  73. if ($password != $password2) {
  74. $_SESSION['return'][] = array(
  75. 'type' => 'danger',
  76. 'log' => array(__FUNCTION__, $_action, $_data_log),
  77. 'msg' => 'password_mismatch'
  78. );
  79. return false;
  80. }
  81. $password_hashed = hash_password($password);
  82. foreach ($domains as $domain) {
  83. if (!is_valid_domain_name($domain)) {
  84. $_SESSION['return'][] = array(
  85. 'type' => 'danger',
  86. 'log' => array(__FUNCTION__, $_action, $_data_log),
  87. 'msg' => 'domain_invalid'
  88. );
  89. return false;
  90. }
  91. $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
  92. VALUES (:username, :domain, :created, :active)");
  93. $stmt->execute(array(
  94. ':username' => $username,
  95. ':domain' => $domain,
  96. ':created' => date('Y-m-d H:i:s'),
  97. ':active' => $active
  98. ));
  99. }
  100. $stmt = $pdo->prepare("INSERT INTO `admin` (`username`, `password`, `superadmin`, `active`)
  101. VALUES (:username, :password_hashed, '0', :active)");
  102. $stmt->execute(array(
  103. ':username' => $username,
  104. ':password_hashed' => $password_hashed,
  105. ':active' => $active
  106. ));
  107. }
  108. else {
  109. $_SESSION['return'][] = array(
  110. 'type' => 'danger',
  111. 'log' => array(__FUNCTION__, $_action, $_data_log),
  112. 'msg' => 'password_empty'
  113. );
  114. return false;
  115. }
  116. $stmt = $pdo->prepare("INSERT INTO `da_acl` (`username`) VALUES (:username)");
  117. $stmt->execute(array(
  118. ':username' => $username
  119. ));
  120. $_SESSION['return'][] = array(
  121. 'type' => 'success',
  122. 'log' => array(__FUNCTION__, $_action, $_data_log),
  123. 'msg' => array('domain_admin_added', htmlspecialchars($username))
  124. );
  125. break;
  126. case 'edit':
  127. if ($_SESSION['mailcow_cc_role'] != "admin" && $_SESSION['mailcow_cc_role'] != "domainadmin") {
  128. $_SESSION['return'][] = array(
  129. 'type' => 'danger',
  130. 'log' => array(__FUNCTION__, $_action, $_data_log),
  131. 'msg' => 'access_denied'
  132. );
  133. return false;
  134. }
  135. // Administrator
  136. if ($_SESSION['mailcow_cc_role'] == "admin") {
  137. if (!is_array($_data['username'])) {
  138. $usernames = array();
  139. $usernames[] = $_data['username'];
  140. }
  141. else {
  142. $usernames = $_data['username'];
  143. }
  144. foreach ($usernames as $username) {
  145. $is_now = domain_admin('details', $username);
  146. $domains = (isset($_data['domains'])) ? (array)$_data['domains'] : null;
  147. if (!empty($is_now)) {
  148. $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active_int'];
  149. $domains = (!empty($domains)) ? $domains : $is_now['selected_domains'];
  150. $username_new = (!empty($_data['username_new'])) ? $_data['username_new'] : $is_now['username'];
  151. }
  152. else {
  153. $_SESSION['return'][] = array(
  154. 'type' => 'danger',
  155. 'log' => array(__FUNCTION__, $_action, $_data_log),
  156. 'msg' => 'access_denied'
  157. );
  158. continue;
  159. }
  160. $password = $_data['password'];
  161. $password2 = $_data['password2'];
  162. if (!empty($domains)) {
  163. foreach ($domains as $domain) {
  164. if (!is_valid_domain_name($domain)) {
  165. $_SESSION['return'][] = array(
  166. 'type' => 'danger',
  167. 'log' => array(__FUNCTION__, $_action, $_data_log),
  168. 'msg' => array('domain_invalid', htmlspecialchars($domain))
  169. );
  170. continue 2;
  171. }
  172. }
  173. }
  174. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username_new))) {
  175. $_SESSION['return'][] = array(
  176. 'type' => 'danger',
  177. 'log' => array(__FUNCTION__, $_action, $_data_log),
  178. 'msg' => array('username_invalid', $username_new)
  179. );
  180. continue;
  181. }
  182. if ($username_new != $username) {
  183. if (!empty(domain_admin('details', $username_new)['username'])) {
  184. $_SESSION['return'][] = array(
  185. 'type' => 'danger',
  186. 'log' => array(__FUNCTION__, $_action, $_data_log),
  187. 'msg' => array('username_invalid', $username_new)
  188. );
  189. continue;
  190. }
  191. }
  192. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
  193. $stmt->execute(array(
  194. ':username' => $username,
  195. ));
  196. $stmt = $pdo->prepare("UPDATE `da_acl` SET `username` = :username_new WHERE `username` = :username");
  197. $stmt->execute(array(
  198. ':username_new' => $username_new,
  199. ':username' => $username
  200. ));
  201. if (!empty($domains)) {
  202. foreach ($domains as $domain) {
  203. $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
  204. VALUES (:username_new, :domain, :created, :active)");
  205. $stmt->execute(array(
  206. ':username_new' => $username_new,
