functions.inc.php 81 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758
  1. <?php
  2. function hash_password($password) {
  3. $salt_str = bin2hex(openssl_random_pseudo_bytes(8));
  4. return "{SSHA256}".base64_encode(hash('sha256', $password . $salt_str, true) . $salt_str);
  5. }
  6. function hasDomainAccess($username, $role, $domain) {
  7. global $pdo;
  8. if (!filter_var($username, FILTER_VALIDATE_EMAIL) && !ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
  9. return false;
  10. }
  11. if (!is_valid_domain_name($domain)) {
  12. return false;
  13. }
  14. if ($role != 'admin' && $role != 'domainadmin' && $role != 'user') {
  15. return false;
  16. }
  17. try {
  18. $stmt = $pdo->prepare("SELECT `domain` FROM `domain_admins`
  19. WHERE (
  20. `active`='1'
  21. AND `username` = :username
  22. AND `domain` = :domain
  23. )
  24. OR 'admin' = :role");
  25. $stmt->execute(array(':username' => $username, ':domain' => $domain, ':role' => $role));
  26. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  27. } catch(PDOException $e) {
  28. error_log($e);
  29. return false;
  30. }
  31. if ($num_results != 0 && !empty($num_results)) {
  32. return true;
  33. }
  34. return false;
  35. }
  36. function init_db_schema() {
  37. global $pdo;
  38. try {
  39. $stmt = $pdo->prepare("SELECT `username` FROM `admin`");
  40. $stmt->execute();
  41. }
  42. catch (Exception $e) {
  43. $lines = file('/web/inc/init.sql');
  44. $data = '';
  45. foreach ($lines as $line) {
  46. if (substr($line, 0, 2) == '--' || $line == '') {
  47. continue;
  48. }
  49. $data .= $line;
  50. if (substr(trim($line), -1, 1) == ';') {
  51. $pdo->query($data);
  52. $data = '';
  53. }
  54. }
  55. // Create index if not exists
  56. $stmt = $pdo->query("SHOW INDEX FROM sogo_acl WHERE KEY_NAME = 'sogo_acl_c_folder_id_idx'");
  57. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  58. if ($num_results == 0) {
  59. $pdo->query("CREATE INDEX sogo_acl_c_folder_id_idx ON sogo_acl(c_folder_id)");
  60. }
  61. $stmt = $pdo->query("SHOW INDEX FROM sogo_acl WHERE KEY_NAME = 'sogo_acl_c_uid_idx'");
  62. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  63. if ($num_results == 0) {
  64. $pdo->query("CREATE INDEX sogo_acl_c_uid_idx ON sogo_acl(c_uid)");
  65. }
  66. $_SESSION['return'] = array(
  67. 'type' => 'success',
  68. 'msg' => 'Database initialization completed.'
  69. );
  70. }
  71. // Add newly added columns
  72. $stmt = $pdo->query("SHOW COLUMNS FROM `mailbox` LIKE 'kind'");
  73. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  74. if ($num_results == 0) {
  75. $pdo->query("ALTER TABLE `mailbox` ADD `kind` varchar(100) NOT NULL DEFAULT ''");
  76. }
  77. $stmt = $pdo->query("SHOW COLUMNS FROM `mailbox` LIKE 'multiple_bookings'");
  78. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  79. if ($num_results == 0) {
  80. $pdo->query("ALTER TABLE `mailbox` ADD `multiple_bookings` tinyint(1) NOT NULL DEFAULT '0'");
  81. }
  82. $stmt = $pdo->query("SHOW COLUMNS FROM `mailbox` LIKE 'wants_tagged_subject'");
  83. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  84. if ($num_results == 0) {
  85. $pdo->query("ALTER TABLE `mailbox` ADD `wants_tagged_subject` tinyint(1) NOT NULL DEFAULT '0'");
  86. }
  87. }
  88. function verify_ssha256($hash, $password) {
  89. // Remove tag if any
  90. $hash = ltrim($hash, '{SSHA256}');
  91. // Decode hash
  92. $dhash = base64_decode($hash);
  93. // Get first 32 bytes of binary which equals a SHA256 hash
  94. $ohash = substr($dhash, 0, 32);
  95. // Remove SHA256 hash from decoded hash to get original salt string
  96. $osalt = str_replace($ohash, '', $dhash);
  97. // Check single salted SHA256 hash against extracted hash
  98. if (hash('sha256', $password . $osalt, true) == $ohash) {
  99. return true;
  100. }
  101. else {
  102. return false;
  103. }
  104. }
  105. function doveadm_authenticate($hash, $algorithm, $password) {
  106. $descr = array(0 => array('pipe', 'r'), 1 => array('pipe', 'w'), 2 => array('pipe', 'w'));
  107. $pipes = array();
  108. $process = proc_open("/usr/bin/doveadm pw -s ".$algorithm." -t '".$hash."'", $descr, $pipes);
  109. if (is_resource($process)) {
  110. fputs($pipes[0], $password);
  111. fclose($pipes[0]);
  112. while ($f = fgets($pipes[1])) {
  113. if (preg_match('/(verified)/', $f)) {
  114. proc_close($process);
  115. return true;
  116. }
  117. return false;
  118. }
  119. fclose($pipes[1]);
  120. while ($f = fgets($pipes[2])) {
  121. proc_close($process);
  122. return false;
  123. }
  124. fclose($pipes[2]);
  125. proc_close($process);
  126. }
  127. return false;
  128. }
  129. function check_login($user, $pass) {
  130. global $pdo;
  131. if (!filter_var($user, FILTER_VALIDATE_EMAIL) && !ctype_alnum(str_replace(array('_', '.', '-'), '', $user))) {
  132. return false;
  133. }
  134. $user = strtolower(trim($user));
  135. $stmt = $pdo->prepare("SELECT `password` FROM `admin`
  136. WHERE `superadmin` = '1'
  137. AND `username` = :user");
  138. $stmt->execute(array(':user' => $user));
  139. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  140. foreach ($rows as $row) {
  141. if (verify_ssha256($row['password'], $pass) !== false) {
  142. unset($_SESSION['ldelay']);
  143. return "admin";
  144. }
  145. }
  146. $stmt = $pdo->prepare("SELECT `password` FROM `admin`
  147. WHERE `superadmin` = '0'
  148. AND `active`='1'
  149. AND `username` = :user");
  150. $stmt->execute(array(':user' => $user));
  151. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  152. foreach ($rows as $row) {
  153. if (verify_ssha256($row['password'], $pass) !== false) {
  154. unset($_SESSION['ldelay']);
  155. return "domainadmin";
  156. }
  157. }
  158. $stmt = $pdo->prepare("SELECT `password` FROM `mailbox`
  159. WHERE `active`='1'
  160. AND `username` = :user");
  161. $stmt->execute(array(':user' => $user));
  162. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  163. foreach ($rows as $row) {
  164. if (verify_ssha256($row['password'], $pass) !== false) {
  165. unset($_SESSION['ldelay']);
  166. return "user";
  167. }
  168. }
  169. if (!isset($_SESSION['ldelay'])) {
  170. $_SESSION['ldelay'] = "0";
  171. }
  172. elseif (!isset($_SESSION['mailcow_cc_username'])) {
  173. $_SESSION['ldelay'] = $_SESSION['ldelay']+0.5;
  174. }
  175. sleep($_SESSION['ldelay']);
  176. }
  177. function formatBytes($size, $precision = 2) {
  178. if(!is_numeric($size)) {
  179. return "0";
  180. }
  181. $base = log($size, 1024);
  182. $suffixes = array(' Byte', ' KiB', ' MiB', ' GiB', ' TiB');
  183. if ($size == "0") {
  184. return "0";
  185. }
  186. return round(pow(1024, $base - floor($base)), $precision) . $suffixes[floor($base)];
  187. }
  188. function dkim_table($action, $item) {
  189. global $lang;
  190. switch ($action) {
  191. case "delete":
  192. $domain = preg_replace('/[^A-Za-z0-9._\-]/', '_', $item['dkim']['domain']);
  193. if (!is_valid_domain_name($domain)) {
  194. $_SESSION['return'] = array(
  195. 'type' => 'danger',
  196. 'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid'])
  197. );
  198. break;
  199. }
  200. exec('rm ' . escapeshellarg($GLOBALS['MC_DKIM_TXTS'] . '/' . $domain . '.dkim'), $out, $return);
  201. if ($return != "0") {
  202. $_SESSION['return'] = array(
  203. 'type' => 'danger',
  204. 'msg' => sprintf($lang['danger']['dkim_remove_failed'])
  205. );
  206. break;
  207. }
  208. exec('rm ' . escapeshellarg($GLOBALS['MC_DKIM_KEYS'] . '/' . $domain . '.dkim'), $out, $return);
  209. if ($return != "0") {
  210. $_SESSION['return'] = array(
  211. 'type' => 'danger',
  212. 'msg' => sprintf($lang['danger']['dkim_remove_failed'])
  213. );
  214. break;
  215. }
  216. $_SESSION['return'] = array(
  217. 'type' => 'success',
  218. 'msg' => sprintf($lang['success']['dkim_removed'])
  219. );
  220. break;
  221. case "add":
  222. $domain = preg_replace('/[^A-Za-z0-9._\-]/', '_', $item['dkim']['domain']);
  223. $key_length = intval($item['dkim']['key_size']);
  224. if (!is_valid_domain_name($domain) || !is_numeric($key_length)) {
  225. $_SESSION['return'] = array(
  226. 'type' => 'danger',
  227. 'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid'])
  228. );
  229. break;
  230. }
  231. if (!empty(glob($GLOBALS['MC_DKIM_TXTS'] . '/' . $domain . '.dkim'))) {
  232. $_SESSION['return'] = array(
  233. 'type' => 'danger',
  234. 'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid'])
  235. );
  236. break;
  237. }
  238. $config = array(
  239. "digest_alg" => "sha256",
  240. "private_key_bits" => $key_length,
  241. "private_key_type" => OPENSSL_KEYTYPE_RSA,
  242. );
  243. $keypair_ressource = openssl_pkey_new($config);
  244. $key_details = openssl_pkey_get_details($keypair_ressource);
  245. $pubKey = implode(array_slice(
  246. array_filter(
  247. explode(PHP_EOL, $key_details['key'])
  248. ), 1, -1)
  249. );
  250. // Save public key to file
  251. file_put_contents($GLOBALS['MC_DKIM_TXTS'] . '/' . $domain . '.dkim', $pubKey);
  252. // Save private key to file
  253. openssl_pkey_export_to_file($keypair_ressource, $GLOBALS['MC_DKIM_KEYS'] . '/' . $domain . '.dkim');
  254. $_SESSION['return'] = array(
  255. 'type' => 'success',
  256. 'msg' => sprintf($lang['success']['dkim_added'])
  257. );
  258. break;
  259. }
  260. }
  261. function mailbox_add_domain($postarray) {
  262. global $pdo;
  263. global $lang;
  264. if ($_SESSION['mailcow_cc_role'] != "admin") {
  265. $_SESSION['return'] = array(
  266. 'type' => 'danger',
  267. 'msg' => sprintf($lang['danger']['access_denied'])
  268. );
  269. return false;
  270. }
  271. $domain = idn_to_ascii(strtolower(trim($postarray['domain'])));
  272. $description = $postarray['description'];
  273. $aliases = $postarray['aliases'];
  274. $mailboxes = $postarray['mailboxes'];
  275. $maxquota = $postarray['maxquota'];
  276. $quota = $postarray['quota'];
  277. if ($maxquota > $quota) {
  278. $_SESSION['return'] = array(
  279. 'type' => 'danger',
  280. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeds_domain_quota'])
  281. );
  282. return false;
  283. }
  284. isset($postarray['active']) ? $active = '1' : $active = '0';
  285. isset($postarray['relay_all_recipients']) ? $relay_all_recipients = '1' : $relay_all_recipients = '0';
  286. isset($postarray['backupmx']) ? $backupmx = '1' : $backupmx = '0';
  287. isset($postarray['relay_all_recipients']) ? $backupmx = '1' : true;
  288. if (!is_valid_domain_name($domain)) {
  289. $_SESSION['return'] = array(
  290. 'type' => 'danger',
  291. 'msg' => sprintf($lang['danger']['domain_invalid'])
  292. );
  293. return false;
  294. }
  295. foreach (array($quota, $maxquota, $mailboxes, $aliases) as $data) {
  296. if (!is_numeric($data)) {
  297. $_SESSION['return'] = array(
  298. 'type' => 'danger',
  299. 'msg' => sprintf($lang['danger']['object_is_not_numeric'], htmlspecialchars($data))
  300. );
  301. return false;
  302. }
  303. }
  304. try {
  305. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  306. WHERE `domain` = :domain");
  307. $stmt->execute(array(':domain' => $domain));
  308. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  309. $stmt = $pdo->prepare("SELECT `alias_domain` FROM `alias_domain`
  310. WHERE `alias_domain` = :domain");
  311. $stmt->execute(array(':domain' => $domain));
  312. $num_results = $num_results + count($stmt->fetchAll(PDO::FETCH_ASSOC));
