2614 lines
75 KiB
PHP
2614 lines
75 KiB
PHP
<?php
|
|
function hash_password($password) {
|
|
$salt_str = bin2hex(openssl_random_pseudo_bytes(8));
|
|
return "{SSHA256}".base64_encode(hash('sha256', $password . $salt_str, true) . $salt_str);
|
|
}
|
|
function hasDomainAccess($username, $role, $domain) {
|
|
global $pdo;
|
|
if (!filter_var($username, FILTER_VALIDATE_EMAIL) && !ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
|
|
return false;
|
|
}
|
|
|
|
if (!is_valid_domain_name($domain)) {
|
|
return false;
|
|
}
|
|
|
|
try {
|
|
$stmt = $pdo->prepare("SELECT `domain` FROM `domain_admins`
|
|
WHERE (
|
|
`active`='1'
|
|
AND `username` = :username
|
|
AND `domain` = :domain
|
|
)
|
|
OR 'admin' = :role");
|
|
$stmt->execute(array(':username' => $username, ':domain' => $domain, ':role' => $role));
|
|
$num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
|
|
} catch(PDOException $e) {
|
|
error_log($e);
|
|
return false;
|
|
}
|
|
if ($num_results != 0 && !empty($num_results)) {
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
function init_db_schema() {
|
|
global $pdo;
|
|
try {
|
|
$stmt = $pdo->prepare("SELECT `username` FROM `admin`");
|
|
$stmt->execute();
|
|
}
|
|
catch (Exception $e) {
|
|
$lines = file('/web/inc/init.sql');
|
|
$data = '';
|
|
foreach ($lines as $line) {
|
|
if (substr($line, 0, 2) == '--' || $line == '') {
|
|
continue;
|
|
}
|
|
$data .= $line;
|
|
if (substr(trim($line), -1, 1) == ';') {
|
|
$pdo->query($data);
|
|
$data = '';
|
|
}
|
|
}
|
|
$stmt = $pdo->query("SHOW INDEX FROM sogo_acl WHERE KEY_NAME = 'sogo_acl_c_folder_id_idx'");
|
|
$num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
|
|
if ($num_results == 0) {
|
|
$pdo->query("CREATE INDEX sogo_acl_c_folder_id_idx ON sogo_acl(c_folder_id)");
|
|
}
|
|
$stmt = $pdo->query("SHOW INDEX FROM sogo_acl WHERE KEY_NAME = 'sogo_acl_c_uid_idx'");
|
|
$num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
|
|
if ($num_results == 0) {
|
|
$pdo->query("CREATE INDEX sogo_acl_c_uid_idx ON sogo_acl(c_uid)");
|
|
}
|
|
$_SESSION['return'] = array(
|
|
'type' => 'success',
|
|
'msg' => 'Database initialization completed.'
|
|
);
|
|
}
|
|
}
|
|
function verify_ssha256($hash, $password) {
|
|
// Remove tag if any
|
|
$hash = ltrim($hash, '{SSHA256}');
|
|
// Decode hash
|
|
$dhash = base64_decode($hash);
|
|
// Get first 32 bytes of binary which equals a SHA256 hash
|
|
$ohash = substr($dhash, 0, 32);
|
|
// Remove SHA256 hash from decoded hash to get original salt string
|
|
$osalt = str_replace($ohash, '', $dhash);
|
|
// Check single salted SHA256 hash against extracted hash
|
|
if (hash('sha256', $password . $osalt, true) == $ohash) {
|
|
return true;
|
|
}
|
|
else {
|
|
return false;
|
|
}
|
|
}
|
|
function doveadm_authenticate($hash, $algorithm, $password) {
|
|
$descr = array(0 => array('pipe', 'r'), 1 => array('pipe', 'w'), 2 => array('pipe', 'w'));
|
|
$pipes = array();
|
|
$process = proc_open("/usr/bin/doveadm pw -s ".$algorithm." -t '".$hash."'", $descr, $pipes);
|
|
if (is_resource($process)) {
|
|
fputs($pipes[0], $password);
|
|
fclose($pipes[0]);
|
|
while ($f = fgets($pipes[1])) {
|
|
if (preg_match('/(verified)/', $f)) {
|
|
proc_close($process);
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
fclose($pipes[1]);
|
|
while ($f = fgets($pipes[2])) {
|
|
proc_close($process);
|
|
return false;
|
|
}
|
|
fclose($pipes[2]);
|
|
proc_close($process);
|
|
}
|
|
return false;
|
|
}
|
|
function check_login($user, $pass) {
|
|
global $pdo;
|
|
if (!filter_var($user, FILTER_VALIDATE_EMAIL) && !ctype_alnum(str_replace(array('_', '.', '-'), '', $user))) {
|
|
return false;
|
|
}
|
|
$user = strtolower(trim($user));
|
|
$stmt = $pdo->prepare("SELECT `password` FROM `admin`
|
|
WHERE `superadmin` = '1'
|
|
AND `username` = :user");
|
|
$stmt->execute(array(':user' => $user));
|
|
$rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
|
|
foreach ($rows as $row) {
|
|
if (verify_ssha256($row['password'], $pass) !== false) {
|
|
unset($_SESSION['ldelay']);
|
|
return "admin";
|
|
}
|
|
}
|
|
$stmt = $pdo->prepare("SELECT `password` FROM `admin`
|
|
WHERE `superadmin` = '0'
|
|
AND `active`='1'
|
|
AND `username` = :user");
|
|
$stmt->execute(array(':user' => $user));
|
|
$rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
|
|
foreach ($rows as $row) {
|
|
if (verify_ssha256($row['password'], $pass) !== false) {
|
|
unset($_SESSION['ldelay']);
|
|
return "domainadmin";
|
|
}
|
|
}
|
|
$stmt = $pdo->prepare("SELECT `password` FROM `mailbox`
|
|
WHERE `active`='1'
|
|
AND `username` = :user");
|
|
$stmt->execute(array(':user' => $user));
|
|
$rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
|
|
foreach ($rows as $row) {
|
|
if (verify_ssha256($row['password'], $pass) !== false) {
|
|
unset($_SESSION['ldelay']);
|
|
return "user";
|
|
}
|
|
}
|
|
if (!isset($_SESSION['ldelay'])) {
|
|
$_SESSION['ldelay'] = "0";
|
|
}
|
|
elseif (!isset($_SESSION['mailcow_cc_username'])) {
|
|
$_SESSION['ldelay'] = $_SESSION['ldelay']+0.5;
|
|
}
|
|
sleep($_SESSION['ldelay']);
|
|
}
|
|
function formatBytes($size, $precision = 2) {
|
|
if(!is_numeric($size)) {
|
|
return "0";
|
|
}
|
|
$base = log($size, 1024);
|
|
$suffixes = array(' Byte', ' KiB', ' MiB', ' GiB', ' TiB');
|
|
if ($size == "0") {
|
|
return "0";
|
|
}
|
|
return round(pow(1024, $base - floor($base)), $precision) . $suffixes[floor($base)];
|
|
}
|
|
function dkim_table($action, $item) {
|
|
global $lang;
|
|
switch ($action) {
|
|
case "delete":
|
|
$domain = preg_replace('/[^A-Za-z0-9._\-]/', '_', $item['dkim']['domain']);
|
|
if (!is_valid_domain_name($domain)) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid'])
|
|
);
|
|
break;
|
|
}
|
|
exec('rm ' . escapeshellarg($GLOBALS['MC_DKIM_TXTS'] . '/' . $domain . '.dkim'), $out, $return);
|
|
if ($return != "0") {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['dkim_remove_failed'])
|
|
);
|
|
break;
|
|
}
|
|
exec('rm ' . escapeshellarg($GLOBALS['MC_DKIM_KEYS'] . '/' . $domain . '.dkim'), $out, $return);
|
|
if ($return != "0") {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['dkim_remove_failed'])
|
|
);
|
|
break;
|
|
}
|
|
$_SESSION['return'] = array(
|
|
'type' => 'success',
|
|
'msg' => sprintf($lang['success']['dkim_removed'])
|
|
);
|
|
break;
|
|
case "add":
|
|
$domain = preg_replace('/[^A-Za-z0-9._\-]/', '_', $item['dkim']['domain']);
|
|
$key_length = intval($item['dkim']['key_size']);
|
|
if (!is_valid_domain_name($domain) || !is_numeric($key_length)) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid'])
|
|
);
|
|
break;
|
|
}
|
|
|
|
if (!empty(glob($GLOBALS['MC_DKIM_TXTS'] . '/' . $domain . '.dkim'))) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid'])
|
|
);
|
|
break;
|
|
}
|
|
|
|
$config = array(
|
|
"digest_alg" => "sha256",
|
|
"private_key_bits" => $key_length,
|
|
"private_key_type" => OPENSSL_KEYTYPE_RSA,
|
|
);
|
|
$keypair_ressource = openssl_pkey_new($config);
|
|
$key_details = openssl_pkey_get_details($keypair_ressource);
|
|
$pubKey = implode(array_slice(
|
|
array_filter(
|
|
explode(PHP_EOL, $key_details['key'])
|
|
), 1, -1)
|
|
);
|
|
// Save public key to file
|
|
file_put_contents($GLOBALS['MC_DKIM_TXTS'] . '/' . $domain . '.dkim', $pubKey);
|
|
// Save private key to file
|
|
openssl_pkey_export_to_file($keypair_ressource, $GLOBALS['MC_DKIM_KEYS'] . '/' . $domain . '.dkim');
|
|
|
|
$_SESSION['return'] = array(
|
|
'type' => 'success',
|
|
'msg' => sprintf($lang['success']['dkim_added'])
|
|
);
|
|
break;
|
|
}
|
|
}
|
|
function mailbox_add_domain($postarray) {
|
|
global $pdo;
|
|
global $lang;
|
|
if ($_SESSION['mailcow_cc_role'] != "admin") {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['access_denied'])
|
|
);
|
|
return false;
|
|
}
|
|
$domain = idn_to_ascii(strtolower(trim($postarray['domain'])));
|
|
$description = $postarray['description'];
|
|
$aliases = $postarray['aliases'];
|
|
$mailboxes = $postarray['mailboxes'];
|
|
$maxquota = $postarray['maxquota'];
|
|
$quota = $postarray['quota'];
|
|
|
|
if ($maxquota > $quota) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['mailbox_quota_exceeds_domain_quota'])
|
|
);
|
|
return false;
|
|
}
|
|
|
|
isset($postarray['active']) ? $active = '1' : $active = '0';
|
|
isset($postarray['relay_all_recipients']) ? $relay_all_recipients = '1' : $relay_all_recipients = '0';
|
|
isset($postarray['backupmx']) ? $backupmx = '1' : $backupmx = '0';
|
|
isset($postarray['relay_all_recipients']) ? $backupmx = '1' : true;