  207. ':domain' => $domain,
  208. ':created' => date('Y-m-d H:i:s'),
  209. ':active' => $active
  210. ));
  211. }
  212. }
  213. if (!empty($password) && !empty($password2)) {
  214. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) {
  215. $_SESSION['return'][] = array(
  216. 'type' => 'danger',
  217. 'log' => array(__FUNCTION__, $_action, $_data_log),
  218. 'msg' => 'password_complexity'
  219. );
  220. continue;
  221. }
  222. if ($password != $password2) {
  223. $_SESSION['return'][] = array(
  224. 'type' => 'danger',
  225. 'log' => array(__FUNCTION__, $_action, $_data_log),
  226. 'msg' => 'password_mismatch'
  227. );
  228. continue;
  229. }
  230. $password_hashed = hash_password($password);
  231. $stmt = $pdo->prepare("UPDATE `admin` SET `username` = :username_new, `active` = :active, `password` = :password_hashed WHERE `username` = :username");
  232. $stmt->execute(array(
  233. ':password_hashed' => $password_hashed,
  234. ':username_new' => $username_new,
  235. ':username' => $username,
  236. ':active' => $active
  237. ));
  238. if (isset($_data['disable_tfa'])) {
  239. $stmt = $pdo->prepare("UPDATE `tfa` SET `active` = '0' WHERE `username` = :username");
  240. $stmt->execute(array(':username' => $username));
  241. }
  242. else {
  243. $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username_new WHERE `username` = :username");
  244. $stmt->execute(array(':username_new' => $username_new, ':username' => $username));
  245. }
  246. }
  247. else {
  248. $stmt = $pdo->prepare("UPDATE `admin` SET `username` = :username_new, `active` = :active WHERE `username` = :username");
  249. $stmt->execute(array(
  250. ':username_new' => $username_new,
  251. ':username' => $username,
  252. ':active' => $active
  253. ));
  254. if (isset($_data['disable_tfa'])) {
  255. $stmt = $pdo->prepare("UPDATE `tfa` SET `active` = '0' WHERE `username` = :username");
  256. $stmt->execute(array(':username' => $username));
  257. }
  258. else {
  259. $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username_new WHERE `username` = :username");
  260. $stmt->execute(array(':username_new' => $username_new, ':username' => $username));
  261. }
  262. }
  263. $_SESSION['return'][] = array(
  264. 'type' => 'success',
  265. 'log' => array(__FUNCTION__, $_action, $_data_log),
  266. 'msg' => array('domain_admin_modified', htmlspecialchars($username))
  267. );
  268. }
  269. return true;
  270. }
  271. // Domain administrator
  272. // Can only edit itself
  273. elseif ($_SESSION['mailcow_cc_role'] == "domainadmin") {
  274. $username = $_SESSION['mailcow_cc_username'];
  275. $password_old = $_data['user_old_pass'];
  276. $password_new = $_data['user_new_pass'];
  277. $password_new2 = $_data['user_new_pass2'];
  278. $stmt = $pdo->prepare("SELECT `password` FROM `admin`
  279. WHERE `username` = :user");
  280. $stmt->execute(array(':user' => $username));
  281. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  282. if (!verify_hash($row['password'], $password_old)) {
  283. $_SESSION['return'][] = array(
  284. 'type' => 'danger',
  285. 'log' => array(__FUNCTION__, $_action, $_data_log),
  286. 'msg' => 'access_denied'
  287. );
  288. return false;
  289. }
  290. if (!empty($password_new2) && !empty($password_new)) {
  291. if ($password_new2 != $password_new) {
  292. $_SESSION['return'][] = array(
  293. 'type' => 'danger',
  294. 'log' => array(__FUNCTION__, $_action, $_data_log),
  295. 'msg' => 'password_mismatch'
  296. );
  297. return false;
  298. }
  299. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password_new)) {
  300. $_SESSION['return'][] = array(
  301. 'type' => 'danger',
  302. 'log' => array(__FUNCTION__, $_action, $_data_log),
  303. 'msg' => 'password_complexity'
  304. );
  305. return false;
  306. }
  307. $password_hashed = hash_password($password_new);
  308. $stmt = $pdo->prepare("UPDATE `admin` SET `password` = :password_hashed WHERE `username` = :username");
  309. $stmt->execute(array(
  310. ':password_hashed' => $password_hashed,
  311. ':username' => $username
  312. ));
  313. }
  314. $_SESSION['return'][] = array(
  315. 'type' => 'success',
  316. 'log' => array(__FUNCTION__, $_action, $_data_log),
  317. 'msg' => array('domain_admin_modified', htmlspecialchars($username))
  318. );
  319. }
  320. break;
  321. case 'delete':
  322. if ($_SESSION['mailcow_cc_role'] != "admin") {
  323. $_SESSION['return'][] = array(
  324. 'type' => 'danger',
  325. 'log' => array(__FUNCTION__, $_action, $_data_log),
  326. 'msg' => 'access_denied'
  327. );
  328. return false;
  329. }
  330. $usernames = (array)$_data['username'];
