triggers.inc.php 6.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207
  1. <?php
  2. // handle iam authentication
  3. if ($iam_provider){
  4. if (isset($_GET['iam_sso'])){
  5. // redirect for sso
  6. $redirect_uri = identity_provider('get-redirect', array('iam_provider' => $iam_provider));
  7. header('Location: ' . $redirect_uri);
  8. die();
  9. }
  10. if ($_SESSION['iam_token'] && $_SESSION['iam_refresh_token']) {
  11. // Session found, try to refresh
  12. $isRefreshed = identity_provider('refresh-token', array('iam_provider' => $iam_provider));
  13. if (!$isRefreshed){
  14. // Session could not be refreshed, clear and redirect to provider
  15. clear_session();
  16. $redirect_uri = identity_provider('get-redirect', array('iam_provider' => $iam_provider));
  17. header('Location: ' . $redirect_uri);
  18. die();
  19. }
  20. } elseif ($_GET['code'] && $_GET['state'] === $_SESSION['oauth2state']) {
  21. // Check given state against previously stored one to mitigate CSRF attack
  22. // Recieved access token in $_GET['code']
  23. // extract info and verify user
  24. identity_provider('verify-sso', array('iam_provider' => $iam_provider));
  25. }
  26. }
  27. if (isset($_GET['mutual_tls_login'])) {
  28. $mutual_login_user = user_mutualtls_login();
  29. if ($mutual_login_user != false) {
  30. $_SESSION['mailcow_cc_username'] = $mutual_login_user;
  31. $_SESSION['mailcow_cc_role'] = "user";
  32. $http_parameters = explode('&', $_SESSION['index_query_string']);
  33. unset($_SESSION['index_query_string']);
  34. if (in_array('mobileconfig', $http_parameters)) {
  35. if (in_array('only_email', $http_parameters)) {
  36. header("Location: /mobileconfig.php?only_email");
  37. die();
  38. }
  39. header("Location: /mobileconfig.php");
  40. die();
  41. }
  42. header("Location: /user");
  43. }
  44. }
  45. // SSO Domain Admin
  46. if (!empty($_GET['sso_token'])) {
  47. $username = domain_admin_sso('check', $_GET['sso_token']);
  48. if ($username !== false) {
  49. $_SESSION['mailcow_cc_username'] = $username;
  50. $_SESSION['mailcow_cc_role'] = 'domainadmin';
  51. header('Location: /mailbox');
  52. }
  53. }
  54. if (isset($_POST["verify_tfa_login"])) {
  55. if (verify_tfa_login($_SESSION['pending_mailcow_cc_username'], $_POST)) {
  56. $_SESSION['mailcow_cc_username'] = $_SESSION['pending_mailcow_cc_username'];
  57. $_SESSION['mailcow_cc_role'] = $_SESSION['pending_mailcow_cc_role'];
  58. unset($_SESSION['pending_mailcow_cc_username']);
  59. unset($_SESSION['pending_mailcow_cc_role']);
  60. unset($_SESSION['pending_tfa_methods']);
  61. header("Location: /user");
  62. } else {
  63. unset($_SESSION['pending_mailcow_cc_username']);
  64. unset($_SESSION['pending_mailcow_cc_role']);
  65. unset($_SESSION['pending_tfa_methods']);
  66. }
  67. }
  68. if (isset($_GET["cancel_tfa_login"])) {
  69. unset($_SESSION['pending_mailcow_cc_username']);
  70. unset($_SESSION['pending_mailcow_cc_role']);
  71. unset($_SESSION['pending_tfa_methods']);
  72. header("Location: /");
  73. }
  74. if (isset($_POST["quick_release"])) {
  75. quarantine('quick_release', $_POST["quick_release"]);
  76. }
  77. if (isset($_POST["quick_delete"])) {
  78. quarantine('quick_delete', $_POST["quick_delete"]);
  79. }
  80. if (isset($_POST["login_user"]) && isset($_POST["pass_user"])) {
  81. $login_user = strtolower(trim($_POST["login_user"]));
  82. $as = check_login($login_user, $_POST["pass_user"]);
  83. if ($as == "admin") {
  84. $_SESSION['mailcow_cc_username'] = $login_user;
  85. $_SESSION['mailcow_cc_role'] = "admin";
  86. header("Location: /admin");
  87. }
  88. elseif ($as == "domainadmin") {
  89. $_SESSION['mailcow_cc_username'] = $login_user;
  90. $_SESSION['mailcow_cc_role'] = "domainadmin";
