507 lines
		
	
	
		
			19 KiB
		
	
	
	
		
			PHP
		
	
	
	
	
	
			
		
		
	
	
			507 lines
		
	
	
		
			19 KiB
		
	
	
	
		
			PHP
		
	
	
	
	
	
| <?php
 | |
| 
 | |
| function domain_admin($_action, $_data = null) {
 | |
|   global $pdo;
 | |
|   global $lang;
 | |
|   switch ($_action) {
 | |
|     case 'add':
 | |
|       $username		= strtolower(trim($_data['username']));
 | |
|       $password		= $_data['password'];
 | |
|       $password2  = $_data['password2'];
 | |
|       $domains    = (array)$_data['domains'];
 | |
|       $active     = intval($_data['active']);
 | |
| 
 | |
|       if ($_SESSION['mailcow_cc_role'] != "admin") {
 | |
|         $_SESSION['return'] = array(
 | |
|           'type' => 'danger',
 | |
|           'msg' => sprintf($lang['danger']['access_denied'])
 | |
|         );
 | |
|         return false;
 | |
|       }
 | |
|       if (empty($domains)) {
 | |
|         $_SESSION['return'] = array(
 | |
|           'type' => 'danger',
 | |
|           'msg' => sprintf($lang['danger']['domain_invalid'])
 | |
|         );
 | |
|         return false;
 | |
|       }
 | |
|       if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username)) || empty ($username)) {
 | |
|         $_SESSION['return'] = array(
 | |
|           'type' => 'danger',
 | |
|           'msg' => sprintf($lang['danger']['username_invalid'])
 | |
|         );
 | |
|         return false;
 | |
|       }
 | |
|       try {
 | |
|         $stmt = $pdo->prepare("SELECT `username` FROM `mailbox`
 | |
|           WHERE `username` = :username");
 | |
|         $stmt->execute(array(':username' => $username));
 | |
|         $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
 | |
|         
 | |
|         $stmt = $pdo->prepare("SELECT `username` FROM `admin`
 | |
|           WHERE `username` = :username");
 | |
|         $stmt->execute(array(':username' => $username));
 | |
|         $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
 | |
|         
 | |
|         $stmt = $pdo->prepare("SELECT `username` FROM `domain_admins`
 | |
|           WHERE `username` = :username");
 | |
|         $stmt->execute(array(':username' => $username));
 | |
|         $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
 | |
|       }
 | |
|       catch(PDOException $e) {
 | |
|         $_SESSION['return'] = array(
 | |
|           'type' => 'danger',
 | |
|           'msg' => 'MySQL: '.$e
 | |
|         );
 | |
|         return false;
 | |
|       }
 | |
|       foreach ($num_results as $num_results_each) {
 | |
|         if ($num_results_each != 0) {
 | |
|           $_SESSION['return'] = array(
 | |
|             'type' => 'danger',
 | |
|             'msg' => sprintf($lang['danger']['object_exists'], htmlspecialchars($username))
 | |
|           );
 | |
|           return false;
 | |
|         }
 | |
|       }
 | |
|       if (!empty($password) && !empty($password2)) {
 | |
|         if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) {
 | |
|           $_SESSION['return'] = array(
 | |
|             'type' => 'danger',
 | |
|             'msg' => sprintf($lang['danger']['password_complexity'])
 | |
|           );
 | |
|           return false;
 | |
|         }
 | |
|         if ($password != $password2) {
 | |
|           $_SESSION['return'] = array(
 | |
|             'type' => 'danger',
 | |
|             'msg' => sprintf($lang['danger']['password_mismatch'])
 | |
|           );
 | |
|           return false;
 | |
|         }
 | |
|         $password_hashed = hash_password($password);
 | |
|         foreach ($domains as $domain) {
 | |
|           if (!is_valid_domain_name($domain)) {
 | |
|             $_SESSION['return'] = array(
 | |
|               'type' => 'danger',
 | |
|               'msg' => sprintf($lang['danger']['domain_invalid'])
 | |
|             );
 | |
|             return false;
 | |
|           }
 | |
|           try {
 | |
|             $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
 | |
|                 VALUES (:username, :domain, :created, :active)");
 | |
|             $stmt->execute(array(
 | |
|               ':username' => $username,
 | |
|               ':domain' => $domain,
 | |
|               ':created' => date('Y-m-d H:i:s'),
 | |
|               ':active' => $active
 | |
|             ));
 | |
|           }
 | |
|           catch (PDOException $e) {
 | |
|             domain_admin('delete', $username);
