functions.domain_admin.inc.php 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487
  1. <?php
  2. function domain_admin($_action, $_data = null) {
  3. global $pdo;
  4. global $lang;
  5. $_data_log = $_data;
  6. !isset($_data_log['password']) ?: $_data_log['password'] = '*';
  7. !isset($_data_log['password2']) ?: $_data_log['password2'] = '*';
  8. !isset($_data_log['user_old_pass']) ?: $_data_log['user_old_pass'] = '*';
  9. !isset($_data_log['user_new_pass']) ?: $_data_log['user_new_pass'] = '*';
  10. !isset($_data_log['user_new_pass2']) ?: $_data_log['user_new_pass2'] = '*';
  11. switch ($_action) {
  12. case 'add':
  13. $username = strtolower(trim($_data['username']));
  14. $password = $_data['password'];
  15. $password2 = $_data['password2'];
  16. $domains = (array)$_data['domains'];
  17. $active = intval($_data['active']);
  18. if ($_SESSION['mailcow_cc_role'] != "admin") {
  19. $_SESSION['return'][] = array(
  20. 'type' => 'danger',
  21. 'log' => array(__FUNCTION__, $_action, $_data_log),
  22. 'msg' => 'access_denied'
  23. );
  24. return false;
  25. }
  26. if (empty($domains)) {
  27. $_SESSION['return'][] = array(
  28. 'type' => 'danger',
  29. 'log' => array(__FUNCTION__, $_action, $_data_log),
  30. 'msg' => 'domain_invalid'
  31. );
  32. return false;
  33. }
  34. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username)) || empty ($username) || $username == 'API') {
  35. $_SESSION['return'][] = array(
  36. 'type' => 'danger',
  37. 'log' => array(__FUNCTION__, $_action, $_data_log),
  38. 'msg' => array('username_invalid', $username)
  39. );
  40. return false;
  41. }
  42. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox`
  43. WHERE `username` = :username");
  44. $stmt->execute(array(':username' => $username));
  45. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  46. $stmt = $pdo->prepare("SELECT `username` FROM `admin`
  47. WHERE `username` = :username");
  48. $stmt->execute(array(':username' => $username));
  49. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  50. $stmt = $pdo->prepare("SELECT `username` FROM `domain_admins`
  51. WHERE `username` = :username");
  52. $stmt->execute(array(':username' => $username));
  53. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  54. foreach ($num_results as $num_results_each) {
  55. if ($num_results_each != 0) {
  56. $_SESSION['return'][] = array(
  57. 'type' => 'danger',
  58. 'log' => array(__FUNCTION__, $_action, $_data_log),
  59. 'msg' => array('object_exists', htmlspecialchars($username))
  60. );
  61. return false;
  62. }
  63. }
  64. if (password_check($password, $password2) !== true) {
  65. continue;
  66. }
  67. $password_hashed = hash_password($password);
  68. $valid_domains = 0;
  69. foreach ($domains as $domain) {
  70. if (!is_valid_domain_name($domain) || mailbox('get', 'domain_details', $domain) === false) {
  71. $_SESSION['return'][] = array(
  72. 'type' => 'danger',
  73. 'log' => array(__FUNCTION__, $_action, $_data_log),
  74. 'msg' => array('domain_invalid', htmlspecialchars($domain))
  75. );
  76. continue;
  77. }
  78. $valid_domains++;
  79. $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
  80. VALUES (:username, :domain, :created, :active)");
  81. $stmt->execute(array(
  82. ':username' => $username,
  83. ':domain' => $domain,
  84. ':created' => date('Y-m-d H:i:s'),
  85. ':active' => $active
  86. ));
  87. }
  88. if ($valid_domains != 0) {
  89. $stmt = $pdo->prepare("INSERT INTO `admin` (`username`, `password`, `superadmin`, `active`)
  90. VALUES (:username, :password_hashed, '0', :active)");
  91. $stmt->execute(array(
  92. ':username' => $username,
  93. ':password_hashed' => $password_hashed,