  313. }
  314. catch(PDOException $e) {
  315. $_SESSION['return'] = array(
  316. 'type' => 'danger',
  317. 'msg' => 'MySQL: '.$e
  318. );
  319. return false;
  320. }
  321. if ($num_results != 0) {
  322. $_SESSION['return'] = array(
  323. 'type' => 'danger',
  324. 'msg' => sprintf($lang['danger']['domain_exists'], htmlspecialchars($domain))
  325. );
  326. return false;
  327. }
  328. try {
  329. $stmt = $pdo->prepare("INSERT INTO `domain` (`domain`, `description`, `aliases`, `mailboxes`, `maxquota`, `quota`, `transport`, `backupmx`, `created`, `modified`, `active`, `relay_all_recipients`)
  330. VALUES (:domain, :description, :aliases, :mailboxes, :maxquota, :quota, 'virtual', :backupmx, :created, :modified, :active, :relay_all_recipients)");
  331. $stmt->execute(array(
  332. ':domain' => $domain,
  333. ':description' => $description,
  334. ':aliases' => $aliases,
  335. ':mailboxes' => $mailboxes,
  336. ':maxquota' => $maxquota,
  337. ':quota' => $quota,
  338. ':backupmx' => $backupmx,
  339. ':active' => $active,
  340. ':created' => date('Y-m-d H:i:s'),
  341. ':modified' => date('Y-m-d H:i:s'),
  342. ':relay_all_recipients' => $relay_all_recipients
  343. ));
  344. //
  345. // PoC for a restart with supervisord unix socket
  346. // * $sock = stream_socket_client("unix:///var/run/controller/supervisord.sock", $errno, $errstr, 30);
  347. // * fwrite($sock, "GET ?processname=sogo&action=restart HTTP/1.0\r\nAccept: */*\r\n\r\n");
  348. // * fclose($sock);
  349. //
  350. $_SESSION['return'] = array(
  351. 'type' => 'success',
  352. 'msg' => sprintf($lang['success']['domain_added'], htmlspecialchars($domain))
  353. );
  354. }
  355. catch (PDOException $e) {
  356. $_SESSION['return'] = array(
  357. 'type' => 'danger',
  358. 'msg' => 'MySQL: '.$e
  359. );
  360. return false;
  361. }
  362. }
  363. function mailbox_add_alias($postarray) {
  364. global $lang;
  365. global $pdo;
  366. $addresses = array_map('trim', preg_split( "/( |,|;|\n)/", $postarray['address']));
  367. $gotos = array_map('trim', preg_split( "/( |,|;|\n)/", $postarray['goto']));
  368. isset($postarray['active']) ? $active = '1' : $active = '0';
  369. if (empty($addresses[0])) {
  370. $_SESSION['return'] = array(
  371. 'type' => 'danger',
  372. 'msg' => sprintf($lang['danger']['alias_empty'])
  373. );
  374. return false;
  375. }
  376. if (empty($gotos[0])) {
  377. $_SESSION['return'] = array(
  378. 'type' => 'danger',
  379. 'msg' => sprintf($lang['danger']['goto_empty'])
  380. );
  381. return false;
  382. }
  383. foreach ($addresses as $address) {
  384. if (empty($address)) {
  385. continue;
  386. }
  387. $domain = idn_to_ascii(substr(strstr($address, '@'), 1));
  388. $local_part = strstr($address, '@', true);
  389. $address = $local_part.'@'.$domain;
  390. if ((!filter_var($address, FILTER_VALIDATE_EMAIL) === true) && !empty($local_part)) {
  391. $_SESSION['return'] = array(
  392. 'type' => 'danger',
  393. 'msg' => sprintf($lang['danger']['alias_invalid'])
  394. );
  395. return false;
  396. }
  397. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  398. $_SESSION['return'] = array(
  399. 'type' => 'danger',
  400. 'msg' => sprintf($lang['danger']['access_denied'])
  401. );
  402. return false;
  403. }
  404. try {
  405. $stmt = $pdo->prepare("SELECT `address` FROM `alias`
  406. WHERE `address`= :address");
  407. $stmt->execute(array(':address' => $address));
  408. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  409. }
  410. catch(PDOException $e) {
  411. $_SESSION['return'] = array(
  412. 'type' => 'danger',
  413. 'msg' => 'MySQL: '.$e
  414. );
  415. return false;
  416. }
  417. if ($num_results != 0) {
  418. $_SESSION['return'] = array(
  419. 'type' => 'danger',
  420. 'msg' => sprintf($lang['danger']['is_alias_or_mailbox'], htmlspecialchars($address))
  421. );
  422. return false;
  423. }
  424. try {
  425. $stmt = $pdo->prepare("SELECT `address` FROM `spamalias`
  426. WHERE `address`= :address");
  427. $stmt->execute(array(':address' => $address));
  428. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  429. }
  430. catch(PDOException $e) {
  431. $_SESSION['return'] = array(
  432. 'type' => 'danger',
  433. 'msg' => 'MySQL: '.$e
  434. );
  435. return false;
  436. }
  437. if ($num_results != 0) {
  438. $_SESSION['return'] = array(
  439. 'type' => 'danger',
  440. 'msg' => sprintf($lang['danger']['is_spam_alias'], htmlspecialchars($address))
  441. );
  442. return false;
  443. }
  444. foreach ($gotos as &$goto) {
  445. if (empty($goto)) {
  446. continue;
  447. }
  448. $goto_domain = idn_to_ascii(substr(strstr($goto, '@'), 1));
  449. $goto_local_part = strstr($goto, '@', true);
  450. $goto = $goto_local_part.'@'.$goto_domain;
  451. if (!filter_var($goto, FILTER_VALIDATE_EMAIL) === true) {
  452. $_SESSION['return'] = array(
  453. 'type' => 'danger',
  454. 'msg' => sprintf($lang['danger']['goto_invalid'])
  455. );
  456. return false;
  457. }
  458. if ($goto == $address) {
  459. $_SESSION['return'] = array(
  460. 'type' => 'danger',
  461. 'msg' => sprintf($lang['danger']['alias_goto_identical'])
  462. );
  463. return false;
  464. }
  465. }
  466. $gotos = array_filter($gotos);
  467. $goto = implode(",", $gotos);
  468. try {
  469. $stmt = $pdo->prepare("INSERT INTO `alias` (`address`, `goto`, `domain`, `created`, `modified`, `active`)
  470. VALUES (:address, :goto, :domain, :created, :modified, :active)");
  471. if (!filter_var($address, FILTER_VALIDATE_EMAIL) === true) {
  472. $stmt->execute(array(
  473. ':address' => '@'.$domain,
  474. ':goto' => $goto,
  475. ':domain' => $domain,
  476. ':created' => date('Y-m-d H:i:s'),
  477. ':modified' => date('Y-m-d H:i:s'),
  478. ':active' => $active
  479. ));
  480. }
  481. else {
  482. $stmt->execute(array(
  483. ':address' => $address,
  484. ':goto' => $goto,
  485. ':domain' => $domain,
  486. ':created' => date('Y-m-d H:i:s'),
  487. ':modified' => date('Y-m-d H:i:s'),
  488. ':active' => $active
  489. ));
  490. }
  491. $_SESSION['return'] = array(
  492. 'type' => 'success',
  493. 'msg' => sprintf($lang['success']['alias_added'])
  494. );
  495. }
  496. catch (PDOException $e) {
  497. $_SESSION['return'] = array(
  498. 'type' => 'danger',
  499. 'msg' => 'MySQL: '.$e
  500. );
  501. return false;
  502. }
  503. }
  504. $_SESSION['return'] = array(
  505. 'type' => 'success',
  506. 'msg' => sprintf($lang['success']['alias_added'])
  507. );
  508. }
  509. function mailbox_add_alias_domain($postarray) {
  510. global $lang;
  511. global $pdo;
  512. isset($postarray['active']) ? $active = '1' : $active = '0';
  513. if (!is_valid_domain_name($postarray['alias_domain'])) {
  514. $_SESSION['return'] = array(
  515. 'type' => 'danger',
  516. 'msg' => sprintf($lang['danger']['alias_domain_invalid'])
  517. );
  518. return false;
  519. }
  520. if (!is_valid_domain_name($postarray['target_domain'])) {
  521. $_SESSION['return'] = array(
  522. 'type' => 'danger',
  523. 'msg' => sprintf($lang['danger']['target_domain_invalid'])
  524. );
  525. return false;
  526. }
  527. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $postarray['target_domain'])) {
  528. $_SESSION['return'] = array(
  529. 'type' => 'danger',
  530. 'msg' => sprintf($lang['danger']['access_denied'])
  531. );
  532. return false;
  533. }
  534. if ($postarray['alias_domain'] == $postarray['target_domain']) {
  535. $_SESSION['return'] = array(
  536. 'type' => 'danger',
  537. 'msg' => sprintf($lang['danger']['aliasd_targetd_identical'])
  538. );
  539. return false;
  540. }
  541. $alias_domain = strtolower(trim($postarray['alias_domain']));
  542. $target_domain = strtolower(trim($postarray['target_domain']));
  543. try {
  544. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  545. WHERE `domain`= :target_domain");
  546. $stmt->execute(array(':target_domain' => $target_domain));
  547. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  548. }
  549. catch(PDOException $e) {
  550. $_SESSION['return'] = array(
  551. 'type' => 'danger',
  552. 'msg' => 'MySQL: '.$e
  553. );
  554. return false;
  555. }
  556. if ($num_results == 0) {
  557. $_SESSION['return'] = array(
  558. 'type' => 'danger',
  559. 'msg' => sprintf($lang['danger']['targetd_not_found'])
  560. );
  561. return false;
  562. }
  563. try {
  564. $stmt = $pdo->prepare("SELECT `alias_domain` FROM `alias_domain` WHERE `alias_domain`= :alias_domain
  565. UNION
  566. SELECT `alias_domain` FROM `alias_domain` WHERE `alias_domain`= :alias_domain_in_domain");
  567. $stmt->execute(array(':alias_domain' => $alias_domain, ':alias_domain_in_domain' => $alias_domain));
  568. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  569. }
  570. catch(PDOException $e) {
  571. $_SESSION['return'] = array(
  572. 'type' => 'danger',
  573. 'msg' => 'MySQL: '.$e
  574. );
  575. return false;
  576. }
  577. if ($num_results != 0) {
  578. $_SESSION['return'] = array(
  579. 'type' => 'danger',
  580. 'msg' => sprintf($lang['danger']['aliasd_exists'])
  581. );
  582. return false;
  583. }
  584. try {
  585. $stmt = $pdo->prepare("INSERT INTO `alias_domain` (`alias_domain`, `target_domain`, `created`, `modified`, `active`)
  586. VALUES (:alias_domain, :target_domain, :created, :modified, :active)");
  587. $stmt->execute(array(
  588. ':alias_domain' => $alias_domain,
  589. ':target_domain' => $target_domain,
  590. ':created' => date('Y-m-d H:i:s'),
  591. ':modified' => date('Y-m-d H:i:s'),
  592. ':active' => $active
  593. ));
  594. $_SESSION['return'] = array(
  595. 'type' => 'success',
  596. 'msg' => sprintf($lang['success']['aliasd_added'], htmlspecialchars($alias_domain))
  597. );
  598. }
  599. catch (PDOException $e) {
  600. $_SESSION['return'] = array(
  601. 'type' => 'danger',
  602. 'msg' => 'MySQL: '.$e
  603. );
  604. return false;
  605. }
  606. }
  607. function mailbox_edit_alias_domain($postarray) {
  608. global $lang;
  609. global $pdo;
  610. isset($postarray['active']) ? $active = '1' : $active = '0';
  611. $alias_domain = idn_to_ascii($postarray['alias_domain']);
  612. $alias_domain = strtolower(trim($alias_domain));
  613. $alias_domain_now = strtolower(trim($postarray['alias_domain_now']));
  614. if (!is_valid_domain_name($alias_domain)) {
  615. $_SESSION['return'] = array(
  616. 'type' => 'danger',
  617. 'msg' => sprintf($lang['danger']['alias_domain_invalid'])
  618. );
  619. return false;
  620. }
  621. if (!is_valid_domain_name($alias_domain_now)) {
  622. $_SESSION['return'] = array(
  623. 'type' => 'danger',
  624. 'msg' => sprintf($lang['danger']['alias_domain_invalid'])
  625. );
  626. return false;
  627. }
  628. try {
  629. $stmt = $pdo->prepare("SELECT `target_domain` FROM `alias_domain`
  630. WHERE `alias_domain`= :alias_domain_now");
  631. $stmt->execute(array(':alias_domain_now' => $alias_domain_now));
  632. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  633. }
  634. catch(PDOException $e) {
  635. $_SESSION['return'] = array(
  636. 'type' => 'danger',
  637. 'msg' => 'MySQL: '.$e
  638. );
  639. return false;
  640. }
  641. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $DomainData['target_domain'])) {
  642. $_SESSION['return'] = array(
  643. 'type' => 'danger',
  644. 'msg' => sprintf($lang['danger']['access_denied'])
  645. );
  646. return false;
  647. }
  648. try {