 | |
|             $_SESSION['return'] = array(
 | |
|               'type' => 'danger',
 | |
|               'msg' => 'MySQL: '.$e
 | |
|             );
 | |
|             return false;
 | |
|           }
 | |
|         }
 | |
|         try {
 | |
|           $stmt = $pdo->prepare("INSERT INTO `admin` (`username`, `password`, `superadmin`, `active`)
 | |
|             VALUES (:username, :password_hashed, '0', :active)");
 | |
|           $stmt->execute(array(
 | |
|             ':username' => $username,
 | |
|             ':password_hashed' => $password_hashed,
 | |
|             ':active' => $active
 | |
|           ));
 | |
|         }
 | |
|         catch (PDOException $e) {
 | |
|           $_SESSION['return'] = array(
 | |
|             'type' => 'danger',
 | |
|             'msg' => 'MySQL: '.$e
 | |
|           );
 | |
|           return false;
 | |
|         }
 | |
|       }
 | |
|       else {
 | |
|         $_SESSION['return'] = array(
 | |
|           'type' => 'danger',
 | |
|           'msg' => sprintf($lang['danger']['password_empty'])
 | |
|         );
 | |
|         return false;
 | |
|       }
 | |
|       $_SESSION['return'] = array(
 | |
|         'type' => 'success',
 | |
|         'msg' => sprintf($lang['success']['domain_admin_added'], htmlspecialchars($username))
 | |
|       );
 | |
|     break;
 | |
|     case 'edit':
 | |
|       if ($_SESSION['mailcow_cc_role'] != "admin" && $_SESSION['mailcow_cc_role'] != "domainadmin") {
 | |
|         $_SESSION['return'] = array(
 | |
|           'type' => 'danger',
 | |
|           'msg' => sprintf($lang['danger']['access_denied'])
 | |
|         );
 | |
|         return false;
 | |
|       }
 | |
|       // Administrator
 | |
|       if ($_SESSION['mailcow_cc_role'] == "admin") {
 | |
|         if (!is_array($_data['username'])) {
 | |
|           $usernames = array();
 | |
|           $usernames[] = $_data['username'];
 | |
|         }
 | |
|         else {
 | |
|           $usernames = $_data['username'];
 | |
|         }
 | |
|         foreach ($usernames as $username) {
 | |
|           $is_now = domain_admin('details', $username);
 | |
|           $domains = (isset($_data['domains'])) ? (array)$_data['domains'] : null;
 | |
|           if (!empty($is_now)) {
 | |
|             $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active_int'];
 | |
|             $domains = (!empty($domains)) ? $domains : $is_now['selected_domains'];
 | |
|             $username_new = (!empty($_data['username_new'])) ? $_data['username_new'] : $is_now['username'];
 | |
|           }
 | |
|           else {
 | |
|             $_SESSION['return'] = array(
 | |
|               'type' => 'danger',
 | |
|               'msg' => sprintf($lang['danger']['access_denied'])
 | |
|             );
 | |
|             return false;
 | |
|           }
 | |
|           $password     = $_data['password'];
 | |
|           $password2    = $_data['password2'];
 | |
| 
 | |
|           if (!empty($domains)) {
 | |
|             foreach ($domains as $domain) {
 | |
|               if (!is_valid_domain_name($domain)) {
 | |
|                 $_SESSION['return'] = array(
 | |
|                   'type' => 'danger',
 | |
|                   'msg' => sprintf($lang['danger']['domain_invalid'])
 | |
|                 );
 | |
|                 return false;
 | |
|               }
 | |
|             }
 | |
|           }
 | |
|           if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username_new))) {
 | |
|             $_SESSION['return'] = array(
 | |
|               'type' => 'danger',
 | |
|               'msg' => sprintf($lang['danger']['username_invalid'])
 | |
|             );
 | |
|             return false;
 | |
|           }
 | |
|           if ($username_new != $username) {
 | |
|             if (!empty(domain_admin('details', $username_new)['username'])) {
 | |
|               $_SESSION['return'] = array(
 | |
|                 'type' => 'danger',
 | |
|                 'msg' => sprintf($lang['danger']['username_invalid'])
 | |
|               );
 | |
|               return false;
 | |
|             }
 | |
|           }
 | |
|           try {
 | |
|             $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
 | |
|             $stmt->execute(array(
 | |
|               ':username' => $username,
 | |
|             ));
 | |
|           }
 | |
|           catch (PDOException $e) {
