prepare("SELECT `domain` FROM `domain_admins` WHERE ( `active`='1' AND `username` = :username AND (`domain` = :domain1 OR `domain` = (SELECT `target_domain` FROM `alias_domain` WHERE `alias_domain` = :domain2)) ) OR 'admin' = :role"); $stmt->execute(array(':username' => $username, ':domain1' => $domain, ':domain2' => $domain, ':role' => $role)); $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC)); } catch(PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } if (!empty($num_results)) { return true; } return false; } function hasMailboxObjectAccess($username, $role, $object) { global $pdo; if (!filter_var($username, FILTER_VALIDATE_EMAIL) && !ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) { return false; } if ($role != 'admin' && $role != 'domainadmin' && $role != 'user') { return false; } if ($username == $object) { return true; } try { $stmt = $pdo->prepare("SELECT `domain` FROM `mailbox` WHERE `username` = :object"); $stmt->execute(array(':object' => $object)); $row = $stmt->fetch(PDO::FETCH_ASSOC); if (isset($row['domain']) && hasDomainAccess($username, $role, $row['domain'])) { return true; } } catch(PDOException $e) { error_log($e); return false; } return false; } function verify_ssha256($hash, $password) { // Remove tag if any $hash = ltrim($hash, '{SSHA256}'); // Decode hash $dhash = base64_decode($hash); // Get first 32 bytes of binary which equals a SHA256 hash $ohash = substr($dhash, 0, 32); // Remove SHA256 hash from decoded hash to get original salt string $osalt = str_replace($ohash, '', $dhash); // Check single salted SHA256 hash against extracted hash if (hash('sha256', $password . $osalt, true) == $ohash) { return true; } else { return false; } } function doveadm_authenticate($hash, $algorithm, $password) { $descr = array(0 => array('pipe', 'r'), 1 => array('pipe', 'w'), 2 => array('pipe', 'w')); $pipes = array(); $process = proc_open("/usr/bin/doveadm pw -s ".$algorithm." -t '".$hash."'", $descr, $pipes); if (is_resource($process)) { fputs($pipes[0], $password); fclose($pipes[0]); while ($f = fgets($pipes[1])) { if (preg_match('/(verified)/', $f)) { proc_close($process); return true; } return false; } fclose($pipes[1]); while ($f = fgets($pipes[2])) { proc_close($process); return false; } fclose($pipes[2]); proc_close($process); } return false; } function check_login($user, $pass) { global $pdo; if (!filter_var($user, FILTER_VALIDATE_EMAIL) && !ctype_alnum(str_replace(array('_', '.', '-'), '', $user))) { return false; } $user = strtolower(trim($user)); $stmt = $pdo->prepare("SELECT `password` FROM `admin` WHERE `superadmin` = '1' AND `username` = :user"); $stmt->execute(array(':user' => $user)); $rows = $stmt->fetchAll(PDO::FETCH_ASSOC); foreach ($rows as $row) { if (verify_ssha256($row['password'], $pass)) { if (get_tfa($user)['name'] != "none") { $_SESSION['pending_mailcow_cc_username'] = $user; $_SESSION['pending_mailcow_cc_role'] = "admin"; $_SESSION['pending_tfa_method'] = get_tfa($user)['name']; unset($_SESSION['ldelay']); return "pending"; } else { unset($_SESSION['ldelay']); return "admin"; } } } $stmt = $pdo->prepare("SELECT `password` FROM `admin` WHERE `superadmin` = '0' AND `active`='1' AND `username` = :user"); $stmt->execute(array(':user' => $user)); $rows = $stmt->fetchAll(PDO::FETCH_ASSOC); foreach ($rows as $row) { if (verify_ssha256($row['password'], $pass) !== false) { if (get_tfa($user)['name'] != "none") { $_SESSION['pending_mailcow_cc_username'] = $user; $_SESSION['pending_mailcow_cc_role'] = "domainadmin"; $_SESSION['pending_tfa_method'] = get_tfa($user)['name']; unset($_SESSION['ldelay']); return "pending"; } else { unset($_SESSION['ldelay']); $stmt = $pdo->prepare("UPDATE `tfa` SET `active`='1' WHERE `username` = :user"); $stmt->execute(array(':user' => $user)); return "domainadmin"; } } } $stmt = $pdo->prepare("SELECT `password` FROM `mailbox` WHERE `kind` NOT REGEXP 'location|thing|group' AND `active`='1' AND `username` = :user"); $stmt->execute(array(':user' => $user)); $rows = $stmt->fetchAll(PDO::FETCH_ASSOC); foreach ($rows as $row) { if (verify_ssha256($row['password'], $pass) !== false) { unset($_SESSION['ldelay']); return "user"; } } if (!isset($_SESSION['ldelay'])) { $_SESSION['ldelay'] = "0"; } elseif (!isset($_SESSION['mailcow_cc_username'])) { $_SESSION['ldelay'] = $_SESSION['ldelay']+0.5; } sleep($_SESSION['ldelay']); } function formatBytes($size, $precision = 2) { if(!is_numeric($size)) { return "0"; } $base = log($size, 1024); $suffixes = array(' Byte', ' KiB', ' MiB', ' GiB', ' TiB'); if ($size == "0") { return "0"; } return round(pow(1024, $base - floor($base)), $precision) . $suffixes[floor($base)]; } function edit_admin_account($postarray) { global $lang; global $pdo; if ($_SESSION['mailcow_cc_role'] != "admin") { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } $username = $postarray['admin_user']; $username_now = $_SESSION['mailcow_cc_username']; $password = $postarray['admin_pass']; $password2 = $postarray['admin_pass2']; if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username)) || empty ($username)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['username_invalid']) ); return false; } if (!empty($password) && !empty($password2)) { if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['password_complexity']) ); return false; } if ($password != $password2) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['password_mismatch']) ); return false; } $password_hashed = hash_password($password); try { $stmt = $pdo->prepare("UPDATE `admin` SET `password` = :password_hashed, `username` = :username1 WHERE `username` = :username2"); $stmt->execute(array( ':password_hashed' => $password_hashed, ':username1' => $username, ':username2' => $username_now )); } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } } else { try { $stmt = $pdo->prepare("UPDATE `admin` SET `username` = :username1 WHERE `username` = :username2"); $stmt->execute(array( ':username1' => $username, ':username2' => $username_now )); } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } } try { $stmt = $pdo->prepare("UPDATE `domain_admins` SET `domain` = 'ALL', `username` = :username1 WHERE `username` = :username2"); $stmt->execute(array(':username1' => $username, ':username2' => $username_now)); $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username1 WHERE `username` = :username2"); $stmt->execute(array(':username1' => $username, ':username2' => $username_now)); } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } $_SESSION['mailcow_cc_username'] = $username; $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['admin_modified']) ); } function set_time_limited_aliases($postarray) { global $lang; global $pdo; (isset($postarray['username'])) ? $username = $postarray['username'] : $username = $_SESSION['mailcow_cc_username']; if ($_SESSION['mailcow_cc_role'] != "user" && $_SESSION['mailcow_cc_role'] != "admin") { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } if (filter_var($username, FILTER_VALIDATE_EMAIL)) { if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $username)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } } try { $stmt = $pdo->prepare("SELECT `domain` FROM `mailbox` WHERE `username` = :username"); $stmt->execute(array(':username' => $username)); $domain = $stmt->fetch(PDO::FETCH_ASSOC)['domain']; } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } switch ($postarray["set_time_limited_aliases"]) { case "generate": if (!is_numeric($postarray["validity"]) || $postarray["validity"] > 672) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['validity_missing']) ); return false; } $validity = strtotime("+".$postarray["validity"]." hour"); $letters = 'abcefghijklmnopqrstuvwxyz1234567890'; $random_name = substr(str_shuffle($letters), 0, 24); try { $stmt = $pdo->prepare("INSERT INTO `spamalias` (`address`, `goto`, `validity`) VALUES (:address, :goto, :validity)"); $stmt->execute(array( ':address' => $random_name . '@' . $domain, ':goto' => $username, ':validity' => $validity )); } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username)) ); break; case "deleteall": try { $stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `goto` = :username"); $stmt->execute(array( ':username' => $username )); } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username)) ); break; case "delete": if (empty($postarray['item']) || !filter_var($postarray['item'], FILTER_VALIDATE_EMAIL)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } $item = $postarray['item']; try { $stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `goto` = :username AND `address` = :item"); $stmt->execute(array( ':username' => $username, ':item' => $item )); } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username)) ); break; case "extendall": try { $stmt = $pdo->prepare("UPDATE `spamalias` SET `validity` = (`validity` + 3600) WHERE `goto` = :username AND `validity` >= :validity"); $stmt->execute(array( ':username' => $username, ':validity' => time(), )); } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username)) ); break; case "extend": if (empty($postarray['item']) || !filter_var($postarray['item'], FILTER_VALIDATE_EMAIL)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } $item = $postarray['item']; try { $stmt = $pdo->prepare("UPDATE `spamalias` SET `validity` = (`validity` + 3600) WHERE `goto` = :username AND `address` = :item AND `validity` >= :validity"); $stmt->execute(array( ':username' => $username, ':item' => $item, ':validity' => time(), )); } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username)) ); break; } } function get_time_limited_aliases($username = null) { // 'username' can be be set, if not, default to mailcow_cc_username global $lang; global $pdo; $data = array(); if (isset($username) && filter_var($username, FILTER_VALIDATE_EMAIL)) { if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $username)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } } else { $username = $_SESSION['mailcow_cc_username']; } try { $stmt = $pdo->prepare("SELECT `address`, `goto`, `validity` FROM `spamalias` WHERE `goto` = :username AND `validity` >= :unixnow"); $stmt->execute(array(':username' => $username, ':unixnow' => time())); $data = $stmt->fetchAll(PDO::FETCH_ASSOC); } catch(PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); } return $data; } function edit_user_account($postarray) { global $lang; global $pdo; if (isset($postarray['username']) && filter_var($postarray['username'], FILTER_VALIDATE_EMAIL)) { if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $postarray['username'])) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } else { $username = $postarray['username']; } } else { $username = $_SESSION['mailcow_cc_username']; } $password_old = $postarray['user_old_pass']; if (isset($postarray['user_new_pass']) && isset($postarray['user_new_pass2'])) { $password_new = $postarray['user_new_pass']; $password_new2 = $postarray['user_new_pass2']; } $stmt = $pdo->prepare("SELECT `password` FROM `mailbox` WHERE `kind` NOT REGEXP 'location|thing|group' AND `username` = :user"); $stmt->execute(array(':user' => $username)); $row = $stmt->fetch(PDO::FETCH_ASSOC); if (!verify_ssha256($row['password'], $password_old)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } if (isset($password_new) && isset($password_new2)) { if (!empty($password_new2) && !empty($password_new)) { if ($password_new2 != $password_new) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['password_mismatch']) ); return false; } if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password_new)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['password_complexity']) ); return false; } $password_hashed = hash_password($password_new); try { $stmt = $pdo->prepare("UPDATE `mailbox` SET `password` = :password_hashed WHERE `username` = :username"); $stmt->execute(array( ':password_hashed' => $password_hashed, ':username' => $username )); } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } } } $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username)) ); } function get_spam_score($username = null) { global $pdo; $default = "5, 15"; if (isset($username) && filter_var($username, FILTER_VALIDATE_EMAIL)) { if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $username)) { return false; } } else { $username = $_SESSION['mailcow_cc_username']; } try { $stmt = $pdo->prepare("SELECT `value` FROM `filterconf` WHERE `object` = :username AND (`option` = 'lowspamlevel' OR `option` = 'highspamlevel')"); $stmt->execute(array(':username' => $username)); $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC)); } catch(PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } if (empty($num_results)) { return $default; } else { try { $stmt = $pdo->prepare("SELECT `value` FROM `filterconf` WHERE `option` = 'highspamlevel' AND `object` = :username"); $stmt->execute(array(':username' => $username)); $highspamlevel = $stmt->fetch(PDO::FETCH_ASSOC); $stmt = $pdo->prepare("SELECT `value` FROM `filterconf` WHERE `option` = 'lowspamlevel' AND `object` = :username"); $stmt->execute(array(':username' => $username)); $lowspamlevel = $stmt->fetch(PDO::FETCH_ASSOC); return $lowspamlevel['value'].', '.$highspamlevel['value']; } catch(PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } } } function edit_spam_score($postarray) { // Array items // 'username' can be set, defaults to mailcow_cc_username // 'lowspamlevel' // 'highspamlevel' global $lang; global $pdo; if (isset($postarray['username']) && filter_var($postarray['username'], FILTER_VALIDATE_EMAIL)) { if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $postarray['username'])) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } else { $username = $postarray['username']; } } else { $username = $_SESSION['mailcow_cc_username']; } $lowspamlevel = explode(',', $postarray['score'])[0]; $highspamlevel = explode(',', $postarray['score'])[1]; if (!is_numeric($lowspamlevel) || !is_numeric($highspamlevel)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } try { $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :username AND (`option` = 'lowspamlevel' OR `option` = 'highspamlevel')"); $stmt->execute(array( ':username' => $username )); $stmt = $pdo->prepare("INSERT INTO `filterconf` (`object`, `option`, `value`) VALUES (:username, 'highspamlevel', :highspamlevel)"); $stmt->execute(array( ':username' => $username, ':highspamlevel' => $highspamlevel )); $stmt = $pdo->prepare("INSERT INTO `filterconf` (`object`, `option`, `value`) VALUES (:username, 'lowspamlevel', :lowspamlevel)"); $stmt->execute(array( ':username' => $username, ':lowspamlevel' => $lowspamlevel )); } catch (PDOException $e) { $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :username AND (`option` = 'lowspamlevel' OR `option` = 'highspamlevel')"); $stmt->execute(array( ':username' => $username )); $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['mailbox_modified'], $username) ); } function get_policy_list($object = null) { // 'object' can be be set, if not, default to mailcow_cc_username global $lang; global $pdo; if (isset($object)) { if (!filter_var($object, FILTER_VALIDATE_EMAIL) && is_valid_domain_name($object)) { $object = idn_to_ascii(strtolower(trim($object))); if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $object)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } } elseif (filter_var($object, FILTER_VALIDATE_EMAIL)) { if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $object)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } } } else { $object = $_SESSION['mailcow_cc_username']; } try { // WHITELIST $stmt = $pdo->prepare("SELECT `object`, `value`, `prefid` FROM `filterconf` WHERE `option`='whitelist_from' AND (`object` = :username OR `object` = SUBSTRING_INDEX(:username_domain, '@' ,-1))"); $stmt->execute(array(':username' => $object, ':username_domain' => $object)); $rows['whitelist'] = $stmt->fetchAll(PDO::FETCH_ASSOC); // BLACKLIST $stmt = $pdo->prepare("SELECT `object`, `value`, `prefid` FROM `filterconf` WHERE `option`='blacklist_from' AND (`object` = :username OR `object` = SUBSTRING_INDEX(:username_domain, '@' ,-1))"); $stmt->execute(array(':username' => $object, ':username_domain' => $object)); $rows['blacklist'] = $stmt->fetchAll(PDO::FETCH_ASSOC); } catch(PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); } return $rows; } function add_policy_list_item($postarray) { // Array data // Either 'domain' or 'username' can be be set // If none of the above is set, default to mailcow_cc_username // // If 'delete_prefid' then delete item id global $lang; global $pdo; $object = (isset($postarray['username'])) ? $postarray['username'] : null; $object = (isset($postarray['domain'])) ? $postarray['domain'] : null; (!isset($object)) ? $object = $_SESSION['mailcow_cc_username'] : null; if (is_valid_domain_name($object)) { if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $object)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } $object = idn_to_ascii(strtolower(trim($object))); } else { if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $object)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } } ($postarray['object_list'] == "bl") ? $object_list = "blacklist_from" : null; ($postarray['object_list'] == "wl") ? $object_list = "whitelist_from" : null; $object_from = preg_replace('/\.