  649. $stmt = $pdo->prepare("SELECT `target_domain` FROM `alias_domain`
  650. WHERE `target_domain`= :alias_domain");
  651. $stmt->execute(array(':alias_domain' => $alias_domain));
  652. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  653. }
  654. catch(PDOException $e) {
  655. $_SESSION['return'] = array(
  656. 'type' => 'danger',
  657. 'msg' => 'MySQL: '.$e
  658. );
  659. return false;
  660. }
  661. if ($num_results != 0) {
  662. $_SESSION['return'] = array(
  663. 'type' => 'danger',
  664. 'msg' => sprintf($lang['danger']['aliasd_targetd_identical'])
  665. );
  666. return false;
  667. }
  668. try {
  669. $stmt = $pdo->prepare("UPDATE `alias_domain` SET `alias_domain` = :alias_domain, `active` = :active WHERE `alias_domain` = :alias_domain_now");
  670. $stmt->execute(array(
  671. ':alias_domain' => $alias_domain,
  672. ':alias_domain_now' => $alias_domain_now,
  673. ':active' => $active
  674. ));
  675. }
  676. catch (PDOException $e) {
  677. $_SESSION['return'] = array(
  678. 'type' => 'danger',
  679. 'msg' => 'MySQL: '.$e
  680. );
  681. return false;
  682. }
  683. $_SESSION['return'] = array(
  684. 'type' => 'success',
  685. 'msg' => sprintf($lang['success']['aliasd_modified'], htmlspecialchars($alias_domain))
  686. );
  687. }
  688. function mailbox_add_mailbox($postarray) {
  689. global $pdo;
  690. global $lang;
  691. $username = strtolower(trim($postarray['local_part'])).'@'.strtolower(trim($postarray['domain']));
  692. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  693. $_SESSION['return'] = array(
  694. 'type' => 'danger',
  695. 'msg' => sprintf($lang['danger']['mailbox_invalid'])
  696. );
  697. return false;
  698. }
  699. if (empty($postarray['local_part'])) {
  700. $_SESSION['return'] = array(
  701. 'type' => 'danger',
  702. 'msg' => sprintf($lang['danger']['mailbox_invalid'])
  703. );
  704. return false;
  705. }
  706. $domain = strtolower(trim($postarray['domain']));
  707. $password = $postarray['password'];
  708. $password2 = $postarray['password2'];
  709. $local_part = strtolower(trim($postarray['local_part']));
  710. $name = $postarray['name'];
  711. $quota_m = $postarray['quota'];
  712. if (empty($name)) {
  713. $name = $local_part;
  714. }
  715. isset($postarray['active']) ? $active = '1' : $active = '0';
  716. $quota_b = ($quota_m * 1048576);
  717. $maildir = $domain."/".$local_part."/";
  718. if (!is_valid_domain_name($domain)) {
  719. $_SESSION['return'] = array(
  720. 'type' => 'danger',
  721. 'msg' => sprintf($lang['danger']['domain_invalid'])
  722. );
  723. return false;
  724. }
  725. try {
  726. $stmt = $pdo->prepare("SELECT `mailboxes`, `maxquota`, `quota` FROM `domain`
  727. WHERE `domain` = :domain");
  728. $stmt->execute(array(':domain' => $domain));
  729. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  730. }
  731. catch(PDOException $e) {
  732. $_SESSION['return'] = array(
  733. 'type' => 'danger',
  734. 'msg' => 'MySQL: '.$e
  735. );
  736. return false;
  737. }
  738. try {
  739. $stmt = $pdo->prepare("SELECT
  740. COUNT(*) as count,
  741. COALESCE(ROUND(SUM(`quota`)/1048576), 0) as `quota`
  742. FROM `mailbox`
  743. WHERE `domain` = :domain");
  744. $stmt->execute(array(':domain' => $domain));
  745. $MailboxData = $stmt->fetch(PDO::FETCH_ASSOC);
  746. }
  747. catch(PDOException $e) {
  748. $_SESSION['return'] = array(
  749. 'type' => 'danger',
  750. 'msg' => 'MySQL: '.$e
  751. );
  752. return false;
  753. }
  754. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  755. $_SESSION['return'] = array(
  756. 'type' => 'danger',
  757. 'msg' => sprintf($lang['danger']['access_denied'])
  758. );
  759. return false;
  760. }
  761. try {
  762. $stmt = $pdo->prepare("SELECT `local_part` FROM `mailbox` WHERE `local_part` = :local_part and `domain`= :domain");
  763. $stmt->execute(array(':local_part' => $local_part, ':domain' => $domain));
  764. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  765. }
  766. catch(PDOException $e) {
  767. $_SESSION['return'] = array(
  768. 'type' => 'danger',
  769. 'msg' => 'MySQL: '.$e
  770. );
  771. return false;
  772. }
  773. if ($num_results != 0) {
  774. $_SESSION['return'] = array(
  775. 'type' => 'danger',
  776. 'msg' => sprintf($lang['danger']['object_exists'], htmlspecialchars($username))
  777. );
  778. return false;
  779. }
  780. try {
  781. $stmt = $pdo->prepare("SELECT `address` FROM `alias` WHERE address= :username");
  782. $stmt->execute(array(':username' => $username));
  783. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  784. }
  785. catch(PDOException $e) {
  786. $_SESSION['return'] = array(
  787. 'type' => 'danger',
  788. 'msg' => 'MySQL: '.$e
  789. );
  790. return false;
  791. }
  792. if ($num_results != 0) {
  793. $_SESSION['return'] = array(
  794. 'type' => 'danger',
  795. 'msg' => sprintf($lang['danger']['is_alias'], htmlspecialchars($username))
  796. );
  797. return false;
  798. }
  799. try {
  800. $stmt = $pdo->prepare("SELECT `address` FROM `spamalias` WHERE `address`= :username");
  801. $stmt->execute(array(':username' => $username));
  802. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  803. }
  804. catch(PDOException $e) {
  805. $_SESSION['return'] = array(
  806. 'type' => 'danger',
  807. 'msg' => 'MySQL: '.$e
  808. );
  809. return false;
  810. }
  811. if ($num_results != 0) {
  812. $_SESSION['return'] = array(
  813. 'type' => 'danger',
  814. 'msg' => sprintf($lang['danger']['is_spam_alias'], htmlspecialchars($username))
  815. );
  816. return false;
  817. }
  818. if (!is_numeric($quota_m) || $quota_m == "0") {
  819. $_SESSION['return'] = array(
  820. 'type' => 'danger',
  821. 'msg' => sprintf($lang['danger']['quota_not_0_not_numeric'])
  822. );
  823. return false;
  824. }
  825. if (!empty($password) && !empty($password2)) {
  826. if ($password != $password2) {
  827. $_SESSION['return'] = array(
  828. 'type' => 'danger',
  829. 'msg' => sprintf($lang['danger']['password_mismatch'])
  830. );
  831. return false;
  832. }
  833. $password_hashed = hash_password($password);
  834. }
  835. else {
  836. $_SESSION['return'] = array(
  837. 'type' => 'danger',
  838. 'msg' => sprintf($lang['danger']['password_empty'])
  839. );
  840. return false;
  841. }
  842. if ($MailboxData['count'] >= $DomainData['mailboxes']) {
  843. $_SESSION['return'] = array(
  844. 'type' => 'danger',
  845. 'msg' => sprintf($lang['danger']['max_mailbox_exceeded'], $MailboxData['count'], $DomainData['mailboxes'])
  846. );
  847. return false;
  848. }
  849. try {
  850. $stmt = $pdo->prepare("SELECT `domain` FROM `domain` WHERE `domain`= :domain");
  851. $stmt->execute(array(':domain' => $domain));
  852. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  853. }
  854. catch(PDOException $e) {
  855. $_SESSION['return'] = array(
  856. 'type' => 'danger',
  857. 'msg' => 'MySQL: '.$e
  858. );
  859. return false;
  860. }
  861. if ($num_results == 0) {
  862. $_SESSION['return'] = array(
  863. 'type' => 'danger',
  864. 'msg' => $lang['danger']['domain_not_found']
  865. );
  866. return false;
  867. }
  868. if ($quota_m > $DomainData['maxquota']) {
  869. $_SESSION['return'] = array(
  870. 'type' => 'danger',
  871. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeded'], $DomainData['maxquota'])
  872. );
  873. return false;
  874. }
  875. if (($MailboxData['quota'] + $quota_m) > $DomainData['quota']) {
  876. $quota_left_m = ($DomainData['quota'] - $MailboxData['quota']);
  877. $_SESSION['return'] = array(
  878. 'type' => 'danger',
  879. 'msg' => sprintf($lang['danger']['mailbox_quota_left_exceeded'], $quota_left_m)
  880. );
  881. return false;
  882. }
  883. try {
  884. $stmt = $pdo->prepare("INSERT INTO `mailbox` (`username`, `password`, `name`, `maildir`, `quota`, `local_part`, `domain`, `created`, `modified`, `active`)
  885. VALUES (:username, :password_hashed, :name, :maildir, :quota_b, :local_part, :domain, :created, :modified, :active)");
  886. $stmt->execute(array(
  887. ':username' => $username,
  888. ':password_hashed' => $password_hashed,
  889. ':name' => $name,
  890. ':maildir' => $maildir,
  891. ':quota_b' => $quota_b,
  892. ':local_part' => $local_part,
  893. ':domain' => $domain,
  894. ':created' => date('Y-m-d H:i:s'),
  895. ':modified' => date('Y-m-d H:i:s'),
  896. ':active' => $active
  897. ));
  898. $stmt = $pdo->prepare("INSERT INTO `quota2` (`username`, `bytes`, `messages`)
  899. VALUES (:username, '0', '0')");
  900. $stmt->execute(array(':username' => $username));
  901. $stmt = $pdo->prepare("INSERT INTO `alias` (`address`, `goto`, `domain`, `created`, `modified`, `active`)
  902. VALUES (:username1, :username2, :domain, :created, :modified, :active)");
  903. $stmt->execute(array(
  904. ':username1' => $username,
  905. ':username2' => $username,
  906. ':domain' => $domain,
  907. ':created' => date('Y-m-d H:i:s'),
  908. ':modified' => date('Y-m-d H:i:s'),
  909. ':active' => $active
  910. ));
  911. $_SESSION['return'] = array(
  912. 'type' => 'success',
  913. 'msg' => sprintf($lang['success']['mailbox_added'], htmlspecialchars($username))
  914. );
  915. }
  916. catch (PDOException $e) {
  917. $_SESSION['return'] = array(
  918. 'type' => 'danger',
  919. 'msg' => 'MySQL: '.$e
  920. );
  921. return false;
  922. }
  923. }
  924. function mailbox_edit_alias($postarray) {
  925. global $lang;
  926. global $pdo;
  927. $address = $postarray['address'];
  928. $domain = idn_to_ascii(substr(strstr($address, '@'), 1));
  929. $local_part = strstr($address, '@', true);
  930. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  931. $_SESSION['return'] = array(
  932. 'type' => 'danger',
  933. 'msg' => sprintf($lang['danger']['access_denied'])
  934. );
  935. return false;
  936. }
  937. if (empty($postarray['goto'])) {
  938. $_SESSION['return'] = array(
  939. 'type' => 'danger',
  940. 'msg' => sprintf($lang['danger']['goto_empty'])
  941. );
  942. return false;
  943. }
  944. $gotos = array_map('trim', preg_split( "/( |,|;|\n)/", $postarray['goto']));
  945. foreach ($gotos as &$goto) {
  946. if (empty($goto)) {
  947. continue;
  948. }
  949. if (!filter_var($goto, FILTER_VALIDATE_EMAIL)) {
  950. $_SESSION['return'] = array(
  951. 'type' => 'danger',
  952. 'msg' =>sprintf($lang['danger']['goto_invalid'])
  953. );
  954. return false;
  955. }
  956. if ($goto == $address) {
  957. $_SESSION['return'] = array(
  958. 'type' => 'danger',
  959. 'msg' => sprintf($lang['danger']['alias_goto_identical'])
  960. );
  961. return false;
  962. }
  963. }
  964. $gotos = array_filter($gotos);
  965. $goto = implode(",", $gotos);
  966. isset($postarray['active']) ? $active = '1' : $active = '0';
  967. if ((!filter_var($address, FILTER_VALIDATE_EMAIL) === true) && !empty($local_part)) {
  968. $_SESSION['return'] = array(
  969. 'type' => 'danger',
  970. 'msg' => sprintf($lang['danger']['alias_invalid'])
  971. );
  972. return false;
  973. }
  974. try {
  975. $stmt = $pdo->prepare("UPDATE `alias` SET `goto` = :goto, `active`= :active WHERE `address` = :address");
  976. $stmt->execute(array(
  977. ':goto' => $goto,
  978. ':active' => $active,
  979. ':address' => $address
  980. ));
  981. $_SESSION['return'] = array(
  982. 'type' => 'success',
  983. 'msg' => sprintf($lang['success']['alias_modified'], htmlspecialchars($address))
  984. );
  985. }
  986. catch (PDOException $e) {
