2
0

functions.app_passwd.inc.php 9.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242
  1. <?php
  2. function app_passwd($_action, $_data = null) {
  3. global $pdo;
  4. global $lang;
  5. $_data_log = $_data;
  6. !isset($_data_log['app_passwd']) ?: $_data_log['app_passwd'] = '*';
  7. !isset($_data_log['app_passwd2']) ?: $_data_log['app_passwd2'] = '*';
  8. if (isset($_data['username']) && filter_var($_data['username'], FILTER_VALIDATE_EMAIL)) {
  9. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $_data['username'])) {
  10. $_SESSION['return'][] = array(
  11. 'type' => 'danger',
  12. 'log' => array(__FUNCTION__, $_action, $_data_log),
  13. 'msg' => 'access_denied'
  14. );
  15. return false;
  16. }
  17. else {
  18. $username = $_data['username'];
  19. }
  20. }
  21. else {
  22. $username = $_SESSION['mailcow_cc_username'];
  23. }
  24. switch ($_action) {
  25. case 'add':
  26. $app_name = htmlspecialchars(trim($_data['app_name']));
  27. $password = $_data['app_passwd'];
  28. $password2 = $_data['app_passwd2'];
  29. $active = intval($_data['active']);
  30. $protocols = (array)$_data['protocols'];
  31. $imap_access = (in_array('imap_access', $protocols)) ? 1 : 0;
  32. $dav_access = (in_array('dav_access', $protocols)) ? 1 : 0;
  33. $smtp_access = (in_array('smtp_access', $protocols)) ? 1 : 0;
  34. $eas_access = (in_array('eas_access', $protocols)) ? 1 : 0;
  35. $pop3_access = (in_array('pop3_access', $protocols)) ? 1 : 0;
  36. $sieve_access = (in_array('sieve_access', $protocols)) ? 1 : 0;
  37. $domain = mailbox('get', 'mailbox_details', $username)['domain'];
  38. if (empty($domain)) {
  39. $_SESSION['return'][] = array(
  40. 'type' => 'danger',
  41. 'log' => array(__FUNCTION__, $_action, $_data_log),
  42. 'msg' => 'access_denied'
  43. );
  44. return false;
  45. }
  46. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) {
  47. $_SESSION['return'][] = array(
  48. 'type' => 'danger',
  49. 'log' => array(__FUNCTION__, $_action, $_data_log),
  50. 'msg' => 'password_complexity'
  51. );
  52. return false;
  53. }
  54. if ($password != $password2) {
  55. $_SESSION['return'][] = array(
  56. 'type' => 'danger',
  57. 'log' => array(__FUNCTION__, $_action, $_data_log),
  58. 'msg' => 'password_mismatch'
  59. );
  60. return false;
  61. }
  62. $password_hashed = hash_password($password);
  63. if (empty($app_name)) {
  64. $_SESSION['return'][] = array(
  65. 'type' => 'danger',
  66. 'log' => array(__FUNCTION__, $_action, $_data_log),
  67. 'msg' => 'app_name_empty'
  68. );
  69. return false;
  70. }
  71. $stmt = $pdo->prepare("INSERT INTO `app_passwd` (`name`, `mailbox`, `domain`, `password`, `imap_access`, `smtp_access`, `eas_access`, `dav_access`, `pop3_access`, `sieve_access`, `active`)
  72. VALUES (:app_name, :mailbox, :domain, :password, :imap_access, :smtp_access, :eas_access, :dav_access, :pop3_access, :sieve_access, :active)");
  73. $stmt->execute(array(
  74. ':app_name' => $app_name,
  75. ':mailbox' => $username,
  76. ':domain' => $domain,
  77. ':password' => $password_hashed,
  78. ':imap_access' => $imap_access,
  79. ':smtp_access' => $smtp_access,
  80. ':eas_access' => $eas_access,
  81. ':dav_access' => $dav_access,
  82. ':pop3_access' => $pop3_access,
  83. ':sieve_access' => $sieve_access,
  84. ':active' => $active
  85. ));
  86. $_SESSION['return'][] = array(
  87. 'type' => 'success',
  88. 'log' => array(__FUNCTION__, $_action, $_data_log),
  89. 'msg' => 'app_passwd_added'
  90. );
  91. break;
  92. case 'edit':
  93. $ids = (array)$_data['id'];
  94. foreach ($ids as $id) {
  95. $is_now = app_passwd('details', $id);
  96. if (!empty($is_now)) {
  97. $app_name = (!empty($_data['app_name'])) ? $_data['app_name'] : $is_now['name'];
  98. $password = (!empty($_data['password'])) ? $_data['password'] : null;
  99. $password2 = (!empty($_data['password2'])) ? $_data['password2'] : null;
  100. if (isset($_data['protocols'])) {
  101. $protocols = (array)$_data['protocols'];
  102. $imap_access = (in_array('imap_access', $protocols)) ? 1 : 0;
  103. $dav_access = (in_array('dav_access', $protocols)) ? 1 : 0;
  104. $smtp_access = (in_array('smtp_access', $protocols)) ? 1 : 0;
  105. $eas_access = (in_array('eas_access', $protocols)) ? 1 : 0;
  106. $pop3_access = (in_array('pop3_access', $protocols)) ? 1 : 0;
  107. $sieve_access = (in_array('sieve_access', $protocols)) ? 1 : 0;
  108. }
  109. else {
  110. $imap_access = $is_now['imap_access'];
  111. $smtp_access = $is_now['smtp_access'];