|
|
|
|
if (!is_valid_domain_name($domain)) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['domain_invalid'])
|
|
);
|
|
return false;
|
|
}
|
|
|
|
foreach (array($quota, $maxquota, $mailboxes, $aliases) as $data) {
|
|
if (!is_numeric($data)) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['object_is_not_numeric'], htmlspecialchars($data))
|
|
);
|
|
return false;
|
|
}
|
|
}
|
|
|
|
try {
|
|
$stmt = $pdo->prepare("SELECT `domain` FROM `domain`
|
|
WHERE `domain` = :domain");
|
|
$stmt->execute(array(':domain' => $domain));
|
|
$num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
|
|
}
|
|
catch(PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
if ($num_results != 0) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['domain_exists'], htmlspecialchars($domain))
|
|
);
|
|
return false;
|
|
}
|
|
|
|
try {
|
|
$stmt = $pdo->prepare("INSERT INTO `domain` (`domain`, `description`, `aliases`, `mailboxes`, `maxquota`, `quota`, `transport`, `backupmx`, `created`, `modified`, `active`, `relay_all_recipients`)
|
|
VALUES (:domain, :description, :aliases, :mailboxes, :maxquota, :quota, 'virtual', :backupmx, :created, :modified, :active, :relay_all_recipients)");
|
|
$stmt->execute(array(
|
|
':domain' => $domain,
|
|
':description' => $description,
|
|
':aliases' => $aliases,
|
|
':mailboxes' => $mailboxes,
|
|
':maxquota' => $maxquota,
|
|
':quota' => $quota,
|
|
':backupmx' => $backupmx,
|
|
':active' => $active,
|
|
':created' => date('Y-m-d H:i:s'),
|
|
':modified' => date('Y-m-d H:i:s'),
|
|
':relay_all_recipients' => $relay_all_recipients
|
|
));
|
|
/*
|
|
PoC for a restart with supervisord unix socket
|
|
* $sock = stream_socket_client("unix:///var/run/controller/supervisord.sock", $errno, $errstr, 30);
|
|
* fwrite($sock, "GET ?processname=sogo&action=restart HTTP/1.0\r\nAccept: */*\r\n\r\n");
|
|
* fclose($sock);
|
|
*/
|
|
$_SESSION['return'] = array(
|
|
'type' => 'success',
|
|
'msg' => sprintf($lang['success']['domain_added'], htmlspecialchars($domain))
|
|
);
|
|
}
|
|
catch (PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
}
|
|
function mailbox_add_alias($postarray) {
|
|
global $lang;
|
|
global $pdo;
|
|
$addresses = array_map('trim', preg_split( "/( |,|;|\n)/", $postarray['address']));
|
|
$gotos = array_map('trim', preg_split( "/( |,|;|\n)/", $postarray['goto']));
|
|
isset($postarray['active']) ? $active = '1' : $active = '0';
|
|
if (empty($addresses[0])) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['alias_empty'])
|
|
);
|
|
return false;
|
|
}
|
|
|
|
if (empty($gotos[0])) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['goto_empty'])
|
|
);
|
|
return false;
|
|
}
|
|
|
|
foreach ($addresses as $address) {
|
|
if (empty($address)) {
|
|
continue;
|
|
}
|
|
|
|
$domain = idn_to_ascii(substr(strstr($address, '@'), 1));
|
|
$local_part = strstr($address, '@', true);
|
|
$address = $local_part.'@'.$domain;
|
|
|
|
if ((!filter_var($address, FILTER_VALIDATE_EMAIL) === true) && !empty($local_part)) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['alias_invalid'])
|
|
);
|
|
return false;
|
|
}
|
|
|
|
if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['access_denied'])
|
|
);
|
|
return false;
|
|
}
|
|
|
|
try {
|
|
$stmt = $pdo->prepare("SELECT `address` FROM `alias`
|
|
WHERE `address`= :address");
|
|
$stmt->execute(array(':address' => $address));
|
|
$num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
|
|
}
|
|
catch(PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
if ($num_results != 0) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['is_alias_or_mailbox'], htmlspecialchars($address))
|
|
);
|
|
return false;
|
|
}
|
|
|
|
try {
|
|
$stmt = $pdo->prepare("SELECT `address` FROM `spamalias`
|
|
WHERE `address`= :address");
|
|
$stmt->execute(array(':address' => $address));
|
|
$num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
|
|
}
|
|
catch(PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
if ($num_results != 0) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['is_spam_alias'], htmlspecialchars($address))
|
|
);
|
|
return false;
|
|
}
|
|
|
|
foreach ($gotos as &$goto) {
|
|
if (empty($goto)) {
|
|
continue;
|
|
}
|
|
|
|
$goto_domain = idn_to_ascii(substr(strstr($goto, '@'), 1));
|
|
$goto_local_part = strstr($goto, '@', true);
|
|
$goto = $goto_local_part.'@'.$goto_domain;
|
|
|
|
if (!filter_var($goto, FILTER_VALIDATE_EMAIL) === true) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['goto_invalid'])
|
|
);
|
|
return false;
|
|
}
|
|
if ($goto == $address) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['alias_goto_identical'])
|
|
);
|
|
return false;
|
|
}
|
|
}
|
|
|
|
$gotos = array_filter($gotos);
|
|
$goto = implode(",", $gotos);
|
|
|
|
try {
|
|
$stmt = $pdo->prepare("INSERT INTO `alias` (`address`, `goto`, `domain`, `created`, `modified`, `active`)
|
|
VALUES (:address, :goto, :domain, :created, :modified, :active)");
|
|
|
|
if (!filter_var($address, FILTER_VALIDATE_EMAIL) === true) {
|
|
$stmt->execute(array(
|
|
':address' => '@'.$domain,
|
|
':goto' => $goto,
|
|
':domain' => $domain,
|
|
':created' => date('Y-m-d H:i:s'),
|
|
':modified' => date('Y-m-d H:i:s'),
|
|
':active' => $active
|
|
));
|
|
}
|
|
else {
|
|
$stmt->execute(array(
|
|
':address' => $address,
|
|
':goto' => $goto,
|
|
':domain' => $domain,
|
|
':created' => date('Y-m-d H:i:s'),
|
|
':modified' => date('Y-m-d H:i:s'),
|
|
':active' => $active
|
|
));
|
|
}
|
|
$_SESSION['return'] = array(
|
|
'type' => 'success',
|
|
'msg' => sprintf($lang['success']['alias_added'])
|
|
);
|
|
}
|
|
catch (PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
}
|
|
$_SESSION['return'] = array(
|
|
'type' => 'success',
|
|
'msg' => sprintf($lang['success']['alias_added'])
|
|
);
|
|
}
|
|
function mailbox_add_alias_domain($postarray) {
|
|
global $lang;
|
|
global $pdo;
|
|
isset($postarray['active']) ? $active = '1' : $active = '0';
|
|
|
|
if (!is_valid_domain_name($postarray['alias_domain'])) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['alias_domain_invalid'])
|
|
);
|
|
return false;
|
|
}
|
|
|
|
if (!is_valid_domain_name($postarray['target_domain'])) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['target_domain_invalid'])
|
|
);
|
|
return false;
|
|
}
|
|
|
|
if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $postarray['target_domain'])) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['access_denied'])
|
|
);
|
|
return false;
|
|
}
|
|
|
|
if ($postarray['alias_domain'] == $postarray['target_domain']) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['aliasd_targetd_identical'])
|
|
);
|
|
return false;
|
|
}
|
|
|
|
$alias_domain = strtolower(trim($postarray['alias_domain']));
|
|
$target_domain = strtolower(trim($postarray['target_domain']));
|
|
|
|
try {
|
|
$stmt = $pdo->prepare("SELECT `domain` FROM `domain`
|
|
WHERE `domain`= :target_domain");
|
|
$stmt->execute(array(':target_domain' => $target_domain));
|
|
$num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
|
|
}
|
|
catch(PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
if ($num_results == 0) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['targetd_not_found'])
|
|
);
|
|
return false;
|
|
}
|
|
|
|
try {
|
|
$stmt = $pdo->prepare("SELECT `alias_domain` FROM `alias_domain` WHERE `alias_domain`= :alias_domain
|
|
UNION
|
|
SELECT `alias_domain` FROM `alias_domain` WHERE `alias_domain`= :alias_domain_in_domain");
|
|
$stmt->execute(array(':alias_domain' => $alias_domain, ':alias_domain_in_domain' => $alias_domain));
|
|
$num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
|
|
}
|
|
catch(PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
if ($num_results != 0) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['aliasd_exists'])
|
|
);
|
|
return false;
|
|
}
|
|
|
|
try {
|
|
$stmt = $pdo->prepare("INSERT INTO `alias_domain` (`alias_domain`, `target_domain`, `created`, `modified`, `active`)
|
|
VALUES (:alias_domain, :target_domain, :created, :modified, :active)");
|
|
$stmt->execute(array(
|
|
':alias_domain' => $alias_domain,
|
|
':target_domain' => $target_domain,
|
|
':created' => date('Y-m-d H:i:s'),
|
|
':modified' => date('Y-m-d H:i:s'),
|
|
':active' => $active
|
|
));
|
|
$_SESSION['return'] = array(
|
|
'type' => 'success',
|
|
'msg' => sprintf($lang['success']['aliasd_added'], htmlspecialchars($alias_domain))
|
|
);
|
|
}
|
|
catch (PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
|
|
}
|