  331. foreach ($usernames as $username) {
  332. if (empty(domain_admin('details', $username))) {
  333. $_SESSION['return'][] = array(
  334. 'type' => 'danger',
  335. 'log' => array(__FUNCTION__, $_action, $_data_log),
  336. 'msg' => array('username_invalid', $username)
  337. );
  338. continue;
  339. }
  340. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
  341. $stmt->execute(array(
  342. ':username' => $username,
  343. ));
  344. $stmt = $pdo->prepare("DELETE FROM `admin` WHERE `username` = :username");
  345. $stmt->execute(array(
  346. ':username' => $username,
  347. ));
  348. $stmt = $pdo->prepare("DELETE FROM `da_acl` WHERE `username` = :username");
  349. $stmt->execute(array(
  350. ':username' => $username,
  351. ));
  352. $_SESSION['return'][] = array(
  353. 'type' => 'success',
  354. 'log' => array(__FUNCTION__, $_action, $_data_log),
  355. 'msg' => array('domain_admin_removed', htmlspecialchars($username))
  356. );
  357. }
  358. break;
  359. case 'get':
  360. $domainadmins = array();
  361. if ($_SESSION['mailcow_cc_role'] != "admin") {
  362. $_SESSION['return'][] = array(
  363. 'type' => 'danger',
  364. 'log' => array(__FUNCTION__, $_action, $_data_log),
  365. 'msg' => 'access_denied'
  366. );
  367. return false;
  368. }
  369. $stmt = $pdo->query("SELECT DISTINCT
  370. `username`
  371. FROM `domain_admins`
  372. WHERE `username` IN (
  373. SELECT `username` FROM `admin`
  374. WHERE `superadmin`!='1'
  375. )");
  376. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  377. while ($row = array_shift($rows)) {
  378. $domainadmins[] = $row['username'];
  379. }
  380. return $domainadmins;
  381. break;
  382. case 'details':
  383. $domainadmindata = array();
  384. if ($_SESSION['mailcow_cc_role'] == "domainadmin" && $_data != $_SESSION['mailcow_cc_username']) {
  385. return false;
  386. }
  387. elseif ($_SESSION['mailcow_cc_role'] != "admin" || !isset($_data)) {
  388. return false;
  389. }
  390. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $_data))) {
  391. return false;
  392. }
  393. $stmt = $pdo->prepare("SELECT
  394. `tfa`.`active` AS `tfa_active_int`,
  395. CASE `tfa`.`active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `tfa_active`,
  396. `domain_admins`.`username`,
  397. `domain_admins`.`created`,
  398. `domain_admins`.`active` AS `active_int`,
  399. CASE `domain_admins`.`active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`
  400. FROM `domain_admins`
  401. LEFT OUTER JOIN `tfa` ON `tfa`.`username`=`domain_admins`.`username`
  402. WHERE `domain_admins`.`username`= :domain_admin");
  403. $stmt->execute(array(
  404. ':domain_admin' => $_data
  405. ));
  406. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  407. if (empty($row)) {
  408. return false;
  409. }
  410. $domainadmindata['username'] = $row['username'];
  411. $domainadmindata['tfa_active'] = $row['tfa_active'];
  412. $domainadmindata['active'] = $row['active'];
  413. $domainadmindata['tfa_active_int'] = $row['tfa_active_int'];
  414. $domainadmindata['active_int'] = $row['active_int'];
  415. $domainadmindata['created'] = $row['created'];
  416. // GET SELECTED
  417. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  418. WHERE `domain` IN (
  419. SELECT `domain` FROM `domain_admins`
  420. WHERE `username`= :domain_admin)");
  421. $stmt->execute(array(':domain_admin' => $_data));
  422. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  423. while($row = array_shift($rows)) {
  424. $domainadmindata['selected_domains'][] = $row['domain'];
  425. }
  426. // GET UNSELECTED
  427. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  428. WHERE `domain` NOT IN (
  429. SELECT `domain` FROM `domain_admins`
  430. WHERE `username`= :domain_admin)");
  431. $stmt->execute(array(':domain_admin' => $_data));
  432. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  433. while($row = array_shift($rows)) {
  434. $domainadmindata['unselected_domains'][] = $row['domain'];
  435. }
  436. if (!isset($domainadmindata['unselected_domains'])) {
  437. $domainadmindata['unselected_domains'] = "";
  438. }
  439. return $domainadmindata;
  440. break;
  441. case 'total_quota':
  442. if ($_SESSION['mailcow_cc_role'] != "admin") {
  443. $_SESSION['return'][] = array(
  444. 'type' => 'danger',
  445. 'log' => array(__FUNCTION__, $_action, $_data_log),
  446. 'msg' => 'access_denied'
  447. );
  448. return false;
  449. }
  450. $stmt = $pdo->query("SELECT SUM(`quota`) AS `quota` FROM `domain` WHERE `active`=1");
  451. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  452. return $row['quota'];
  453. break;
  454. }
  455. }