1: | <?php |
2: | declare(strict_types=1); |
3: | |
4: | |
5: | |
6: | |
7: | |
8: | |
9: | |
10: | |
11: | |
12: | |
13: | |
14: | |
15: | use Module\Provider; |
16: | use Module\Skeleton\Contracts\Hookable; |
17: | use Module\Skeleton\Contracts\Proxied; |
18: | use Module\Skeleton\Contracts\Reactive; |
19: | use Module\Skeleton\Contracts\Tasking; |
20: | use Opcenter\Account\Enumerate; |
21: | use Opcenter\Crypto\Ssl; |
22: | use Opcenter\Database\PostgreSQL\EscapePolyfill\{function pg_escape_literal, function pg_escape_string}; |
23: | use Opcenter\Dns\Record; |
24: | use Opcenter\Filesystem; |
25: | use Opcenter\Mail\Services\Dovecot; |
26: | use Opcenter\Mail\Services\Haproxy; |
27: | use Opcenter\Mail\Services\Postfix; |
28: | use Opcenter\Mail\Services\Postsrsd; |
29: | use Opcenter\Mail\Services\Rspamd\Dkim; |
30: | use Opcenter\Mail\Services\Webmail; |
31: | use Opcenter\Mail\Storage; |
32: | use Opcenter\Mail\Vacation; |
33: | use Opcenter\Service\ConfigurationContext; |
34: | |
35: | |
36: | |
37: | |
38: | |
39: | |
40: | class Email_Module extends Module_Skeleton implements Hookable, Proxied, Reactive, Tasking |
41: | { |
42: | const DEPENDENCY_MAP = [ |
43: | 'siteinfo', |
44: | 'ipinfo', |
45: | 'ipinfo6', |
46: | 'users', |
47: | 'aliases', |
48: | 'dns' |
49: | ]; |
50: | const MAILDIR_HOME = Storage::MAILDIR_HOME; |
51: | const MAILBOX_SPECIAL = 's'; |
52: | const MAILBOX_FORWARD = 'a'; |
53: | const MAILBOX_USER = 'v'; |
54: | const MAILBOX_DISABLED = 'd'; |
55: | const MAILBOX_ENABLED = 'e'; |
56: | const MAILBOX_SINGLE = '1'; |
57: | const MAILBOX_DESTINATION = 'destination'; |
58: | |
59: | const MAILBOX_SAVE_DEFAULT = 'email_addr'; |
60: | |
61: | const VACATION_PREFKEY = 'mail.vacapref'; |
62: | |
63: | const POSTFIX_CMD = '/usr/sbin/postfix'; |
64: | const SSL_PROXY_DIR = '/etc/haproxy/ssl.d'; |
65: | private $_webmail = array( |
66: | 'sqmail' => array( |
67: | 'subdomain' => 'mail', |
68: | 'path' => '/var/www/html/mail' |
69: | ), |
70: | 'horde' => array( |
71: | 'subdomain' => 'horde', |
72: | 'path' => '/var/www/html/horde' |
73: | ), |
74: | 'roundcube' => array( |
75: | 'subdomain' => 'roundcube', |
76: | 'path' => '/var/www/html/roundcube' |
77: | ) |
78: | ); |
79: | |
80: | protected $exportedFunctions = [ |
81: | 'address_exists' => PRIVILEGE_SITE | PRIVILEGE_USER, |
82: | 'create_maildir_backend' => PRIVILEGE_SITE | PRIVILEGE_SERVER_EXEC, |
83: | 'get_spool_size_backend' => PRIVILEGE_SITE | PRIVILEGE_SERVER_EXEC, |
84: | |
85: | 'add_vacation' => PRIVILEGE_SITE | PRIVILEGE_USER, |
86: | 'add_vacation_backend' => PRIVILEGE_SITE | PRIVILEGE_USER, |
87: | 'set_vacation' => PRIVILEGE_SITE | PRIVILEGE_USER, |
88: | 'set_vacation_options' => PRIVILEGE_SITE | PRIVILEGE_USER, |
89: | 'get_vacation_options' => PRIVILEGE_SITE | PRIVILEGE_USER, |
90: | 'vacation_exists' => PRIVILEGE_SITE | PRIVILEGE_USER, |
91: | 'enable_vacation' => PRIVILEGE_SITE | PRIVILEGE_USER, |
92: | 'remove_vacation' => PRIVILEGE_SITE | PRIVILEGE_USER, |
93: | 'get_vacation_message' => PRIVILEGE_SITE | PRIVILEGE_USER, |
94: | 'change_vacation_message' => PRIVILEGE_SITE | PRIVILEGE_USER, |
95: | 'get_webmail_location' => PRIVILEGE_SITE | PRIVILEGE_USER, |
96: | 'webmail_apps' => PRIVILEGE_SITE | PRIVILEGE_USER, |
97: | 'create_maildir' => PRIVILEGE_SITE | PRIVILEGE_USER, |
98: | 'remove_maildir' => PRIVILEGE_SITE | PRIVILEGE_USER, |
99: | 'user_enabled' => PRIVILEGE_SITE | PRIVILEGE_USER, |
100: | 'user_permitted' => PRIVILEGE_SITE | PRIVILEGE_USER, |
101: | 'get_mail_ip' => PRIVILEGE_SITE | PRIVILEGE_USER, |
102: | 'user_mailboxes' => PRIVILEGE_SITE | PRIVILEGE_USER, |
103: | 'convert_mailbox' => PRIVILEGE_SITE | PRIVILEGE_USER, |
104: | 'roll_srs' => PRIVILEGE_ADMIN, |
105: | '*' => PRIVILEGE_SITE, |
106: | 'get_provider' => PRIVILEGE_ALL, |
107: | 'configured' => PRIVILEGE_ALL, |
108: | 'providers' => PRIVILEGE_ADMIN, |
109: | 'merge_ssl' => PRIVILEGE_ADMIN, |
110: | ]; |
111: | |
112: | |
113: | public function _proxy(): \Module_Skeleton |
114: | { |
115: | $provider = $this->get_provider(); |
116: | |
117: | if ($provider === \Opcenter\Service\Contracts\DefaultNullable::NULLABLE_MARKER) { |
118: | |
119: | |
120: | |