|
function mailbox_edit_alias_domain($postarray) {
|
|
global $lang;
|
|
global $pdo;
|
|
isset($postarray['active']) ? $active = '1' : $active = '0';
|
|
$alias_domain = idn_to_ascii($postarray['alias_domain']);
|
|
$alias_domain = strtolower(trim($alias_domain));
|
|
$alias_domain_now = strtolower(trim($postarray['alias_domain_now']));
|
|
if (!is_valid_domain_name($alias_domain)) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['alias_domain_invalid'])
|
|
);
|
|
return false;
|
|
}
|
|
|
|
if (!is_valid_domain_name($alias_domain_now)) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['alias_domain_invalid'])
|
|
);
|
|
return false;
|
|
}
|
|
|
|
try {
|
|
$stmt = $pdo->prepare("SELECT `target_domain` FROM `alias_domain`
|
|
WHERE `alias_domain`= :alias_domain_now");
|
|
$stmt->execute(array(':alias_domain_now' => $alias_domain_now));
|
|
$DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
|
|
}
|
|
catch(PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $DomainData['target_domain'])) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['access_denied'])
|
|
);
|
|
return false;
|
|
}
|
|
|
|
try {
|
|
$stmt = $pdo->prepare("SELECT `target_domain` FROM `alias_domain`
|
|
WHERE `target_domain`= :alias_domain");
|
|
$stmt->execute(array(':alias_domain' => $alias_domain));
|
|
$num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
|
|
}
|
|
catch(PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
if ($num_results != 0) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['aliasd_targetd_identical'])
|
|
);
|
|
return false;
|
|
}
|
|
|
|
try {
|
|
$stmt = $pdo->prepare("UPDATE `alias_domain` SET `alias_domain` = :alias_domain, `active` = :active WHERE `alias_domain` = :alias_domain_now");
|
|
$stmt->execute(array(
|
|
':alias_domain' => $alias_domain,
|
|
':alias_domain_now' => $alias_domain_now,
|
|
':active' => $active
|
|
));
|
|
}
|
|
catch (PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
|
|
$_SESSION['return'] = array(
|
|
'type' => 'success',
|
|
'msg' => sprintf($lang['success']['aliasd_modified'], htmlspecialchars($alias_domain))
|
|
);
|
|
}
|
|
function mailbox_add_mailbox($postarray) {
|
|
global $pdo;
|
|
global $lang;
|
|
$username = strtolower(trim($postarray['local_part'])).'@'.strtolower(trim($postarray['domain']));
|
|
if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['mailbox_invalid'])
|
|
);
|
|
return false;
|
|
}
|
|
if (empty($postarray['local_part'])) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['mailbox_invalid'])
|
|
);
|
|
return false;
|
|
}
|
|
$domain = strtolower(trim($postarray['domain']));
|
|
$password = $postarray['password'];
|
|
$password2 = $postarray['password2'];
|
|
$local_part = strtolower(trim($postarray['local_part']));
|
|
$name = $postarray['name'];
|
|
$quota_m = $postarray['quota'];
|
|
|
|
if (empty($name)) {
|
|
$name = $local_part;
|
|
}
|
|
|
|
isset($postarray['active']) ? $active = '1' : $active = '0';
|
|
|
|
$quota_b = ($quota_m * 1048576);
|
|
$maildir = $domain."/".$local_part."/";
|
|
|
|
if (!is_valid_domain_name($domain)) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['domain_invalid'])
|
|
);
|
|
return false;
|
|
}
|
|
|
|
try {
|
|
$stmt = $pdo->prepare("SELECT `mailboxes`, `maxquota`, `quota` FROM `domain`
|
|
WHERE `domain` = :domain");
|
|
$stmt->execute(array(':domain' => $domain));
|
|
$DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
|
|
}
|
|
catch(PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
|
|
try {
|
|
$stmt = $pdo->prepare("SELECT
|
|
COUNT(*) as count,
|
|
COALESCE(ROUND(SUM(`quota`)/1048576), 0) as `quota`
|
|
FROM `mailbox`
|
|
WHERE `domain` = :domain");
|
|
$stmt->execute(array(':domain' => $domain));
|
|
$MailboxData = $stmt->fetch(PDO::FETCH_ASSOC);
|
|
}
|
|
catch(PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
|
|
if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['access_denied'])
|
|
);
|
|
return false;
|
|
}
|
|
|
|
try {
|
|
$stmt = $pdo->prepare("SELECT `local_part` FROM `mailbox` WHERE `local_part` = :local_part and `domain`= :domain");
|
|
$stmt->execute(array(':local_part' => $local_part, ':domain' => $domain));
|
|
$num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
|
|
}
|
|
catch(PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
if ($num_results != 0) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['object_exists'], htmlspecialchars($username))
|
|
);
|
|
return false;
|
|
}
|
|
|
|
try {
|
|
$stmt = $pdo->prepare("SELECT `address` FROM `alias` WHERE address= :username");
|
|
$stmt->execute(array(':username' => $username));
|
|
$num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
|
|
}
|
|
catch(PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
if ($num_results != 0) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['is_alias'], htmlspecialchars($username))
|
|
);
|
|
return false;
|
|
}
|
|
|
|
try {
|
|
$stmt = $pdo->prepare("SELECT `address` FROM `spamalias` WHERE `address`= :username");
|
|
$stmt->execute(array(':username' => $username));
|
|
$num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
|
|
}
|
|
catch(PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
if ($num_results != 0) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['is_spam_alias'], htmlspecialchars($username))
|
|
);
|
|
return false;
|
|
}
|
|
|
|
if (!is_numeric($quota_m) || $quota_m == "0") {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['quota_not_0_not_numeric'])
|
|
);
|
|
return false;
|
|
}
|
|
|
|
if (!empty($password) && !empty($password2)) {
|
|
if ($password != $password2) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['password_mismatch'])
|
|
);
|
|
return false;
|
|
}
|
|
$password_hashed = hash_password($password);
|
|
}
|
|
else {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['password_empty'])
|
|
);
|
|
return false;
|
|
}
|
|
|
|
if ($MailboxData['count'] >= $DomainData['mailboxes']) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['max_mailbox_exceeded'], $MailboxData['count'], $DomainData['mailboxes'])
|
|
);
|
|
return false;
|
|
}
|
|
|
|
try {
|
|
$stmt = $pdo->prepare("SELECT `domain` FROM `domain` WHERE `domain`= :domain");
|
|
$stmt->execute(array(':domain' => $domain));
|
|
$num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
|
|
}
|
|
catch(PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
if ($num_results == 0) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => $lang['danger']['domain_not_found']
|
|
);
|
|
return false;
|
|
}
|
|
|
|
if ($quota_m > $DomainData['maxquota']) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['mailbox_quota_exceeded'], $DomainData['maxquota'])
|
|
);
|
|
return false;
|
|
}
|
|
|
|
if (($MailboxData['quota'] + $quota_m) > $DomainData['quota']) {
|
|
$quota_left_m = ($DomainData['quota'] - $MailboxData['quota']);
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['mailbox_quota_left_exceeded'], $quota_left_m)
|
|
);
|
|
return false;
|
|
}
|
|
|
|
try {
|
|
$stmt = $pdo->prepare("INSERT INTO `mailbox` (`username`, `password`, `name`, `maildir`, `quota`, `local_part`, `domain`, `created`, `modified`, `active`)
|
|
VALUES (:username, :password_hashed, :name, :maildir, :quota_b, :local_part, :domain, :created, :modified, :active)");
|
|
$stmt->execute(array(
|
|
':username' => $username,
|
|
':password_hashed' => $password_hashed,
|
|
':name' => $name,
|
|
':maildir' => $maildir,
|
|
':quota_b' => $quota_b,
|
|
':local_part' => $local_part,
|
|
':domain' => $domain,
|
|
':created' => date('Y-m-d H:i:s'),
|
|
':modified' => date('Y-m-d H:i:s'),
|
|
':active' => $active
|
|
));
|
|
|
|
$stmt = $pdo->prepare("INSERT INTO `quota2` (`username`, `bytes`, `messages`)
|
|
VALUES (:username, '0', '0')");
|
|
$stmt->execute(array(':username' => $username));
|
|
|
|
$stmt = $pdo->prepare("INSERT INTO `alias` (`address`, `goto`, `domain`, `created`, `modified`, `active`)
|
|
VALUES (:username1, :username2, :domain, :created, :modified, :active)");
|
|
$stmt->execute(array(
|
|
':username1' => $username,
|
|
':username2' => $username,
|
|
':domain' => $domain,
|
|
':created' => date('Y-m-d H:i:s'),
|
|
':modified' => date('Y-m-d H:i:s'),
|
|
':active' => $active
|
|
));
|
|
|
|
$_SESSION['return'] = array(
|
|
'type' => 'success',
|
|
'msg' => sprintf($lang['success']['mailbox_added'], htmlspecialchars($username))
|
|
);
|
|
}
|
|
catch (PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
}
|
|
function mailbox_edit_alias($postarray) {
|
|
global $lang;