  987. $_SESSION['return'] = array(
  988. 'type' => 'danger',
  989. 'msg' => 'MySQL: '.$e
  990. );
  991. return false;
  992. }
  993. }
  994. function mailbox_edit_domain($postarray) {
  995. global $lang;
  996. global $pdo;
  997. $domain = $postarray['domain'];
  998. $description = $postarray['description'];
  999. $aliases = filter_var($postarray['aliases'], FILTER_SANITIZE_NUMBER_FLOAT);
  1000. $mailboxes = filter_var($postarray['mailboxes'], FILTER_SANITIZE_NUMBER_FLOAT);
  1001. $maxquota = filter_var($postarray['maxquota'], FILTER_SANITIZE_NUMBER_FLOAT);
  1002. $quota = filter_var($postarray['quota'], FILTER_SANITIZE_NUMBER_FLOAT);
  1003. isset($postarray['relay_all_recipients']) ? $relay_all_recipients = '1' : $relay_all_recipients = '0';
  1004. isset($postarray['backupmx']) ? $backupmx = '1' : $backupmx = '0';
  1005. isset($postarray['relay_all_recipients']) ? $backupmx = '1' : true;
  1006. isset($postarray['active']) ? $active = '1' : $active = '0';
  1007. try {
  1008. $stmt = $pdo->prepare("SELECT
  1009. COUNT(*) AS count,
  1010. MAX(COALESCE(ROUND(`quota`/1048576), 0)) AS `maxquota`,
  1011. COALESCE(ROUND(SUM(`quota`)/1048576), 0) AS `quota`
  1012. FROM `mailbox`
  1013. WHERE domain= :domain");
  1014. $stmt->execute(array(':domain' => $domain));
  1015. $MailboxData = $stmt->fetch(PDO::FETCH_ASSOC);
  1016. }
  1017. catch(PDOException $e) {
  1018. $_SESSION['return'] = array(
  1019. 'type' => 'danger',
  1020. 'msg' => 'MySQL: '.$e
  1021. );
  1022. return false;
  1023. }
  1024. try {
  1025. $stmt = $pdo->prepare("SELECT COUNT(*) AS `count` FROM `alias`
  1026. WHERE domain = :domain
  1027. AND address NOT IN (
  1028. SELECT `username` FROM `mailbox`
  1029. )");
  1030. $stmt->execute(array(':domain' => $domain));
  1031. $AliasData = $stmt->fetch(PDO::FETCH_ASSOC);
  1032. }
  1033. catch(PDOException $e) {
  1034. $_SESSION['return'] = array(
  1035. 'type' => 'danger',
  1036. 'msg' => 'MySQL: '.$e
  1037. );
  1038. return false;
  1039. }
  1040. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  1041. $_SESSION['return'] = array(
  1042. 'type' => 'danger',
  1043. 'msg' => sprintf($lang['danger']['access_denied'])
  1044. );
  1045. return false;
  1046. }
  1047. if ($maxquota > $quota) {
  1048. $_SESSION['return'] = array(
  1049. 'type' => 'danger',
  1050. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeds_domain_quota'])
  1051. );
  1052. return false;
  1053. }
  1054. if ($MailboxData['maxquota'] > $maxquota) {
  1055. $_SESSION['return'] = array(
  1056. 'type' => 'danger',
  1057. 'msg' => sprintf($lang['danger']['max_quota_in_use'], $MailboxData['maxquota'])
  1058. );
  1059. return false;
  1060. }
  1061. if ($MailboxData['quota'] > $quota) {
  1062. $_SESSION['return'] = array(
  1063. 'type' => 'danger',
  1064. 'msg' => sprintf($lang['danger']['domain_quota_m_in_use'], $MailboxData['quota'])
  1065. );
  1066. return false;
  1067. }
  1068. if ($MailboxData['count'] > $mailboxes) {
  1069. $_SESSION['return'] = array(
  1070. 'type' => 'danger',
  1071. 'msg' => sprintf($lang['danger']['mailboxes_in_use'], $MailboxData['count'])
  1072. );
  1073. return false;
  1074. }
  1075. if ($AliasData['count'] > $aliases) {
  1076. $_SESSION['return'] = array(
  1077. 'type' => 'danger',
  1078. 'msg' => sprintf($lang['danger']['aliases_in_use'], $AliasData['count'])
  1079. );
  1080. return false;
  1081. }
  1082. if (!is_valid_domain_name($domain)) {
  1083. $_SESSION['return'] = array(
  1084. 'type' => 'danger',
  1085. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1086. );
  1087. return false;
  1088. }
  1089. try {
  1090. $stmt = $pdo->prepare("UPDATE `domain` SET
  1091. `modified`= :modified,
  1092. `relay_all_recipients` = :relay_all_recipients,
  1093. `backupmx` = :backupmx,
  1094. `active` = :active,
  1095. `quota` = :quota,
  1096. `maxquota` = :maxquota,
  1097. `mailboxes` = :mailboxes,
  1098. `aliases` = :aliases,
  1099. `description` = :description
  1100. WHERE `domain` = :domain");
  1101. $stmt->execute(array(
  1102. ':relay_all_recipients' => $relay_all_recipients,
  1103. ':backupmx' => $backupmx,
  1104. ':active' => $active,
  1105. ':quota' => $quota,
  1106. ':maxquota' => $maxquota,
  1107. ':mailboxes' => $mailboxes,
  1108. ':aliases' => $aliases,
  1109. ':modified' => date('Y-m-d H:i:s'),
  1110. ':description' => $description,
  1111. ':domain' => $domain
  1112. ));
  1113. $_SESSION['return'] = array(
  1114. 'type' => 'success',
  1115. 'msg' => sprintf($lang['success']['domain_modified'], htmlspecialchars($domain))
  1116. );
  1117. }
  1118. catch (PDOException $e) {
  1119. $_SESSION['return'] = array(
  1120. 'type' => 'danger',
  1121. 'msg' => 'MySQL: '.$e
  1122. );
  1123. return false;
  1124. }
  1125. }
  1126. function edit_domain_admin($postarray) {
  1127. global $lang;
  1128. global $pdo;
  1129. $username = $postarray['username'];
  1130. $password = $postarray['password'];
  1131. $password2 = $postarray['password2'];
  1132. isset($postarray['active']) ? $active = '1' : $active = '0';
  1133. if ($_SESSION['mailcow_cc_role'] != "admin") {
  1134. $_SESSION['return'] = array(
  1135. 'type' => 'danger',
  1136. 'msg' => sprintf($lang['danger']['access_denied'])
  1137. );
  1138. return false;
  1139. }
  1140. foreach ($postarray['domain'] as $domain) {
  1141. if (!is_valid_domain_name($domain)) {
  1142. $_SESSION['return'] = array(
  1143. 'type' => 'danger',
  1144. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1145. );
  1146. return false;
  1147. }
  1148. }
  1149. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
  1150. $_SESSION['return'] = array(
  1151. 'type' => 'danger',
  1152. 'msg' => sprintf($lang['danger']['username_invalid'])
  1153. );
  1154. return false;
  1155. }
  1156. try {
  1157. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
  1158. $stmt->execute(array(
  1159. ':username' => $username,
  1160. ));
  1161. }
  1162. catch (PDOException $e) {
  1163. $_SESSION['return'] = array(
  1164. 'type' => 'danger',
  1165. 'msg' => 'MySQL: '.$e
  1166. );
  1167. return false;
  1168. }
  1169. foreach ($postarray['domain'] as $domain) {
  1170. try {
  1171. $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
  1172. VALUES (:username, :domain, :created, :active)");
  1173. $stmt->execute(array(
  1174. ':username' => $username,
  1175. ':domain' => $domain,
  1176. ':created' => date('Y-m-d H:i:s'),
  1177. ':active' => $active
  1178. ));
  1179. }
  1180. catch (PDOException $e) {
  1181. $_SESSION['return'] = array(
  1182. 'type' => 'danger',
  1183. 'msg' => 'MySQL: '.$e
  1184. );
  1185. return false;
  1186. }
  1187. }
  1188. if (!empty($password) && !empty($password2)) {
  1189. if ($password != $password2) {
  1190. $_SESSION['return'] = array(
  1191. 'type' => 'danger',
  1192. 'msg' => sprintf($lang['danger']['password_mismatch'])
  1193. );
  1194. return false;
  1195. }
  1196. $password_hashed = hash_password($password);
  1197. try {
  1198. $stmt = $pdo->prepare("UPDATE `admin` SET `modified` = :modified, `active` = :active, `password` = :password_hashed WHERE `username` = :username");
  1199. $stmt->execute(array(
  1200. ':password_hashed' => $password_hashed,
  1201. ':username' => $username,
  1202. ':modified' => date('Y-m-d H:i:s'),
  1203. ':active' => $active
  1204. ));
  1205. }
  1206. catch (PDOException $e) {
  1207. $_SESSION['return'] = array(
  1208. 'type' => 'danger',
  1209. 'msg' => 'MySQL: '.$e
  1210. );
  1211. return false;
  1212. }
  1213. }
  1214. else {
  1215. try {
  1216. $stmt = $pdo->prepare("UPDATE `admin` SET `modified` = :modified, `active` = :active WHERE `username` = :username");
  1217. $stmt->execute(array(
  1218. ':username' => $username,
  1219. ':modified' => date('Y-m-d H:i:s'),
  1220. ':active' => $active
  1221. ));
  1222. }
  1223. catch (PDOException $e) {
  1224. $_SESSION['return'] = array(
  1225. 'type' => 'danger',
  1226. 'msg' => 'MySQL: '.$e
  1227. );
  1228. return false;
  1229. }
  1230. }
  1231. $_SESSION['return'] = array(
  1232. 'type' => 'success',
  1233. 'msg' => sprintf($lang['success']['domain_admin_modified'], htmlspecialchars($username))
  1234. );
  1235. }
  1236. function mailbox_edit_mailbox($postarray) {
  1237. global $lang;
  1238. global $pdo;
  1239. isset($postarray['active']) ? $active = '1' : $active = '0';
  1240. if (!filter_var($postarray['username'], FILTER_VALIDATE_EMAIL)) {
  1241. $_SESSION['return'] = array(
  1242. 'type' => 'danger',
  1243. 'msg' => sprintf($lang['danger']['username_invalid'])
  1244. );
  1245. return false;
  1246. }
  1247. $quota_m = $postarray['quota'];
  1248. $quota_b = $quota_m*1048576;
  1249. $username = $postarray['username'];
  1250. $name = $postarray['name'];
  1251. $password = $postarray['password'];
  1252. $password2 = $postarray['password2'];
  1253. try {
  1254. $stmt = $pdo->prepare("SELECT `domain`
  1255. FROM `mailbox`
  1256. WHERE username = :username");
  1257. $stmt->execute(array(':username' => $username));
  1258. $MailboxData1 = $stmt->fetch(PDO::FETCH_ASSOC);
  1259. $stmt = $pdo->prepare("SELECT
  1260. COALESCE(ROUND(SUM(`quota`)/1048576), 0) as `quota_m_now`
  1261. FROM `mailbox`
  1262. WHERE `username` = :username");
  1263. $stmt->execute(array(':username' => $username));
  1264. $MailboxData2 = $stmt->fetch(PDO::FETCH_ASSOC);
  1265. $stmt = $pdo->prepare("SELECT
  1266. COALESCE(ROUND(SUM(`quota`)/1048576), 0) as `quota_m_in_use`
  1267. FROM `mailbox`
  1268. WHERE `domain` = :domain");
  1269. $stmt->execute(array(':domain' => $MailboxData1['domain']));
  1270. $MailboxData3 = $stmt->fetch(PDO::FETCH_ASSOC);
  1271. $stmt = $pdo->prepare("SELECT `quota`, `maxquota`
  1272. FROM `domain`
  1273. WHERE `domain` = :domain");
  1274. $stmt->execute(array(':domain' => $MailboxData1['domain']));
  1275. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  1276. }
  1277. catch(PDOException $e) {
  1278. $_SESSION['return'] = array(
  1279. 'type' => 'danger',
  1280. 'msg' => 'MySQL: '.$e
  1281. );
  1282. return false;
  1283. }
  1284. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $MailboxData1['domain'])) {
  1285. $_SESSION['return'] = array(
  1286. 'type' => 'danger',
  1287. 'msg' => sprintf($lang['danger']['access_denied'])
  1288. );
  1289. return false;
  1290. }
  1291. if (!is_numeric($quota_m) || $quota_m == "0") {
  1292. $_SESSION['return'] = array(
  1293. 'type' => 'danger',
  1294. 'msg' => sprintf($lang['danger']['quota_not_0_not_numeric'], htmlspecialchars($quota_m))
  1295. );
  1296. return false;
  1297. }
  1298. if ($quota_m > $DomainData['maxquota']) {
  1299. $_SESSION['return'] = array(
  1300. 'type' => 'danger',
  1301. 'msg' => sprintf($lang['danger']['mailbox_quota_exceeded'], $DomainData['maxquota'])
  1302. );
  1303. return false;
  1304. }
  1305. if (($MailboxData3['quota_m_in_use'] - $MailboxData2['quota_m_now'] + $quota_m) > $DomainData['quota']) {
  1306. $quota_left_m = ($DomainData['quota'] - $MailboxData3['quota_m_in_use'] + $MailboxData2['quota_m_now']);
  1307. $_SESSION['return'] = array(
  1308. 'type' => 'danger',
  1309. 'msg' => sprintf($lang['danger']['mailbox_quota_left_exceeded'], $quota_left_m)
  1310. );
  1311. return false;
  1312. }
  1313. try {
  1314. $stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` = :username");
  1315. $stmt->execute(array(
  1316. ':username' => $username
  1317. ));