  94. ':active' => $active
  95. ));
  96. }
  97. $stmt = $pdo->prepare("INSERT INTO `da_acl` (`username`) VALUES (:username)");
  98. $stmt->execute(array(
  99. ':username' => $username
  100. ));
  101. $_SESSION['return'][] = array(
  102. 'type' => 'success',
  103. 'log' => array(__FUNCTION__, $_action, $_data_log),
  104. 'msg' => array('domain_admin_added', htmlspecialchars($username))
  105. );
  106. break;
  107. case 'edit':
  108. if ($_SESSION['mailcow_cc_role'] != "admin" && $_SESSION['mailcow_cc_role'] != "domainadmin") {
  109. $_SESSION['return'][] = array(
  110. 'type' => 'danger',
  111. 'log' => array(__FUNCTION__, $_action, $_data_log),
  112. 'msg' => 'access_denied'
  113. );
  114. return false;
  115. }
  116. // Administrator
  117. if ($_SESSION['mailcow_cc_role'] == "admin") {
  118. if (!is_array($_data['username'])) {
  119. $usernames = array();
  120. $usernames[] = $_data['username'];
  121. }
  122. else {
  123. $usernames = $_data['username'];
  124. }
  125. foreach ($usernames as $username) {
  126. $is_now = domain_admin('details', $username);
  127. $domains = (isset($_data['domains'])) ? (array)$_data['domains'] : null;
  128. if (!empty($is_now)) {
  129. $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active'];
  130. $domains = (!empty($domains)) ? $domains : $is_now['selected_domains'];
  131. $username_new = (!empty($_data['username_new'])) ? $_data['username_new'] : $is_now['username'];
  132. }
  133. else {
  134. $_SESSION['return'][] = array(
  135. 'type' => 'danger',
  136. 'log' => array(__FUNCTION__, $_action, $_data_log),
  137. 'msg' => 'access_denied'
  138. );
  139. continue;
  140. }
  141. $password = $_data['password'];
  142. $password2 = $_data['password2'];
  143. if (!empty($domains)) {
  144. foreach ($domains as $domain) {
  145. if (!is_valid_domain_name($domain) || mailbox('get', 'domain_details', $domain) === false) {
  146. $_SESSION['return'][] = array(
  147. 'type' => 'danger',
  148. 'log' => array(__FUNCTION__, $_action, $_data_log),
  149. 'msg' => array('domain_invalid', htmlspecialchars($domain))
  150. );
  151. continue 2;
  152. }
  153. }
  154. }
  155. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username_new))) {
  156. $_SESSION['return'][] = array(
  157. 'type' => 'danger',
  158. 'log' => array(__FUNCTION__, $_action, $_data_log),
  159. 'msg' => array('username_invalid', $username_new)
  160. );
  161. continue;
  162. }
  163. if ($username_new != $username) {
  164. if (!empty(domain_admin('details', $username_new)['username'])) {
  165. $_SESSION['return'][] = array(
  166. 'type' => 'danger',
  167. 'log' => array(__FUNCTION__, $_action, $_data_log),
  168. 'msg' => array('username_invalid', $username_new)
  169. );
  170. continue;
  171. }
  172. }
  173. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
  174. $stmt->execute(array(
  175. ':username' => $username,
  176. ));
  177. $stmt = $pdo->prepare("UPDATE `da_acl` SET `username` = :username_new WHERE `username` = :username");
  178. $stmt->execute(array(
  179. ':username_new' => $username_new,
  180. ':username' => $username
  181. ));
  182. if (!empty($domains)) {
  183. foreach ($domains as $domain) {
  184. $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
  185. VALUES (:username_new, :domain, :created, :active)");
  186. $stmt->execute(array(
  187. ':username_new' => $username_new,
  188. ':domain' => $domain,
  189. ':created' => date('Y-m-d H:i:s'),
  190. ':active' => $active
  191. ));
  192. }
  193. }
  194. $force_tfa = intval($_data['force_tfa'] ?? 0) ? 1 : 0;
  195. $force_pw_update = intval($_data['force_pw_update'] ?? 0) ? 1 : 0;