|
|
global $pdo;
|
|
$address = $postarray['address'];
|
|
$domain = idn_to_ascii(substr(strstr($address, '@'), 1));
|
|
$local_part = strstr($address, '@', true);
|
|
if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['access_denied'])
|
|
);
|
|
return false;
|
|
}
|
|
if (empty($postarray['goto'])) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['goto_empty'])
|
|
);
|
|
return false;
|
|
}
|
|
$gotos = array_map('trim', preg_split( "/( |,|;|\n)/", $postarray['goto']));
|
|
foreach ($gotos as &$goto) {
|
|
if (empty($goto)) {
|
|
continue;
|
|
}
|
|
if (!filter_var($goto, FILTER_VALIDATE_EMAIL)) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' =>sprintf($lang['danger']['goto_invalid'])
|
|
);
|
|
return false;
|
|
}
|
|
if ($goto == $address) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['alias_goto_identical'])
|
|
);
|
|
return false;
|
|
}
|
|
}
|
|
$gotos = array_filter($gotos);
|
|
$goto = implode(",", $gotos);
|
|
isset($postarray['active']) ? $active = '1' : $active = '0';
|
|
if ((!filter_var($address, FILTER_VALIDATE_EMAIL) === true) && !empty($local_part)) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['alias_invalid'])
|
|
);
|
|
return false;
|
|
}
|
|
|
|
try {
|
|
$stmt = $pdo->prepare("UPDATE `alias` SET `goto` = :goto, `active`= :active WHERE `address` = :address");
|
|
$stmt->execute(array(
|
|
':goto' => $goto,
|
|
':active' => $active,
|
|
':address' => $address
|
|
));
|
|
$_SESSION['return'] = array(
|
|
'type' => 'success',
|
|
'msg' => sprintf($lang['success']['alias_modified'], htmlspecialchars($address))
|
|
);
|
|
}
|
|
catch (PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
}
|
|
function mailbox_edit_domain($postarray) {
|
|
global $lang;
|
|
global $pdo;
|
|
$domain = $postarray['domain'];
|
|
$description = $postarray['description'];
|
|
|
|
$aliases = filter_var($postarray['aliases'], FILTER_SANITIZE_NUMBER_FLOAT);
|
|
$mailboxes = filter_var($postarray['mailboxes'], FILTER_SANITIZE_NUMBER_FLOAT);
|
|
$maxquota = filter_var($postarray['maxquota'], FILTER_SANITIZE_NUMBER_FLOAT);
|
|
$quota = filter_var($postarray['quota'], FILTER_SANITIZE_NUMBER_FLOAT);
|
|
|
|
isset($postarray['relay_all_recipients']) ? $relay_all_recipients = '1' : $relay_all_recipients = '0';
|
|
isset($postarray['backupmx']) ? $backupmx = '1' : $backupmx = '0';
|
|
isset($postarray['relay_all_recipients']) ? $backupmx = '1' : true;
|
|
isset($postarray['active']) ? $active = '1' : $active = '0';
|
|
|
|
try {
|
|
$stmt = $pdo->prepare("SELECT
|
|
COUNT(*) AS count,
|
|
MAX(COALESCE(ROUND(`quota`/1048576), 0)) AS `maxquota`,
|
|
COALESCE(ROUND(SUM(`quota`)/1048576), 0) AS `quota`
|
|
FROM `mailbox`
|
|
WHERE domain= :domain");
|
|
$stmt->execute(array(':domain' => $domain));
|
|
$MailboxData = $stmt->fetch(PDO::FETCH_ASSOC);
|
|
}
|
|
catch(PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
|
|
|
|
try {
|
|
$stmt = $pdo->prepare("SELECT COUNT(*) AS `count` FROM `alias`
|
|
WHERE domain = :domain
|
|
AND address NOT IN (
|
|
SELECT `username` FROM `mailbox`
|
|
)");
|
|
$stmt->execute(array(':domain' => $domain));
|
|
$AliasData = $stmt->fetch(PDO::FETCH_ASSOC);
|
|
}
|
|
catch(PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
|
|
if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['access_denied'])
|
|
);
|
|
return false;
|
|
}
|
|
|
|
if ($maxquota > $quota) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['mailbox_quota_exceeds_domain_quota'])
|
|
);
|
|
return false;
|
|
}
|
|
|
|
if ($MailboxData['maxquota'] > $maxquota) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['max_quota_in_use'], $MailboxData['maxquota'])
|
|
);
|
|
return false;
|
|
}
|
|
|
|
if ($MailboxData['quota'] > $quota) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['domain_quota_m_in_use'], $MailboxData['quota'])
|
|
);
|
|
return false;
|
|
}
|
|
|
|
if ($MailboxData['count'] > $mailboxes) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['mailboxes_in_use'], $MailboxData['count'])
|
|
);
|
|
return false;
|
|
}
|
|
|
|
if ($AliasData['count'] > $aliases) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['aliases_in_use'], $AliasData['count'])
|
|
);
|
|
return false;
|
|
}
|
|
|
|
if (!is_valid_domain_name($domain)) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['domain_invalid'])
|
|
);
|
|
return false;
|
|
}
|
|
try {
|
|
$stmt = $pdo->prepare("UPDATE `domain` SET
|
|
`modified`= :modified,
|
|
`relay_all_recipients` = :relay_all_recipients,
|
|
`backupmx` = :backupmx,
|
|
`active` = :active,
|
|
`quota` = :quota,
|
|
`maxquota` = :maxquota,
|
|
`mailboxes` = :mailboxes,
|
|
`aliases` = :aliases,
|
|
`description` = :description
|
|
WHERE `domain` = :domain");
|
|
$stmt->execute(array(
|
|
':relay_all_recipients' => $relay_all_recipients,
|
|
':backupmx' => $backupmx,
|
|
':active' => $active,
|
|
':quota' => $quota,
|
|
':maxquota' => $maxquota,
|
|
':mailboxes' => $mailboxes,
|
|
':aliases' => $aliases,
|
|
':modified' => date('Y-m-d H:i:s'),
|
|
':description' => $description,
|
|
':domain' => $domain
|
|
));
|
|
$_SESSION['return'] = array(
|
|
'type' => 'success',
|
|
'msg' => sprintf($lang['success']['domain_modified'], htmlspecialchars($domain))
|
|
);
|
|
}
|
|
catch (PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
|
|
}
|
|
function edit_domain_admin($postarray) {
|
|
global $lang;
|
|
global $pdo;
|
|
$username = $postarray['username'];
|
|
$password = $postarray['password'];
|
|
$password2 = $postarray['password2'];
|
|
isset($postarray['active']) ? $active = '1' : $active = '0';
|
|
|
|
if ($_SESSION['mailcow_cc_role'] != "admin") {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['access_denied'])
|
|
);
|
|
return false;
|
|
}
|
|
|
|
foreach ($postarray['domain'] as $domain) {
|
|
if (!is_valid_domain_name($domain)) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['domain_invalid'])
|
|
);
|
|
return false;
|
|
}
|
|
}
|
|
|
|
if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['username_invalid'])
|
|
);
|
|
return false;
|
|
}
|
|
|
|
try {
|
|
$stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
|
|
$stmt->execute(array(
|
|
':username' => $username,
|
|
));
|
|
}
|
|
catch (PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
|
|
foreach ($postarray['domain'] as $domain) {
|
|
try {
|
|
$stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
|
|
VALUES (:username, :domain, :created, :active)");
|
|
$stmt->execute(array(
|
|
':username' => $username,
|
|
':domain' => $domain,
|
|
':created' => date('Y-m-d H:i:s'),
|
|
':active' => $active
|
|
));
|
|
}
|
|
catch (PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
}
|
|
|
|
if (!empty($password) && !empty($password2)) {
|
|
if ($password != $password2) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['password_mismatch'])
|
|
);
|
|
return false;
|
|
}
|
|
$password_hashed = hash_password($password);
|
|
try {
|
|
$stmt = $pdo->prepare("UPDATE `admin` SET `modified` = :modified, `active` = :active, `password` = :password_hashed WHERE `username` = :username");
|
|
$stmt->execute(array(
|
|
':password_hashed' => $password_hashed,
|
|
':username' => $username,
|
|
':modified' => date('Y-m-d H:i:s'),
|
|
':active' => $active
|
|
));
|
|
}
|
|
catch (PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
}
|
|
else {
|
|
try {
|
|
$stmt = $pdo->prepare("UPDATE `admin` SET `modified` = :modified, `active` = :active WHERE `username` = :username");
|
|
$stmt->execute(array(
|
|
':username' => $username,
|
|
':modified' => date('Y-m-d H:i:s'),
|
|
':active' => $active
|
|
));
|
|
}
|
|
catch (PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
}
|
|
|
|
$_SESSION['return'] = array(
|
|
'type' => 'success',
|
|
'msg' => sprintf($lang['success']['domain_admin_modified'], htmlspecialchars($username))
|
|
);
|
|
}
|
|
function mailbox_edit_mailbox($postarray) {
|
|
global $lang;
|
|
global $pdo;
|
|
isset($postarray['active']) ? $active = '1' : $active = '0';
|
|
if (!filter_var($postarray['username'], FILTER_VALIDATE_EMAIL)) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['username_invalid'])
|
|
);
|
|
return false;
|
|
}
|
|
$quota_m = $postarray['quota'];
|
|
$quota_b = $quota_m*1048576;
|
|
$username = $postarray['username'];
|
|
$name = $postarray['name'];
|
|
$password = $postarray['password'];
|
|
$password2 = $postarray['password2'];
|
|
|
|
try {
|
|
$stmt = $pdo->prepare("SELECT `domain`
|
|
FROM `mailbox`
|
|
WHERE username = :username");
|
|
$stmt->execute(array(':username' => $username));