  1318. }
  1319. catch (PDOException $e) {
  1320. $_SESSION['return'] = array(
  1321. 'type' => 'danger',
  1322. 'msg' => 'MySQL: '.$e
  1323. );
  1324. return false;
  1325. }
  1326. if (isset($postarray['sender_acl']) && is_array($postarray['sender_acl'])) {
  1327. foreach ($postarray['sender_acl'] as $sender_acl) {
  1328. if (!filter_var($sender_acl, FILTER_VALIDATE_EMAIL) &&
  1329. !is_valid_domain_name(str_replace('@', '', $sender_acl))) {
  1330. $_SESSION['return'] = array(
  1331. 'type' => 'danger',
  1332. 'msg' => sprintf($lang['danger']['sender_acl_invalid'])
  1333. );
  1334. return false;
  1335. }
  1336. }
  1337. foreach ($postarray['sender_acl'] as $sender_acl) {
  1338. try {
  1339. $stmt = $pdo->prepare("INSERT INTO `sender_acl` (`send_as`, `logged_in_as`)
  1340. VALUES (:sender_acl, :username)");
  1341. $stmt->execute(array(
  1342. ':sender_acl' => $sender_acl,
  1343. ':username' => $username
  1344. ));
  1345. }
  1346. catch (PDOException $e) {
  1347. $_SESSION['return'] = array(
  1348. 'type' => 'danger',
  1349. 'msg' => 'MySQL: '.$e
  1350. );
  1351. return false;
  1352. }
  1353. }
  1354. }
  1355. if (!empty($password) && !empty($password2)) {
  1356. if ($password != $password2) {
  1357. $_SESSION['return'] = array(
  1358. 'type' => 'danger',
  1359. 'msg' => sprintf($lang['danger']['password_mismatch'])
  1360. );
  1361. return false;
  1362. }
  1363. $password_hashed = hash_password($password);
  1364. try {
  1365. $stmt = $pdo->prepare("UPDATE `alias` SET
  1366. `modified` = :modified,
  1367. `active` = :active
  1368. WHERE `address` = :address");
  1369. $stmt->execute(array(
  1370. ':address' => $username,
  1371. ':modified' => date('Y-m-d H:i:s'),
  1372. ':active' => $active
  1373. ));
  1374. $stmt = $pdo->prepare("UPDATE `mailbox` SET
  1375. `modified` = :modified,
  1376. `active` = :active,
  1377. `password` = :password_hashed,
  1378. `name`= :name,
  1379. `quota` = :quota_b
  1380. WHERE `username` = :username");
  1381. $stmt->execute(array(
  1382. ':modified' => date('Y-m-d H:i:s'),
  1383. ':password_hashed' => $password_hashed,
  1384. ':active' => $active,
  1385. ':name' => $name,
  1386. ':quota_b' => $quota_b,
  1387. ':username' => $username
  1388. ));
  1389. $_SESSION['return'] = array(
  1390. 'type' => 'success',
  1391. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  1392. );
  1393. return true;
  1394. }
  1395. catch (PDOException $e) {
  1396. $_SESSION['return'] = array(
  1397. 'type' => 'danger',
  1398. 'msg' => 'MySQL: '.$e
  1399. );
  1400. return false;
  1401. }
  1402. }
  1403. try {
  1404. $stmt = $pdo->prepare("UPDATE `alias` SET
  1405. `modified` = :modified,
  1406. `active` = :active
  1407. WHERE `address` = :address");
  1408. $stmt->execute(array(
  1409. ':address' => $username,
  1410. ':modified' => date('Y-m-d H:i:s'),
  1411. ':active' => $active
  1412. ));
  1413. $stmt = $pdo->prepare("UPDATE `mailbox` SET
  1414. `modified` = :modified,
  1415. `active` = :active,
  1416. `name`= :name,
  1417. `quota` = :quota_b
  1418. WHERE `username` = :username");
  1419. $stmt->execute(array(
  1420. ':active' => $active,
  1421. ':modified' => date('Y-m-d H:i:s'),
  1422. ':name' => $name,
  1423. ':quota_b' => $quota_b,
  1424. ':username' => $username
  1425. ));
  1426. $_SESSION['return'] = array(
  1427. 'type' => 'success',
  1428. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  1429. );
  1430. return true;
  1431. }
  1432. catch (PDOException $e) {
  1433. $_SESSION['return'] = array(
  1434. 'type' => 'danger',
  1435. 'msg' => 'MySQL: '.$e
  1436. );
  1437. return false;
  1438. }
  1439. }
  1440. function mailbox_delete_domain($postarray) {
  1441. global $lang;
  1442. global $pdo;
  1443. $domain = $postarray['domain'];
  1444. if ($_SESSION['mailcow_cc_role'] != "admin") {
  1445. $_SESSION['return'] = array(
  1446. 'type' => 'danger',
  1447. 'msg' => sprintf($lang['danger']['access_denied'])
  1448. );
  1449. return false;
  1450. }
  1451. if (!is_valid_domain_name($domain)) {
  1452. $_SESSION['return'] = array(
  1453. 'type' => 'danger',
  1454. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1455. );
  1456. return false;
  1457. }
  1458. $domain = strtolower(trim($domain));
  1459. try {
  1460. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox`
  1461. WHERE `domain` = :domain");
  1462. $stmt->execute(array(':domain' => $domain));
  1463. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  1464. }
  1465. catch(PDOException $e) {
  1466. $_SESSION['return'] = array(
  1467. 'type' => 'danger',
  1468. 'msg' => 'MySQL: '.$e
  1469. );
  1470. return false;
  1471. }
  1472. if ($num_results != 0 || !empty($num_results)) {
  1473. $_SESSION['return'] = array(
  1474. 'type' => 'danger',
  1475. 'msg' => sprintf($lang['danger']['domain_not_empty'])
  1476. );
  1477. return false;
  1478. }
  1479. try {
  1480. $stmt = $pdo->prepare("DELETE FROM `domain` WHERE `domain` = :domain");
  1481. $stmt->execute(array(
  1482. ':domain' => $domain,
  1483. ));
  1484. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `domain` = :domain");
  1485. $stmt->execute(array(
  1486. ':domain' => $domain,
  1487. ));
  1488. $stmt = $pdo->prepare("DELETE FROM `alias` WHERE `domain` = :domain");
  1489. $stmt->execute(array(
  1490. ':domain' => $domain,
  1491. ));
  1492. $stmt = $pdo->prepare("DELETE FROM `alias_domain` WHERE `target_domain` = :domain");
  1493. $stmt->execute(array(
  1494. ':domain' => $domain,
  1495. ));
  1496. $stmt = $pdo->prepare("DELETE FROM `mailbox` WHERE `domain` = :domain");
  1497. $stmt->execute(array(
  1498. ':domain' => $domain,
  1499. ));
  1500. $stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` LIKE :domain");
  1501. $stmt->execute(array(
  1502. ':domain' => '%@'.$domain,
  1503. ));
  1504. $stmt = $pdo->prepare("DELETE FROM `quota2` WHERE `username` = :domain");
  1505. $stmt->execute(array(
  1506. ':domain' => '%@'.$domain,
  1507. ));
  1508. $stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `address` = :domain");
  1509. $stmt->execute(array(
  1510. ':domain' => '%@'.$domain,
  1511. ));
  1512. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :domain");
  1513. $stmt->execute(array(
  1514. ':domain' => '%@'.$domain,
  1515. ));
  1516. }
  1517. catch (PDOException $e) {
  1518. $_SESSION['return'] = array(
  1519. 'type' => 'danger',
  1520. 'msg' => 'MySQL: '.$e
  1521. );
  1522. return false;
  1523. }
  1524. $_SESSION['return'] = array(
  1525. 'type' => 'success',
  1526. 'msg' => sprintf($lang['success']['domain_removed'], htmlspecialchars($domain))
  1527. );
  1528. return true;
  1529. }
  1530. function mailbox_delete_alias($postarray) {
  1531. global $lang;
  1532. global $pdo;
  1533. $address = $postarray['address'];
  1534. $local_part = strstr($address, '@', true);
  1535. $domain = substr(strrchr($address, "@"), 1);
  1536. try {
  1537. $stmt = $pdo->prepare("SELECT `goto` FROM `alias` WHERE `address` = :address");
  1538. $stmt->execute(array(':address' => $address));
  1539. $gotos = $stmt->fetch(PDO::FETCH_ASSOC);
  1540. }
  1541. catch(PDOException $e) {
  1542. $_SESSION['return'] = array(
  1543. 'type' => 'danger',
  1544. 'msg' => 'MySQL: '.$e
  1545. );
  1546. return false;
  1547. }
  1548. $goto_array = explode(',', $gotos['goto']);
  1549. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  1550. $_SESSION['return'] = array(
  1551. 'type' => 'danger',
  1552. 'msg' => sprintf($lang['danger']['access_denied'])
  1553. );
  1554. return false;
  1555. }
  1556. try {
  1557. $stmt = $pdo->prepare("DELETE FROM `alias` WHERE `address` = :address AND `address` NOT IN (SELECT `username` FROM `mailbox`)");
  1558. $stmt->execute(array(
  1559. ':address' => $address
  1560. ));
  1561. }
  1562. catch (PDOException $e) {
  1563. $_SESSION['return'] = array(
  1564. 'type' => 'danger',
  1565. 'msg' => 'MySQL: '.$e
  1566. );
  1567. return false;
  1568. }
  1569. $_SESSION['return'] = array(
  1570. 'type' => 'success',
  1571. 'msg' => sprintf($lang['success']['alias_removed'], htmlspecialchars($address))
  1572. );
  1573. }
  1574. function mailbox_delete_alias_domain($postarray) {
  1575. global $lang;
  1576. global $pdo;
  1577. if (!is_valid_domain_name($postarray['alias_domain'])) {
  1578. $_SESSION['return'] = array(
  1579. 'type' => 'danger',
  1580. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1581. );
  1582. return false;
  1583. }
  1584. $alias_domain = $postarray['alias_domain'];
  1585. try {
  1586. $stmt = $pdo->prepare("SELECT `target_domain` FROM `alias_domain`
  1587. WHERE `alias_domain`= :alias_domain");
  1588. $stmt->execute(array(':alias_domain' => $alias_domain));
  1589. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  1590. }
  1591. catch(PDOException $e) {
  1592. $_SESSION['return'] = array(
  1593. 'type' => 'danger',
  1594. 'msg' => 'MySQL: '.$e
  1595. );
  1596. return false;
  1597. }
  1598. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $DomainData['target_domain'])) {
  1599. $_SESSION['return'] = array(
  1600. 'type' => 'danger',
  1601. 'msg' => sprintf($lang['danger']['access_denied'])
  1602. );
  1603. return false;
  1604. }
  1605. try {
  1606. $stmt = $pdo->prepare("DELETE FROM `alias_domain` WHERE `alias_domain` = :alias_domain");
  1607. $stmt->execute(array(
  1608. ':alias_domain' => $alias_domain,
  1609. ));
  1610. }
  1611. catch (PDOException $e) {
  1612. $_SESSION['return'] = array(
  1613. 'type' => 'danger',
  1614. 'msg' => 'MySQL: '.$e
  1615. );
  1616. return false;
  1617. }
  1618. $_SESSION['return'] = array(
  1619. 'type' => 'success',
  1620. 'msg' => sprintf($lang['success']['alias_domain_removed'], htmlspecialchars($alias_domain))
  1621. );
  1622. }
  1623. function mailbox_delete_mailbox($postarray) {
  1624. global $lang;
  1625. global $pdo;
  1626. $domain = substr(strrchr($postarray['username'], "@"), 1);
  1627. $username = $postarray['username'];
  1628. if (!filter_var($postarray['username'], FILTER_VALIDATE_EMAIL)) {
  1629. $_SESSION['return'] = array(
  1630. 'type' => 'danger',
  1631. 'msg' => sprintf($lang['danger']['access_denied'])
  1632. );
  1633. return false;
  1634. }
  1635. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  1636. $_SESSION['return'] = array(
  1637. 'type' => 'danger',
  1638. 'msg' => sprintf($lang['danger']['access_denied'])
  1639. );
  1640. return false;
  1641. }
  1642. try {
  1643. $stmt = $pdo->prepare("DELETE FROM `alias` WHERE `goto` = :username");
  1644. $stmt->execute(array(
  1645. ':username' => $username
  1646. ));
  1647. $stmt = $pdo->prepare("DELETE FROM `quota2` WHERE `username` = :username");
  1648. $stmt->execute(array(
  1649. ':username' => $username
  1650. ));
  1651. $stmt = $pdo->prepare("DELETE FROM `mailbox` WHERE `username` = :username");
  1652. $stmt->execute(array(
  1653. ':username' => $username
  1654. ));
  1655. $stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` = :username");
  1656. $stmt->execute(array(
  1657. ':username' => $username
  1658. ));
  1659. $stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `goto` = :username");
  1660. $stmt->execute(array(
  1661. ':username' => $username
  1662. ));
  1663. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :username");
  1664. $stmt->execute(array(
  1665. ':username' => $username
  1666. ));