+/', '.', rtrim(preg_replace("/\.\*/", "*", trim(strtolower($postarray['object_from']))), '.')); if (!ctype_alnum(str_replace(array('@', '.', '-', '*'), '', $object_from))) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['policy_list_from_invalid']) ); return false; } if ($object_list != "blacklist_from" && $object_list != "whitelist_from") { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } try { $stmt = $pdo->prepare("SELECT `object` FROM `filterconf` WHERE (`option` = 'whitelist_from' OR `option` = 'blacklist_from') AND `object` = :object AND `value` = :object_from"); $stmt->execute(array(':object' => $object, ':object_from' => $object_from)); $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC)); if ($num_results != 0) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['policy_list_from_exists']) ); return false; } } catch(PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } try { $stmt = $pdo->prepare("INSERT INTO `filterconf` (`object`, `option` ,`value`) VALUES (:object, :object_list, :object_from)"); $stmt->execute(array( ':object' => $object, ':object_list' => $object_list, ':object_from' => $object_from )); } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['object_modified'], $object) ); } function delete_policy_list_item($postarray) { // Array data // Either 'domain' or 'username' can be be set // If none of the above is set, default to mailcow_cc_username // // 'delete_prefid' is item to be deleted global $lang; global $pdo; $object = (isset($postarray['username'])) ? $postarray['username'] : null; $object = (isset($postarray['domain'])) ? $postarray['domain'] : null; (!isset($object)) ? $object = $_SESSION['mailcow_cc_username'] : null; if (is_valid_domain_name($object)) { if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $object)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } $object = idn_to_ascii(strtolower(trim($object))); } else { if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $object)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } } if (!is_numeric($postarray['delete_prefid'])) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } try { $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :object AND `prefid` = :prefid"); $stmt->execute(array( ':object' => $object, ':prefid' => $postarray['delete_prefid'] )); } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['object_modified'], $object) ); return true; } function get_syncjobs($username = null) { // 'username' can be be set, if not, default to mailcow_cc_username global $lang; global $pdo; $data = array(); if (isset($username) && filter_var($username, FILTER_VALIDATE_EMAIL)) { if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $username)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } } else { $username = $_SESSION['mailcow_cc_username']; } try { $stmt = $pdo->prepare("SELECT *, CONCAT(LEFT(`password1`, 3), '…') as `password1_short` FROM `imapsync` WHERE `user2` = :username"); $stmt->execute(array(':username' => $username)); $data = $stmt->fetchAll(PDO::FETCH_ASSOC); } catch(PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); } return $data; } function get_syncjob_details($id) { global $lang; global $pdo; $syncjobdetails = array(); if ($_SESSION['mailcow_cc_role'] != "user" && $_SESSION['mailcow_cc_role'] != "admin") { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } if (!is_numeric($id)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } try { $stmt = $pdo->prepare("SELECT * FROM `imapsync` WHERE (`user2` = :username OR 'admin' = :role) AND id = :id"); $stmt->execute(array(':id' => $id, ':role' => $_SESSION['mailcow_cc_role'], ':username' => $_SESSION['mailcow_cc_username'])); $syncjobdetails = $stmt->fetch(PDO::FETCH_ASSOC); } catch(PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); } return $syncjobdetails; } function delete_syncjob($postarray) { // Array items // 'username' can be set, defaults to mailcow_cc_username global $lang; global $pdo; if (isset($postarray['username']) && filter_var($postarray['username'], FILTER_VALIDATE_EMAIL)) { if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $postarray['username'])) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } else { $username = $postarray['username']; } } else { $username = $_SESSION['mailcow_cc_username']; } $id = $postarray['id']; if (!is_numeric($id)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } try { $stmt = $pdo->prepare("DELETE FROM `imapsync` WHERE `user2` = :username AND `id`= :id"); $stmt->execute(array( ':username' => $username, ':id' => $id, )); } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username)) ); return true; } function add_syncjob($postarray) { // Array items // 'username' can be set, defaults to mailcow_cc_username global $lang; global $pdo; if (isset($postarray['username']) && filter_var($postarray['username'], FILTER_VALIDATE_EMAIL)) { if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $postarray['username'])) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } else { $username = $postarray['username']; } } else { $username = $_SESSION['mailcow_cc_username']; } $active = intval($postarray['active']); $delete2duplicates = intval($postarray['delete2duplicates']); $delete1 = intval($postarray['delete1']); $port1 = $postarray['port1']; $host1 = $postarray['host1']; $password1 = $postarray['password1']; $exclude = $postarray['exclude']; $maxage = $postarray['maxage']; $subfolder2 = $postarray['subfolder2']; $user1 = $postarray['user1']; $mins_interval = $postarray['mins_interval']; $enc1 = $postarray['enc1']; if (empty($subfolder2)) { $subfolder2 = ""; } if (!isset($maxage) || !filter_var($maxage, FILTER_VALIDATE_INT, array('options' => array('min_range' => 1, 'max_range' => 32767)))) { $maxage = "0"; } if (!filter_var($port1, FILTER_VALIDATE_INT, array('options' => array('min_range' => 1, 'max_range' => 65535)))) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } if (!filter_var($mins_interval, FILTER_VALIDATE_INT, array('options' => array('min_range' => 10, 'max_range' => 3600)))) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } if (!is_valid_domain_name($host1)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } if ($enc1 != "TLS" && $enc1 != "SSL" && $enc1 != "PLAIN") { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } if (@preg_match("/" . $exclude . "/", null) === false) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } try { $stmt = $pdo->prepare("SELECT `user2`, `user1` FROM `imapsync` WHERE `user2` = :user2 AND `user1` = :user1"); $stmt->execute(array(':user1' => $user1, ':user2' => $username)); $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC)); } catch(PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } if ($num_results != 0) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['object_exists'], htmlspecialchars($host1 . ' / ' . $user1)) ); return false; } try { $stmt = $pdo->prepare("INSERT INTO `imapsync` (`user2`, `exclude`, `delete1`, `maxage`, `subfolder2`, `host1`, `authmech1`, `user1`, `password1`, `mins_interval`, `port1`, `enc1`, `delete2duplicates`, `active`) VALUES (:user2, :exclude, :maxage, :delete1, :subfolder2, :host1, :authmech1, :user1, :password1, :mins_interval, :port1, :enc1, :delete2duplicates, :active)"); $stmt->execute(array( ':user2' => $username, ':exclude' => $exclude, ':maxage' => $maxage, ':delete1' => $delete1, ':subfolder2' => $subfolder2, ':host1' => $host1, ':authmech1' => 'PLAIN', ':user1' => $user1, ':password1' => $password1, ':mins_interval' => $mins_interval, ':port1' => $port1, ':enc1' => $enc1, ':delete2duplicates' => $delete2duplicates, ':active' => $active, )); } catch(PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['mailbox_modified'], $username) ); return true; } function edit_syncjob($postarray) { // Array items // 'username' can be set, defaults to mailcow_cc_username global $lang; global $pdo; if (isset($postarray['username']) && filter_var($postarray['username'], FILTER_VALIDATE_EMAIL)) { if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $postarray['username'])) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } else { $username = $postarray['username']; } } else { $username = $_SESSION['mailcow_cc_username']; } $active = intval($postarray['active']); $delete2duplicates = intval($postarray['delete2duplicates']); $delete1 = intval($postarray['delete1']); $id = $postarray['id']; $port1 = $postarray['port1']; $host1 = $postarray['host1']; $password1 = $postarray['password1']; $exclude = $postarray['exclude']; $maxage = $postarray['maxage']; $subfolder2 = $postarray['subfolder2']; $user1 = $postarray['user1']; $mins_interval = $postarray['mins_interval']; $enc1 = $postarray['enc1']; if (empty($subfolder2)) { $subfolder2 = ""; } if (!isset($maxage) || !filter_var($maxage, FILTER_VALIDATE_INT, array('options' => array('min_range' => 1, 'max_range' => 32767)))) { $maxage = "0"; } if (!filter_var($port1, FILTER_VALIDATE_INT, array('options' => array('min_range' => 1, 'max_range' => 65535)))) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } if (!filter_var($mins_interval, FILTER_VALIDATE_INT, array('options' => array('min_range' => 10, 'max_range' => 3600)))) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } if (!is_valid_domain_name($host1)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } if ($enc1 != "TLS" && $enc1 != "SSL" && $enc1 != "PLAIN") { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } if (@preg_match("/" . $exclude . "/", null) === false) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } try { $stmt = $pdo->prepare("SELECT `user2` FROM `imapsync` WHERE `user2` = :user2 AND `id` = :id"); $stmt->execute(array(':user2' => $username, ':id' => $id)); $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC)); } catch(PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } if (empty($num_results)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } try { $stmt = $pdo->prepare("UPDATE `imapsync` set `delete1` = :delete1, `maxage` = :maxage, `subfolder2` = :subfolder2, `exclude` = :exclude, `host1` = :host1, `user1` = :user1, `password1` = :password1, `mins_interval` = :mins_interval, `port1` = :port1, `enc1` = :enc1, `delete2duplicates` = :delete2duplicates, `active` = :active WHERE `user2` = :user2 AND `id` = :id"); $stmt->execute(array( ':user2' => $username, ':delete1' => $delete1, ':id' => $id, ':exclude' => $exclude, ':maxage' => $maxage, ':subfolder2' => $subfolder2, ':host1' => $host1, ':user1' => $user1, ':password1' => $password1, ':mins_interval' => $mins_interval, ':port1' => $port1, ':enc1' => $enc1, ':delete2duplicates' => $delete2duplicates, ':active' => $active, )); } catch(PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['mailbox_modified'], $username) ); return true; } function edit_tls_policy($postarray) { global $lang; global $pdo; if (isset($postarray['username']) && filter_var($postarray['username'], FILTER_VALIDATE_EMAIL)) { if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $postarray['username'])) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } else { $username = $postarray['username']; } } else { $username = $_SESSION['mailcow_cc_username']; } $tls_out = intval($postarray['tls_out']); $tls_in = intval($postarray['tls_in']); $username = $_SESSION['mailcow_cc_username']; if (!filter_var($username, FILTER_VALIDATE_EMAIL)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['username_invalid']) ); return false; } try { $stmt = $pdo->prepare("UPDATE `mailbox` SET `tls_enforce_out` = :tls_out, `tls_enforce_in` = :tls_in WHERE `username` = :username"); $stmt->execute(array( ':tls_out' => $tls_out, ':tls_in' => $tls_in, ':username' => $username )); } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['mailbox_modified'], $username) ); } function get_tls_policy($username = null) { global $lang; global $pdo; $data = array(); if (isset($username) && filter_var($username, FILTER_VALIDATE_EMAIL)) { if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $username)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } } else { $username = $_SESSION['mailcow_cc_username']; } try { $stmt = $pdo->prepare("SELECT `tls_enforce_out`, `tls_enforce_in` FROM `mailbox` WHERE `username` = :username"); $stmt->execute(array(':username' => $username)); $data = $stmt->fetch(PDO::FETCH_ASSOC); } catch(PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } return $data; } function edit_delimiter_action($postarray) { // Array items // 'username' can be set, defaults to mailcow_cc_username global $lang; global $redis; if (isset($postarray['username']) && filter_var($postarray['username'], FILTER_VALIDATE_EMAIL)) { if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $postarray['username'])) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } else { $username = $postarray['username']; } } else { $username = $_SESSION['mailcow_cc_username']; } if (!filter_var($username, FILTER_VALIDATE_EMAIL)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['username_invalid']) ); return false; } if (isset($postarray['tagged_mail_handler']) && $postarray['tagged_mail_handler'] == "subject") { try { $redis->hSet('RCPT_WANTS_SUBJECT_TAG', $username, 1); } catch (RedisException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'Redis: '.$e ); return false; } } else { try { $redis->hDel('RCPT_WANTS_SUBJECT_TAG', $username); } catch (RedisException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'Redis: '.$e ); return false; } } $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['mailbox_modified'], $username) ); return true; } function get_delimiter_action($username = null) { // 'username' can be set, defaults to mailcow_cc_username global $lang; global $redis; $data = array(); if (isset($username) && filter_var($username, FILTER_VALIDATE_EMAIL)) { if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $username)) { return false; } } else { $username = $_SESSION['mailcow_cc_username']; } try { if ($redis->hGet('RCPT_WANTS_SUBJECT_TAG', $username)) { return "subject"; } else { return "subfolder"; } } catch (RedisException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'Redis: '.