 | |
|             $_SESSION['return'] = array(
 | |
|               'type' => 'danger',
 | |
|               'msg' => 'MySQL: '.$e
 | |
|             );
 | |
|             return false;
 | |
|           }
 | |
| 
 | |
|           if (!empty($domains)) {
 | |
|             foreach ($domains as $domain) {
 | |
|               try {
 | |
|                 $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
 | |
|                   VALUES (:username_new, :domain, :created, :active)");
 | |
|                 $stmt->execute(array(
 | |
|                   ':username_new' => $username_new,
 | |
|                   ':domain' => $domain,
 | |
|                   ':created' => date('Y-m-d H:i:s'),
 | |
|                   ':active' => $active
 | |
|                 ));
 | |
|               }
 | |
|               catch (PDOException $e) {
 | |
|                 $_SESSION['return'] = array(
 | |
|                   'type' => 'danger',
 | |
|                   'msg' => 'MySQL: '.$e
 | |
|                 );
 | |
|                 return false;
 | |
|               }
 | |
|             }
 | |
|           }
 | |
| 
 | |
|           if (!empty($password) && !empty($password2)) {
 | |
|             if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) {
 | |
|               $_SESSION['return'] = array(
 | |
|                 'type' => 'danger',
 | |
|                 'msg' => sprintf($lang['danger']['password_complexity'])
 | |
|               );
 | |
|               return false;
 | |
|             }
 | |
|             if ($password != $password2) {
 | |
|               $_SESSION['return'] = array(
 | |
|                 'type' => 'danger',
 | |
|                 'msg' => sprintf($lang['danger']['password_mismatch'])
 | |
|               );
 | |
|               return false;
 | |
|             }
 | |
|             $password_hashed = hash_password($password);
 | |
|             try {
 | |
|               $stmt = $pdo->prepare("UPDATE `admin` SET `username` = :username_new, `active` = :active, `password` = :password_hashed WHERE `username` = :username");
 | |
|               $stmt->execute(array(
 | |
|                 ':password_hashed' => $password_hashed,
 | |
|                 ':username_new' => $username_new,
 | |
|                 ':username' => $username,
 | |
|                 ':active' => $active
 | |
|               ));
 | |
|               if (isset($_data['disable_tfa'])) {
 | |
|                 $stmt = $pdo->prepare("UPDATE `tfa` SET `active` = '0' WHERE `username` = :username");
 | |
|                 $stmt->execute(array(':username' => $username));
 | |
|               }
 | |
|               else {
 | |
|                 $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username_new WHERE `username` = :username");
 | |
|                 $stmt->execute(array(':username_new' => $username_new, ':username' => $username));
 | |
|               }
 | |
|             }
 | |
|             catch (PDOException $e) {
 | |
|               $_SESSION['return'] = array(
 | |
|                 'type' => 'danger',
 | |
|                 'msg' => 'MySQL: '.$e
 | |
|               );
 | |
|               return false;
 | |
|             }
 | |
|           }
 | |
|           else {
 | |
|             try {
 | |
|               $stmt = $pdo->prepare("UPDATE `admin` SET `username` = :username_new, `active` = :active WHERE `username` = :username");
 | |
|               $stmt->execute(array(
 | |
|                 ':username_new' => $username_new,
 | |
|                 ':username' => $username,
 | |
|                 ':active' => $active
 | |
|               ));
 | |
|               if (isset($_data['disable_tfa'])) {
 | |
|                 $stmt = $pdo->prepare("UPDATE `tfa` SET `active` = '0' WHERE `username` = :username");
 | |
|                 $stmt->execute(array(':username' => $username));
 | |
|               }
 | |
|               else {
 | |
|                 $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username_new WHERE `username` = :username");
 | |
|                 $stmt->execute(array(':username_new' => $username_new, ':username' => $username));
 | |
|               }
 | |
|             }
 | |
|             catch (PDOException $e) {
 | |
|               $_SESSION['return'] = array(
 | |
|                 'type' => 'danger',
 | |
|                 'msg' => 'MySQL: '.$e
 | |
|               );
 | |