  1667. $stmt = $pdo->prepare("SELECT `address`, `goto` FROM `alias`
  1668. WHERE `goto` LIKE :username");
  1669. $stmt->execute(array(':username' => '%'.$username.'%'));
  1670. $GotoData = $stmt->fetchAll(PDO::FETCH_ASSOC);
  1671. foreach ($GotoData as $gotos) {
  1672. $goto_exploded = explode(',', $gotos['goto']);
  1673. if (($key = array_search($username, $goto_exploded)) !== false) {
  1674. unset($goto_exploded[$key]);
  1675. }
  1676. $gotos_rebuild = implode(',', $goto_exploded);
  1677. $stmt = $pdo->prepare("UPDATE `alias` SET `goto` = :goto WHERE `address` = :address");
  1678. $stmt->execute(array(
  1679. ':goto' => $gotos_rebuild,
  1680. ':address' => $gotos['address']
  1681. ));
  1682. }
  1683. }
  1684. catch (PDOException $e) {
  1685. $_SESSION['return'] = array(
  1686. 'type' => 'danger',
  1687. 'msg' => 'MySQL: '.$e
  1688. );
  1689. return false;
  1690. }
  1691. $_SESSION['return'] = array(
  1692. 'type' => 'success',
  1693. 'msg' => sprintf($lang['success']['mailbox_removed'], htmlspecialchars($username))
  1694. );
  1695. }
  1696. function set_admin_account($postarray) {
  1697. global $lang;
  1698. global $pdo;
  1699. if ($_SESSION['mailcow_cc_role'] != "admin") {
  1700. $_SESSION['return'] = array(
  1701. 'type' => 'danger',
  1702. 'msg' => sprintf($lang['danger']['access_denied'])
  1703. );
  1704. return false;
  1705. }
  1706. $name = $postarray['admin_user'];
  1707. $name_now = $postarray['admin_user_now'];
  1708. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $name)) || empty ($name)) {
  1709. $_SESSION['return'] = array(
  1710. 'type' => 'danger',
  1711. 'msg' => sprintf($lang['danger']['username_invalid'])
  1712. );
  1713. return false;
  1714. }
  1715. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $name_now)) || empty ($name_now)) {
  1716. $_SESSION['return'] = array(
  1717. 'type' => 'danger',
  1718. 'msg' => sprintf($lang['danger']['username_invalid'])
  1719. );
  1720. return false;
  1721. }
  1722. if (!empty($postarray['admin_pass']) && !empty($postarray['admin_pass2'])) {
  1723. if ($postarray['admin_pass'] != $postarray['admin_pass2']) {
  1724. $_SESSION['return'] = array(
  1725. 'type' => 'danger',
  1726. 'msg' => sprintf($lang['danger']['password_mismatch'])
  1727. );
  1728. return false;
  1729. }
  1730. $password_hashed = hash_password($postarray['admin_pass']);
  1731. try {
  1732. $stmt = $pdo->prepare("UPDATE `admin` SET
  1733. `modified` = :modified,
  1734. `password` = :password_hashed,
  1735. `username` = :name
  1736. WHERE `username` = :username");
  1737. $stmt->execute(array(
  1738. ':password_hashed' => $password_hashed,
  1739. ':modified' => date('Y-m-d H:i:s'),
  1740. ':name' => $name,
  1741. ':username' => $name_now
  1742. ));
  1743. }
  1744. catch (PDOException $e) {
  1745. $_SESSION['return'] = array(
  1746. 'type' => 'danger',
  1747. 'msg' => 'MySQL: '.$e
  1748. );
  1749. return false;
  1750. }
  1751. }
  1752. else {
  1753. try {
  1754. $stmt = $pdo->prepare("UPDATE `admin` SET
  1755. `modified` = :modified,
  1756. `username` = :name
  1757. WHERE `username` = :name_now");
  1758. $stmt->execute(array(
  1759. ':name' => $name,
  1760. ':modified' => date('Y-m-d H:i:s'),
  1761. ':name_now' => $name_now
  1762. ));
  1763. }
  1764. catch (PDOException $e) {
  1765. $_SESSION['return'] = array(
  1766. 'type' => 'danger',
  1767. 'msg' => 'MySQL: '.$e
  1768. );
  1769. return false;
  1770. }
  1771. }
  1772. try {
  1773. $stmt = $pdo->prepare("UPDATE `domain_admins` SET
  1774. `domain` = :domain,
  1775. `username` = :name
  1776. WHERE `username` = :name_now");
  1777. $stmt->execute(array(
  1778. ':domain' => 'ALL',
  1779. ':name' => $name,
  1780. ':name_now' => $name_now
  1781. ));
  1782. }
  1783. catch (PDOException $e) {
  1784. $_SESSION['return'] = array(
  1785. 'type' => 'danger',
  1786. 'msg' => 'MySQL: '.$e
  1787. );
  1788. return false;
  1789. }
  1790. $_SESSION['return'] = array(
  1791. 'type' => 'success',
  1792. 'msg' => sprintf($lang['success']['admin_modified'])
  1793. );
  1794. }
  1795. function set_time_limited_aliases($postarray) {
  1796. global $lang;
  1797. global $pdo;
  1798. $username = $_SESSION['mailcow_cc_username'];
  1799. $domain = substr($username, strpos($username, '@'));
  1800. if (($_SESSION['mailcow_cc_role'] != "user" &&
  1801. $_SESSION['mailcow_cc_role'] != "domainadmin") ||
  1802. empty($username) ||
  1803. empty($domain)) {
  1804. $_SESSION['return'] = array(
  1805. 'type' => 'danger',
  1806. 'msg' => sprintf($lang['danger']['access_denied'])
  1807. );
  1808. return false;
  1809. }
  1810. switch ($postarray["trigger_set_time_limited_aliases"]) {
  1811. case "generate":
  1812. if (!is_numeric($postarray["validity"]) || $postarray["validity"] > 672) {
  1813. $_SESSION['return'] = array(
  1814. 'type' => 'danger',
  1815. 'msg' => sprintf($lang['danger']['validity_missing'])
  1816. );
  1817. return false;
  1818. }
  1819. $validity = strtotime("+".$postarray["validity"]." hour");
  1820. $letters = 'abcefghijklmnopqrstuvwxyz1234567890';
  1821. $random_name = substr(str_shuffle($letters), 0, 24);
  1822. try {
  1823. $stmt = $pdo->prepare("INSERT INTO `spamalias` (`address`, `goto`, `validity`) VALUES
  1824. (:address, :goto, :validity)");
  1825. $stmt->execute(array(
  1826. ':address' => $random_name.$domain,
  1827. ':goto' => $username,
  1828. ':validity' => $validity
  1829. ));
  1830. }
  1831. catch (PDOException $e) {
  1832. $_SESSION['return'] = array(
  1833. 'type' => 'danger',
  1834. 'msg' => 'MySQL: '.$e
  1835. );
  1836. return false;
  1837. }
  1838. $_SESSION['return'] = array(
  1839. 'type' => 'success',
  1840. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username))
  1841. );
  1842. break;
  1843. case "delete":
  1844. try {
  1845. $stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `goto` = :username");
  1846. $stmt->execute(array(
  1847. ':username' => $username
  1848. ));
  1849. }
  1850. catch (PDOException $e) {
  1851. $_SESSION['return'] = array(
  1852. 'type' => 'danger',
  1853. 'msg' => 'MySQL: '.$e
  1854. );
  1855. return false;
  1856. }
  1857. $_SESSION['return'] = array(
  1858. 'type' => 'success',
  1859. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username))
  1860. );
  1861. break;
  1862. case "extend":
  1863. try {
  1864. $stmt = $pdo->prepare("UPDATE `spamalias` SET `validity` = (`validity` + 3600)
  1865. WHERE `goto` = :username
  1866. AND `validity` >= :validity");
  1867. $stmt->execute(array(
  1868. ':username' => $username,
  1869. ':validity' => time(),
  1870. ));
  1871. }
  1872. catch (PDOException $e) {
  1873. $_SESSION['return'] = array(
  1874. 'type' => 'danger',
  1875. 'msg' => 'MySQL: '.$e
  1876. );
  1877. return false;
  1878. }
  1879. $_SESSION['return'] = array(
  1880. 'type' => 'success',
  1881. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username))
  1882. );
  1883. break;
  1884. }
  1885. }
  1886. function set_user_account($postarray) {
  1887. global $lang;
  1888. global $pdo;
  1889. $username = $_SESSION['mailcow_cc_username'];
  1890. $password_old = $postarray['user_old_pass'];
  1891. isset($postarray['togglePwNew']) ? $pwnew_active = '1' : $pwnew_active = '0';
  1892. if (isset($pwnew_active) && $pwnew_active == "1") {
  1893. $password_new = $postarray['user_new_pass'];
  1894. $password_new2 = $postarray['user_new_pass2'];
  1895. }
  1896. if (!check_login($username, $password_old) == "user") {
  1897. $_SESSION['return'] = array(
  1898. 'type' => 'danger',
  1899. 'msg' => sprintf($lang['danger']['access_denied'])
  1900. );
  1901. return false;
  1902. }
  1903. if ($_SESSION['mailcow_cc_role'] != "user" &&
  1904. $_SESSION['mailcow_cc_role'] != "domainadmin") {
  1905. $_SESSION['return'] = array(
  1906. 'type' => 'danger',
  1907. 'msg' => sprintf($lang['danger']['access_denied'])
  1908. );
  1909. return false;
  1910. }
  1911. if (isset($password_new) && isset($password_new2)) {
  1912. if (!empty($password_new2) && !empty($password_new)) {
  1913. if ($password_new2 != $password_new) {
  1914. $_SESSION['return'] = array(
  1915. 'type' => 'danger',
  1916. 'msg' => sprintf($lang['danger']['password_mismatch'])
  1917. );
  1918. return false;
  1919. }
  1920. if (strlen($password_new) < "6" ||
  1921. !preg_match('/[A-Za-z]/', $password_new) ||
  1922. !preg_match('/[0-9]/', $password_new)) {
  1923. $_SESSION['return'] = array(
  1924. 'type' => 'danger',
  1925. 'msg' => sprintf($lang['danger']['password_complexity'])
  1926. );
  1927. return false;
  1928. }
  1929. $password_hashed = hash_password($password_new);
  1930. try {
  1931. $stmt = $pdo->prepare("UPDATE `mailbox` SET `modified` = :modified, `password` = :password_hashed WHERE `username` = :username");
  1932. $stmt->execute(array(
  1933. ':password_hashed' => $password_hashed,
  1934. ':modified' => date('Y-m-d H:i:s'),
  1935. ':username' => $username
  1936. ));
  1937. }
  1938. catch (PDOException $e) {
  1939. $_SESSION['return'] = array(
  1940. 'type' => 'danger',
  1941. 'msg' => 'MySQL: '.$e
  1942. );
  1943. return false;
  1944. }
  1945. }
  1946. }
  1947. $_SESSION['return'] = array(
  1948. 'type' => 'success',
  1949. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  1950. );
  1951. }
  1952. function add_domain_admin($postarray) {
  1953. global $lang;
  1954. global $pdo;
  1955. $username = strtolower(trim($postarray['username']));
  1956. $password = $postarray['password'];
  1957. $password2 = $postarray['password2'];
  1958. isset($postarray['active']) ? $active = '1' : $active = '0';
  1959. if ($_SESSION['mailcow_cc_role'] != "admin") {
  1960. $_SESSION['return'] = array(
  1961. 'type' => 'danger',
  1962. 'msg' => sprintf($lang['danger']['access_denied'])
  1963. );
  1964. return false;
  1965. }
  1966. if (empty($postarray['domain'])) {
  1967. $_SESSION['return'] = array(
  1968. 'type' => 'danger',
  1969. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1970. );
  1971. return false;
  1972. }
  1973. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username)) || empty ($username)) {
  1974. $_SESSION['return'] = array(
  1975. 'type' => 'danger',
  1976. 'msg' => sprintf($lang['danger']['username_invalid'])
  1977. );
  1978. return false;
  1979. }
  1980. try {
  1981. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox`
  1982. WHERE `username` = :username");
  1983. $stmt->execute(array(':username' => $username));
  1984. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  1985. $stmt = $pdo->prepare("SELECT `username` FROM `admin`
  1986. WHERE `username` = :username");
  1987. $stmt->execute(array(':username' => $username));
  1988. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  1989. $stmt = $pdo->prepare("SELECT `username` FROM `domain_admins`
  1990. WHERE `username` = :username");
  1991. $stmt->execute(array(':username' => $username));
  1992. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  1993. }
  1994. catch(PDOException $e) {
  1995. $_SESSION['return'] = array(
  1996. 'type' => 'danger',
  1997. 'msg' => 'MySQL: '.$e
  1998. );
  1999. return false;
  2000. }
  2001. foreach ($num_results as $num_results_each) {
  2002. if ($num_results_each != 0) {
  2003. $_SESSION['return'] = array(
  2004. 'type' => 'danger',
  2005. 'msg' => sprintf($lang['danger']['object_exists'], htmlspecialchars($username))
  2006. );