  112. $dav_access = $is_now['dav_access'];
  113. $eas_access = $is_now['eas_access'];
  114. $pop3_access = $is_now['pop3_access'];
  115. $sieve_access = $is_now['sieve_access'];
  116. }
  117. $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active'];
  118. }
  119. else {
  120. $_SESSION['return'][] = array(
  121. 'type' => 'danger',
  122. 'log' => array(__FUNCTION__, $_action, $_data_log),
  123. 'msg' => array('app_passwd_id_invalid', $id)
  124. );
  125. continue;
  126. }
  127. $app_name = htmlspecialchars(trim($app_name));
  128. if (!empty($password) && !empty($password2)) {
  129. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) {
  130. $_SESSION['return'][] = array(
  131. 'type' => 'danger',
  132. 'log' => array(__FUNCTION__, $_action, $_type, $_data_log, $_attr),
  133. 'msg' => 'password_complexity'
  134. );
  135. continue;
  136. }
  137. if ($password != $password2) {
  138. $_SESSION['return'][] = array(
  139. 'type' => 'danger',
  140. 'log' => array(__FUNCTION__, $_action, $_type, $_data_log, $_attr),
  141. 'msg' => 'password_mismatch'
  142. );
  143. continue;
  144. }
  145. $password_hashed = hash_password($password);
  146. $stmt = $pdo->prepare("UPDATE `app_passwd` SET
  147. `password` = :password_hashed
  148. WHERE `mailbox` = :username AND `id` = :id");
  149. $stmt->execute(array(
  150. ':password_hashed' => $password_hashed,
  151. ':username' => $username,
  152. ':id' => $id
  153. ));
  154. }
  155. $stmt = $pdo->prepare("UPDATE `app_passwd` SET
  156. `name` = :app_name,
  157. `mailbox` = :username,
  158. `imap_access` = :imap_access,
  159. `smtp_access` = :smtp_access,
  160. `eas_access` = :eas_access,
  161. `dav_access` = :dav_access,
  162. `pop3_access` = :pop3_access,
  163. `sieve_access` = :sieve_access,
  164. `active` = :active
  165. WHERE `id` = :id");
  166. $stmt->execute(array(
  167. ':app_name' => $app_name,
  168. ':username' => $username,
  169. ':imap_access' => $imap_access,
  170. ':smtp_access' => $smtp_access,
  171. ':eas_access' => $eas_access,
  172. ':dav_access' => $dav_access,
  173. ':pop3_access' => $pop3_access,
  174. ':sieve_access' => $sieve_access,
  175. ':active' => $active,
  176. ':id' => $id
  177. ));
  178. $_SESSION['return'][] = array(
  179. 'type' => 'success',
  180. 'log' => array(__FUNCTION__, $_action, $_data_log),
  181. 'msg' => array('object_modified', htmlspecialchars(implode(', ', $ids)))
  182. );
  183. }
  184. break;
  185. case 'delete':
  186. $ids = (array)$_data['id'];
  187. foreach ($ids as $id) {
  188. $stmt = $pdo->prepare("SELECT `mailbox` FROM `app_passwd` WHERE `id` = :id");
  189. $stmt->execute(array(':id' => $id));
  190. $mailbox = $stmt->fetch(PDO::FETCH_ASSOC)['mailbox'];
  191. if (empty($mailbox)) {
  192. $_SESSION['return'][] = array(
  193. 'type' => 'danger',
  194. 'log' => array(__FUNCTION__, $_action, $_data_log),
  195. 'msg' => 'app_passwd_id_invalid'
  196. );
  197. return false;
  198. }
  199. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $mailbox)) {
  200. $_SESSION['return'][] = array(
  201. 'type' => 'danger',
  202. 'log' => array(__FUNCTION__, $_action, $_data_log),
  203. 'msg' => 'access_denied'
  204. );
  205. return false;
  206. }
  207. $stmt = $pdo->prepare("DELETE FROM `app_passwd` WHERE `id`= :id");
  208. $stmt->execute(array(':id' => $id));
  209. $_SESSION['return'][] = array(
  210. 'type' => 'success',
  211. 'log' => array(__FUNCTION__, $_action, $_data_log),
  212. 'msg' => array('app_passwd_removed', htmlspecialchars($id))
  213. );
  214. }
  215. break;
  216. case 'get':
  217. $app_passwds = array();
  218. $stmt = $pdo->prepare("SELECT `id`, `name` FROM `app_passwd` WHERE `mailbox` = :username");
  219. $stmt->execute(array(':username' => $username));
  220. $app_passwds = $stmt->fetchAll(PDO::FETCH_ASSOC);
  221. return $app_passwds;
  222. break;
  223. case 'details':
  224. $app_passwd_data = array();
  225. $stmt = $pdo->prepare("SELECT *
  226. FROM `app_passwd`
  227. WHERE `id` = :id");
  228. $stmt->execute(array(':id' => $_data));
  229. $app_passwd_data = $stmt->fetch(PDO::FETCH_ASSOC);
  230. if (empty($app_passwd_data)) {
  231. return false;
  232. }
  233. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $app_passwd_data['mailbox'])) {
  234. $app_passwd_data = array();
  235. return false;
  236. }
  237. $app_passwd_data['name'] = htmlspecialchars(trim($app_passwd_data['name']));
  238. return $app_passwd_data;
  239. break;
  240. }
  241. }