|               return false;
 | |
|             }
 | |
|           }
 | |
|         }
 | |
|         $_SESSION['return'] = array(
 | |
|           'type' => 'success',
 | |
|           'msg' => sprintf($lang['success']['domain_admin_modified'], htmlspecialchars(implode(', ', $usernames)))
 | |
|         );
 | |
|       }
 | |
|       // Domain administrator
 | |
|       // Can only edit itself
 | |
|       elseif ($_SESSION['mailcow_cc_role'] == "domainadmin") {
 | |
|         $username = $_SESSION['mailcow_cc_username'];
 | |
|         $password_old		= $_data['user_old_pass'];
 | |
|         $password_new	= $_data['user_new_pass'];
 | |
|         $password_new2	= $_data['user_new_pass2'];
 | |
| 
 | |
|         $stmt = $pdo->prepare("SELECT `password` FROM `admin`
 | |
|             WHERE `username` = :user");
 | |
|         $stmt->execute(array(':user' => $username));
 | |
|         $row = $stmt->fetch(PDO::FETCH_ASSOC);
 | |
|         if (!verify_ssha256($row['password'], $password_old)) {
 | |
|           $_SESSION['return'] = array(
 | |
|             'type' => 'danger',
 | |
|             'msg' => sprintf($lang['danger']['access_denied'])
 | |
|           );
 | |
|           return false;
 | |
|         }
 | |
| 
 | |
|         if (!empty($password_new2) && !empty($password_new)) {
 | |
|           if ($password_new2 != $password_new) {
 | |
|             $_SESSION['return'] = array(
 | |
|               'type' => 'danger',
 | |
|               'msg' => sprintf($lang['danger']['password_mismatch'])
 | |
|             );
 | |
|             return false;
 | |
|           }
 | |
|           if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password_new)) {
 | |
|             $_SESSION['return'] = array(
 | |
|               'type' => 'danger',
 | |
|               'msg' => sprintf($lang['danger']['password_complexity'])
 | |
|             );
 | |
|             return false;
 | |
|           }
 | |
|           $password_hashed = hash_password($password_new);
 | |
|           try {
 | |
|             $stmt = $pdo->prepare("UPDATE `admin` SET `password` = :password_hashed WHERE `username` = :username");
 | |
|             $stmt->execute(array(
 | |
|               ':password_hashed' => $password_hashed,
 | |
|               ':username' => $username
 | |
|             ));
 | |
|           }
 | |
|           catch (PDOException $e) {
 | |
|             $_SESSION['return'] = array(
 | |
|               'type' => 'danger',
 | |
|               'msg' => 'MySQL: '.$e
 | |
|             );
 | |
|             return false;
 | |
|           }
 | |
|         }
 | |
|         
 | |
|         $_SESSION['return'] = array(
 | |
|           'type' => 'success',
 | |
|           'msg' => sprintf($lang['success']['domain_admin_modified'], htmlspecialchars($username))
 | |
|         );
 | |
|       }
 | |
|     break;
 | |
|     case 'delete':
 | |
|       if ($_SESSION['mailcow_cc_role'] != "admin") {
 | |
|         $_SESSION['return'] = array(
 | |
|           'type' => 'danger',
 | |
|           'msg' => sprintf($lang['danger']['access_denied'])
 | |
|         );
 | |
|         return false;
 | |
|       }
 | |
|       $usernames = (array)$_data['username'];
 | |
|       foreach ($usernames as $username) {
 | |
|         if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
 | |
|           $_SESSION['return'] = array(
 | |
|             'type' => 'danger',
 | |
|             'msg' => sprintf($lang['danger']['username_invalid'])
 | |
|           );
 | |
|           return false;
 | |
|         }
 | |
|         try {
 | |
|           $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
 | |
|           $stmt->execute(array(
 | |
|             ':username' => $username,
 | |
|           ));
 | |
|           $stmt = $pdo->prepare("DELETE FROM `admin` WHERE `username` = :username");
 | |
|           $stmt->execute(array(
 | |
|             ':username' => $username,
 | |
|           ));
 | |
|         }
 | |
|         catch (PDOException $e) {
 | |
|           $_SESSION['return'] = array(
 | |
|             'type' => 'danger',
 | |
|             'msg' => 'MySQL: '.$e
 | |
|           );
 | |
|           return false;
 | |
|         }
 | |
|       }
 | |
|       $_SESSION['return'] = array(
 | |
|         'type' => 'success',
 | |
|         'msg' => sprintf($lang['success']['domain_admin_removed'], htmlspecialchars(implode(', ', $usernames)))
 | |