  196. if (!empty($password)) {
  197. if (password_check($password, $password2) !== true) {
  198. return false;
  199. }
  200. $password_hashed = hash_password($password);
  201. $stmt = $pdo->prepare("UPDATE `admin` SET `username` = :username_new, `active` = :active, `password` = :password_hashed,
  202. `attributes` = JSON_SET(COALESCE(`attributes`, '{}'), '$.force_tfa', :force_tfa, '$.force_pw_update', :force_pw_update)
  203. WHERE `username` = :username");
  204. $stmt->execute(array(
  205. ':password_hashed' => $password_hashed,
  206. ':username_new' => $username_new,
  207. ':username' => $username,
  208. ':active' => $active,
  209. ':force_tfa' => strval($force_tfa),
  210. ':force_pw_update' => strval($force_pw_update)
  211. ));
  212. if (isset($_data['disable_tfa'])) {
  213. $stmt = $pdo->prepare("UPDATE `tfa` SET `active` = '0' WHERE `username` = :username");
  214. $stmt->execute(array(':username' => $username));
  215. }
  216. else {
  217. $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username_new WHERE `username` = :username");
  218. $stmt->execute(array(':username_new' => $username_new, ':username' => $username));
  219. }
  220. }
  221. else {
  222. $stmt = $pdo->prepare("UPDATE `admin` SET `username` = :username_new, `active` = :active,
  223. `attributes` = JSON_SET(COALESCE(`attributes`, '{}'), '$.force_tfa', :force_tfa, '$.force_pw_update', :force_pw_update)
  224. WHERE `username` = :username");
  225. $stmt->execute(array(
  226. ':username_new' => $username_new,
  227. ':username' => $username,
  228. ':active' => $active,
  229. ':force_tfa' => strval($force_tfa),
  230. ':force_pw_update' => strval($force_pw_update)
  231. ));
  232. if (isset($_data['disable_tfa'])) {
  233. $stmt = $pdo->prepare("UPDATE `tfa` SET `active` = '0' WHERE `username` = :username");
  234. $stmt->execute(array(':username' => $username));
  235. }
  236. else {
  237. $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username_new WHERE `username` = :username");
  238. $stmt->execute(array(':username_new' => $username_new, ':username' => $username));
  239. }
  240. }
  241. $_SESSION['return'][] = array(
  242. 'type' => 'success',
  243. 'log' => array(__FUNCTION__, $_action, $_data_log),
  244. 'msg' => array('domain_admin_modified', htmlspecialchars($username))
  245. );
  246. }
  247. return true;
  248. }
  249. // Domain administrator
  250. // Can only edit itself
  251. elseif ($_SESSION['mailcow_cc_role'] == "domainadmin") {
  252. $username = $_SESSION['mailcow_cc_username'];
  253. $password_old = $_data['user_old_pass'] ?? '';
  254. $password_new = $_data['user_new_pass'];
  255. $password_new2 = $_data['user_new_pass2'];
  256. // Only verify old password if this is NOT a forced password update
  257. if (empty($_SESSION['pending_pw_update'])) {
  258. $stmt = $pdo->prepare("SELECT `password` FROM `admin`
  259. WHERE `username` = :user");
  260. $stmt->execute(array(':user' => $username));
  261. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  262. if (!verify_hash($row['password'], $password_old)) {
  263. $_SESSION['return'][] = array(
  264. 'type' => 'danger',
  265. 'log' => array(__FUNCTION__, $_action, $_data_log),
  266. 'msg' => 'access_denied'
  267. );
  268. return false;
  269. }
  270. }
  271. if (password_check($password_new, $password_new2) !== true) {
  272. return false;
  273. }
  274. $password_hashed = hash_password($password_new);
  275. $stmt = $pdo->prepare("UPDATE `admin` SET `password` = :password_hashed,
  276. `attributes` = JSON_SET(COALESCE(`attributes`, '{}'), '$.force_pw_update', '0')
  277. WHERE `username` = :username");
  278. $stmt->execute(array(