|
|
$MailboxData1 = $stmt->fetch(PDO::FETCH_ASSOC);
|
|
|
|
$stmt = $pdo->prepare("SELECT
|
|
COALESCE(ROUND(SUM(`quota`)/1048576), 0) as `quota_m_now`
|
|
FROM `mailbox`
|
|
WHERE `username` = :username");
|
|
$stmt->execute(array(':username' => $username));
|
|
$MailboxData2 = $stmt->fetch(PDO::FETCH_ASSOC);
|
|
|
|
$stmt = $pdo->prepare("SELECT
|
|
COALESCE(ROUND(SUM(`quota`)/1048576), 0) as `quota_m_in_use`
|
|
FROM `mailbox`
|
|
WHERE `domain` = :domain");
|
|
$stmt->execute(array(':domain' => $MailboxData1['domain']));
|
|
$MailboxData3 = $stmt->fetch(PDO::FETCH_ASSOC);
|
|
|
|
$stmt = $pdo->prepare("SELECT `quota`, `maxquota`
|
|
FROM `domain`
|
|
WHERE `domain` = :domain");
|
|
$stmt->execute(array(':domain' => $MailboxData1['domain']));
|
|
$DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
|
|
}
|
|
catch(PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
|
|
if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $MailboxData1['domain'])) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['access_denied'])
|
|
);
|
|
return false;
|
|
}
|
|
if (!is_numeric($quota_m) || $quota_m == "0") {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['quota_not_0_not_numeric'], htmlspecialchars($quota_m))
|
|
);
|
|
return false;
|
|
}
|
|
if ($quota_m > $DomainData['maxquota']) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['mailbox_quota_exceeded'], $DomainData['maxquota'])
|
|
);
|
|
return false;
|
|
}
|
|
if (($MailboxData3['quota_m_in_use'] - $MailboxData2['quota_m_now'] + $quota_m) > $DomainData['quota']) {
|
|
$quota_left_m = ($DomainData['quota'] - $MailboxData3['quota_m_in_use'] + $MailboxData2['quota_m_now']);
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['mailbox_quota_left_exceeded'], $quota_left_m)
|
|
);
|
|
return false;
|
|
}
|
|
|
|
try {
|
|
$stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` = :username");
|
|
$stmt->execute(array(
|
|
':username' => $username
|
|
));
|
|
}
|
|
catch (PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
if (isset($postarray['sender_acl']) && is_array($postarray['sender_acl'])) {
|
|
foreach ($postarray['sender_acl'] as $sender_acl) {
|
|
if (!filter_var($sender_acl, FILTER_VALIDATE_EMAIL) &&
|
|
!is_valid_domain_name(str_replace('@', '', $sender_acl))) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['sender_acl_invalid'])
|
|
);
|
|
return false;
|
|
}
|
|
}
|
|
foreach ($postarray['sender_acl'] as $sender_acl) {
|
|
try {
|
|
$stmt = $pdo->prepare("INSERT INTO `sender_acl` (`send_as`, `logged_in_as`)
|
|
VALUES (:sender_acl, :username)");
|
|
$stmt->execute(array(
|
|
':sender_acl' => $sender_acl,
|
|
':username' => $username
|
|
));
|
|
}
|
|
catch (PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
}
|
|
}
|
|
if (!empty($password) && !empty($password2)) {
|
|
if ($password != $password2) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['password_mismatch'])
|
|
);
|
|
return false;
|
|
}
|
|
$password_hashed = hash_password($password);
|
|
try {
|
|
$stmt = $pdo->prepare("UPDATE `alias` SET
|
|
`modified` = :modified,
|
|
`active` = :active
|
|
WHERE `address` = :address");
|
|
$stmt->execute(array(
|
|
':address' => $username,
|
|
':modified' => date('Y-m-d H:i:s'),
|
|
':active' => $active
|
|
));
|
|
$stmt = $pdo->prepare("UPDATE `mailbox` SET
|
|
`modified` = :modified,
|
|
`active` = :active,
|
|
`password` = :password_hashed,
|
|
`name`= :name,
|
|
`quota` = :quota_b
|
|
WHERE `username` = :username");
|
|
$stmt->execute(array(
|
|
':modified' => date('Y-m-d H:i:s'),
|
|
':password_hashed' => $password_hashed,
|
|
':active' => $active,
|
|
':name' => $name,
|
|
':quota_b' => $quota_b,
|
|
':username' => $username
|
|
));
|
|
$_SESSION['return'] = array(
|
|
'type' => 'success',
|
|
'msg' => sprintf($lang['success']['mailbox_modified'], $username)
|
|
);
|
|
return true;
|
|
}
|
|
catch (PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
}
|
|
try {
|
|
$stmt = $pdo->prepare("UPDATE `alias` SET
|
|
`modified` = :modified,
|
|
`active` = :active
|
|
WHERE `address` = :address");
|
|
$stmt->execute(array(
|
|
':address' => $username,
|
|
':modified' => date('Y-m-d H:i:s'),
|
|
':active' => $active
|
|
));
|
|
$stmt = $pdo->prepare("UPDATE `mailbox` SET
|
|
`modified` = :modified,
|
|
`active` = :active,
|
|
`name`= :name,
|
|
`quota` = :quota_b
|
|
WHERE `username` = :username");
|
|
$stmt->execute(array(
|
|
':active' => $active,
|
|
':modified' => date('Y-m-d H:i:s'),
|
|
':name' => $name,
|
|
':quota_b' => $quota_b,
|
|
':username' => $username
|
|
));
|
|
$_SESSION['return'] = array(
|
|
'type' => 'success',
|
|
'msg' => sprintf($lang['success']['mailbox_modified'], $username)
|
|
);
|
|
return true;
|
|
}
|
|
catch (PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
}
|
|
function mailbox_delete_domain($postarray) {
|
|
global $lang;
|
|
global $pdo;
|
|
$domain = $postarray['domain'];
|
|
if ($_SESSION['mailcow_cc_role'] != "admin") {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['access_denied'])
|
|
);
|
|
return false;
|
|
}
|
|
if (!is_valid_domain_name($domain)) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['domain_invalid'])
|
|
);
|
|
return false;
|
|
}
|
|
$domain = strtolower(trim($domain));
|
|
|
|
|
|
try {
|
|
$stmt = $pdo->prepare("SELECT `username` FROM `mailbox`
|
|
WHERE `domain` = :domain");
|
|
$stmt->execute(array(':domain' => $domain));
|
|
$num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
|
|
}
|
|
catch(PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
if ($num_results != 0 || !empty($num_results)) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['domain_not_empty'])
|
|
);
|
|
return false;
|
|
}
|
|
|
|
try {
|
|
$stmt = $pdo->prepare("DELETE FROM `domain` WHERE `domain` = :domain");
|
|
$stmt->execute(array(
|
|
':domain' => $domain,
|
|
));
|
|
$stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `domain` = :domain");
|
|
$stmt->execute(array(
|
|
':domain' => $domain,
|
|
));
|
|
$stmt = $pdo->prepare("DELETE FROM `alias` WHERE `domain` = :domain");
|
|
$stmt->execute(array(
|
|
':domain' => $domain,
|
|
));
|
|
$stmt = $pdo->prepare("DELETE FROM `alias_domain` WHERE `target_domain` = :domain");
|
|
$stmt->execute(array(
|
|
':domain' => $domain,
|
|
));
|
|
$stmt = $pdo->prepare("DELETE FROM `mailbox` WHERE `domain` = :domain");
|
|
$stmt->execute(array(
|
|
':domain' => $domain,
|
|
));
|
|
$stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` LIKE :domain");
|
|
$stmt->execute(array(
|
|
':domain' => '%@'.$domain,
|
|
));
|
|
$stmt = $pdo->prepare("DELETE FROM `quota2` WHERE `username` = :domain");
|
|
$stmt->execute(array(
|
|
':domain' => '%@'.$domain,
|
|
));
|
|
$stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `address` = :domain");
|
|
$stmt->execute(array(
|
|
':domain' => '%@'.$domain,
|
|
));
|
|
$stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :domain");
|
|
$stmt->execute(array(
|
|
':domain' => '%@'.$domain,
|
|
));
|
|
}
|
|
catch (PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
$_SESSION['return'] = array(
|
|
'type' => 'success',
|
|
'msg' => sprintf($lang['success']['domain_removed'], htmlspecialchars($domain))
|
|
);
|
|
return true;
|
|
}
|
|
function mailbox_delete_alias($postarray) {
|
|
global $lang;
|
|
global $pdo;
|
|
$address = $postarray['address'];
|
|
$local_part = strstr($address, '@', true);
|
|
$domain = substr(strrchr($address, "@"), 1);
|
|
try {
|
|
$stmt = $pdo->prepare("SELECT `goto` FROM `alias` WHERE `address` = :address");
|
|
$stmt->execute(array(':address' => $address));
|
|
$gotos = $stmt->fetch(PDO::FETCH_ASSOC);
|
|
}
|
|
catch(PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
$goto_array = explode(',', $gotos['goto']);
|
|
|
|
if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['access_denied'])
|
|
);
|
|
return false;
|
|
}
|
|
try {
|
|
$stmt = $pdo->prepare("DELETE FROM `alias` WHERE `address` = :address AND `address` NOT IN (SELECT `username` FROM `mailbox`)");
|
|
$stmt->execute(array(
|
|
':address' => $address
|
|
));
|
|
}
|
|
catch (PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
$_SESSION['return'] = array(
|
|
'type' => 'success',
|
|
'msg' => sprintf($lang['success']['alias_removed'], htmlspecialchars($address))
|
|
);
|
|
|
|
}
|
|
function mailbox_delete_alias_domain($postarray) {
|
|
global $lang;
|
|
global $pdo;
|
|
if (!is_valid_domain_name($postarray['alias_domain'])) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['domain_invalid'])