$e ); return false; } } function user_get_alias_details($username) { global $lang; global $pdo; if ($_SESSION['mailcow_cc_role'] == "user") { $username = $_SESSION['mailcow_cc_username']; } if (!filter_var($username, FILTER_VALIDATE_EMAIL)) { return false; } try { $data['address'] = $username; $stmt = $pdo->prepare("SELECT IFNULL(GROUP_CONCAT(`address` SEPARATOR ', '), '✘') AS `aliases` FROM `alias` WHERE `goto` REGEXP :username_goto AND `address` NOT LIKE '@%' AND `address` != :username_address"); $stmt->execute(array(':username_goto' => '(^|,)'.$username.'($|,)', ':username_address' => $username)); $run = $stmt->fetchAll(PDO::FETCH_ASSOC); while ($row = array_shift($run)) { $data['aliases'] = $row['aliases']; } $stmt = $pdo->prepare("SELECT IFNULL(GROUP_CONCAT(local_part, '@', alias_domain SEPARATOR ', '), '✘') AS `ad_alias` FROM `mailbox` LEFT OUTER JOIN `alias_domain` on `target_domain` = `domain` WHERE `username` = :username ;"); $stmt->execute(array(':username' => $username)); $run = $stmt->fetchAll(PDO::FETCH_ASSOC); while ($row = array_shift($run)) { $data['ad_alias'] = $row['ad_alias']; } $stmt = $pdo->prepare("SELECT IFNULL(GROUP_CONCAT(`send_as` SEPARATOR ', '), '✘') AS `send_as` FROM `sender_acl` WHERE `logged_in_as` = :username AND `send_as` NOT LIKE '@%';"); $stmt->execute(array(':username' => $username)); $run = $stmt->fetchAll(PDO::FETCH_ASSOC); while ($row = array_shift($run)) { $data['aliases_also_send_as'] = $row['send_as']; } $stmt = $pdo->prepare("SELECT IFNULL(GROUP_CONCAT(`send_as` SEPARATOR ', '), '✘') AS `send_as` FROM `sender_acl` WHERE `logged_in_as` = :username AND `send_as` LIKE '@%';"); $stmt->execute(array(':username' => $username)); $run = $stmt->fetchAll(PDO::FETCH_ASSOC); while ($row = array_shift($run)) { $data['aliases_send_as_all'] = $row['send_as']; } $stmt = $pdo->prepare("SELECT IFNULL(GROUP_CONCAT(`address` SEPARATOR ', '), '✘') as `address` FROM `alias` WHERE `goto` REGEXP :username AND `address` LIKE '@%';"); $stmt->execute(array(':username' => '(^|,)'.$username.'($|,)')); $run = $stmt->fetchAll(PDO::FETCH_ASSOC); while ($row = array_shift($run)) { $data['is_catch_all'] = $row['address']; } return $data; } catch(PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } } function is_valid_domain_name($domain_name) { if (empty($domain_name)) { return false; } $domain_name = idn_to_ascii($domain_name); return (preg_match("/^([a-z\d](-*[a-z\d])*)(\.([a-z\d](-*[a-z\d])*))*$/i", $domain_name) && preg_match("/^.{1,253}$/", $domain_name) && preg_match("/^[^\.]{1,63}(\.[^\.]{1,63})*$/", $domain_name)); } function add_domain_admin($postarray) { global $lang; global $pdo; $username = strtolower(trim($postarray['username'])); $password = $postarray['password']; $password2 = $postarray['password2']; $active = intval($postarray['active']); if ($_SESSION['mailcow_cc_role'] != "admin") { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } if (empty($postarray['domain'])) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['domain_invalid']) ); return false; } if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username)) || empty ($username)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['username_invalid']) ); return false; } try { $stmt = $pdo->prepare("SELECT `username` FROM `mailbox` WHERE `username` = :username"); $stmt->execute(array(':username' => $username)); $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC)); $stmt = $pdo->prepare("SELECT `username` FROM `admin` WHERE `username` = :username"); $stmt->execute(array(':username' => $username)); $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC)); $stmt = $pdo->prepare("SELECT `username` FROM `domain_admins` WHERE `username` = :username"); $stmt->execute(array(':username' => $username)); $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC)); } catch(PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } foreach ($num_results as $num_results_each) { if ($num_results_each != 0) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['object_exists'], htmlspecialchars($username)) ); return false; } } if (!empty($password) && !empty($password2)) { if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['password_complexity']) ); return false; } if ($password != $password2) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['password_mismatch']) ); return false; } $password_hashed = hash_password($password); foreach ($postarray['domain'] as $domain) { if (!is_valid_domain_name($domain)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['domain_invalid']) ); return false; } try { $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`) VALUES (:username, :domain, :created, :active)"); $stmt->execute(array( ':username' => $username, ':domain' => $domain, ':created' => date('Y-m-d H:i:s'), ':active' => $active )); } catch (PDOException $e) { delete_domain_admin(array('username' => $username)); $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } } try { $stmt = $pdo->prepare("INSERT INTO `admin` (`username`, `password`, `superadmin`, `active`) VALUES (:username, :password_hashed, '0', :active)"); $stmt->execute(array( ':username' => $username, ':password_hashed' => $password_hashed, ':active' => $active )); } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } } else { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['password_empty']) ); return false; } $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['domain_admin_added'], htmlspecialchars($username)) ); } function delete_domain_admin($postarray) { global $pdo; global $lang; if ($_SESSION['mailcow_cc_role'] != "admin") { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } $username = $postarray['username']; if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['username_invalid']) ); return false; } try { $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username"); $stmt->execute(array( ':username' => $username, )); $stmt = $pdo->prepare("DELETE FROM `admin` WHERE `username` = :username"); $stmt->execute(array( ':username' => $username, )); } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['domain_admin_removed'], htmlspecialchars($username)) ); } function get_domain_admins() { global $pdo; global $lang; $domainadmins = array(); if ($_SESSION['mailcow_cc_role'] != "admin") { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } try { $stmt = $pdo->query("SELECT DISTINCT `username` FROM `domain_admins` WHERE `username` IN ( SELECT `username` FROM `admin` WHERE `superadmin`!='1' )"); $rows = $stmt->fetchAll(PDO::FETCH_ASSOC); while ($row = array_shift($rows)) { $domainadmins[] = $row['username']; } } catch(PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); } return $domainadmins; } function get_domain_admin_details($domain_admin) { global $pdo; global $lang; $domainadmindata = array(); if (isset($domain_admin) && $_SESSION['mailcow_cc_role'] != "admin") { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } if (!isset($domain_admin) && $_SESSION['mailcow_cc_role'] != "domainadmin") { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } (!isset($domain_admin)) ? $domain_admin = $_SESSION['mailcow_cc_username'] : null; if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $domain_admin))) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['username_invalid']) ); return false; } try { $stmt = $pdo->prepare("SELECT `tfa`.`active` AS `tfa_active_int`, CASE `tfa`.`active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `tfa_active`, `domain_admins`.`username`, `domain_admins`.`created`, `domain_admins`.`active` AS `active_int`, CASE `domain_admins`.`active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active` FROM `domain_admins` LEFT OUTER JOIN `tfa` ON `tfa`.`username`=`domain_admins`.`username` WHERE `domain_admins`.`username`= :domain_admin"); $stmt->execute(array( ':domain_admin' => $domain_admin )); $row = $stmt->fetch(PDO::FETCH_ASSOC); if (empty($row)) { return false; } $domainadmindata['username'] = $row['username']; $domainadmindata['tfa_active'] = $row['tfa_active']; $domainadmindata['active'] = $row['active']; $domainadmindata['tfa_active_int'] = $row['tfa_active_int']; $domainadmindata['active_int'] = $row['active_int']; $domainadmindata['modified'] = $row['created']; // GET SELECTED $stmt = $pdo->prepare("SELECT `domain` FROM `domain` WHERE `domain` IN ( SELECT `domain` FROM `domain_admins` WHERE `username`= :domain_admin)"); $stmt->execute(array(':domain_admin' => $domain_admin)); $rows = $stmt->fetchAll(PDO::FETCH_ASSOC); while($row = array_shift($rows)) { $domainadmindata['selected_domains'][] = $row['domain']; } // GET UNSELECTED $stmt = $pdo->prepare("SELECT `domain` FROM `domain` WHERE `domain` NOT IN ( SELECT `domain` FROM `domain_admins` WHERE `username`= :domain_admin)"); $stmt->execute(array(':domain_admin' => $domain_admin)); $rows = $stmt->fetchAll(PDO::FETCH_ASSOC); while($row = array_shift($rows)) { $domainadmindata['unselected_domains'][] = $row['domain']; } if (!isset($domainadmindata['unselected_domains'])) { $domainadmindata['unselected_domains'] = ""; } } catch(PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); } return $domainadmindata; } function set_tfa($postarray) { global $lang; global $pdo; global $yubi; global $u2f; global $tfa; if ($_SESSION['mailcow_cc_role'] != "domainadmin" && $_SESSION['mailcow_cc_role'] != "admin") { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } $username = $_SESSION['mailcow_cc_username']; $stmt = $pdo->prepare("SELECT `password` FROM `admin` WHERE `username` = :user"); $stmt->execute(array(':user' => $username)); $row = $stmt->fetch(PDO::FETCH_ASSOC); if (!verify_ssha256($row['password'], $postarray["confirm_password"])) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } switch ($postarray["tfa_method"]) { case "yubi_otp": $key_id = (!isset($postarray["key_id"])) ? 'unidentified' : $postarray["key_id"]; $yubico_id = $postarray['yubico_id']; $yubico_key = $postarray['yubico_key']; $yubi = new Auth_Yubico($yubico_id, $yubico_key); if (!$yubi) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } if (!ctype_alnum($postarray["otp_token"]) || strlen($postarray["otp_token"]) != 44) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['tfa_token_invalid']) ); return false; } $yauth = $yubi->verify($postarray["otp_token"]); if (PEAR::isError($yauth)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'Yubico API: ' . $yauth->getMessage() ); return false; } try { // We could also do a modhex translation here $yubico_modhex_id = substr($postarray["otp_token"], 0, 12); $stmt = $pdo->prepare("DELETE FROM `tfa` WHERE `username` = :username AND (`authmech` != 'yubi_otp') OR (`authmech` = 'yubi_otp' AND `secret` LIKE :modhex)"); $stmt->execute(array(':username' => $username, ':modhex' => '%' . $yubico_modhex_id)); $stmt = $pdo->prepare("INSERT INTO `tfa` (`key_id`, `username`, `authmech`, `active`, `secret`) VALUES (:key_id, :username, 'yubi_otp', '1', :secret)"); $stmt->execute(array(':key_id' => $key_id, ':username' => $username, ':secret' => $yubico_id . ':' . $yubico_key . ':' . $yubico_modhex_id)); } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['object_modified'], htmlspecialchars($username)) ); break; case "u2f": $key_id = (!isset($postarray["key_id"])) ? 'unidentified' : $postarray["key_id"]; try { $reg = $u2f->doRegister(json_decode($_SESSION['regReq']), json_decode($postarray['token'])); $stmt = $pdo->prepare("DELETE FROM `tfa` WHERE `username` = :username AND `authmech` != 'u2f'"); $stmt->execute(array(':username' => $username)); $stmt = $pdo->prepare("INSERT INTO `tfa` (`username`, `key_id`, `authmech`, `keyHandle`, `publicKey`, `certificate`, `counter`, `active`) VALUES (?, ?, 'u2f', ?, ?, ?, ?, '1')"); $stmt->execute(array($username, $key_id, $reg->keyHandle, $reg->publicKey, $reg->certificate, $reg->counter)); $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['object_modified'], $username) ); $_SESSION['regReq'] = null; } catch (Exception $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => "U2F: " . $e->getMessage() ); $_SESSION['regReq'] = null; return false; } break; case "totp": $key_id = (!isset($postarray["key_id"])) ? 'unidentified' : $postarray["key_id"]; if ($tfa->verifyCode($_POST['totp_secret'], $_POST['totp_confirm_token']) === true) { try { $stmt = $pdo->prepare("DELETE FROM `tfa` WHERE `username` = :username"); $stmt->execute(array(':username' => $username)); $stmt = $pdo->prepare("INSERT INTO `tfa` (`username`, `key_id`, `authmech`, `secret`, `active`) VALUES (?, ?, 'totp', ?, '1')"); $stmt->execute(array($username, $key_id, $_POST['totp_secret'])); } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['object_modified'], $username) ); } else { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'TOTP verification failed' ); } break; case "none": try { $stmt = $pdo->prepare("DELETE FROM `tfa` WHERE `username` = :username"); $stmt->execute(array(':username' => $username)); } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['object_modified'], htmlspecialchars($username)) ); break; } } function unset_tfa_key($postarray) { // Can only unset own keys // Needs at least one key left global $pdo; global $lang; $id = intval($postarray['unset_tfa_key']); if ($_SESSION['mailcow_cc_role'] != "domainadmin" && $_SESSION['mailcow_cc_role'] != "admin") { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } $username = $_SESSION['mailcow_cc_username']; try { if (!is_numeric($id)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } $stmt = $pdo->prepare("SELECT COUNT(*) AS `keys` FROM `tfa` WHERE `username` = :username AND `active` = '1'"); $stmt->execute(array(':username' => $username)); $row = $stmt->fetch(PDO::FETCH_ASSOC); if ($row['keys'] == "1") { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['last_key']) ); return false; } $stmt = $pdo->prepare("DELETE FROM `tfa` WHERE `username` = :username AND `id` = :id"); $stmt->execute(array(':username' => $username, ':id' => $id)); $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['object_modified'], $username) ); } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } } function get_tfa($username = null) { global $pdo; if (isset($_SESSION['mailcow_cc_username'])) { $username = $_SESSION['mailcow_cc_username']; } elseif (empty($username)) { return false; } $stmt = $pdo->prepare("SELECT * FROM `tfa` WHERE `username` = :username AND `active` = '1'"); $stmt->execute(array(':username' => $username)); $row = $stmt->fetch(PDO::FETCH_ASSOC); switch ($row["authmech"]) { case "yubi_otp": $data['name'] = "yubi_otp"; $data['pretty'] = "Yubico OTP"; $stmt = $pdo->prepare("SELECT `id`, `key_id`, RIGHT(`secret`, 12) AS 'modhex' FROM `tfa` WHERE `authmech` = 'yubi_otp' AND `username` = :username"); $stmt->execute(array( ':username' => $username, )); $rows = $stmt->fetchAll(PDO::FETCH_ASSOC); while($row = array_shift($rows)) { $data['additional'][] = $row; } return $data; break; case "u2f": $data['name'] = "u2f"; $data['pretty'] = "Fido U2F"; $stmt = $pdo->prepare("SELECT `id`, `key_id` FROM `tfa` WHERE `authmech` = 'u2f' AND `username` = :username"); $stmt->execute(array( ':username' => $username, )); $rows = $stmt->fetchAll(PDO::FETCH_ASSOC); while($row = array_shift($rows)) { $data['additional'][] = $row; } return $data; break; case "hotp": $data['name'] = "hotp"; $data['pretty'] = "HMAC-based OTP"; return $data; break; case "totp": $data['name'] = "totp"; $data['pretty'] = "Time-based OTP"; $stmt = $pdo->prepare("SELECT `id`, `key_id`, `secret` FROM `tfa` WHERE `authmech` = 'totp' AND `username` = :username"); $stmt->execute(array( ':username' => $username, )); $rows = $stmt->fetchAll(PDO::FETCH_ASSOC); while($row = array_shift($rows)) { $data['additional'][] = $row; } return $data; break; default: $data['name'] = 'none'; $data['pretty'] = "-"; return $data; break; } } function verify_tfa_login($username, $token) { global $pdo; global $lang; global $yubi; global $u2f; global $tfa; $stmt = $pdo->prepare("SELECT `authmech` FROM `tfa` WHERE `username` = :username AND `active` = '1'"); $stmt->execute(array(':username' => $username)); $row = $stmt->fetch(PDO::FETCH_ASSOC); switch ($row["authmech"]) { case "yubi_otp": if (!ctype_alnum($token) || strlen($token) != 44) { return false; } $yubico_modhex_id = substr($token, 0, 12); $stmt = $pdo->prepare("SELECT `id`, `secret` FROM `tfa` WHERE `username` = :username AND `authmech` = 'yubi_otp' AND `active`='1' AND `secret` LIKE :modhex"); $stmt->execute(array(':username' => $username, ':modhex' => '%' . $yubico_modhex_id)); $row = $stmt->fetch(PDO::FETCH_ASSOC); $yubico_auth = explode(':', $row['secret']); $yubi = new Auth_Yubico($yubico_auth[0], $yubico_auth[1]); $yauth = $yubi->verify($token); if (PEAR::isError($yauth)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'Yubico Authentication error: ' . $yauth->getMessage() ); return false; } else { $_SESSION['tfa_id'] = $row['id']; return true; } return false; break; case "u2f": try { $reg = $u2f->doAuthenticate(json_decode($_SESSION['authReq']), get_u2f_registrations($username), json_decode($token)); $stmt = $pdo->prepare("UPDATE `tfa` SET `counter` = ? WHERE `id` = ?"); $stmt->execute(array($reg->counter, $reg->id)); $_SESSION['tfa_id'] = $reg->id; $_SESSION['authReq'] = null; return true; } catch (Exception $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => "U2F: " . $e->getMessage() ); $_SESSION['regReq'] = null; return false; } return false; break; case "hotp": return false; break; case "totp": try { $stmt = $pdo->prepare("SELECT `id`, `secret` FROM `tfa` WHERE `username` = :username AND `authmech` = 'totp' AND `active`='1'"); $stmt->execute(array(':username' => $username)); $row = $stmt->fetch(PDO::FETCH_ASSOC); if ($tfa->verifyCode($row['secret'], $_POST['token']) === true) { $_SESSION['tfa_id'] = $row['id']; return true; } return false; } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } break; default: return false; break; } return false; } function edit_domain_admin($postarray) { global $lang; global $pdo; if ($_SESSION['mailcow_cc_role'] != "admin" && $_SESSION['mailcow_cc_role'] != "domainadmin") { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } // Administrator if ($_SESSION['mailcow_cc_role'] == "admin") { $username = $postarray['username']; $username_now = $postarray['username_now']; $password = $postarray['password']; $password2 = $postarray['password2']; $active = intval($postarray['active']); if(isset($postarray['domain'])) { foreach ($postarray['domain'] as $domain) { if (!is_valid_domain_name($domain)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['domain_invalid']) ); return false; } } } if (empty($postarray['domain'])) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['domain_invalid']) ); return false; } if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['username_invalid']) ); return false; } if ($username != $username_now) { if (empty(get_domain_admin_details($username_now)['username']) || !empty(get_domain_admin_details($username)['username'])) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['username_invalid']) ); return false; } } try { $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username"); $stmt->execute(array( ':username' => $username_now, )); } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } if (isset($postarray['domain'])) { foreach ($postarray['domain'] as $domain) { try { $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`) VALUES (:username, :domain, :created, :active)"); $stmt->execute(array( ':username' => $username, ':domain' => $domain, ':created' => date('Y-m-d H:i:s'), ':active' => $active )); } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } } } if (!empty($password) && !empty($password2)) { if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['password_complexity']) ); return false; } if ($password != $password2) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['password_mismatch']) ); return false; } $password_hashed = hash_password($password); try { $stmt = $pdo->prepare("UPDATE `admin` SET `username` = :username1, `active` = :active, `password` = :password_hashed WHERE `username` = :username2"); $stmt->execute(array( ':password_hashed' => $password_hashed, ':username1' => $username, ':username2' => $username_now, ':active' => $active )); if (isset($postarray['disable_tfa'])) { $stmt = $pdo->prepare("UPDATE `tfa` SET `active` = '0' WHERE `username` = :username"); $stmt->execute(array(':username' => $username_now)); } else { $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username WHERE `username` = :username_now"); $stmt->execute(array(':username' => $username, ':username_now' => $username_now)); } } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } } else { try { $stmt = $pdo->prepare("UPDATE `admin` SET `username` = :username1, `active` = :active WHERE `username` = :username2"); $stmt->execute(array( ':username1' => $username, ':username2' => $username_now, ':active' => $active )); if (isset($postarray['disable_tfa'])) { $stmt = $pdo->prepare("UPDATE `tfa` SET `active` = '0' WHERE `username` = :username"); $stmt->execute(array(':username' => $username)); } else { $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username WHERE `username` = :username_now"); $stmt->execute(array(':username' => $username, ':username_now' => $username_now)); } } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } } $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['domain_admin_modified'], htmlspecialchars($username)) ); } // Domain administrator // Can only edit itself elseif ($_SESSION['mailcow_cc_role'] == "domainadmin") { $username = $_SESSION['mailcow_cc_username']; $password_old = $postarray['user_old_pass']; $password_new = $postarray['user_new_pass']; $password_new2 = $postarray['user_new_pass2']; $stmt = $pdo->prepare("SELECT `password` FROM `admin` WHERE `username` = :user"); $stmt->execute(array(':user' => $username)); $row = $stmt->fetch(PDO::FETCH_ASSOC); if (!verify_ssha256($row['password'], $password_old)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } if (!empty($password_new2) && !empty($password_new)) { if ($password_new2 != $password_new) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['password_mismatch']) ); return false; } if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password_new)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['password_complexity']) ); return false; } $password_hashed = hash_password($password_new); try { $stmt = $pdo->prepare("UPDATE `admin` SET `password` = :password_hashed WHERE `username` = :username"); $stmt->execute(array( ':password_hashed' => $password_hashed, ':username' => $username )); } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } } $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['domain_admin_modified'], htmlspecialchars($username)) ); } } function get_admin_details() { // No parameter to be given, only one admin should exist global $pdo; global $lang; $data = array(); if ($_SESSION['mailcow_cc_role'] != 'admin') { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } try { $stmt = $pdo->prepare("SELECT `username`, `modified`, `created` FROM `admin` WHERE `superadmin`='1' AND active='1'"); $stmt->execute(); $data = $stmt->fetch(PDO::FETCH_ASSOC); } catch(PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); } return $data; } function dkim_add_key($postarray) { global $lang; global $pdo; global $redis; if ($_SESSION['mailcow_cc_role'] != "admin") { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } // if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) { // $_SESSION['return'] = array( // 'type' => 'danger', // 'msg' => sprintf($lang['danger']['access_denied']) // ); // return false; // } $key_length = intval($postarray['key_size']); $dkim_selector = (isset($postarray['dkim_selector'])) ? $postarray['dkim_selector'] : 'dkim'; $domain = $postarray['domain']; if (!is_valid_domain_name($domain) || !is_numeric($key_length)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid']) ); return false; } if (!empty(glob($GLOBALS['MC_DKIM_TXTS'] . '/' . $domain . '.dkim')) || $redis->hGet('DKIM_PUB_KEYS', $domain)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid']) ); return false; } if (!ctype_alnum($dkim_selector)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid']) ); return false; } $config = array( "digest_alg" => "sha256", "private_key_bits" => $key_length, "private_key_type" => OPENSSL_KEYTYPE_RSA, ); if ($keypair_ressource = openssl_pkey_new($config)) { $key_details = openssl_pkey_get_details($keypair_ressource); $pubKey = implode(array_slice( array_filter( explode(PHP_EOL, $key_details['key']) ), 1, -1) ); // Save public key and selector to redis try { $redis->hSet('DKIM_PUB_KEYS', $domain, $pubKey); $redis->hSet('DKIM_SELECTORS', $domain, $dkim_selector); } catch (RedisException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'Redis: '.$e ); return false; } // Export private key and save private key to redis openssl_pkey_export($keypair_ressource, $privKey); if (isset($privKey) && !empty($privKey)) { try { $redis->hSet('DKIM_PRIV_KEYS', $dkim_selector . '.' . $domain, trim($privKey)); } catch (RedisException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'Redis: '.$e ); return false; } } $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['dkim_added']) ); return true; } else { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid']) ); return false; } } function dkim_get_key_details($domain) { $data = array(); global $redis; if (hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) { if ($redis_dkim_key_data = $redis->hGet('DKIM_PUB_KEYS', $domain)) { $data['pubkey'] = $redis_dkim_key_data; $data['length'] = (strlen($data['pubkey']) < 391) ? 1024 : 2048; $data['dkim_txt'] = 'v=DKIM1;k=rsa;t=s;s=email;p=' . $redis_dkim_key_data; $data['dkim_selector'] = $redis->hGet('DKIM_SELECTORS', $domain); } } return $data; } function dkim_get_blind_keys() { global $redis; global $lang; if ($_SESSION['mailcow_cc_role'] != "admin") { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } $domains = array(); foreach ($redis->hKeys('DKIM_PUB_KEYS') as $redis_dkim_domain) { $domains[] = $redis_dkim_domain; } return array_diff($domains, array_merge(mailbox_get_domains(), mailbox_get_alias_domains())); } function dkim_delete_key($postarray) { global $redis; global $lang; if (!is_array($postarray['domains'])) { $domains = array(); $domains[] = $postarray['domains']; } else { $domains = $postarray['domains']; } if ($_SESSION['mailcow_cc_role'] != "admin") { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } foreach ($domains as $domain) { if (!is_valid_domain_name($domain)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid']) ); return false; } try { $selector = $redis->hGet('DKIM_SELECTORS', $domain); $redis->hDel('DKIM_PUB_KEYS', $domain); $redis->hDel('DKIM_PRIV_KEYS', $selector . '.' . $domain); $redis->hDel('DKIM_SELECTORS', $selector); } catch (RedisException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'Redis: '.$e ); return false; } } $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['dkim_removed'], htmlspecialchars(implode(', ', $domains))) ); return true; } function mailbox_add_domain($postarray) { // Array elements // domain string // description string // aliases int // mailboxes int // maxquota int // quota int // active int // relay_all_recipients int // backupmx int global $pdo; global $redis; global $lang; if ($_SESSION['mailcow_cc_role'] != "admin") { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } $domain = idn_to_ascii(strtolower(trim($postarray['domain']))); $description = $postarray['description']; $aliases = $postarray['aliases']; $mailboxes = $postarray['mailboxes']; $maxquota = $postarray['maxquota']; $quota = $postarray['quota']; if ($maxquota > $quota) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['mailbox_quota_exceeds_domain_quota']) ); return false; } if ($maxquota == "0" || empty($maxquota)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['maxquota_empty']) ); return false; } $active = intval($postarray['active']); $relay_all_recipients = intval($postarray['relay_all_recipients']); $backupmx = intval($postarray['backupmx']); ($relay_all_recipients == 1) ? $backupmx = '1' : null; if (!is_valid_domain_name($domain)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['domain_invalid']) ); return false; } foreach (array($quota, $maxquota, $mailboxes, $aliases) as $data) { if (!is_numeric($data)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['object_is_not_numeric'], htmlspecialchars($data)) ); return false; } } try { $stmt = $pdo->prepare("SELECT `domain` FROM `domain` WHERE `domain` = :domain"); $stmt->execute(array(':domain' => $domain)); $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC)); $stmt = $pdo->prepare("SELECT `alias_domain` FROM `alias_domain` WHERE `alias_domain` = :domain"); $stmt->execute(array(':domain' => $domain)); $num_results = $num_results + count($stmt->fetchAll(PDO::FETCH_ASSOC)); } catch(PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } if ($num_results != 0) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['domain_exists'], htmlspecialchars($domain)) ); return false; } try { $stmt = $pdo->prepare("INSERT INTO `domain` (`domain`, `description`, `aliases`, `mailboxes`, `maxquota`, `quota`, `transport`, `backupmx`, `active`, `relay_all_recipients`) VALUES (:domain, :description, :aliases, :mailboxes, :maxquota, :quota, 'virtual', :backupmx, :active, :relay_all_recipients)"); $stmt->execute(array( ':domain' => $domain, ':description' => $description, ':aliases' => $aliases, ':mailboxes' => $mailboxes, ':maxquota' => $maxquota, ':quota' => $quota, ':backupmx' => $backupmx, ':active' => $active, ':relay_all_recipients' => $relay_all_recipients )); try { $redis->hSet('DOMAIN_MAP', $domain, 1); } catch (RedisException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'Redis: '.$e ); return false; } $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['domain_added'], htmlspecialchars($domain)) ); } catch (PDOException $e) { mailbox_delete_domain(array('domain' => $domain)); $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } } function mailbox_add_alias($postarray) { // Array elements // address string (separated by " ", "," ";" "\n") - email address or domain // goto string (separated by " ", "," ";" "\n") // active int global $lang; global $pdo; $addresses = array_map('trim', preg_split( "/( |,|;|\n)/", $postarray['address'])); $gotos = array_map('trim', preg_split( "/( |,|;|\n)/", $postarray['goto'])); $active = intval($postarray['active']); if (empty($addresses[0])) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['alias_empty']) ); return false; } if (empty($gotos[0])) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['goto_empty']) ); return false; } foreach ($addresses as $address) { if (empty($address)) { continue; } $stmt = $pdo->prepare("SELECT `address` FROM `alias` WHERE `address`= :address"); $stmt->execute(array(':address' => $address)); $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC)); if ($num_results != 0) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['is_alias_or_mailbox'], htmlspecialchars($address)) ); return false; } $domain = idn_to_ascii(substr(strstr($address, '@'), 1)); $local_part = strstr($address, '@', true); $address = $local_part.'@'.