 89fdd1986d
			
		
	
	
		89fdd1986d
		
			
		
	
	
	
	
		
			
			* [API] Fix minor issue in api docs * [GH-Actions][stale] Add neverstale label to exempt list * [Web] add github version tag * [Web] add github version tag error handling * Passwordless SOGo auth: support for calendar invitations and calendar/contacts subscriptions Inviting someone to a calendar event triggers a request to /SOGo/so/otheruser@example.com/freebusy.ifb/ajaxRead. Subscribing to someone's calendar/contacts triggers a request to /SOGo/so/otheruser@example.com/foldersSearch. The email address in the URL is different from the logged-in user, which needs to be handled appropriately by sogo-auth.php. * [Web] add github version tag - adjust css * [Compose] Update SOGo Autoreply Schedule to 5m Based on the advice of inverse (SOGo developer). Thanks to https://github.com/jmber Closes: https://github.com/mailcow/mailcow-dockerized/issues/4436 * [Web] add github version tag - move twig globals * [Web] add github version tag - missing </div> * Passwordless SOGo auth: improvements for when accessing other users * [WebAuthn] fido2 passwordless auth - fix (#4440) * [WebAuthn] fido2 revert * [WebAuthn] set UV flags to 'discouraged' * [WebAuthn] revert - set UV flags to 'discouraged' Co-authored-by: ntimo <git@nowitzki.me> Co-authored-by: Peter <magic@kthx.at> Co-authored-by: FreddleSpl0it <patschul@posteo.de> Co-authored-by: FreddleSpl0it <75116288+FreddleSpl0it@users.noreply.github.com> Co-authored-by: Michael Kuron <mkuron@users.noreply.github.com>
		
			
				
	
	
		
			105 lines
		
	
	
		
			4.1 KiB
		
	
	
	
		
			PHP
		
	
	
	
	
	
			
		
		
	
	
			105 lines
		
	
	
		
			4.1 KiB
		
	
	
	
		
			PHP
		
	
	
	
	