|
|
);
|
|
return false;
|
|
}
|
|
$alias_domain = $postarray['alias_domain'];
|
|
try {
|
|
$stmt = $pdo->prepare("SELECT `target_domain` FROM `alias_domain`
|
|
WHERE `alias_domain`= :alias_domain");
|
|
$stmt->execute(array(':alias_domain' => $alias_domain));
|
|
$DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
|
|
}
|
|
catch(PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
|
|
if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $DomainData['target_domain'])) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['access_denied'])
|
|
);
|
|
return false;
|
|
}
|
|
|
|
try {
|
|
$stmt = $pdo->prepare("DELETE FROM `alias_domain` WHERE `alias_domain` = :alias_domain");
|
|
$stmt->execute(array(
|
|
':alias_domain' => $alias_domain,
|
|
));
|
|
}
|
|
catch (PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
$_SESSION['return'] = array(
|
|
'type' => 'success',
|
|
'msg' => sprintf($lang['success']['alias_domain_removed'], htmlspecialchars($alias_domain))
|
|
);
|
|
}
|
|
function mailbox_delete_mailbox($postarray) {
|
|
global $lang;
|
|
global $pdo;
|
|
$domain = substr(strrchr($postarray['username'], "@"), 1);
|
|
$username = $postarray['username'];
|
|
if (!filter_var($postarray['username'], FILTER_VALIDATE_EMAIL)) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['access_denied'])
|
|
);
|
|
return false;
|
|
}
|
|
if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['access_denied'])
|
|
);
|
|
return false;
|
|
}
|
|
|
|
try {
|
|
$stmt = $pdo->prepare("DELETE FROM `alias` WHERE `goto` = :username");
|
|
$stmt->execute(array(
|
|
':username' => $username
|
|
));
|
|
$stmt = $pdo->prepare("DELETE FROM `quota2` WHERE `username` = :username");
|
|
$stmt->execute(array(
|
|
':username' => $username
|
|
));
|
|
$stmt = $pdo->prepare("DELETE FROM `mailbox` WHERE `username` = :username");
|
|
$stmt->execute(array(
|
|
':username' => $username
|
|
));
|
|
$stmt = $pdo->prepare("DELETE FROM `sender_acl` WHERE `logged_in_as` = :username");
|
|
$stmt->execute(array(
|
|
':username' => $username
|
|
));
|
|
$stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `goto` = :username");
|
|
$stmt->execute(array(
|
|
':username' => $username
|
|
));
|
|
$stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :username");
|
|
$stmt->execute(array(
|
|
':username' => $username
|
|
));
|
|
$stmt = $pdo->prepare("SELECT `address`, `goto` FROM `alias`
|
|
WHERE `goto` LIKE :username");
|
|
$stmt->execute(array(':username' => '%'.$username.'%'));
|
|
$GotoData = $stmt->fetchAll(PDO::FETCH_ASSOC);
|
|
foreach ($GotoData as $gotos) {
|
|
$goto_exploded = explode(',', $gotos['goto']);
|
|
if (($key = array_search($username, $goto_exploded)) !== false) {
|
|
unset($goto_exploded[$key]);
|
|
}
|
|
$gotos_rebuild = implode(',', $goto_exploded);
|
|
$stmt = $pdo->prepare("UPDATE `alias` SET `goto` = :goto WHERE `address` = :address");
|
|
$stmt->execute(array(
|
|
':goto' => $gotos_rebuild,
|
|
':address' => $gotos['address']
|
|
));
|
|
}
|
|
}
|
|
catch (PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
$_SESSION['return'] = array(
|
|
'type' => 'success',
|
|
'msg' => sprintf($lang['success']['mailbox_removed'], htmlspecialchars($username))
|
|
);
|
|
}
|
|
function set_admin_account($postarray) {
|
|
global $lang;
|
|
global $pdo;
|
|
if ($_SESSION['mailcow_cc_role'] != "admin") {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['access_denied'])
|
|
);
|
|
return false;
|
|
}
|
|
$name = $postarray['admin_user'];
|
|
$name_now = $postarray['admin_user_now'];
|
|
|
|
if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $name)) || empty ($name)) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['username_invalid'])
|
|
);
|
|
return false;
|
|
}
|
|
if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $name_now)) || empty ($name_now)) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['username_invalid'])
|
|
);
|
|
return false;
|
|
}
|
|
if (!empty($postarray['admin_pass']) && !empty($postarray['admin_pass2'])) {
|
|
if ($postarray['admin_pass'] != $postarray['admin_pass2']) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['password_mismatch'])
|
|
);
|
|
return false;
|
|
}
|
|
$password_hashed = hash_password($postarray['admin_pass']);
|
|
try {
|
|
$stmt = $pdo->prepare("UPDATE `admin` SET
|
|
`modified` = :modified,
|
|
`password` = :password_hashed,
|
|
`username` = :name
|
|
WHERE `username` = :username");
|
|
$stmt->execute(array(
|
|
':password_hashed' => $password_hashed,
|
|
':modified' => date('Y-m-d H:i:s'),
|
|
':name' => $name,
|
|
':username' => $name_now
|
|
));
|
|
}
|
|
catch (PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
}
|
|
else {
|
|
try {
|
|
$stmt = $pdo->prepare("UPDATE `admin` SET
|
|
`modified` = :modified,
|
|
`username` = :name
|
|
WHERE `username` = :name_now");
|
|
$stmt->execute(array(
|
|
':name' => $name,
|
|
':modified' => date('Y-m-d H:i:s'),
|
|
':name_now' => $name_now
|
|
));
|
|
}
|
|
catch (PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
}
|
|
try {
|
|
$stmt = $pdo->prepare("UPDATE `domain_admins` SET
|
|
`domain` = :domain,
|
|
`username` = :name
|
|
WHERE `username` = :name_now");
|
|
$stmt->execute(array(
|
|
':domain' => 'ALL',
|
|
':name' => $name,
|
|
':name_now' => $name_now
|
|
));
|
|
}
|
|
catch (PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
$_SESSION['return'] = array(
|
|
'type' => 'success',
|
|
'msg' => sprintf($lang['success']['admin_modified'])
|
|
);
|
|
}
|
|
function set_time_limited_aliases($postarray) {
|
|
global $lang;
|
|
global $pdo;
|
|
$username = $_SESSION['mailcow_cc_username'];
|
|
$domain = substr($username, strpos($username, '@'));
|
|
if (($_SESSION['mailcow_cc_role'] != "user" &&
|
|
$_SESSION['mailcow_cc_role'] != "domainadmin") ||
|
|
empty($username) ||
|
|
empty($domain)) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['access_denied'])
|
|
);
|
|
return false;
|
|
}
|
|
switch ($postarray["trigger_set_time_limited_aliases"]) {
|
|
case "generate":
|
|
if (!is_numeric($postarray["validity"]) || $postarray["validity"] > 672) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['validity_missing'])
|
|
);
|
|
return false;
|
|
}
|
|
$validity = strtotime("+".$postarray["validity"]." hour");
|
|
$letters = 'abcefghijklmnopqrstuvwxyz1234567890';
|
|
$random_name = substr(str_shuffle($letters), 0, 24);
|
|
try {
|
|
$stmt = $pdo->prepare("INSERT INTO `spamalias` (`address`, `goto`, `validity`) VALUES
|
|
(:address, :goto, :validity)");
|
|
$stmt->execute(array(
|
|
':address' => $random_name.$domain,
|
|
':goto' => $username,
|
|
':validity' => $validity
|
|
));
|
|
}
|
|
catch (PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
$_SESSION['return'] = array(
|
|
'type' => 'success',
|
|
'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username))
|
|
);
|
|
break;
|
|
case "delete":
|
|
try {
|
|
$stmt = $pdo->prepare("DELETE FROM `spamalias` WHERE `goto` = :username");
|
|
$stmt->execute(array(
|
|
':username' => $username
|
|
));
|
|
}
|
|
catch (PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
$_SESSION['return'] = array(
|
|
'type' => 'success',
|
|
'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username))
|
|
);
|
|
break;
|
|
case "extend":
|
|
try {
|
|
$stmt = $pdo->prepare("UPDATE `spamalias` SET `validity` = (`validity` + 3600)
|
|
WHERE `goto` = :username
|
|
AND `validity` >= :validity");
|
|
$stmt->execute(array(
|
|
':username' => $username,
|
|
':validity' => time(),
|
|
));
|
|
}
|
|
catch (PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
$_SESSION['return'] = array(
|
|
'type' => 'success',
|
|
'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username))
|
|
);
|
|
break;
|
|
}
|
|
}
|
|
function set_user_account($postarray) {
|
|
global $lang;
|
|
global $pdo;
|
|
$username = $_SESSION['mailcow_cc_username'];
|
|
$password_old = $postarray['user_old_pass'];
|
|
isset($postarray['togglePwNew']) ? $pwnew_active = '1' : $pwnew_active = '0';
|
|
|
|
if (isset($pwnew_active) && $pwnew_active == "1") {
|
|
$password_new = $postarray['user_new_pass'];
|
|
$password_new2 = $postarray['user_new_pass2'];
|
|
}
|
|
|
|
if (!check_login($username, $password_old) == "user") {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['access_denied'])
|
|
);
|
|
return false;
|
|
}
|
|
|
|
if ($_SESSION['mailcow_cc_role'] != "user" &&
|
|
$_SESSION['mailcow_cc_role'] != "domainadmin") {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['access_denied'])