  2007. return false;
  2008. }
  2009. }
  2010. if (!empty($password) && !empty($password2)) {
  2011. if ($password != $password2) {
  2012. $_SESSION['return'] = array(
  2013. 'type' => 'danger',
  2014. 'msg' => sprintf($lang['danger']['password_mismatch'])
  2015. );
  2016. return false;
  2017. }
  2018. $password_hashed = hash_password($password);
  2019. foreach ($postarray['domain'] as $domain) {
  2020. if (!is_valid_domain_name($domain)) {
  2021. $_SESSION['return'] = array(
  2022. 'type' => 'danger',
  2023. 'msg' => sprintf($lang['danger']['domain_invalid'])
  2024. );
  2025. return false;
  2026. }
  2027. try {
  2028. $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
  2029. VALUES (:username, :domain, :created, :active)");
  2030. $stmt->execute(array(
  2031. ':username' => $username,
  2032. ':domain' => $domain,
  2033. ':created' => date('Y-m-d H:i:s'),
  2034. ':active' => $active
  2035. ));
  2036. }
  2037. catch (PDOException $e) {
  2038. $_SESSION['return'] = array(
  2039. 'type' => 'danger',
  2040. 'msg' => 'MySQL: '.$e
  2041. );
  2042. return false;
  2043. }
  2044. }
  2045. try {
  2046. $stmt = $pdo->prepare("INSERT INTO `admin` (`username`, `password`, `superadmin`, `created`, `modified`, `active`)
  2047. VALUES (:username, :password_hashed, '0', :created, :modified, :active)");
  2048. $stmt->execute(array(
  2049. ':username' => $username,
  2050. ':password_hashed' => $password_hashed,
  2051. ':created' => date('Y-m-d H:i:s'),
  2052. ':modified' => date('Y-m-d H:i:s'),
  2053. ':active' => $active
  2054. ));
  2055. }
  2056. catch (PDOException $e) {
  2057. $_SESSION['return'] = array(
  2058. 'type' => 'danger',
  2059. 'msg' => 'MySQL: '.$e
  2060. );
  2061. return false;
  2062. }
  2063. }
  2064. else {
  2065. $_SESSION['return'] = array(
  2066. 'type' => 'danger',
  2067. 'msg' => sprintf($lang['danger']['password_empty'])
  2068. );
  2069. return false;
  2070. }
  2071. $_SESSION['return'] = array(
  2072. 'type' => 'success',
  2073. 'msg' => sprintf($lang['success']['domain_admin_added'], htmlspecialchars($username))
  2074. );
  2075. }
  2076. function delete_domain_admin($postarray) {
  2077. global $pdo;
  2078. global $lang;
  2079. if ($_SESSION['mailcow_cc_role'] != "admin") {
  2080. $_SESSION['return'] = array(
  2081. 'type' => 'danger',
  2082. 'msg' => sprintf($lang['danger']['access_denied'])
  2083. );
  2084. return false;
  2085. }
  2086. $username = $postarray['username'];
  2087. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
  2088. $_SESSION['return'] = array(
  2089. 'type' => 'danger',
  2090. 'msg' => sprintf($lang['danger']['username_invalid'])
  2091. );
  2092. return false;
  2093. }
  2094. try {
  2095. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
  2096. $stmt->execute(array(
  2097. ':username' => $username,
  2098. ));
  2099. $stmt = $pdo->prepare("DELETE FROM `admin` WHERE `username` = :username");
  2100. $stmt->execute(array(
  2101. ':username' => $username,
  2102. ));
  2103. }
  2104. catch (PDOException $e) {
  2105. $_SESSION['return'] = array(
  2106. 'type' => 'danger',
  2107. 'msg' => 'MySQL: '.$e
  2108. );
  2109. return false;
  2110. }
  2111. $_SESSION['return'] = array(
  2112. 'type' => 'success',
  2113. 'msg' => sprintf($lang['success']['domain_admin_removed'], htmlspecialchars($username))
  2114. );
  2115. }
  2116. function get_spam_score($username) {
  2117. global $pdo;
  2118. $default = "5, 15";
  2119. if ($_SESSION['mailcow_cc_role'] != "user") {
  2120. return false;
  2121. }
  2122. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  2123. return $default;
  2124. }
  2125. try {
  2126. $stmt = $pdo->prepare("SELECT `value` FROM `filterconf` WHERE `object` = :username AND
  2127. (`option` = 'lowspamlevel' OR `option` = 'highspamlevel')");
  2128. $stmt->execute(array(':username' => $username));
  2129. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  2130. }
  2131. catch(PDOException $e) {
  2132. $_SESSION['return'] = array(
  2133. 'type' => 'danger',
  2134. 'msg' => 'MySQL: '.$e
  2135. );
  2136. return false;
  2137. }
  2138. if ($num_results == 0 || empty ($num_results)) {
  2139. return $default;
  2140. }
  2141. else {
  2142. try {
  2143. $stmt = $pdo->prepare("SELECT `value` FROM `filterconf` WHERE `option` = 'highspamlevel' AND `object` = :username");
  2144. $stmt->execute(array(':username' => $username));
  2145. $highspamlevel = $stmt->fetch(PDO::FETCH_ASSOC);
  2146. $stmt = $pdo->prepare("SELECT `value` FROM `filterconf` WHERE `option` = 'lowspamlevel' AND `object` = :username");
  2147. $stmt->execute(array(':username' => $username));
  2148. $lowspamlevel = $stmt->fetch(PDO::FETCH_ASSOC);
  2149. return $lowspamlevel['value'].', '.$highspamlevel['value'];
  2150. }
  2151. catch(PDOException $e) {
  2152. $_SESSION['return'] = array(
  2153. 'type' => 'danger',
  2154. 'msg' => 'MySQL: '.$e
  2155. );
  2156. return false;
  2157. }
  2158. }
  2159. }
  2160. function set_spam_score($postarray) {
  2161. global $lang;
  2162. global $pdo;
  2163. if ($_SESSION['mailcow_cc_role'] != "user") {
  2164. $_SESSION['return'] = array(
  2165. 'type' => 'danger',
  2166. 'msg' => sprintf($lang['danger']['access_denied'])
  2167. );
  2168. return false;
  2169. }
  2170. $username = $_SESSION['mailcow_cc_username'];
  2171. $lowspamlevel = explode(',', $postarray['score'])[0];
  2172. $highspamlevel = explode(',', $postarray['score'])[1];
  2173. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  2174. $_SESSION['return'] = array(
  2175. 'type' => 'danger',
  2176. 'msg' => sprintf($lang['danger']['username_invalid'])
  2177. );
  2178. return false;
  2179. }
  2180. if (!is_numeric($lowspamlevel) || !is_numeric($highspamlevel)) {
  2181. $_SESSION['return'] = array(
  2182. 'type' => 'danger',
  2183. 'msg' => sprintf($lang['danger']['access_denied'])
  2184. );
  2185. return false;
  2186. }
  2187. try {
  2188. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :username
  2189. AND (`option` = 'lowspamlevel' OR `option` = 'highspamlevel')");
  2190. $stmt->execute(array(
  2191. ':username' => $username
  2192. ));
  2193. $stmt = $pdo->prepare("INSERT INTO `filterconf` (`object`, `option`, `value`)
  2194. VALUES (:username, 'highspamlevel', :highspamlevel)");
  2195. $stmt->execute(array(
  2196. ':username' => $username,
  2197. ':highspamlevel' => $highspamlevel
  2198. ));
  2199. $stmt = $pdo->prepare("INSERT INTO `filterconf` (`object`, `option`, `value`)
  2200. VALUES (:username, 'lowspamlevel', :lowspamlevel)");
  2201. $stmt->execute(array(
  2202. ':username' => $username,
  2203. ':lowspamlevel' => $lowspamlevel
  2204. ));
  2205. }
  2206. catch (PDOException $e) {
  2207. $_SESSION['return'] = array(
  2208. 'type' => 'danger',
  2209. 'msg' => 'MySQL: '.$e
  2210. );
  2211. return false;
  2212. }
  2213. $_SESSION['return'] = array(
  2214. 'type' => 'success',
  2215. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  2216. );
  2217. }
  2218. function set_policy_list($postarray) {
  2219. global $lang;
  2220. global $pdo;
  2221. if ($_SESSION['mailcow_cc_role'] != "admin" &&
  2222. $_SESSION['mailcow_cc_role'] != "domainadmin" &&
  2223. $_SESSION['mailcow_cc_role'] != "user") {
  2224. $_SESSION['return'] = array(
  2225. 'type' => 'danger',
  2226. 'msg' => sprintf($lang['danger']['access_denied'])
  2227. );
  2228. return false;
  2229. }
  2230. (isset($postarray['domain'])) ? $object = $postarray['domain'] : $object = $_SESSION['mailcow_cc_username'];
  2231. ($postarray['object_list'] == "bl") ? $object_list = "blacklist_from" : $object_list = "whitelist_from";
  2232. $object_from = preg_replace('/\.+/', '.', rtrim(preg_replace("/\.\*/", "*", trim(strtolower($postarray['object_from']))), '.'));
  2233. if (!filter_var($object, FILTER_VALIDATE_EMAIL) && !is_valid_domain_name($object)) {
  2234. $_SESSION['return'] = array(
  2235. 'type' => 'danger',
  2236. 'msg' => sprintf($lang['danger']['username_invalid'])
  2237. );
  2238. return false;
  2239. }
  2240. if (is_valid_domain_name($object)) {
  2241. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $object)) {
  2242. $_SESSION['return'] = array(
  2243. 'type' => 'danger',
  2244. 'msg' => sprintf($lang['danger']['access_denied'])
  2245. );
  2246. return false;
  2247. }
  2248. }
  2249. if (isset($postarray['prefid'])) {
  2250. if (!is_numeric($postarray['prefid'])) {
  2251. $_SESSION['return'] = array(
  2252. 'type' => 'danger',
  2253. 'msg' => sprintf($lang['danger']['access_denied'])
  2254. );
  2255. return false;
  2256. }
  2257. try {
  2258. $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :object AND `prefid` = :prefid");
  2259. $stmt->execute(array(
  2260. ':object' => $object,
  2261. ':prefid' => $postarray['prefid']
  2262. ));
  2263. }
  2264. catch (PDOException $e) {
  2265. $_SESSION['return'] = array(
  2266. 'type' => 'danger',
  2267. 'msg' => 'MySQL: '.$e
  2268. );
  2269. return false;
  2270. }
  2271. $_SESSION['return'] = array(
  2272. 'type' => 'success',
  2273. 'msg' => sprintf($lang['success']['mailbox_modified'], $object)
  2274. );
  2275. return true;
  2276. }
  2277. if (!ctype_alnum(str_replace(array('@', '.', '-', '*'), '', $object_from))) {
  2278. $_SESSION['return'] = array(
  2279. 'type' => 'danger',
  2280. 'msg' => sprintf($lang['danger']['policy_list_from_invalid'])
  2281. );
  2282. return false;
  2283. }
  2284. try {
  2285. $stmt = $pdo->prepare("SELECT `object` FROM `filterconf`
  2286. WHERE (`option` = 'whitelist_from' OR `option` = 'blacklist_from')
  2287. AND `object` = :object
  2288. AND `value` = :object_from");
  2289. $stmt->execute(array(':object' => $object, ':object_from' => $object_from));
  2290. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  2291. }
  2292. catch(PDOException $e) {
  2293. $_SESSION['return'] = array(
  2294. 'type' => 'danger',
  2295. 'msg' => 'MySQL: '.$e
  2296. );
  2297. return false;
  2298. }
  2299. if ($num_results != 0) {
  2300. $_SESSION['return'] = array(
  2301. 'type' => 'danger',
  2302. 'msg' => sprintf($lang['danger']['policy_list_from_exists'])
  2303. );
  2304. return false;
  2305. }
  2306. try {
  2307. $stmt = $pdo->prepare("INSERT INTO `filterconf` (`object`, `option` ,`value`)
  2308. VALUES (:object, :object_list, :object_from)");
  2309. $stmt->execute(array(
  2310. ':object' => $object,
  2311. ':object_list' => $object_list,
  2312. ':object_from' => $object_from
  2313. ));
  2314. }
  2315. catch (PDOException $e) {
  2316. $_SESSION['return'] = array(
  2317. 'type' => 'danger',
  2318. 'msg' => 'MySQL: '.$e
  2319. );
  2320. return false;
  2321. }
  2322. $_SESSION['return'] = array(
  2323. 'type' => 'success',
  2324. 'msg' => sprintf($lang['success']['mailbox_modified'], $object)
  2325. );
  2326. }
  2327. function set_tls_policy($postarray) {
  2328. global $lang;
  2329. global $pdo;
  2330. if ($_SESSION['mailcow_cc_role'] != "user") {
  2331. $_SESSION['return'] = array(
  2332. 'type' => 'danger',
  2333. 'msg' => sprintf($lang['danger']['access_denied'])
  2334. );
  2335. return false;
  2336. }
  2337. isset($postarray['tls_in']) ? $tls_in = '1' : $tls_in = '0';
  2338. isset($postarray['tls_out']) ? $tls_out = '1' : $tls_out = '0';
  2339. $username = $_SESSION['mailcow_cc_username'];
  2340. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  2341. $_SESSION['return'] = array(