$domain; $domaindata = mailbox_get_domain_details($domain); if (is_array($domaindata) && $domaindata['aliases_left'] == "0") { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['max_alias_exceeded']) ); return false; } try { $stmt = $pdo->prepare("SELECT `domain` FROM `domain` WHERE `domain`= :domain1 OR `domain` = (SELECT `target_domain` FROM `alias_domain` WHERE `alias_domain` = :domain2)"); $stmt->execute(array(':domain1' => $domain, ':domain2' => $domain)); $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC)); if ($num_results == 0) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['domain_not_found'], htmlspecialchars($domain)) ); return false; } $stmt = $pdo->prepare("SELECT `address` FROM `alias` WHERE `address`= :address"); $stmt->execute(array(':address' => $address)); $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC)); if ($num_results != 0) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['is_alias_or_mailbox'], htmlspecialchars($address)) ); return false; } $stmt = $pdo->prepare("SELECT `address` FROM `spamalias` WHERE `address`= :address"); $stmt->execute(array(':address' => $address)); $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC)); if ($num_results != 0) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['is_spam_alias'], htmlspecialchars($address)) ); return false; } } catch(PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } if ((!filter_var($address, FILTER_VALIDATE_EMAIL) === true) && !empty($local_part)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['alias_invalid']) ); return false; } if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } foreach ($gotos as &$goto) { if (empty($goto)) { continue; } $goto_domain = idn_to_ascii(substr(strstr($goto, '@'), 1)); $goto_local_part = strstr($goto, '@', true); $goto = $goto_local_part.'@'.$goto_domain; $stmt = $pdo->prepare("SELECT `username` FROM `mailbox` WHERE `kind` REGEXP 'location|thing|group' AND `username`= :goto"); $stmt->execute(array(':goto' => $goto)); $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC)); if ($num_results != 0) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['goto_invalid']) ); return false; } if (!filter_var($goto, FILTER_VALIDATE_EMAIL) === true) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['goto_invalid']) ); return false; } if ($goto == $address) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['alias_goto_identical']) ); return false; } } $gotos = array_filter($gotos); $goto = implode(",", $gotos); try { $stmt = $pdo->prepare("INSERT INTO `alias` (`address`, `goto`, `domain`, `active`) VALUES (:address, :goto, :domain, :active)"); if (!filter_var($address, FILTER_VALIDATE_EMAIL) === true) { $stmt->execute(array( ':address' => '@'.$domain, ':goto' => $goto, ':domain' => $domain, ':active' => $active )); } else { $stmt->execute(array( ':address' => $address, ':goto' => $goto, ':domain' => $domain, ':active' => $active )); } $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['alias_added']) ); } catch (PDOException $e) { mailbox_delete_alias(array('address' => $address)); $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } } $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['alias_added']) ); } function mailbox_add_alias_domain($postarray) { // Array elements // active int // alias_domain string // target_domain string global $lang; global $pdo; $active = intval($postarray['active']); $alias_domain = idn_to_ascii(strtolower(trim($postarray['alias_domain']))); $target_domain = idn_to_ascii(strtolower(trim($postarray['target_domain']))); if (!is_valid_domain_name($alias_domain)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['alias_domain_invalid']) ); return false; } if (!is_valid_domain_name($target_domain)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['target_domain_invalid']) ); return false; } if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $target_domain)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } if ($alias_domain == $target_domain) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['aliasd_targetd_identical']) ); return false; } try { $stmt = $pdo->prepare("SELECT `domain` FROM `domain` WHERE `domain`= :target_domain"); $stmt->execute(array(':target_domain' => $target_domain)); $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC)); if ($num_results == 0) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['targetd_not_found']) ); return false; } $stmt = $pdo->prepare("SELECT `alias_domain` FROM `alias_domain` WHERE `alias_domain`= :alias_domain UNION SELECT `alias_domain` FROM `alias_domain` WHERE `alias_domain`= :alias_domain_in_domain"); $stmt->execute(array(':alias_domain' => $alias_domain, ':alias_domain_in_domain' => $alias_domain)); $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC)); if ($num_results != 0) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['aliasd_exists']) ); return false; } } catch(PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } try { $stmt = $pdo->prepare("INSERT INTO `alias_domain` (`alias_domain`, `target_domain`, `active`) VALUES (:alias_domain, :target_domain, :active)"); $stmt->execute(array( ':alias_domain' => $alias_domain, ':target_domain' => $target_domain, ':active' => $active )); $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['aliasd_added'], htmlspecialchars($alias_domain)) ); } catch (PDOException $e) { mailbox_delete_alias_domain(array('alias_domain' => $alias_domain)); $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } } function mailbox_add_mailbox($postarray) { // Array elements // active int // local_part string // domain string // name string (username if empty) // password string // password2 string // quota int (MiB) // active int global $pdo; global $lang; $local_part = strtolower(trim($postarray['local_part'])); $domain = idn_to_ascii(strtolower(trim($postarray['domain']))); $username = $local_part . '@' . $domain; if (!filter_var($username, FILTER_VALIDATE_EMAIL)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['mailbox_invalid']) ); return false; } if (empty($postarray['local_part'])) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['mailbox_invalid']) ); return false; } $password = $postarray['password']; $password2 = $postarray['password2']; $name = $postarray['name']; $quota_m = filter_var($postarray['quota'], FILTER_SANITIZE_NUMBER_FLOAT); if (empty($name)) { $name = $local_part; } $active = intval($postarray['active']); $quota_b = ($quota_m * 1048576); $maildir = $domain."/".$local_part."/"; if (!is_valid_domain_name($domain)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['domain_invalid']) ); return false; } if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } try { $stmt = $pdo->prepare("SELECT `mailboxes`, `maxquota`, `quota` FROM `domain` WHERE `domain` = :domain"); $stmt->execute(array(':domain' => $domain)); $DomainData = $stmt->fetch(PDO::FETCH_ASSOC); $stmt = $pdo->prepare("SELECT COUNT(*) as count, COALESCE(ROUND(SUM(`quota`)/1048576), 0) as `quota` FROM `mailbox` WHERE `kind` NOT REGEXP 'location|thing|group' AND `domain` = :domain"); $stmt->execute(array(':domain' => $domain)); $MailboxData = $stmt->fetch(PDO::FETCH_ASSOC); $stmt = $pdo->prepare("SELECT `local_part` FROM `mailbox` WHERE `local_part` = :local_part and `domain`= :domain"); $stmt->execute(array(':local_part' => $local_part, ':domain' => $domain)); $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC)); if ($num_results != 0) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['object_exists'], htmlspecialchars($username)) ); return false; } $stmt = $pdo->prepare("SELECT `address` FROM `alias` WHERE address= :username"); $stmt->execute(array(':username' => $username)); $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC)); if ($num_results != 0) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['is_alias'], htmlspecialchars($username)) ); return false; } $stmt = $pdo->prepare("SELECT `address` FROM `spamalias` WHERE `address`= :username"); $stmt->execute(array(':username' => $username)); $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC)); if ($num_results != 0) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['is_spam_alias'], htmlspecialchars($username)) ); return false; } $stmt = $pdo->prepare("SELECT `domain` FROM `domain` WHERE `domain`= :domain"); $stmt->execute(array(':domain' => $domain)); $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC)); if ($num_results == 0) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['domain_not_found'], $domain) ); return false; } } catch(PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } if (!is_numeric($quota_m) || $quota_m == "0") { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['quota_not_0_not_numeric']) ); return false; } if (!empty($password) && !empty($password2)) { if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['password_complexity']) ); return false; } if ($password != $password2) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['password_mismatch']) ); return false; } $password_hashed = hash_password($password); } else { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['password_empty']) ); return false; } if ($MailboxData['count'] >= $DomainData['mailboxes']) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['max_mailbox_exceeded'], $MailboxData['count'], $DomainData['mailboxes']) ); return false; } if ($quota_m > $DomainData['maxquota']) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['mailbox_quota_exceeded'], $DomainData['maxquota']) ); return false; } if (($MailboxData['quota'] + $quota_m) > $DomainData['quota']) { $quota_left_m = ($DomainData['quota'] - $MailboxData['quota']); $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['mailbox_quota_left_exceeded'], $quota_left_m) ); return false; } try { $stmt = $pdo->prepare("INSERT INTO `mailbox` (`username`, `password`, `name`, `maildir`, `quota`, `local_part`, `domain`, `active`) VALUES (:username, :password_hashed, :name, :maildir, :quota_b, :local_part, :domain, :active)"); $stmt->execute(array( ':username' => $username, ':password_hashed' => $password_hashed, ':name' => $name, ':maildir' => $maildir, ':quota_b' => $quota_b, ':local_part' => $local_part, ':domain' => $domain, ':active' => $active )); $stmt = $pdo->prepare("INSERT INTO `quota2` (`username`, `bytes`, `messages`) VALUES (:username, '0', '0')"); $stmt->execute(array(':username' => $username)); $stmt = $pdo->prepare("INSERT INTO `alias` (`address`, `goto`, `domain`, `active`) VALUES (:username1, :username2, :domain, :active)"); $stmt->execute(array( ':username1' => $username, ':username2' => $username, ':domain' => $domain, ':active' => $active )); $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['mailbox_added'], htmlspecialchars($username)) ); } catch (PDOException $e) { mailbox_delete_mailbox(array('username' => $username)); $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } } function mailbox_add_resource($postarray) { // Array elements // active int // domain string // description string // multiple_bookings int // kind string global $pdo; global $lang; $domain = idn_to_ascii(strtolower(trim($postarray['domain']))); $description = $postarray['description']; $local_part = preg_replace('/[^\da-z]/i', '', preg_quote($description, '/')); $name = $local_part . '@' . $domain; $kind = $postarray['kind']; $active = intval($postarray['active']); $multiple_bookings = intval($postarray['multiple_bookings']); if (!filter_var($name, FILTER_VALIDATE_EMAIL)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['resource_invalid']) ); return false; } if (empty($description)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['description_invalid']) ); return false; } if ($kind != 'location' && $kind != 'group' && $kind != 'thing') { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['resource_invalid']) ); return false; } if (!is_valid_domain_name($domain)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['domain_invalid']) ); return false; } if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } try { $stmt = $pdo->prepare("SELECT `username` FROM `mailbox` WHERE `username` = :name"); $stmt->execute(array(':name' => $name)); $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC)); if ($num_results != 0) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['object_exists'], htmlspecialchars($name)) ); return false; } $stmt = $pdo->prepare("SELECT `address` FROM `alias` WHERE address= :name"); $stmt->execute(array(':name' => $name)); $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC)); if ($num_results != 0) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['is_alias'], htmlspecialchars($name)) ); return false; } $stmt = $pdo->prepare("SELECT `address` FROM `spamalias` WHERE `address`= :name"); $stmt->execute(array(':name' => $name)); $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC)); if ($num_results != 0) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['is_spam_alias'], htmlspecialchars($name)) ); return false; } $stmt = $pdo->prepare("SELECT `domain` FROM `domain` WHERE `domain`= :domain"); $stmt->execute(array(':domain' => $domain)); $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC)); if ($num_results == 0) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['domain_not_found'], $domain) ); return false; } } catch(PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } try { $stmt = $pdo->prepare("INSERT INTO `mailbox` (`username`, `password`, `name`, `maildir`, `quota`, `local_part`, `domain`, `active`, `multiple_bookings`, `kind`) VALUES (:name, 'RESOURCE', :description, 'RESOURCE', 0, :local_part, :domain, :active, :multiple_bookings, :kind)"); $stmt->execute(array( ':name' => $name, ':description' => $description, ':local_part' => $local_part, ':domain' => $domain, ':active' => $active, ':kind' => $kind, ':multiple_bookings' => $multiple_bookings )); $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['resource_added'], htmlspecialchars($name)) ); } catch (PDOException $e) { mailbox_delete_resource(array('name' => $name)); $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } } function mailbox_edit_alias_domain($postarray) { // active int // target_domain string // alias_domain string/array of strings global $lang; global $pdo; if (!is_array($postarray['alias_domain'])) { $alias_domains = array(); $alias_domains[] = $postarray['alias_domain']; } else { $alias_domains = $postarray['alias_domain']; } foreach ($alias_domains as $alias_domain) { $alias_domain = idn_to_ascii(strtolower(trim($alias_domain))); $is_now = mailbox_get_alias_domain_details($alias_domain); if (!empty($is_now)) { $active = (isset($postarray['active'])) ? $postarray['active'] : $is_now['active_int']; $target_domain = (!empty($postarray['target_domain'])) ? idn_to_ascii(strtolower(trim($postarray['target_domain']))) : $is_now['target_domain']; } else { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['alias_domain_invalid']) ); return false; } if (!is_valid_domain_name($target_domain)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['target_domain_invalid']) ); return false; } if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $target_domain)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } if (empty(mailbox_get_domain_details($target_domain))) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['target_domain_invalid']) ); return false; } try { $stmt = $pdo->prepare("UPDATE `alias_domain` SET `target_domain` = :target_domain, `active` = :active WHERE `alias_domain` = :alias_domain"); $stmt->execute(array( ':alias_domain' => $alias_domain, ':target_domain' => $target_domain, ':active' => $active )); } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } } $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['aliasd_modified'], htmlspecialchars(implode(', ', $alias_domains))) ); } function