|
|
);
|
|
return false;
|
|
}
|
|
|
|
if (isset($password_new) && isset($password_new2)) {
|
|
if (!empty($password_new2) && !empty($password_new)) {
|
|
if ($password_new2 != $password_new) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['password_mismatch'])
|
|
);
|
|
return false;
|
|
}
|
|
if (strlen($password_new) < "6" ||
|
|
!preg_match('/[A-Za-z]/', $password_new) ||
|
|
!preg_match('/[0-9]/', $password_new)) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['password_complexity'])
|
|
);
|
|
return false;
|
|
}
|
|
$password_hashed = hash_password($password_new);
|
|
try {
|
|
$stmt = $pdo->prepare("UPDATE `mailbox` SET `modified` = :modified, `password` = :password_hashed WHERE `username` = :username");
|
|
$stmt->execute(array(
|
|
':password_hashed' => $password_hashed,
|
|
':modified' => date('Y-m-d H:i:s'),
|
|
':username' => $username
|
|
));
|
|
}
|
|
catch (PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
}
|
|
}
|
|
$_SESSION['return'] = array(
|
|
'type' => 'success',
|
|
'msg' => sprintf($lang['success']['mailbox_modified'], $username)
|
|
);
|
|
}
|
|
function add_domain_admin($postarray) {
|
|
global $lang;
|
|
global $pdo;
|
|
$username = strtolower(trim($postarray['username']));
|
|
$password = $postarray['password'];
|
|
$password2 = $postarray['password2'];
|
|
isset($postarray['active']) ? $active = '1' : $active = '0';
|
|
if ($_SESSION['mailcow_cc_role'] != "admin") {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['access_denied'])
|
|
);
|
|
return false;
|
|
}
|
|
if (empty($postarray['domain'])) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['domain_invalid'])
|
|
);
|
|
return false;
|
|
}
|
|
if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username)) || empty ($username)) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['username_invalid'])
|
|
);
|
|
return false;
|
|
}
|
|
try {
|
|
$stmt = $pdo->prepare("SELECT `username` FROM `mailbox`
|
|
WHERE `username` = :username");
|
|
$stmt->execute(array(':username' => $username));
|
|
$num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
|
|
|
|
$stmt = $pdo->prepare("SELECT `username` FROM `admin`
|
|
WHERE `username` = :username");
|
|
$stmt->execute(array(':username' => $username));
|
|
$num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
|
|
|
|
$stmt = $pdo->prepare("SELECT `username` FROM `domain_admins`
|
|
WHERE `username` = :username");
|
|
$stmt->execute(array(':username' => $username));
|
|
$num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
|
|
}
|
|
catch(PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
foreach ($num_results as $num_results_each) {
|
|
if ($num_results_each != 0) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['object_exists'], htmlspecialchars($username))
|
|
);
|
|
return false;
|
|
}
|
|
}
|
|
if (!empty($password) && !empty($password2)) {
|
|
if ($password != $password2) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['password_mismatch'])
|
|
);
|
|
return false;
|
|
}
|
|
$password_hashed = hash_password($password);
|
|
foreach ($postarray['domain'] as $domain) {
|
|
if (!is_valid_domain_name($domain)) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['domain_invalid'])
|
|
);
|
|
return false;
|
|
}
|
|
try {
|
|
$stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
|
|
VALUES (:username, :domain, :created, :active)");
|
|
$stmt->execute(array(
|
|
':username' => $username,
|
|
':domain' => $domain,
|
|
':created' => date('Y-m-d H:i:s'),
|
|
':active' => $active
|
|
));
|
|
}
|
|
catch (PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
}
|
|
try {
|
|
$stmt = $pdo->prepare("INSERT INTO `admin` (`username`, `password`, `superadmin`, `created`, `modified`, `active`)
|
|
VALUES (:username, :password_hashed, '0', :created, :modified, :active)");
|
|
$stmt->execute(array(
|
|
':username' => $username,
|
|
':password_hashed' => $password_hashed,
|
|
':created' => date('Y-m-d H:i:s'),
|
|
':modified' => date('Y-m-d H:i:s'),
|
|
':active' => $active
|
|
));
|
|
}
|
|
catch (PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
}
|
|
else {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['password_empty'])
|
|
);
|
|
return false;
|
|
}
|
|
$_SESSION['return'] = array(
|
|
'type' => 'success',
|
|
'msg' => sprintf($lang['success']['domain_admin_added'], htmlspecialchars($username))
|
|
);
|
|
}
|
|
function delete_domain_admin($postarray) {
|
|
global $pdo;
|
|
global $lang;
|
|
if ($_SESSION['mailcow_cc_role'] != "admin") {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['access_denied'])
|
|
);
|
|
return false;
|
|
}
|
|
$username = $postarray['username'];
|
|
if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['username_invalid'])
|
|
);
|
|
return false;
|
|
}
|
|
try {
|
|
$stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
|
|
$stmt->execute(array(
|
|
':username' => $username,
|
|
));
|
|
$stmt = $pdo->prepare("DELETE FROM `admin` WHERE `username` = :username");
|
|
$stmt->execute(array(
|
|
':username' => $username,
|
|
));
|
|
}
|
|
catch (PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
$_SESSION['return'] = array(
|
|
'type' => 'success',
|
|
'msg' => sprintf($lang['success']['domain_admin_removed'], htmlspecialchars($username))
|
|
);
|
|
}
|
|
function get_spam_score($username) {
|
|
global $pdo;
|
|
$default = "5, 15";
|
|
if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
|
|
return $default;
|
|
}
|
|
try {
|
|
$stmt = $pdo->prepare("SELECT `value` FROM `filterconf` WHERE `object` = :username AND
|
|
(`option` = 'lowspamlevel' OR `option` = 'highspamlevel')");
|
|
$stmt->execute(array(':username' => $username));
|
|
$num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
|
|
}
|
|
catch(PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
if ($num_results == 0 || empty ($num_results)) {
|
|
return $default;
|
|
}
|
|
else {
|
|
try {
|
|
$stmt = $pdo->prepare("SELECT `value` FROM `filterconf` WHERE `option` = 'highspamlevel' AND `object` = :username");
|
|
$stmt->execute(array(':username' => $username));
|
|
$highspamlevel = $stmt->fetch(PDO::FETCH_ASSOC);
|
|
|
|
$stmt = $pdo->prepare("SELECT `value` FROM `filterconf` WHERE `option` = 'lowspamlevel' AND `object` = :username");
|
|
$stmt->execute(array(':username' => $username));
|
|
$lowspamlevel = $stmt->fetch(PDO::FETCH_ASSOC);
|
|
|
|
return $lowspamlevel['value'].', '.$highspamlevel['value'];
|
|
}
|
|
catch(PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
}
|
|
}
|
|
function set_spam_score($postarray) {
|
|
global $lang;
|
|
global $pdo;
|
|
$username = $_SESSION['mailcow_cc_username'];
|
|
$lowspamlevel = explode(',', $postarray['score'])[0];
|
|
$highspamlevel = explode(',', $postarray['score'])[1];
|
|
if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['username_invalid'])
|
|
);
|
|
return false;
|
|
}
|
|
if (!is_numeric($lowspamlevel) || !is_numeric($highspamlevel)) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['access_denied'])
|
|
);
|
|
return false;
|
|
}
|
|
try {
|
|
$stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :username
|
|
AND (`option` = 'lowspamlevel' OR `option` = 'highspamlevel')");
|
|
$stmt->execute(array(
|
|
':username' => $username
|
|
));
|
|
|
|
$stmt = $pdo->prepare("INSERT INTO `filterconf` (`object`, `option`, `value`)
|
|
VALUES (:username, 'highspamlevel', :highspamlevel)");
|
|
$stmt->execute(array(
|
|
':username' => $username,
|
|
':highspamlevel' => $highspamlevel
|
|
));
|
|
|
|
$stmt = $pdo->prepare("INSERT INTO `filterconf` (`object`, `option`, `value`)
|
|
VALUES (:username, 'lowspamlevel', :lowspamlevel)");
|
|
$stmt->execute(array(
|
|
':username' => $username,
|
|
':lowspamlevel' => $lowspamlevel
|
|
));
|
|
}
|
|
catch (PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
$_SESSION['return'] = array(
|
|
'type' => 'success',
|
|
'msg' => sprintf($lang['success']['mailbox_modified'], $username)
|
|
);
|
|
}
|
|
function set_policy_list($postarray) {
|
|
global $lang;
|
|
global $pdo;
|
|
|
|
(isset($postarray['domain'])) ? $object = $postarray['domain'] : $object = $_SESSION['mailcow_cc_username'];
|
|
($postarray['object_list'] == "bl") ? $object_list = "blacklist_from" : $object_list = "whitelist_from";
|
|
$object_from = preg_replace('/\.+/', '.', rtrim(preg_replace("/\.\*/", "*", trim(strtolower($postarray['object_from']))), '.'));
|
|
if (!filter_var($object, FILTER_VALIDATE_EMAIL) && !is_valid_domain_name($object)) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['username_invalid'])