  279. ':password_hashed' => $password_hashed,
  280. ':username' => $username
  281. ));
  282. unset($_SESSION['pending_pw_update']);
  283. $_SESSION['return'][] = array(
  284. 'type' => 'success',
  285. 'log' => array(__FUNCTION__, $_action, $_data_log),
  286. 'msg' => array('domain_admin_modified', htmlspecialchars($username))
  287. );
  288. }
  289. break;
  290. case 'delete':
  291. if ($_SESSION['mailcow_cc_role'] != "admin") {
  292. $_SESSION['return'][] = array(
  293. 'type' => 'danger',
  294. 'log' => array(__FUNCTION__, $_action, $_data_log),
  295. 'msg' => 'access_denied'
  296. );
  297. return false;
  298. }
  299. $usernames = (array)$_data['username'];
  300. foreach ($usernames as $username) {
  301. if (empty(domain_admin('details', $username))) {
  302. $_SESSION['return'][] = array(
  303. 'type' => 'danger',
  304. 'log' => array(__FUNCTION__, $_action, $_data_log),
  305. 'msg' => array('username_invalid', $username)
  306. );
  307. continue;
  308. }
  309. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
  310. $stmt->execute(array(
  311. ':username' => $username,
  312. ));
  313. $stmt = $pdo->prepare("DELETE FROM `admin` WHERE `username` = :username");
  314. $stmt->execute(array(
  315. ':username' => $username,
  316. ));
  317. $stmt = $pdo->prepare("DELETE FROM `da_acl` WHERE `username` = :username");
  318. $stmt->execute(array(
  319. ':username' => $username,
  320. ));
  321. $stmt = $pdo->prepare("DELETE FROM `tfa` WHERE `username` = :username");
  322. $stmt->execute(array(
  323. ':username' => $username,
  324. ));
  325. $stmt = $pdo->prepare("DELETE FROM `fido2` WHERE `username` = :username");
  326. $stmt->execute(array(
  327. ':username' => $username,
  328. ));
  329. $_SESSION['return'][] = array(
  330. 'type' => 'success',
  331. 'log' => array(__FUNCTION__, $_action, $_data_log),
  332. 'msg' => array('domain_admin_removed', htmlspecialchars($username))
  333. );
  334. }
  335. break;
  336. case 'get':
  337. $domainadmins = array();
  338. if ($_SESSION['mailcow_cc_role'] != "admin") {
  339. $_SESSION['return'][] = array(
  340. 'type' => 'danger',
  341. 'log' => array(__FUNCTION__, $_action, $_data_log),
  342. 'msg' => 'access_denied'
  343. );
  344. return false;
  345. }
  346. $stmt = $pdo->query("SELECT DISTINCT
  347. `username`
  348. FROM `domain_admins`
  349. WHERE `username` IN (
  350. SELECT `username` FROM `admin`
  351. WHERE `superadmin`!='1'
  352. )");
  353. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  354. while ($row = array_shift($rows)) {
  355. $domainadmins[] = $row['username'];
  356. }
  357. return $domainadmins;
  358. break;
  359. case 'details':
  360. $domainadmindata = array();
  361. if ($_SESSION['mailcow_cc_role'] == "domainadmin" && $_data != $_SESSION['mailcow_cc_username']) {
  362. return false;
  363. }
  364. elseif ($_SESSION['mailcow_cc_role'] != "admin" || !isset($_data)) {
  365. return false;
  366. }
  367. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $_data))) {
  368. return false;
  369. }
  370. $stmt = $pdo->prepare("SELECT
  371. `tfa`.`active` AS `tfa_active`,
  372. `domain_admins`.`username`,
  373. `domain_admins`.`created`,
  374. `domain_admins`.`active` AS `active`,
  375. `admin`.`attributes` AS `attributes`
  376. FROM `domain_admins`
  377. LEFT OUTER JOIN `tfa` ON `tfa`.`username`=`domain_admins`.`username`
  378. LEFT OUTER JOIN `admin` ON `admin`.`username`=`domain_admins`.`username`
  379. WHERE `domain_admins`.`username`= :domain_admin");
  380. $stmt->execute(array(
  381. ':domain_admin' => $_data
  382. ));
  383. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  384. if (empty($row)) {
  385. return false;