  91. header("Location: /mailbox");
  92. }
  93. elseif ($as == "user") {
  94. $_SESSION['mailcow_cc_username'] = $login_user;
  95. $_SESSION['mailcow_cc_role'] = "user";
  96. $http_parameters = explode('&', $_SESSION['index_query_string']);
  97. unset($_SESSION['index_query_string']);
  98. if (in_array('mobileconfig', $http_parameters)) {
  99. if (in_array('only_email', $http_parameters)) {
  100. header("Location: /mobileconfig.php?only_email");
  101. die();
  102. }
  103. header("Location: /mobileconfig.php");
  104. die();
  105. }
  106. header("Location: /user");
  107. }
  108. elseif ($as != "pending") {
  109. unset($_SESSION['pending_mailcow_cc_username']);
  110. unset($_SESSION['pending_mailcow_cc_role']);
  111. unset($_SESSION['pending_tfa_methods']);
  112. unset($_SESSION['mailcow_cc_username']);
  113. unset($_SESSION['mailcow_cc_role']);
  114. }
  115. }
  116. if (isset($_SESSION['mailcow_cc_role']) && (isset($_SESSION['acl']['login_as']) && $_SESSION['acl']['login_as'] == "1")) {
  117. if (isset($_GET["duallogin"])) {
  118. $duallogin = html_entity_decode(rawurldecode($_GET["duallogin"]));
  119. if (filter_var($duallogin, FILTER_VALIDATE_EMAIL)) {
  120. if (!empty(mailbox('get', 'mailbox_details', $duallogin))) {
  121. $_SESSION["dual-login"]["username"] = $_SESSION['mailcow_cc_username'];
  122. $_SESSION["dual-login"]["role"] = $_SESSION['mailcow_cc_role'];
  123. $_SESSION['mailcow_cc_username'] = $duallogin;
  124. $_SESSION['mailcow_cc_role'] = "user";
  125. header("Location: /user");
  126. }
  127. }
  128. else {
  129. if (!empty(domain_admin('details', $duallogin))) {
  130. $_SESSION["dual-login"]["username"] = $_SESSION['mailcow_cc_username'];
  131. $_SESSION["dual-login"]["role"] = $_SESSION['mailcow_cc_role'];
  132. $_SESSION['mailcow_cc_username'] = $duallogin;
  133. $_SESSION['mailcow_cc_role'] = "domainadmin";
  134. header("Location: /user");
  135. }
  136. }
  137. }
  138. }
  139. if (isset($_SESSION['mailcow_cc_role'])) {
  140. if (isset($_POST["set_tfa"])) {
  141. set_tfa($_POST);
  142. }
  143. if (isset($_POST["unset_tfa_key"])) {
  144. unset_tfa_key($_POST);
  145. }
  146. if (isset($_POST["unset_fido2_key"])) {
  147. fido2(array("action" => "unset_fido2_key", "post_data" => $_POST));
  148. }
  149. }
  150. if (isset($_SESSION['mailcow_cc_role']) && $_SESSION['mailcow_cc_role'] == "admin" && !isset($_SESSION['mailcow_cc_api'])) {
  151. // TODO: Move file upload to API?
  152. if (isset($_POST["submit_main_logo"])) {
  153. if ($_FILES['main_logo']['error'] == 0) {
  154. customize('add', 'main_logo', $_FILES);
  155. }
  156. if ($_FILES['main_logo_dark']['error'] == 0) {
  157. customize('add', 'main_logo_dark', $_FILES);
  158. }
  159. }
  160. if (isset($_POST["reset_main_logo"])) {
  161. customize('delete', 'main_logo');
  162. customize('delete', 'main_logo_dark');
  163. }
  164. // Some actions will not be available via API
  165. if (isset($_POST["license_validate_now"])) {
  166. license('verify');
  167. }
  168. if (isset($_POST["admin_api"])) {
  169. if (isset($_POST["admin_api"]["ro"])) {
  170. admin_api('ro', 'edit', $_POST);
  171. }
  172. elseif (isset($_POST["admin_api"]["rw"])) {
  173. admin_api('rw', 'edit', $_POST);
  174. }
  175. }
  176. if (isset($_POST["admin_api_regen_key"])) {
  177. if (isset($_POST["admin_api_regen_key"]["ro"])) {
  178. admin_api('ro', 'regen_key', $_POST);
  179. }
  180. elseif (isset($_POST["admin_api_regen_key"]["rw"])) {
  181. admin_api('rw', 'regen_key', $_POST);
  182. }
  183. }
  184. if (isset($_POST["rspamd_ui"])) {
  185. rspamd_ui('edit', $_POST);
  186. }
  187. if (isset($_POST["mass_send"])) {
  188. sys_mail($_POST);
  189. }
  190. }
  191. ?>