|
|
);
|
|
return false;
|
|
}
|
|
if (is_valid_domain_name($object)) {
|
|
if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $object)) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['access_denied'])
|
|
);
|
|
return false;
|
|
}
|
|
}
|
|
if (isset($postarray['prefid'])) {
|
|
if (!is_numeric($postarray['prefid'])) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['access_denied'])
|
|
);
|
|
return false;
|
|
}
|
|
try {
|
|
$stmt = $pdo->prepare("DELETE FROM `filterconf` WHERE `object` = :object AND `prefid` = :prefid");
|
|
$stmt->execute(array(
|
|
':object' => $object,
|
|
':prefid' => $postarray['prefid']
|
|
));
|
|
}
|
|
catch (PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
$_SESSION['return'] = array(
|
|
'type' => 'success',
|
|
'msg' => sprintf($lang['success']['mailbox_modified'], $object)
|
|
);
|
|
return true;
|
|
}
|
|
if (!ctype_alnum(str_replace(array('@', '.', '-', '*'), '', $object_from))) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['policy_list_from_invalid'])
|
|
);
|
|
return false;
|
|
}
|
|
try {
|
|
$stmt = $pdo->prepare("SELECT `object` FROM `filterconf`
|
|
WHERE (`option` = 'whitelist_from' OR `option` = 'blacklist_from')
|
|
AND `object` = :object
|
|
AND `value` = :object_from");
|
|
$stmt->execute(array(':object' => $object, ':object_from' => $object_from));
|
|
$num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
|
|
}
|
|
catch(PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
if ($num_results != 0) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['policy_list_from_exists'])
|
|
);
|
|
return false;
|
|
}
|
|
try {
|
|
$stmt = $pdo->prepare("INSERT INTO `filterconf` (`object`, `option` ,`value`)
|
|
VALUES (:object, :object_list, :object_from)");
|
|
$stmt->execute(array(
|
|
':object' => $object,
|
|
':object_list' => $object_list,
|
|
':object_from' => $object_from
|
|
));
|
|
}
|
|
catch (PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
$_SESSION['return'] = array(
|
|
'type' => 'success',
|
|
'msg' => sprintf($lang['success']['mailbox_modified'], $object)
|
|
);
|
|
}
|
|
function set_tls_policy($postarray) {
|
|
global $lang;
|
|
global $pdo;
|
|
isset($postarray['tls_in']) ? $tls_in = '1' : $tls_in = '0';
|
|
isset($postarray['tls_out']) ? $tls_out = '1' : $tls_out = '0';
|
|
$username = $_SESSION['mailcow_cc_username'];
|
|
if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['username_invalid'])
|
|
);
|
|
return false;
|
|
}
|
|
try {
|
|
$stmt = $pdo->prepare("UPDATE `mailbox` SET `tls_enforce_out` = :tls_out, `tls_enforce_in` = :tls_in WHERE `username` = :username");
|
|
$stmt->execute(array(
|
|
':tls_out' => $tls_out,
|
|
':tls_in' => $tls_in,
|
|
':username' => $username
|
|
));
|
|
}
|
|
catch (PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
$_SESSION['return'] = array(
|
|
'type' => 'success',
|
|
'msg' => sprintf($lang['success']['mailbox_modified'], $username)
|
|
);
|
|
}
|
|
function get_tls_policy($username) {
|
|
global $lang;
|
|
global $pdo;
|
|
if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => sprintf($lang['danger']['username_invalid'])
|
|
);
|
|
return false;
|
|
}
|
|
try {
|
|
$stmt = $pdo->prepare("SELECT `tls_enforce_out`, `tls_enforce_in` FROM `mailbox` WHERE `username` = :username");
|
|
$stmt->execute(array(':username' => $username));
|
|
$TLSData = $stmt->fetch(PDO::FETCH_ASSOC);
|
|
}
|
|
catch(PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
return $TLSData;
|
|
}
|
|
function remaining_specs($domain, $object = null, $js = null) {
|
|
// left_m without object given = MiB left in domain
|
|
// left_m with object given = Max. MiB we can assign to given object
|
|
// limit_m = Domain limit in MiB
|
|
// left_c = Mailboxes we can create depending on domain quota
|
|
global $pdo;
|
|
if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
|
|
return false;
|
|
}
|
|
try {
|
|
$stmt = $pdo->prepare("SELECT `mailboxes`, `maxquota`, `quota` FROM `domain` WHERE `domain` = :domain");
|
|
$stmt->execute(array(':domain' => $domain));
|
|
$DomainData = $stmt->fetch(PDO::FETCH_ASSOC);
|
|
|
|
$stmt = $pdo->prepare("SELECT COUNT(*) AS `count`, COALESCE(ROUND(SUM(`quota`)/1048576), 0) as `in_use_m` FROM `mailbox` WHERE `domain` = :domain AND `username` != :object");
|
|
$stmt->execute(array(':domain' => $domain, ':object' => $object));
|
|
$MailboxDataDomain = $stmt->fetch(PDO::FETCH_ASSOC);
|
|
|
|
$quota_left_m = $DomainData['quota'] - $MailboxDataDomain['in_use_m'];
|
|
$mboxs_left = $DomainData['mailboxes'] - $MailboxDataDomain['count'];
|
|
|
|
if ($quota_left_m > $DomainData['maxquota']) {
|
|
$quota_left_m = $DomainData['maxquota'];
|
|
}
|
|
|
|
}
|
|
catch (PDOException $e) {
|
|
return false;
|
|
}
|
|
if (is_numeric($quota_left_m)) {
|
|
$spec['left_m'] = $quota_left_m;
|
|
$spec['limit_m'] = $DomainData['maxquota'];
|
|
}
|
|
if (is_numeric($mboxs_left)) {
|
|
$spec['left_c'] = $mboxs_left;
|
|
}
|
|
if (!empty($js)) {
|
|
echo $quota_left_m;
|
|
exit;
|
|
}
|
|
return $spec;
|
|
}
|
|
function get_sender_acl_handles($mailbox, $which) {
|
|
global $pdo;
|
|
if ($_SESSION['mailcow_cc_role'] != "admin" && $_SESSION['mailcow_cc_role'] != "domainadmin") {
|
|
return false;
|
|
}
|
|
switch ($which) {
|
|
case "preselected":
|
|
try {
|
|
$stmt = $pdo->prepare("SELECT `address` FROM `alias` WHERE `goto` = :goto AND `address` NOT LIKE '@%'");
|
|
$stmt->execute(array(':goto' => $mailbox));
|
|
$rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
|
|
return $rows;
|
|
}
|
|
catch(PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
break;
|
|
case "selected":
|
|
try {
|
|
$stmt = $pdo->prepare("SELECT `send_as` FROM `sender_acl` WHERE `logged_in_as` = :logged_in_as");
|
|
$stmt->execute(array(':logged_in_as' => $mailbox));
|
|
$rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
|
|
return $rows;
|
|
}
|
|
catch(PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
break;
|
|
case "unselected-domains":
|
|
try {
|
|
if ($_SESSION['mailcow_cc_role'] == "admin" ) {
|
|
$stmt = $pdo->prepare("SELECT DISTINCT `domain` FROM `domain`
|
|
WHERE `domain` NOT IN (
|
|
SELECT REPLACE(`send_as`, '@', '') FROM `sender_acl`
|
|
WHERE `logged_in_as` = :logged_in_as)
|
|
AND `domain` NOT IN (
|
|
SELECT REPLACE(`address`, '@', '') FROM `alias`
|
|
WHERE `goto` = :goto)");
|
|
$stmt->execute(array(
|
|
':logged_in_as' => $mailbox,
|
|
':goto' => $mailbox,
|
|
));
|
|
}
|
|
else {
|
|
$stmt = $pdo->prepare("SELECT DISTINCT `domain` FROM `domain_admins`
|
|
WHERE `username` = :username
|
|
AND `domain` != 'ALL'
|
|
AND `domain` NOT IN (
|
|
SELECT REPLACE(`send_as`, '@', '') FROM `sender_acl`
|
|
WHERE `logged_in_as` = :logged_in_as)");
|
|
$stmt->execute(array(
|
|
':logged_in_as' => $mailbox,
|
|
':username' => $_SESSION['mailcow_cc_username']
|
|
));
|
|
}
|
|
$rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
|
|
return $rows;
|
|
}
|
|
catch(PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
break;
|
|
case "unselected-addresses":
|
|
try {
|
|
if ($_SESSION['mailcow_cc_role'] == "admin" ) {
|
|
$stmt = $pdo->prepare("SELECT `address` FROM `alias`
|
|
WHERE `goto` != :goto
|
|
AND `address` NOT IN (
|
|
SELECT `send_as` FROM `sender_acl`
|
|
WHERE `logged_in_as` = :logged_in_as)");
|
|
$stmt->execute(array(
|
|
':logged_in_as' => $mailbox,
|
|
':goto' => $mailbox
|
|
));
|
|
}
|
|
else {
|
|
$stmt = $pdo->prepare("SELECT `address` FROM `alias`
|
|
WHERE `goto` != :goto
|
|
AND `domain` IN (
|
|
SELECT `domain` FROM `domain_admins`
|
|
WHERE `username` = :username)
|
|
AND `address` NOT IN (
|
|
SELECT `send_as` FROM `sender_acl`
|
|
WHERE `logged_in_as` = :logged_in_as)");
|
|
$stmt->execute(array(
|
|
':logged_in_as' => $mailbox,
|
|
':goto' => $mailbox,
|
|
':username' => $_SESSION['mailcow_cc_username']
|
|
));
|
|
}
|
|
$rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
|
|
return $rows;
|
|
}
|
|
catch(PDOException $e) {
|
|
$_SESSION['return'] = array(
|
|
'type' => 'danger',
|
|
'msg' => 'MySQL: '.$e
|
|
);
|
|
return false;
|
|
}
|
|
break;
|
|
}
|
|
return false;
|
|
}
|
|
function is_valid_domain_name($domain_name) {
|
|
if (empty($domain_name)) {
|
|
return false;
|
|
}
|
|
$domain_name = idn_to_ascii($domain_name);
|
|
return (preg_match("/^([a-z\d](-*[a-z\d])*)(\.([a-z\d](-*[a-z\d])*))*$/i", $domain_name)
|
|
&& preg_match("/^.{1,253}$/", $domain_name)
|
|
&& preg_match("/^[^\.]{1,63}(\.[^\.]{1,63})*$/", $domain_name));
|
|
}
|
|
?>
|