mailbox_edit_alias($postarray) { // We can edit multiple addresses at once, but only set one "goto" and/or "active" attribute for all // address string or array containing strings | email | required // goto string | separated by " ", "," ";" "\n", email or domain | optional // active set (active) or unset (inactive) global $lang; global $pdo; if (!is_array($postarray['address'])) { $addresses = array(); $addresses[] = $postarray['address']; } else { $addresses = $postarray['address']; } foreach ($addresses as $address) { $is_now = mailbox_get_alias_details($address); if (!empty($is_now)) { $active = (isset($postarray['active'])) ? $postarray['active'] : $is_now['active_int']; $goto = (!empty($postarray['goto'])) ? $postarray['goto'] : $is_now['goto']; } else { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['alias_invalid']) ); return false; } $gotos = array_map('trim', preg_split( "/( |,|;|\n)/", $postarray['goto'])); foreach ($gotos as &$goto) { if (empty($goto)) { continue; } if (!filter_var($goto, FILTER_VALIDATE_EMAIL)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' =>sprintf($lang['danger']['goto_invalid']) ); return false; } if ($goto == $address) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['alias_goto_identical']) ); return false; } } $gotos = array_filter($gotos); $goto = implode(",", $gotos); $domain = idn_to_ascii(substr(strstr($address, '@'), 1)); $local_part = strstr($address, '@', true); if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } if ((!filter_var($address, FILTER_VALIDATE_EMAIL) === true) && !empty($local_part)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['alias_invalid']) ); return false; } try { if (!empty($goto)) { $stmt = $pdo->prepare("UPDATE `alias` SET `goto` = :goto, `active`= :active WHERE `address` = :address"); $stmt->execute(array( ':goto' => $goto, ':active' => $active, ':address' => $address )); } else { $stmt = $pdo->prepare("UPDATE `alias` SET `active`= :active WHERE `address` = :address"); $stmt->execute(array( ':active' => $active, ':address' => $address )); } } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } } $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['alias_modified'], htmlspecialchars(implode(', ', $addresses))) ); } function mailbox_edit_domain($postarray) { // Array elements // domain string // description string // active int // relay_all_recipients int // backupmx int // aliases float // mailboxes float // maxquota float // quota float (Byte) // active int global $lang; global $pdo; if (!is_array($postarray['domain'])) { $domains = array(); $domains[] = $postarray['domain']; } else { $domains = $postarray['domain']; } foreach ($domains as $domain) { $domain = idn_to_ascii($domain); if (!is_valid_domain_name($domain)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['domain_invalid']) ); return false; } if ($_SESSION['mailcow_cc_role'] == "domainadmin" && hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) { $description = $postarray['description']; $active = intval($postarray['active']); try { $stmt = $pdo->prepare("UPDATE `domain` SET `description` = :description WHERE `domain` = :domain"); $stmt->execute(array( ':description' => $description, ':domain' => $domain )); $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['domain_modified'], htmlspecialchars($domain)) ); } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } } elseif ($_SESSION['mailcow_cc_role'] == "admin") { $is_now = mailbox_get_domain_details($domain); if (!empty($is_now)) { $active = (isset($postarray['active'])) ? $postarray['active'] : $is_now['active_int']; $backupmx = (isset($postarray['backupmx'])) ? $postarray['backupmx'] : $is_now['backupmx_int']; $relay_all_recipients = (isset($postarray['relay_all_recipients'])) ? $postarray['relay_all_recipients'] : $is_now['relay_all_recipients_int']; $aliases = (!empty($postarray['aliases'])) ? $postarray['aliases'] : $is_now['max_num_aliases_for_domain']; $mailboxes = (!empty($postarray['mailboxes'])) ? $postarray['mailboxes'] : $is_now['max_num_mboxes_for_domain']; $maxquota = (!empty($postarray['maxquota'])) ? $postarray['maxquota'] : ($is_now['max_new_mailbox_quota'] / 1048576); $quota = (!empty($postarray['quota'])) ? $postarray['quota'] : ($is_now['max_quota_for_domain'] / 1048576); $description = (!empty($postarray['description'])) ? $postarray['description'] : $is_now['description']; ($relay_all_recipients == '1') ? $backupmx = '1' : null; } else { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['domain_invalid']) ); return false; } try { // todo: should be using api here $stmt = $pdo->prepare("SELECT COUNT(*) AS count, MAX(COALESCE(ROUND(`quota`/1048576), 0)) AS `biggest_mailbox`, COALESCE(ROUND(SUM(`quota`)/1048576), 0) AS `quota_all` FROM `mailbox` WHERE `kind` NOT REGEXP 'location|thing|group' AND domain = :domain"); $stmt->execute(array(':domain' => $domain)); $MailboxData = $stmt->fetch(PDO::FETCH_ASSOC); // todo: should be using api here $stmt = $pdo->prepare("SELECT COUNT(*) AS `count` FROM `alias` WHERE domain = :domain AND address NOT IN ( SELECT `username` FROM `mailbox` )"); $stmt->execute(array(':domain' => $domain)); $AliasData = $stmt->fetch(PDO::FETCH_ASSOC); } catch(PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } if ($maxquota > $quota) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['mailbox_quota_exceeds_domain_quota']) ); return false; } if ($maxquota == "0" || empty($maxquota)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['maxquota_empty']) ); return false; } if ($MailboxData['biggest_mailbox'] > $maxquota) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['max_quota_in_use'], $MailboxData['biggest_mailbox']) ); return false; } if ($MailboxData['quota_all'] > $quota) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['domain_quota_m_in_use'], $MailboxData['quota_all']) ); return false; } if ($MailboxData['count'] > $mailboxes) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['mailboxes_in_use'], $MailboxData['count']) ); return false; } if ($AliasData['count'] > $aliases) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['aliases_in_use'], $AliasData['count']) ); return false; } try { $stmt = $pdo->prepare("UPDATE `domain` SET `relay_all_recipients` = :relay_all_recipients, `backupmx` = :backupmx, `active` = :active, `quota` = :quota, `maxquota` = :maxquota, `mailboxes` = :mailboxes, `aliases` = :aliases, `description` = :description WHERE `domain` = :domain"); $stmt->execute(array( ':relay_all_recipients' => $relay_all_recipients, ':backupmx' => $backupmx, ':active' => $active, ':quota' => $quota, ':maxquota' => $maxquota, ':mailboxes' => $mailboxes, ':aliases' => $aliases, ':description' => $description, ':domain' => $domain )); $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['domain_modified'], htmlspecialchars($domain)) ); } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } } } } function mailbox_edit_mailbox($postarray) { global $lang; global $pdo; if (!is_array($postarray['username'])) { $usernames = array(); $usernames[] = $postarray['username']; } else { $usernames = $postarray['username']; } foreach ($usernames as $username) { if (!filter_var($username, FILTER_VALIDATE_EMAIL)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['username_invalid']) ); return false; } $is_now = mailbox_get_mailbox_details($username); if (!empty($is_now)) { $active = (isset($postarray['active'])) ? $postarray['active'] : $is_now['active_int']; $name = (!empty($postarray['name'])) ? $postarray['name'] : $is_now['name']; $domain = $is_now['domain']; $quota_m = (!empty($postarray['quota'])) ? $postarray['quota'] : ($is_now['quota'] / 1048576); $quota_b = $quota_m * 1048576; $password = (!empty($postarray['password'])) ? $postarray['password'] : null; $password2 = (!empty($postarray['password2'])) ? $postarray['password2'] : null; } else { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } try { $stmt = $pdo->prepare("SELECT `quota`, `maxquota` FROM `domain` WHERE `domain` = :domain"); $stmt->execute(array(':domain' => $domain)); $DomainData = $stmt->fetch(PDO::FETCH_ASSOC); } catch(PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } if (!is_numeric($quota_m) || $quota_m == "0") { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['quota_not_0_not_numeric'], htmlspecialchars($quota_m)) ); return false; } if ($quota_m > $DomainData['maxquota']) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['mailbox_quota_exceeded'], $DomainData['maxquota']) ); return false; } if (((($is_now['quota_used'] / 1048576) - $quota_m) + $quota_m) > $DomainData['quota']) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['mailbox_quota_left_exceeded'], ($is_now['max_new_quota'] / 1048576)) ); return false; } if (isset($postarray['sender_acl'])) { // Get sender_acl items set by admin $sender_acl_admin = array_merge( mailbox_get_sender_acl_handles($username)['sender_acl_domains']['ro'], mailbox_get_sender_acl_handles($username)['sender_acl_addresses']['ro'] ); // Get sender_acl items from POST array $sender_acl_domain_admin = ($postarray['sender_acl'] == "0") ? array() : $postarray['sender_acl']; if (!empty($sender_acl_domain_admin) || !empty($sender_acl_admin)) { // Check items in POST array foreach ($sender_acl_domain_admin as $sender_acl) { if (!filter_var($sender_acl, FILTER_VALIDATE_EMAIL) && !is_valid_domain_name(ltrim($sender_acl, '@'))) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['sender_acl_invalid']) ); return false; } if (is_valid_domain_name(ltrim($sender_acl, '@'))) { if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], ltrim($sender_acl, '@'))) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['sender_acl_invalid']) ); return false; } } if (filter_var($sender_acl, FILTER_VALIDATE_EMAIL)) { if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $sender_acl)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['sender_acl_invalid']) ); return false; } } } // Merge both arrays $sender_acl_merged = array_merge($sender_acl_domain_admin, $sender_acl_admin); try { $stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` = :username"); $stmt->execute(array( ':username' => $username )); } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } foreach ($sender_acl_merged as $sender_acl) { $domain = ltrim($sender_acl, '@'); if (is_valid_domain_name($domain)) { $sender_acl = '@' . $domain; } try { $stmt = $pdo->prepare("INSERT INTO `sender_acl` (`send_as`, `logged_in_as`) VALUES (:sender_acl, :username)"); $stmt->execute(array( ':sender_acl' => $sender_acl, ':username' => $username )); } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } } } else { try { $stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` = :username"); $stmt->execute(array( ':username' => $username )); } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } } } if (!empty($password) && !empty($password2)) { if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['password_complexity']) ); return false; } if ($password != $password2) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['password_mismatch']) ); return false; } $password_hashed = hash_password($password); try { $stmt = $pdo->prepare("UPDATE `alias` SET `active` = :active WHERE `address` = :address"); $stmt->execute(array( ':address' => $username, ':active' => $active )); $stmt = $pdo->prepare("UPDATE `mailbox` SET `active` = :active, `password` = :password_hashed, `name`= :name, `quota` = :quota_b WHERE `username` = :username"); $stmt->execute(array( ':password_hashed' => $password_hashed, ':active' => $active, ':name' => $name, ':quota_b' => $quota_b, ':username' => $username )); } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } } try { $stmt = $pdo->prepare("UPDATE `alias` SET `active` = :active WHERE `address` = :address"); $stmt->execute(array( ':address' => $username, ':active' => $active )); $stmt = $pdo->prepare("UPDATE `mailbox` SET `active` = :active, `name`= :name, `quota` = :quota_b WHERE `username` = :username"); $stmt->execute(array( ':active' => $active, ':name' => $name, ':quota_b' => $quota_b, ':username' => $username )); } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } } $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['mailbox_modified'], implode(', ', $usernames)) ); return true; } function mailbox_edit_resource($postarray) { global $lang; global $pdo; if (!is_array($postarray['name'])) { $names = array(); $names[] = $postarray['name']; } else { $names = $postarray['name']; } foreach ($names as $name) { $is_now = mailbox_get_resource_details($name); if (!empty($is_now)) { $active = (isset($postarray['active'])) ? $postarray['active'] : $is_now['active_int']; $multiple_bookings = (isset($postarray['multiple_bookings'])) ? $postarray['multiple_bookings'] : $is_now['multiple_bookings_int']; $description = (!empty($postarray['description'])) ? $postarray['description'] : $is_now['description']; $kind = (!empty($postarray['kind'])) ? $postarray['kind'] : $is_now['kind']; } else { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['resource_invalid']) ); return false; } if (!filter_var($name, FILTER_VALIDATE_EMAIL)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['resource_invalid']) ); return false; } if (empty($description)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['description_invalid']) ); return false; } if ($kind != 'location' && $kind != 'group' && $kind != 'thing') { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['resource_invalid']) ); return false; } if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $name)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } try { $stmt = $pdo->prepare("UPDATE `mailbox` SET `active` = :active, `name`= :description, `kind`= :kind, `multiple_bookings`= :multiple_bookings WHERE `username` = :name"); $stmt->execute(array( ':active' => $active, ':description' => $description, ':multiple_bookings' => $multiple_bookings, ':kind' => $kind, ':name' => $name )); } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } } $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['resource_modified'], implode(', ', $names)) ); return true; } function mailbox_get_mailboxes($domain = null) { global $lang; global $pdo; $mailboxes = array(); if (isset($domain) && !hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } elseif (isset($domain) && hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) { try { $stmt = $pdo->prepare("SELECT `username` FROM `mailbox` WHERE `kind` NOT REGEXP 'location|thing|group' AND `domain` != 'ALL' AND `domain` = :domain"); $stmt->execute(array( ':domain' => $domain, )); $rows = $stmt->fetchAll(PDO::FETCH_ASSOC); while($row = array_shift($rows)) { $mailboxes[] = $row['username']; } } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } } else { try { $stmt = $pdo->prepare("SELECT `username` FROM `mailbox` WHERE `kind` NOT REGEXP 'location|thing|group' AND `domain` IN (SELECT `domain` FROM `domain_admins` WHERE `active` = '1' AND `username` = :username) OR 'admin' = :role"); $stmt->execute(array( ':username' => $_SESSION['mailcow_cc_username'], ':role' => $_SESSION['mailcow_cc_role'], )); $rows = $stmt->fetchAll(PDO::FETCH_ASSOC); while($row = array_shift($rows)) { $mailboxes[] = $row['username']; } } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } } return $mailboxes; } function mailbox_get_resources($domain = null) { global $lang; global $pdo; $resources = array(); if (isset($domain) && !hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } elseif (isset($domain) && hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) { try { $stmt = $pdo->prepare("SELECT `username` FROM `mailbox` WHERE `kind` REGEXP 'location|thing|group' AND `domain` != 'ALL' AND `domain` = :domain"); $stmt->execute(array( ':domain' => $domain, )); $rows = $stmt->fetchAll(PDO::FETCH_ASSOC); while($row = array_shift($rows)) { $resources[] = $row['username']; } } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } } else { try { $stmt = $pdo->prepare("SELECT `username` FROM `mailbox` WHERE `kind` REGEXP 'location|thing|group' AND `domain` IN (SELECT `domain` FROM `domain_admins` WHERE `active` = '1' AND `username` = :username) OR 'admin' = :role"); $stmt->execute(array( ':username' => $_SESSION['mailcow_cc_username'], ':role' => $_SESSION['mailcow_cc_role'], )); $rows = $stmt->fetchAll(PDO::FETCH_ASSOC); while($row = array_shift($rows)) { $resources[] = $row['username']; } } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } } return $resources; } function mailbox_get_alias_domains($domain = null) { // Get all domains assigned to mailcow_cc_username or domain, if set // Domain admin needs to be active // Domain does not need to be active global $lang; global $pdo; $aliasdomains = array(); if (isset($domain) && !hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } elseif (isset($domain) && hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) { try { $stmt = $pdo->prepare("SELECT `alias_domain` FROM `alias_domain` WHERE `target_domain` = :domain"); $stmt->execute(array( ':domain' => $domain, )); $rows = $stmt->fetchAll(PDO::FETCH_ASSOC); while($row = array_shift($rows)) { $aliasdomains[] = $row['alias_domain']; } } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } } else { try { $stmt = $pdo->prepare("SELECT `alias_domain` FROM `alias_domain` WHERE `target_domain` IN (SELECT `domain` FROM `domain_admins` WHERE `active` = '1' AND `username` = :username) OR 'admin' = :role"); $stmt->execute(array( ':username' => $_SESSION['mailcow_cc_username'], ':role' => $_SESSION['mailcow_cc_role'], )); $rows = $stmt->fetchAll(PDO::FETCH_ASSOC); while($row = array_shift($rows)) { $aliasdomains[] = $row['alias_domain']; } } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } } return $aliasdomains; } function mailbox_get_aliases($domain) { global $lang; global $pdo; $aliases = array(); if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } try { $stmt = $pdo->prepare("SELECT `address` FROM `alias` WHERE `address` != `goto` AND `domain` = :domain"); $stmt->execute(array( ':domain' => $domain, )); $rows = $stmt->fetchAll(PDO::FETCH_ASSOC); while($row = array_shift($rows)) { $aliases[] = $row['address']; } } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } return $aliases; } function mailbox_get_alias_details($address) { global $lang; global $pdo; $aliasdata = array(); try { $stmt = $pdo->prepare("SELECT `domain`, `goto`, `address`, `active` as `active_int`, CASE `active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`, `created`, `modified` FROM `alias` WHERE `address` = :address AND `address` != `goto`"); $stmt->execute(array( ':address' => $address, )); $row = $stmt->fetch(PDO::FETCH_ASSOC); $stmt = $pdo->prepare("SELECT `target_domain` FROM `alias_domain` WHERE `alias_domain` = :domain"); $stmt->execute(array( ':domain' => $row['domain'], )); $row_alias_domain = $stmt->fetch(PDO::FETCH_ASSOC); if (isset($row_alias_domain['target_domain']) && !empty($row_alias_domain['target_domain'])) { $aliasdata['in_primary_domain'] = $row_alias_domain['target_domain']; } else { $aliasdata['in_primary_domain'] = ""; } $aliasdata['domain'] = $row['domain']; $aliasdata['goto'] = $row['goto']; $aliasdata['address'] = $row['address']; (!filter_var($aliasdata['address'], FILTER_VALIDATE_EMAIL)) ? $aliasdata['is_catch_all'] = 1 : $aliasdata['is_catch_all'] = 0; $aliasdata['active'] = $row['active']; $aliasdata['active_int'] = $row['active_int']; $aliasdata['created'] = $row['created']; $aliasdata['modified'] = $row['modified']; if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $aliasdata['domain'])) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } return $aliasdata; } function mailbox_get_alias_domain_details($aliasdomain) { global $lang; global $pdo; $aliasdomaindata = array(); try { $stmt = $pdo->prepare("SELECT `alias_domain`, `target_domain`, `active` AS `active_int`, CASE `active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`, `created`, `modified` FROM `alias_domain` WHERE `alias_domain` = :aliasdomain"); $stmt->execute(array( ':aliasdomain' => $aliasdomain, )); $row = $stmt->fetch(PDO::FETCH_ASSOC); $aliasdomaindata['alias_domain'] = $row['alias_domain']; $aliasdomaindata['target_domain'] = $row['target_domain']; $aliasdomaindata['active'] = $row['active']; $aliasdomaindata['active_int'] = $row['active_int']; $aliasdomaindata['created'] = $row['created']; $aliasdomaindata['modified'] = $row['modified']; } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $aliasdomaindata['target_domain'])) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } return $aliasdomaindata; } function mailbox_get_domains() { // Get all domains assigned to mailcow_cc_username // Domain admin needs to be active // Domain does not need to be active global $lang; global $pdo; try { $domains = array(); $stmt = $pdo->prepare("SELECT `domain` FROM `domain` WHERE (`domain` IN ( SELECT `domain` from `domain_admins` WHERE (`active`='1' AND `username` = :username)) ) OR ('admin'= :role) AND `domain` != 'ALL'"); $stmt->execute(array( ':username' => $_SESSION['mailcow_cc_username'], ':role' => $_SESSION['mailcow_cc_role'], )); $rows = $stmt->fetchAll(PDO::FETCH_ASSOC); while($row = array_shift($rows)) { $domains[] = $row['domain']; } } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } return $domains; } function mailbox_get_domain_details($domain) { global $lang; global $pdo; $domaindata = array(); $domain = idn_to_ascii(strtolower(trim($domain))); if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } try { $stmt = $pdo->prepare("SELECT `target_domain` FROM `alias_domain` WHERE `alias_domain` = :domain"); $stmt->execute(array( ':domain' => $domain )); $row = $stmt->fetch(PDO::FETCH_ASSOC); if (!empty($row)) { $domain = $row['target_domain']; } $stmt = $pdo->prepare("SELECT `domain`, `description`, `aliases`, `mailboxes`, `maxquota`, `quota`, `relay_all_recipients` as `relay_all_recipients_int`, `backupmx` as `backupmx_int`, `active` as `active_int`, CASE `relay_all_recipients` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `relay_all_recipients`, CASE `backupmx` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `backupmx`, CASE `active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active` FROM `domain` WHERE `domain`= :domain"); $stmt->execute(array( ':domain' => $domain )); $row = $stmt->fetch(PDO::FETCH_ASSOC); if (empty($row)) { return false; } $stmt = $pdo->prepare("SELECT COUNT(*) AS `count`, COALESCE(SUM(`quota`), 0) AS `in_use` FROM `mailbox` WHERE `kind` NOT REGEXP 'location|thing|group' AND `domain` = :domain"); $stmt->execute(array(':domain' => $row['domain'])); $MailboxDataDomain = $stmt->fetch(PDO::FETCH_ASSOC); $domaindata['max_new_mailbox_quota'] = ($row['quota'] * 1048576) - $MailboxDataDomain['in_use']; if ($domaindata['max_new_mailbox_quota'] > ($row['maxquota'] * 1048576)) { $domaindata['max_new_mailbox_quota'] = ($row['maxquota'] * 1048576); } $domaindata['quota_used_in_domain'] = $MailboxDataDomain['in_use']; $domaindata['mboxes_in_domain'] = $MailboxDataDomain['count']; $domaindata['mboxes_left'] = $row['mailboxes'] - $MailboxDataDomain['count']; $domaindata['domain_name'] = $row['domain']; $domaindata['description'] = $row['description']; $domaindata['max_num_aliases_for_domain'] = $row['aliases']; $domaindata['max_num_mboxes_for_domain'] = $row['mailboxes']; $domaindata['max_quota_for_mbox'] = $row['maxquota'] * 1048576; $domaindata['max_quota_for_domain'] = $row['quota'] * 1048576; $domaindata['backupmx'] = $row['backupmx']; $domaindata['backupmx_int'] = $row['backupmx_int']; $domaindata['active'] = $row['active']; $domaindata['active_int'] = $row['active_int']; $domaindata['relay_all_recipients'] = $row['relay_all_recipients']; $domaindata['relay_all_recipients_int'] = $row['relay_all_recipients_int']; $stmt = $pdo->prepare("SELECT COUNT(*) AS `alias_count` FROM `alias` WHERE (`domain`= :domain OR `domain` IN (SELECT `alias_domain` FROM `alias_domain` WHERE `target_domain` = :domain2)) AND `address` NOT IN ( SELECT `username` FROM `mailbox` )"); $stmt->execute(array( ':domain' => $domain, ':domain2' => $domain )); $AliasDataDomain = $stmt->fetch(PDO::FETCH_ASSOC); (isset($AliasDataDomain['alias_count'])) ? $domaindata['aliases_in_domain'] = $AliasDataDomain['alias_count'] : $domaindata['aliases_in_domain'] = "0"; $domaindata['aliases_left'] = $row['aliases'] - $AliasDataDomain['alias_count']; } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } return $domaindata; } function mailbox_get_mailbox_details($mailbox) { global $lang; global $pdo; if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $mailbox)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } $mailboxdata = array(); try { $stmt = $pdo->prepare("SELECT `domain`.`backupmx`, `mailbox`.`username`, `mailbox`.`name`, `mailbox`.`active` AS `active_int`, CASE `mailbox`.`active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`, `mailbox`.`domain`, `mailbox`.`quota`, `quota2`.`bytes`, `quota2`.`messages` FROM `mailbox`, `quota2`, `domain` WHERE `mailbox`.`kind` NOT REGEXP 'location|thing|group' AND `mailbox`.`username` = `quota2`.`username` AND `domain`.`domain` = `mailbox`.`domain` AND `mailbox`.`username` = :mailbox"); $stmt->execute(array( ':mailbox' => $mailbox, )); $row = $stmt->fetch(PDO::FETCH_ASSOC); $stmt = $pdo->prepare("SELECT `maxquota`, `quota` FROM `domain` WHERE `domain` = :domain"); $stmt->execute(array(':domain' => $row['domain'])); $DomainQuota = $stmt->fetch(PDO::FETCH_ASSOC); $stmt = $pdo->prepare("SELECT COALESCE(SUM(`quota`), 0) as `in_use` FROM `mailbox` WHERE `kind` NOT REGEXP 'location|thing|group' AND `domain` = :domain AND `username` != :username"); $stmt->execute(array(':domain' => $row['domain'], ':username' => $mailbox)); $MailboxUsage = $stmt->fetch(PDO::FETCH_ASSOC); $stmt = $pdo->prepare("SELECT IFNULL(COUNT(`address`), 0) AS `sa_count` FROM `spamalias` WHERE `goto` = :address AND `validity` >= :unixnow"); $stmt->execute(array(':address' => $mailbox, ':unixnow' => time())); $SpamaliasUsage = $stmt->fetch(PDO::FETCH_ASSOC); $mailboxdata['max_new_quota'] = ($DomainQuota['quota'] * 1048576) - $MailboxUsage['in_use']; if ($mailboxdata['max_new_quota'] > ($DomainQuota['maxquota'] * 1048576)) { $mailboxdata['max_new_quota'] = ($DomainQuota['maxquota'] * 1048576); } $mailboxdata['username'] = $row['username']; $mailboxdata['is_relayed'] = $row['backupmx']; $mailboxdata['name'] = $row['name']; $mailboxdata['active'] = $row['active']; $mailboxdata['active_int'] = $row['active_int']; $mailboxdata['domain'] = $row['domain']; $mailboxdata['quota'] = $row['quota']; $mailboxdata['quota_used'] = intval($row['bytes']); $mailboxdata['percent_in_use'] = round((intval($row['bytes']) / intval($row['quota'])) * 100); $mailboxdata['messages'] = $row['messages']; $mailboxdata['spam_aliases'] = $SpamaliasUsage['sa_count']; if ($mailboxdata['percent_in_use'] >= 90) { $mailboxdata['percent_class'] = "danger"; } elseif ($mailboxdata['percent_in_use'] >= 75) { $mailboxdata['percent_class'] = "warning"; } else { $mailboxdata['percent_class'] = "success"; } } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } return $mailboxdata; } function mailbox_get_resource_details($resource) { global $lang; global $pdo; $resourcedata = array(); if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $resource)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } try { $stmt = $pdo->prepare("SELECT `username`, `name`, `kind`, `multiple_bookings` AS `multiple_bookings_int`, `local_part`, `active` AS `active_int`, CASE `multiple_bookings` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `multiple_bookings`, CASE `active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`, `domain` FROM `mailbox` WHERE `kind` REGEXP 'location|thing|group' AND `username` = :resource"); $stmt->execute(array( ':resource' => $resource, )); $row = $stmt->fetch(PDO::FETCH_ASSOC); $resourcedata['name'] = $row['username']; $resourcedata['kind'] = $row['kind']; $resourcedata['multiple_bookings'] = $row['multiple_bookings']; $resourcedata['multiple_bookings_int'] = $row['multiple_bookings_int']; $resourcedata['description'] = $row['name']; $resourcedata['active'] = $row['active']; $resourcedata['active_int'] = $row['active_int']; $resourcedata['domain'] = $row['domain']; $resourcedata['local_part'] = $row['local_part']; } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } if (!isset($resourcedata['domain']) || (isset($resourcedata['domain']) && !hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $resourcedata['domain']))) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } return $resourcedata; } function mailbox_delete_domain($postarray) { global $lang; global $redis; global $pdo; if (!is_array($postarray['domain'])) { $domains = array(); $domains[] = $postarray['domain']; } else { $domains = $postarray['domain']; } if ($_SESSION['mailcow_cc_role'] != "admin") { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } foreach ($domains as $domain) { if (!is_valid_domain_name($domain)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['domain_invalid']) ); return false; } $domain = idn_to_ascii(strtolower(trim($domain))); try { $stmt = $pdo->prepare("SELECT `username` FROM `mailbox` WHERE `domain` = :domain"); $stmt->execute(array(':domain' => $domain)); $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC)); } catch(PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } if ($num_results != 0 || !empty($num_results)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['domain_not_empty']) ); return false; } try { $stmt = $pdo->prepare("DELETE FROM `domain` WHERE `domain` = :domain"); $stmt->execute(array( ':domain' => $domain, )); $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `domain` = :domain"); $stmt->execute(array( ':domain' => $domain, )); $stmt = $pdo->prepare("DELETE FROM `alias` WHERE `domain` = :domain"); $stmt->execute(array( ':domain' => $domain, )); $stmt = $pdo->prepare("DELETE FROM `alias_domain` WHERE `target_domain` = :domain"); $stmt->execute(array( ':domain' => $domain, )); $stmt = $pdo->prepare("DELETE FROM `mailbox` WHERE `domain` = :domain"); $stmt->execute(array( ':domain' => $domain, )); $stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` LIKE :domain"); $stmt->execute(array( ':domain' => '%@'.$domain, )); $stmt = $pdo->prepare("DELETE FROM `quota2` WHERE `username` = :domain"); $stmt->execute(array( ':domain' => '%@'.$domain, )); $stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `address` = :domain"); $stmt->execute(array( ':domain' => '%@'.$domain, )); $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :domain"); $stmt->execute(array( ':domain' => '%@'.$domain, )); } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } try { $redis->hDel('DOMAIN_MAP', $domain); } catch (RedisException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'Redis: '.