	
| <?php
 | |
| 
 | |
| $ALLOW_ADMIN_EMAIL_LOGIN = (preg_match(
 | |
|   "/^([yY][eE][sS]|[yY])+$/",
 | |
|   $_ENV["ALLOW_ADMIN_EMAIL_LOGIN"]
 | |
| ));
 | |
| 
 | |
| $session_var_user_allowed = 'sogo-sso-user-allowed';
 | |
| $session_var_pass = 'sogo-sso-pass';
 | |
| 
 | |
| // validate credentials for basic auth requests
 | |
| if (isset($_SERVER['PHP_AUTH_USER'])) {
 | |
|   // load prerequisites only when required
 | |
|   require_once $_SERVER['DOCUMENT_ROOT'] . '/inc/prerequisites.inc.php';
 | |
|   $username = $_SERVER['PHP_AUTH_USER'];
 | |
|   $password = $_SERVER['PHP_AUTH_PW'];
 | |
|   $is_eas = false;
 | |
|   $is_dav = false;
 | |
|   $original_uri = isset($_SERVER['HTTP_X_ORIGINAL_URI']) ? $_SERVER['HTTP_X_ORIGINAL_URI'] : '';
 | |
|   if (preg_match('/^(\/SOGo|)\/dav.*/', $original_uri) === 1) {
 | |
|     $is_dav = true;
 | |
|   }
 | |
|   elseif (preg_match('/^(\/SOGo|)\/Microsoft-Server-ActiveSync.*/', $original_uri) === 1) {
 | |
|     $is_eas = true;
 | |
|   }
 | |
|   $login_check = check_login($username, $password, array('dav' => $is_dav, 'eas' => $is_eas));
 | |
|   if ($login_check === 'user') {
 | |
|     header("X-User: $username");
 | |
|     header("X-Auth: Basic ".base64_encode("$username:$password"));
 | |
|     header("X-Auth-Type: Basic");
 | |
|     exit;
 | |
|   } else {
 | |
|     header('HTTP/1.0 401 Unauthorized');
 | |
|     echo 'Invalid login';
 | |
|     exit;
 | |
|   }
 | |
| }
 | |
| // check permissions and redirect for direct GET ?login=xy requests
 | |
| elseif (isset($_GET['login'])) {
 | |
|   // load prerequisites only when required
 | |
|   require_once $_SERVER['DOCUMENT_ROOT'] . '/inc/prerequisites.inc.php';
 | |
|   // check if dual_login is active
 | |
|   $is_dual = (!empty($_SESSION["dual-login"]["username"])) ? true : false;
 | |
|   // check permissions (if dual_login is active, deny sso when acl is not given)
 | |
|   $login = html_entity_decode(rawurldecode($_GET["login"]));
 | |
|   if (isset($_SESSION['mailcow_cc_role']) &&
 | |
|     (($_SESSION['acl']['login_as'] == "1" && $ALLOW_ADMIN_EMAIL_LOGIN !== 0) || ($is_dual === false && $login == $_SESSION['mailcow_cc_username']))) {
 | |
|     if (filter_var($login, FILTER_VALIDATE_EMAIL)) {
 | |
|       if (user_get_alias_details($login) !== false) {
 | |
|         // load master password
 | |
|         $sogo_sso_pass = file_get_contents("/etc/sogo-sso/sogo-sso.pass");
 | |
|         // register username and password in session
 | |
|         $_SESSION[$session_var_user_allowed][] = $login;
 | |
|         $_SESSION[$session_var_pass] = $sogo_sso_pass;
 | |
|         // update sasl logs
 | |
|         $service = ($app_passwd_data['eas'] === true) ? 'EAS' : 'DAV';
 | |
|         $stmt = $pdo->prepare("REPLACE INTO sasl_log (`service`, `app_password`, `username`, `real_rip`) VALUES ('SSO', 0, :username, :remote_addr)");
 | |
|         $stmt->execute(array(
 | |
|           ':username' => $login,
 | |
|           ':remote_addr' => ($_SERVER['HTTP_X_REAL_IP'] ?? $_SERVER['REMOTE_ADDR'])
 | |
|         ));
 | |
|         // redirect to sogo (sogo will get the correct credentials via nginx auth_request
 | |
|         header("Location: /SOGo/so/${login}");
 | |
|         exit;
 | |
|       }
 | |
|     }
 | |
|   }
 | |
|   header('HTTP/1.0 403 Forbidden');
 | |
|   echo "Forbidden";
 | |
|   exit;
 | |
| }
 | |
| // only check for admin-login on sogo GUI requests
 | |
| elseif (isset($_SERVER['HTTP_X_ORIGINAL_URI']) && strcasecmp(substr($_SERVER['HTTP_X_ORIGINAL_URI'], 0, 9), "/SOGo/so/") === 0) {
 | |
|   // this is an nginx auth_request call, we check for existing sogo-sso session variables
 | |
|   session_start();
 | |
|   // extract email address from "/SOGo/so/user@domain/xy"
 | |
|   $url_parts = explode("/", $_SERVER['HTTP_X_ORIGINAL_URI']);
 | |
|   $email_list = array(
 | |
|       $url_parts[3],                                // Requested mailbox
 | |
|       ($_SESSION['mailcow_cc_username'] ?? ''),     // Current user
 | |
|       ($_SESSION["dual-login"]["username"] ?? ''),  // Dual login user
 | |
|   );
 | |
|   foreach($email_list as $email) {
 | |
|     // check if this email is in session allowed list
 | |
|     if (
 | |
|         !empty($email) &&
 | |
|         filter_var($email, FILTER_VALIDATE_EMAIL) &&
 | |
|         is_array($_SESSION[$session_var_user_allowed]) &&
 | |
|         in_array($email, $_SESSION[$session_var_user_allowed])
 | |
|     ) {
 | |
|       $username = $email;
 | |
|       $password = $_SESSION[$session_var_pass];
 | |
|       header("X-User: $username");
 | |
|       header("X-Auth: Basic ".base64_encode("$username:$password"));
 | |
|       header("X-Auth-Type: Basic");
 | |
|       exit;
 | |
|     }
 | |
|   }
 | |
| }
 | |
| 
 | |
| // if username is empty, SOGo will use the normal login methods / login form
 | |
| header("X-User: ");
 | |
| header("X-Auth: ");
 | |
| header("X-Auth-Type: ");
 |