  2342. 'type' => 'danger',
  2343. 'msg' => sprintf($lang['danger']['username_invalid'])
  2344. );
  2345. return false;
  2346. }
  2347. try {
  2348. $stmt = $pdo->prepare("UPDATE `mailbox` SET `tls_enforce_out` = :tls_out, `tls_enforce_in` = :tls_in WHERE `username` = :username");
  2349. $stmt->execute(array(
  2350. ':tls_out' => $tls_out,
  2351. ':tls_in' => $tls_in,
  2352. ':username' => $username
  2353. ));
  2354. }
  2355. catch (PDOException $e) {
  2356. $_SESSION['return'] = array(
  2357. 'type' => 'danger',
  2358. 'msg' => 'MySQL: '.$e
  2359. );
  2360. return false;
  2361. }
  2362. $_SESSION['return'] = array(
  2363. 'type' => 'success',
  2364. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  2365. );
  2366. }
  2367. function get_tls_policy($username) {
  2368. global $lang;
  2369. global $pdo;
  2370. if ($_SESSION['mailcow_cc_role'] != "user") {
  2371. return false;
  2372. }
  2373. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  2374. $_SESSION['return'] = array(
  2375. 'type' => 'danger',
  2376. 'msg' => sprintf($lang['danger']['username_invalid'])
  2377. );
  2378. return false;
  2379. }
  2380. try {
  2381. $stmt = $pdo->prepare("SELECT `tls_enforce_out`, `tls_enforce_in` FROM `mailbox` WHERE `username` = :username");
  2382. $stmt->execute(array(':username' => $username));
  2383. $TLSData = $stmt->fetch(PDO::FETCH_ASSOC);
  2384. }
  2385. catch(PDOException $e) {
  2386. $_SESSION['return'] = array(
  2387. 'type' => 'danger',
  2388. 'msg' => 'MySQL: '.$e
  2389. );
  2390. return false;
  2391. }
  2392. return $TLSData;
  2393. }
  2394. function remaining_specs($domain, $object = null, $js = null) {
  2395. // left_m without object given = MiB left in domain
  2396. // left_m with object given = Max. MiB we can assign to given object
  2397. // limit_m = Domain limit in MiB
  2398. // left_c = Mailboxes we can create depending on domain quota
  2399. global $pdo;
  2400. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  2401. return false;
  2402. }
  2403. try {
  2404. $stmt = $pdo->prepare("SELECT `mailboxes`, `maxquota`, `quota` FROM `domain` WHERE `domain` = :domain");
  2405. $stmt->execute(array(':domain' => $domain));
  2406. $DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
  2407. $stmt = $pdo->prepare("SELECT COUNT(*) AS `count`, COALESCE(ROUND(SUM(`quota`)/1048576), 0) as `in_use_m` FROM `mailbox` WHERE `domain` = :domain AND `username` != :object");
  2408. $stmt->execute(array(':domain' => $domain, ':object' => $object));
  2409. $MailboxDataDomain = $stmt->fetch(PDO::FETCH_ASSOC);
  2410. $quota_left_m = $DomainData['quota'] - $MailboxDataDomain['in_use_m'];
  2411. $mboxs_left = $DomainData['mailboxes'] - $MailboxDataDomain['count'];
  2412. if ($quota_left_m > $DomainData['maxquota']) {
  2413. $quota_left_m = $DomainData['maxquota'];
  2414. }
  2415. }
  2416. catch (PDOException $e) {
  2417. return false;
  2418. }
  2419. if (is_numeric($quota_left_m)) {
  2420. $spec['left_m'] = $quota_left_m;
  2421. $spec['limit_m'] = $DomainData['maxquota'];
  2422. }
  2423. if (is_numeric($mboxs_left)) {
  2424. $spec['left_c'] = $mboxs_left;
  2425. }
  2426. if (!empty($js)) {
  2427. echo $quota_left_m;
  2428. exit;
  2429. }
  2430. return $spec;
  2431. }
  2432. function get_sender_acl_handles($mailbox, $which) {
  2433. global $pdo;
  2434. if ($_SESSION['mailcow_cc_role'] != "admin" && $_SESSION['mailcow_cc_role'] != "domainadmin") {
  2435. return false;
  2436. }
  2437. switch ($which) {
  2438. case "preselected":
  2439. try {
  2440. $stmt = $pdo->prepare("SELECT `address` FROM `alias` WHERE `goto` = :goto AND `address` NOT LIKE '@%'");
  2441. $stmt->execute(array(':goto' => $mailbox));
  2442. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2443. return $rows;
  2444. }
  2445. catch(PDOException $e) {
  2446. $_SESSION['return'] = array(
  2447. 'type' => 'danger',
  2448. 'msg' => 'MySQL: '.$e
  2449. );
  2450. return false;
  2451. }
  2452. break;
  2453. case "selected":
  2454. try {
  2455. $stmt = $pdo->prepare("SELECT `send_as` FROM `sender_acl` WHERE `logged_in_as` = :logged_in_as");
  2456. $stmt->execute(array(':logged_in_as' => $mailbox));
  2457. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2458. return $rows;
  2459. }
  2460. catch(PDOException $e) {
  2461. $_SESSION['return'] = array(
  2462. 'type' => 'danger',
  2463. 'msg' => 'MySQL: '.$e
  2464. );
  2465. return false;
  2466. }
  2467. break;
  2468. case "unselected-domains":
  2469. try {
  2470. if ($_SESSION['mailcow_cc_role'] == "admin" ) {
  2471. $stmt = $pdo->prepare("SELECT DISTINCT `domain` FROM `domain`
  2472. WHERE `domain` NOT IN (
  2473. SELECT REPLACE(`send_as`, '@', '') FROM `sender_acl`
  2474. WHERE `logged_in_as` = :logged_in_as)
  2475. AND `domain` NOT IN (
  2476. SELECT REPLACE(`address`, '@', '') FROM `alias`
  2477. WHERE `goto` = :goto)");
  2478. $stmt->execute(array(
  2479. ':logged_in_as' => $mailbox,
  2480. ':goto' => $mailbox,
  2481. ));
  2482. }
  2483. else {
  2484. $stmt = $pdo->prepare("SELECT DISTINCT `domain` FROM `domain_admins`
  2485. WHERE `username` = :username
  2486. AND `domain` != 'ALL'
  2487. AND `domain` NOT IN (
  2488. SELECT REPLACE(`send_as`, '@', '') FROM `sender_acl`
  2489. WHERE `logged_in_as` = :logged_in_as)");
  2490. $stmt->execute(array(
  2491. ':logged_in_as' => $mailbox,
  2492. ':username' => $_SESSION['mailcow_cc_username']
  2493. ));
  2494. }
  2495. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2496. return $rows;
  2497. }
  2498. catch(PDOException $e) {
  2499. $_SESSION['return'] = array(
  2500. 'type' => 'danger',
  2501. 'msg' => 'MySQL: '.$e
  2502. );
  2503. return false;
  2504. }
  2505. break;
  2506. case "unselected-addresses":
  2507. try {
  2508. if ($_SESSION['mailcow_cc_role'] == "admin" ) {
  2509. $stmt = $pdo->prepare("SELECT `address` FROM `alias`
  2510. WHERE `goto` != :goto
  2511. AND `address` NOT IN (
  2512. SELECT `send_as` FROM `sender_acl`
  2513. WHERE `logged_in_as` = :logged_in_as)");
  2514. $stmt->execute(array(
  2515. ':logged_in_as' => $mailbox,
  2516. ':goto' => $mailbox
  2517. ));
  2518. }
  2519. else {
  2520. $stmt = $pdo->prepare("SELECT `address` FROM `alias`
  2521. WHERE `goto` != :goto
  2522. AND `domain` IN (
  2523. SELECT `domain` FROM `domain_admins`
  2524. WHERE `username` = :username)
  2525. AND `address` NOT IN (
  2526. SELECT `send_as` FROM `sender_acl`
  2527. WHERE `logged_in_as` = :logged_in_as)");
  2528. $stmt->execute(array(
  2529. ':logged_in_as' => $mailbox,
  2530. ':goto' => $mailbox,
  2531. ':username' => $_SESSION['mailcow_cc_username']
  2532. ));
  2533. }
  2534. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2535. return $rows;
  2536. }
  2537. catch(PDOException $e) {
  2538. $_SESSION['return'] = array(
  2539. 'type' => 'danger',
  2540. 'msg' => 'MySQL: '.$e
  2541. );
  2542. return false;
  2543. }
  2544. break;
  2545. }
  2546. return false;
  2547. }
  2548. function tagging_options($action, $data = null) {
  2549. global $lang;
  2550. global $pdo;
  2551. $username = $_SESSION['mailcow_cc_username'];
  2552. if ($action == "get") {
  2553. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  2554. return false;
  2555. }
  2556. try {
  2557. $stmt = $pdo->prepare("SELECT `wants_tagged_subject` FROM `mailbox` WHERE `username` = :username");
  2558. $stmt->execute(array(':username' => $username));
  2559. $SelectData = $stmt->fetch(PDO::FETCH_ASSOC);
  2560. }
  2561. catch(PDOException $e) {
  2562. $_SESSION['return'] = array(
  2563. 'type' => 'danger',
  2564. 'msg' => 'MySQL: '.$e
  2565. );
  2566. return false;
  2567. }
  2568. return $SelectData['wants_tagged_subject'];
  2569. }
  2570. elseif ($action == "set") {
  2571. ($data['tagged_mail_handler'] == "subject") ? $wants_tagged_subject = '1' : $wants_tagged_subject = '0';
  2572. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  2573. $_SESSION['return'] = array(
  2574. 'type' => 'danger',
  2575. 'msg' => sprintf($lang['danger']['username_invalid'])
  2576. );
  2577. return false;
  2578. }
  2579. try {
  2580. $stmt = $pdo->prepare("UPDATE `mailbox` SET `wants_tagged_subject` = :wants_tagged_subject WHERE `username` = :username");
  2581. $stmt->execute(array(':username' => $username, ':wants_tagged_subject' => $wants_tagged_subject));
  2582. $SelectData = $stmt->fetch(PDO::FETCH_ASSOC);
  2583. }
  2584. catch(PDOException $e) {
  2585. $_SESSION['return'] = array(
  2586. 'type' => 'danger',
  2587. 'msg' => 'MySQL: '.$e
  2588. );
  2589. return false;
  2590. }
  2591. $_SESSION['return'] = array(
  2592. 'type' => 'success',
  2593. 'msg' => sprintf($lang['success']['mailbox_modified'], $username)
  2594. );
  2595. }
  2596. return false;
  2597. }
  2598. function user_object_info($action, $data = null) {
  2599. global $lang;
  2600. global $pdo;
  2601. $username = $_SESSION['mailcow_cc_username'];
  2602. if ($action == "get") {
  2603. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  2604. return false;
  2605. }
  2606. try {
  2607. $stmt = $pdo->prepare("SELECT IFNULL(GROUP_CONCAT(`address` SEPARATOR ', '), '&#10008;') AS `aliases` FROM `alias` WHERE `goto` = :username_goto AND `address` NOT LIKE '@%' AND `address` != :username_address");
  2608. $stmt->execute(array(':username_goto' => $username, ':username_address' => $username));
  2609. $run = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2610. while ($row = array_shift($run)) {
  2611. $data['aliases'] = $row['aliases'];
  2612. }
  2613. $stmt = $pdo->prepare("SELECT IFNULL(GROUP_CONCAT(`send_as` SEPARATOR ', '), '&#10008;') AS `send_as` FROM `sender_acl` WHERE `logged_in_as` = :username AND `send_as` NOT LIKE '@%';");
  2614. $stmt->execute(array(':username' => $username));
  2615. $run = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2616. while ($row = array_shift($run)) {
  2617. $data['aliases_also_send_as'] = $row['send_as'];
  2618. }
  2619. $stmt = $pdo->prepare("SELECT IFNULL(GROUP_CONCAT(`send_as` SEPARATOR ', '), '&#10008;') AS `send_as` FROM `sender_acl` WHERE `logged_in_as` = :username AND `send_as` LIKE '@%';");
  2620. $stmt->execute(array(':username' => $username));
  2621. $run = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2622. while ($row = array_shift($run)) {
  2623. $data['aliases_send_as_all'] = $row['send_as'];
  2624. }
  2625. $stmt = $pdo->prepare("SELECT IFNULL(GROUP_CONCAT(`address` SEPARATOR ', '), '&#10008;') as `address` FROM `alias` WHERE `goto` = :username AND `address` LIKE '@%';");
  2626. $stmt->execute(array(':username' => $username));
  2627. $run = $stmt->fetchAll(PDO::FETCH_ASSOC);
  2628. while ($row = array_shift($run)) {
  2629. $data['is_catch_all'] = $row['address'];
  2630. }
  2631. return $data;
  2632. }
  2633. catch(PDOException $e) {
  2634. $_SESSION['return'] = array(
  2635. 'type' => 'danger',
  2636. 'msg' => 'MySQL: '.$e
  2637. );
  2638. return false;
  2639. }
  2640. }
  2641. return false;
  2642. }
  2643. function is_valid_domain_name($domain_name) {
  2644. if (empty($domain_name)) {
  2645. return false;
  2646. }
  2647. $domain_name = idn_to_ascii($domain_name);
  2648. return (preg_match("/^([a-z\d](-*[a-z\d])*)(\.([a-z\d](-*[a-z\d])*))*$/i", $domain_name)
  2649. && preg_match("/^.{1,253}$/", $domain_name)
  2650. && preg_match("/^[^\.]{1,63}(\.[^\.]{1,63})*$/", $domain_name));
  2651. }
  2652. ?>