  386. }
  387. $domainadmindata['username'] = $row['username'];
  388. $domainadmindata['tfa_active'] = (is_null($row['tfa_active'])) ? 0 : $row['tfa_active'];
  389. $domainadmindata['tfa_active_int'] = (is_null($row['tfa_active'])) ? 0 : $row['tfa_active'];
  390. $domainadmindata['active'] = $row['active'];
  391. $domainadmindata['active_int'] = $row['active'];
  392. $domainadmindata['created'] = $row['created'];
  393. $domainadmindata['attributes'] = json_decode($row['attributes'], true) ?? array('force_tfa' => '0', 'force_pw_update' => '0');
  394. // GET SELECTED
  395. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  396. WHERE `domain` IN (
  397. SELECT `domain` FROM `domain_admins`
  398. WHERE `username`= :domain_admin)");
  399. $stmt->execute(array(':domain_admin' => $_data));
  400. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  401. while($row = array_shift($rows)) {
  402. $domainadmindata['selected_domains'][] = $row['domain'];
  403. }
  404. // GET UNSELECTED
  405. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  406. WHERE `domain` NOT IN (
  407. SELECT `domain` FROM `domain_admins`
  408. WHERE `username`= :domain_admin)");
  409. $stmt->execute(array(':domain_admin' => $_data));
  410. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  411. while($row = array_shift($rows)) {
  412. $domainadmindata['unselected_domains'][] = $row['domain'];
  413. }
  414. if (!isset($domainadmindata['unselected_domains'])) {
  415. $domainadmindata['unselected_domains'] = "";
  416. }
  417. return $domainadmindata;
  418. break;
  419. }
  420. }
  421. function domain_admin_sso($_action, $_data) {
  422. global $pdo;
  423. switch ($_action) {
  424. case 'check':
  425. $token = $_data;
  426. $stmt = $pdo->prepare("SELECT `t1`.`username` FROM `da_sso` AS `t1` JOIN `admin` AS `t2` ON `t1`.`username` = `t2`.`username` WHERE `t1`.`token` = :token AND `t1`.`created` > DATE_SUB(NOW(), INTERVAL '30' SECOND) AND `t2`.`active` = 1 AND `t2`.`superadmin` = 0;");
  427. $stmt->execute(array(
  428. ':token' => preg_replace('/[^a-zA-Z0-9-]/', '', $token)
  429. ));
  430. $return = $stmt->fetch(PDO::FETCH_ASSOC);
  431. return empty($return['username']) ? false : $return['username'];
  432. case 'issue':
  433. if ($_SESSION['mailcow_cc_role'] != "admin") {
  434. $_SESSION['return'][] = array(
  435. 'type' => 'danger',
  436. 'log' => array(__FUNCTION__, $_action, $_data),
  437. 'msg' => 'access_denied'
  438. );
  439. return false;
  440. }
  441. $username = $_data['username'];
  442. $stmt = $pdo->prepare("SELECT `username` FROM `domain_admins`
  443. WHERE `username` = :username");
  444. $stmt->execute(array(':username' => $username));
  445. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  446. if ($num_results < 1) {
  447. $_SESSION['return'][] = array(
  448. 'type' => 'danger',
  449. 'log' => array(__FUNCTION__, $_action, $_data),
  450. 'msg' => array('object_doesnt_exist', htmlspecialchars($username))
  451. );
  452. return false;
  453. }
  454. $token = implode('-', array(
  455. strtoupper(bin2hex(random_bytes(3))),
  456. strtoupper(bin2hex(random_bytes(3))),
  457. strtoupper(bin2hex(random_bytes(3))),
  458. strtoupper(bin2hex(random_bytes(3))),
  459. strtoupper(bin2hex(random_bytes(3)))
  460. ));
  461. $stmt = $pdo->prepare("INSERT INTO `da_sso` (`username`, `token`)
  462. VALUES (:username, :token)");
  463. $stmt->execute(array(
  464. ':username' => $username,
  465. ':token' => $token
  466. ));
  467. // perform cleanup
  468. $pdo->query("DELETE FROM `da_sso` WHERE created < DATE_SUB(NOW(), INTERVAL '30' SECOND);");
  469. return ['token' => $token];
  470. break;
  471. }
  472. }