$e ); return false; } } $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['domain_removed'], htmlspecialchars($domain)) ); return true; } function mailbox_delete_alias($postarray) { // $postarray['address'] can be a single element or an array global $lang; global $pdo; if (!is_array($postarray['address'])) { $addresses = array(); $addresses[] = $postarray['address']; } else { $addresses = $postarray['address']; } foreach ($addresses as $address) { $local_part = strstr($address, '@', true); $domain = mailbox_get_alias_details($address)['domain']; try { $stmt = $pdo->prepare("SELECT `goto` FROM `alias` WHERE `address` = :address"); $stmt->execute(array(':address' => $address)); $gotos = $stmt->fetch(PDO::FETCH_ASSOC); } catch(PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } $goto_array = explode(',', $gotos['goto']); if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } try { $stmt = $pdo->prepare("DELETE FROM `alias` WHERE `address` = :address AND `address` NOT IN (SELECT `username` FROM `mailbox`)"); $stmt->execute(array( ':address' => $address )); } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } } $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['alias_removed'], htmlspecialchars(implode(', ', $addresses))) ); } function mailbox_delete_alias_domain($postarray) { global $lang; global $pdo; if (!is_array($postarray['alias_domain'])) { $alias_domains = array(); $alias_domains[] = $postarray['alias_domain']; } else { $alias_domains = $postarray['alias_domain']; } foreach ($alias_domains as $alias_domain) { if (!is_valid_domain_name($alias_domain)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['domain_invalid']) ); return false; } try { $stmt = $pdo->prepare("SELECT `target_domain` FROM `alias_domain` WHERE `alias_domain`= :alias_domain"); $stmt->execute(array(':alias_domain' => $alias_domain)); $DomainData = $stmt->fetch(PDO::FETCH_ASSOC); } catch(PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $DomainData['target_domain'])) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } try { $stmt = $pdo->prepare("DELETE FROM `alias_domain` WHERE `alias_domain` = :alias_domain"); $stmt->execute(array( ':alias_domain' => $alias_domain, )); $stmt = $pdo->prepare("DELETE FROM `alias` WHERE `domain` = :alias_domain"); $stmt->execute(array( ':alias_domain' => $alias_domain, )); } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } } $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['alias_domain_removed'], htmlspecialchars(implode(', ', $alias_domains))) ); } function mailbox_delete_mailbox($postarray) { global $lang; global $pdo; if (!is_array($postarray['username'])) { $usernames = array(); $usernames[] = $postarray['username']; } else { $usernames = $postarray['username']; } foreach ($usernames as $username) { if (!filter_var($username, FILTER_VALIDATE_EMAIL)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $username)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } try { $stmt = $pdo->prepare("DELETE FROM `alias` WHERE `goto` = :username"); $stmt->execute(array( ':username' => $username )); $stmt = $pdo->prepare("DELETE FROM `quota2` WHERE `username` = :username"); $stmt->execute(array( ':username' => $username )); $stmt = $pdo->prepare("DELETE FROM `mailbox` WHERE `username` = :username"); $stmt->execute(array( ':username' => $username )); $stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` = :username"); $stmt->execute(array( ':username' => $username )); $stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `goto` = :username"); $stmt->execute(array( ':username' => $username )); $stmt = $pdo->prepare("DELETE FROM `imapsync` WHERE `user2` = :username"); $stmt->execute(array( ':username' => $username )); $stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :username"); $stmt->execute(array( ':username' => $username )); $stmt = $pdo->prepare("DELETE FROM `sogo_user_profile` WHERE `c_uid` = :username"); $stmt->execute(array( ':username' => $username )); $stmt = $pdo->prepare("DELETE FROM `sogo_cache_folder` WHERE `c_uid` = :username"); $stmt->execute(array( ':username' => $username )); $stmt = $pdo->prepare("DELETE FROM `sogo_acl` WHERE `c_object` LIKE '%/" . $username . "/%' OR `c_uid` = :username"); $stmt->execute(array( ':username' => $username )); $stmt = $pdo->prepare("DELETE FROM `sogo_store` WHERE `c_folder_id` IN (SELECT `c_folder_id` FROM `sogo_folder_info` WHERE `c_path2` = :username)"); $stmt->execute(array( ':username' => $username )); $stmt = $pdo->prepare("DELETE FROM `sogo_quick_contact` WHERE `c_folder_id` IN (SELECT `c_folder_id` FROM `sogo_folder_info` WHERE `c_path2` = :username)"); $stmt->execute(array( ':username' => $username )); $stmt = $pdo->prepare("DELETE FROM `sogo_quick_appointment` WHERE `c_folder_id` IN (SELECT `c_folder_id` FROM `sogo_folder_info` WHERE `c_path2` = :username)"); $stmt->execute(array( ':username' => $username )); $stmt = $pdo->prepare("DELETE FROM `sogo_folder_info` WHERE `c_path2` = :username"); $stmt->execute(array( ':username' => $username )); $stmt = $pdo->prepare("SELECT `address`, `goto` FROM `alias` WHERE `goto` REGEXP :username"); $stmt->execute(array(':username' => '(^|,)'.$username.'($|,)')); $GotoData = $stmt->fetchAll(PDO::FETCH_ASSOC); foreach ($GotoData as $gotos) { $goto_exploded = explode(',', $gotos['goto']); if (($key = array_search($username, $goto_exploded)) !== false) { unset($goto_exploded[$key]); } $gotos_rebuild = implode(',', $goto_exploded); $stmt = $pdo->prepare("UPDATE `alias` SET `goto` = :goto WHERE `address` = :address"); $stmt->execute(array( ':goto' => $gotos_rebuild, ':address' => $gotos['address'] )); } } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } } $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['mailbox_removed'], htmlspecialchars(implode(', ', $usernames))) ); } function mailbox_reset_eas($username) { global $lang; global $pdo; (isset($postarray['username'])) ? $username = $postarray['username'] : $username = $_SESSION['mailcow_cc_username']; if (!filter_var($username, FILTER_VALIDATE_EMAIL)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $username)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } try { $stmt = $pdo->prepare("DELETE FROM `sogo_cache_folder` WHERE `c_uid` = :username"); $stmt->execute(array( ':username' => $username )); } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['eas_reset'], htmlspecialchars($username)) ); } function mailbox_delete_resource($postarray) { global $lang; global $pdo; if (!is_array($postarray['name'])) { $names = array(); $names[] = $postarray['name']; } else { $names = $postarray['name']; } foreach ($names as $name) { if (!filter_var($name, FILTER_VALIDATE_EMAIL)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $name)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } try { $stmt = $pdo->prepare("DELETE FROM `mailbox` WHERE `username` = :username"); $stmt->execute(array( ':username' => $name )); $stmt = $pdo->prepare("DELETE FROM `sogo_user_profile` WHERE `c_uid` = :username"); $stmt->execute(array( ':username' => $name )); $stmt = $pdo->prepare("DELETE FROM `sogo_cache_folder` WHERE `c_uid` = :username"); $stmt->execute(array( ':username' => $name )); $stmt = $pdo->prepare("DELETE FROM `sogo_acl` WHERE `c_object` LIKE '%/" . $name . "/%' OR `c_uid` = :username"); $stmt->execute(array( ':username' => $name )); $stmt = $pdo->prepare("DELETE FROM `sogo_store` WHERE `c_folder_id` IN (SELECT `c_folder_id` FROM `sogo_folder_info` WHERE `c_path2` = :username)"); $stmt->execute(array( ':username' => $name )); $stmt = $pdo->prepare("DELETE FROM `sogo_quick_contact` WHERE `c_folder_id` IN (SELECT `c_folder_id` FROM `sogo_folder_info` WHERE `c_path2` = :username)"); $stmt->execute(array( ':username' => $name )); $stmt = $pdo->prepare("DELETE FROM `sogo_quick_appointment` WHERE `c_folder_id` IN (SELECT `c_folder_id` FROM `sogo_folder_info` WHERE `c_path2` = :username)"); $stmt->execute(array( ':username' => $name )); $stmt = $pdo->prepare("DELETE FROM `sogo_folder_info` WHERE `c_path2` = :username"); $stmt->execute(array( ':username' => $name )); } catch (PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } } $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['resource_removed'], htmlspecialchars(implode(', ', $names))) ); } function mailbox_get_sender_acl_handles($mailbox) { global $pdo; global $lang; if ($_SESSION['mailcow_cc_role'] != "admin" && $_SESSION['mailcow_cc_role'] != "domainadmin") { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } $data['sender_acl_domains']['ro'] = array(); $data['sender_acl_domains']['rw'] = array(); $data['sender_acl_domains']['selectable'] = array(); $data['sender_acl_addresses']['ro'] = array(); $data['sender_acl_addresses']['rw'] = array(); $data['sender_acl_addresses']['selectable'] = array(); $data['fixed_sender_aliases'] = array(); try { // Fixed addresses $stmt = $pdo->prepare("SELECT `address` FROM `alias` WHERE `goto` REGEXP :goto AND `address` NOT LIKE '@%'"); $stmt->execute(array(':goto' => '(^|,)'.$mailbox.'($|,)')); $rows = $stmt->fetchAll(PDO::FETCH_ASSOC); while ($row = array_shift($rows)) { $data['fixed_sender_aliases'][] = $row['address']; } $stmt = $pdo->prepare("SELECT CONCAT(`local_part`, '@', `alias_domain`.`alias_domain`) AS `alias_domain_alias` FROM `mailbox`, `alias_domain` WHERE `alias_domain`.`target_domain` = `mailbox`.`domain` AND `mailbox`.`username` = :username"); $stmt->execute(array(':username' => $mailbox)); $rows = $stmt->fetchAll(PDO::FETCH_ASSOC); while ($row = array_shift($rows)) { if (!empty($row['alias_domain_alias'])) { $data['fixed_sender_aliases'][] = $row['alias_domain_alias']; } } // Return array $data['sender_acl_domains/addresses']['ro'] with read-only objects // Return array $data['sender_acl_domains/addresses']['rw'] with read-write objects (can be deleted) $stmt = $pdo->prepare("SELECT REPLACE(`send_as`, '@', '') AS `send_as` FROM `sender_acl` WHERE `logged_in_as` = :logged_in_as AND `send_as` LIKE '@%'"); $stmt->execute(array(':logged_in_as' => $mailbox)); $domain_rows = $stmt->fetchAll(PDO::FETCH_ASSOC); while ($domain_row = array_shift($domain_rows)) { if (is_valid_domain_name($domain_row['send_as']) && !hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain_row['send_as'])) { $data['sender_acl_domains']['ro'][] = $domain_row['send_as']; continue; } if (is_valid_domain_name($domain_row['send_as']) && hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain_row['send_as'])) { $data['sender_acl_domains']['rw'][] = $domain_row['send_as']; continue; } } $stmt = $pdo->prepare("SELECT `send_as` FROM `sender_acl` WHERE `logged_in_as` = :logged_in_as AND `send_as` NOT LIKE '@%'"); $stmt->execute(array(':logged_in_as' => $mailbox)); $address_rows = $stmt->fetchAll(PDO::FETCH_ASSOC); while ($address_row = array_shift($address_rows)) { if (filter_var($address_row['send_as'], FILTER_VALIDATE_EMAIL) && !hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $address_row['send_as'])) { $data['sender_acl_addresses']['ro'][] = $address_row['send_as']; continue; } if (filter_var($address_row['send_as'], FILTER_VALIDATE_EMAIL) && hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $address_row['send_as'])) { $data['sender_acl_addresses']['rw'][] = $address_row['send_as']; continue; } } $stmt = $pdo->prepare("SELECT `domain` FROM `domain` WHERE `domain` NOT IN ( SELECT REPLACE(`send_as`, '@', '') FROM `sender_acl` WHERE `logged_in_as` = :logged_in_as AND `send_as` LIKE '@%')"); $stmt->execute(array( ':logged_in_as' => $mailbox, )); $rows_domain = $stmt->fetchAll(PDO::FETCH_ASSOC); while ($row_domain = array_shift($rows_domain)) { if (is_valid_domain_name($row_domain['domain']) && hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $row_domain['domain'])) { $data['sender_acl_domains']['selectable'][] = $row_domain['domain']; } } $stmt = $pdo->prepare("SELECT `address` FROM `alias` WHERE `goto` != :goto AND `address` NOT IN ( SELECT `send_as` FROM `sender_acl` WHERE `logged_in_as` = :logged_in_as AND `send_as` NOT LIKE '@%')"); $stmt->execute(array( ':logged_in_as' => $mailbox, ':goto' => $mailbox )); $rows_mbox = $stmt->fetchAll(PDO::FETCH_ASSOC); while ($row = array_shift($rows_mbox)) { if (filter_var($row['address'], FILTER_VALIDATE_EMAIL) && hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $row['address'])) { $data['sender_acl_addresses']['selectable'][] = $row['address']; } } } catch(PDOException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'MySQL: '.$e ); return false; } return $data; } function get_u2f_registrations($username) { global $pdo; $sel = $pdo->prepare("SELECT * FROM `tfa` WHERE `authmech` = 'u2f' AND `username` = ? AND `active` = '1'"); $sel->execute(array($username)); return $sel->fetchAll(PDO::FETCH_OBJ); } function get_forwarding_hosts() { global $redis; $data = array(); try { $fwd_hosts = $redis->hGetAll('WHITELISTED_FWD_HOST'); if (!empty($fwd_hosts)) { foreach ($fwd_hosts as $fwd_host => $source) { $data[] = $fwd_host; } } } catch (RedisException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'Redis: '.$e ); return false; } return $data; } function get_forwarding_host_details($host) { global $redis; $data = array(); if (!isset($host) || empty($host)) { return false; } if (filter_var($host, FILTER_VALIDATE_IP)) { return; } try { if ($source = $redis->hGet('WHITELISTED_FWD_HOST', $host)) { $data['host'] = $host; $data['source'] = $source; $data['keep_spam'] = ($redis->hGet('KEEP_SPAM', $host)) ? "yes" : "no"; } } catch (RedisException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'Redis: '.$e ); return false; } return $data; } function add_forwarding_host($postarray) { require_once 'spf.inc.php'; global $redis; global $lang; if ($_SESSION['mailcow_cc_role'] != "admin") { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } $source = $postarray['hostname']; $host = trim($postarray['hostname']); $filter_spam = $postarray['filter_spam']; if (isset($postarray['filter_spam']) && $postarray['filter_spam'] == 1) { $filter_spam = 1; } else { $filter_spam = 0; } if (preg_match('/^[0-9a-fA-F:\/]+$/', $host)) { // IPv6 address $hosts = array($host); } elseif (preg_match('/^[0-9\.\/]+$/', $host)) { // IPv4 address $hosts = array($host); } else { $hosts = get_outgoing_hosts_best_guess($host); } if (empty($hosts)) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'Invalid host specified: '. htmlspecialchars($host) ); return false; } foreach ($hosts as $host) { try { $redis->hSet('WHITELISTED_FWD_HOST', $host, $source); if ($filter_spam == 0) { $redis->hSet('KEEP_SPAM', $host, 1); } elseif ($redis->hGet('KEEP_SPAM', $host)) { $redis->hDel('KEEP_SPAM', $host); } } catch (RedisException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'Redis: '.$e ); return false; } } $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['forwarding_host_added'], htmlspecialchars(implode(', ', $hosts))) ); } function delete_forwarding_host($postarray) { global $redis; global $lang; if ($_SESSION['mailcow_cc_role'] != "admin") { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } if (!is_array($postarray['forwardinghost'])) { $hosts = array(); $hosts[] = $postarray['forwardinghost']; } else { $hosts = $postarray['forwardinghost']; } foreach ($hosts as $host) { try { $redis->hDel('WHITELISTED_FWD_HOST', $host); $redis->hDel('KEEP_SPAM', $host); } catch (RedisException $e) { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => 'Redis: '.$e ); return false; } } $_SESSION['return'] = array( 'type' => 'success', 'msg' => sprintf($lang['success']['forwarding_host_removed'], htmlspecialchars(implode(', ', $hosts))) ); } function get_logs($container, $lines = 100) { global $lang; global $redis; if ($_SESSION['mailcow_cc_role'] != "admin") { $_SESSION['return'] = array( 'type' => 'danger', 'msg' => sprintf($lang['danger']['access_denied']) ); return false; } $lines = intval($lines); if ($container == "dovecot-mailcow") { if ($data = $redis->lRange('DOVECOT_MAILLOG', 1, $lines)) { foreach ($data as $json_line) { $data_array[] = json_decode($json_line, true); } return $data_array; } } if ($container == "postfix-mailcow") { if ($data = $redis->lRange('POSTFIX_MAILLOG', 1, $lines)) { foreach ($data as $json_line) { $data_array[] = json_decode($json_line, true); } return $data_array; } } return false; } ?>