|       );
 | |
|     break;
 | |
|     case 'get':
 | |
|       $domainadmins = array();
 | |
|       if ($_SESSION['mailcow_cc_role'] != "admin") {
 | |
|         $_SESSION['return'] = array(
 | |
|           'type' => 'danger',
 | |
|           'msg' => sprintf($lang['danger']['access_denied'])
 | |
|         );
 | |
|         return false;
 | |
|       }
 | |
|       try {
 | |
|         $stmt = $pdo->query("SELECT DISTINCT
 | |
|           `username`
 | |
|             FROM `domain_admins` 
 | |
|               WHERE `username` IN (
 | |
|                 SELECT `username` FROM `admin`
 | |
|                   WHERE `superadmin`!='1'
 | |
|               )");
 | |
|         $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
 | |
|         while ($row = array_shift($rows)) {
 | |
|           $domainadmins[] = $row['username'];
 | |
|         }
 | |
|       }
 | |
|       catch(PDOException $e) {
 | |
|         $_SESSION['return'] = array(
 | |
|           'type' => 'danger',
 | |
|           'msg' => 'MySQL: '.$e
 | |
|         );
 | |
|       }
 | |
|       return $domainadmins;
 | |
|     break;
 | |
|     case 'details':
 | |
|       $domainadmindata = array();
 | |
| 
 | |
|       if ($_SESSION['mailcow_cc_role'] == "domainadmin" && $_data != $_SESSION['mailcow_cc_username']) {
 | |
|         return false;
 | |
|       }
 | |
|       elseif ($_SESSION['mailcow_cc_role'] != "admin" || !isset($_data)) {
 | |
|         return false;
 | |
|       }
 | |
| 
 | |
|       if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $_data))) {
 | |
|         return false;
 | |
|       }
 | |
|       try {
 | |
|         $stmt = $pdo->prepare("SELECT
 | |
|           `tfa`.`active` AS `tfa_active_int`,
 | |
|           CASE `tfa`.`active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `tfa_active`,
 | |
|           `domain_admins`.`username`,
 | |
|           `domain_admins`.`created`,
 | |
|           `domain_admins`.`active` AS `active_int`,
 | |
|           CASE `domain_admins`.`active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`
 | |
|             FROM `domain_admins`
 | |
|             LEFT OUTER JOIN `tfa` ON `tfa`.`username`=`domain_admins`.`username`
 | |
|               WHERE `domain_admins`.`username`= :domain_admin");
 | |
|         $stmt->execute(array(
 | |
|           ':domain_admin' => $_data
 | |
|         ));
 | |
|         $row = $stmt->fetch(PDO::FETCH_ASSOC);
 | |
|         if (empty($row)) { 
 | |
|           return false;
 | |
|         }
 | |
|         $domainadmindata['username'] = $row['username'];
 | |
|         $domainadmindata['tfa_active'] = $row['tfa_active'];
 | |
|         $domainadmindata['active'] = $row['active'];
 | |
|         $domainadmindata['tfa_active_int'] = $row['tfa_active_int'];
 | |
|         $domainadmindata['active_int'] = $row['active_int'];
 | |
|         $domainadmindata['modified'] = $row['created'];
 | |
|         // GET SELECTED
 | |
|         $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
 | |
|           WHERE `domain` IN (
 | |
|             SELECT `domain` FROM `domain_admins`
 | |
|               WHERE `username`= :domain_admin)");
 | |
|         $stmt->execute(array(':domain_admin' => $_data));
 | |
|         $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
 | |
|         while($row = array_shift($rows)) {
 | |
|           $domainadmindata['selected_domains'][] = $row['domain'];
 | |
|         }
 | |
|         // GET UNSELECTED
 | |
|         $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
 | |
|           WHERE `domain` NOT IN (
 | |
|             SELECT `domain` FROM `domain_admins`
 | |
|               WHERE `username`= :domain_admin)");
 | |
|         $stmt->execute(array(':domain_admin' => $_data));
 | |
|         $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
 | |
|         while($row = array_shift($rows)) {
 | |
|           $domainadmindata['unselected_domains'][] = $row['domain'];
 | |
|         }
 | |
|         if (!isset($domainadmindata['unselected_domains'])) {
 | |
|           $domainadmindata['unselected_domains'] = "";
 | |
|         }
 | |
|       }
 | |
|       catch(PDOException $e) {
 | |
|         $_SESSION['return'] = array(
 | |
|           'type' => 'danger',
 | |
|           'msg' => 'MySQL: '.$e
 | |
|         );
 | |
|       }
 | |
|       return $domainadmindata;
 | |
|     break;
 | |
|   }
 | |
| } | 