121: | $provider = \Opcenter\Mail::default(); |
122: | } |
123: | |
124: | if ($provider === 'builtin') { |
125: | return $this; |
126: | } |
127: | |
128: | return Provider::get('mail', $provider, $this->getAuthContext()); |
129: | } |
130: | |
131: | |
132: | |
133: | |
134: | |
135: | |
136: | public function get_provider(): string |
137: | { |
138: | $provider = $this->getServiceValue('mail', 'provider', \Opcenter\Mail::default()); |
139: | |
140: | if ($provider === \Opcenter\Service\Contracts\DefaultNullable::NULLABLE_MARKER) { |
141: | |
142: | |
143: | |
144: | $provider = \Opcenter\Mail::default(); |
145: | } |
146: | |
147: | if ($this->permission_level & PRIVILEGE_SITE|PRIVILEGE_USER) { |
148: | if (self::class !== static::class && !$this->enabled()) { |
149: | |
150: | return 'null'; |
151: | } |
152: | return $provider; |
153: | } |
154: | |
155: | return \Opcenter\Mail::default(); |
156: | } |
157: | |
158: | |
159: | |
160: | |
161: | |
162: | |
163: | public function configured(): bool |
164: | { |
165: | return $this->get_provider() === 'builtin'; |
166: | } |
167: | |
168: | |
169: | |
170: | |
171: | |
172: | |
173: | public function providers(): array |
174: | { |
175: | return \Opcenter\Mail::providers(); |
176: | } |
177: | |
178: | public function list_aliases() |
179: | { |
180: | return $this->list_mailboxes('forward'); |
181: | } |
182: | |
183: | |
184: | |
185: | |
186: | |
187: | |
188: | public function user_mailboxes(string $username = null) |
189: | { |
190: | if ($username && ($this->permission_level & PRIVILEGE_USER)) { |
191: | return error('%(param)s disallowed as user', ['$username']); |
192: | } |
193: | $username = $username ?? $this->username; |
194: | if (!$this->user_exists($username)) { |
195: | return error('user %s does not exist', $username); |
196: | } |
197: | |
198: | if (!$uid = $this->user_get_uid_from_username($username)) { |
199: | return false; |
200: | } |
201: | |
202: | $q = 'SELECT |
203: | CONCAT("user", \'@\', e1."domain") AS email |
204: | FROM email_lookup e1 |
205: | JOIN domain_lookup USING (domain) |
206: | WHERE |
207: | domain_lookup.site_id = ' . $this->site_id . ' AND |
208: | uid = ' . $uid . ' AND type = \'' . self::MAILBOX_USER . '\''; |
209: | |
210: | $addresses = []; |
211: | |
212: | $pgdb = \PostgreSQL::initialize(); |
213: | $pgdb->query($q); |
214: | while (null !== ($row = $pgdb->fetch_object())) { |
215: | $addresses[] = $row->email; |
216: | } |
217: | return $addresses; |
218: | } |
219: | |
220: | |
221: | |
222: | |
223: | |
224: | |
225: | |
226: | |
227: | |
228: | |
229: | |
230: | public function list_mailboxes($filter = null, $address = null, $domain = null) |
231: | { |
232: | $filter_clause = '1=1'; |
233: | |
234: | |
235: | if ($filter == 'forward') { |
236: | $filter = self::MAILBOX_FORWARD; |
237: | } else if ($filter == 'local') { |
238: | $filter = self::MAILBOX_USER; |
239: | } else if ($filter == 'special') { |
240: | $filter = self::MAILBOX_SPECIAL; |
241: | } else if ($filter == 'disabled') { |
242: | $filter = self::MAILBOX_DISABLED; |
243: | } else if ($filter == 'enabled') { |
244: | $filter = self::MAILBOX_ENABLED; |
245: | } |
246: | |
247: | if ($filter && !in_array($filter, array( |
248: | self::MAILBOX_FORWARD, |
249: | self::MAILBOX_USER, |
250: | self::MAILBOX_SPECIAL, |
251: | self::MAILBOX_DISABLED, |
252: | self::MAILBOX_ENABLED, |
253: | self::MAILBOX_SINGLE, |
254: | self::MAILBOX_DESTINATION |
255: | )) |
256: | ) { |
257: | return error("invalid filter specification `%s'", $filter); |
258: | } |
259: | |
260: | if ($filter == self::MAILBOX_FORWARD) { |
261: | $filter_clause = 'type = \'' . self::MAILBOX_FORWARD . '\''; |
262: | } else if ($filter == self::MAILBOX_USER) { |
263: | $filter_clause = 'type = \'' . self::MAILBOX_USER . '\''; |
264: | } else if ($filter == self::MAILBOX_SPECIAL) { |
265: | |
266: | } else if ($filter == self::MAILBOX_SINGLE) { |
267: | $filter_clause = 'email_lookup."user" ' . (false !== strpos($address, |
268: | '%') ? 'LIKE' : '=') . ' \'' . pg_escape_string($address) . '\''; |
269: | } else if ($filter == self::MAILBOX_ENABLED) { |
270: | $filter_clause = 'enabled = 1::bit'; |
271: | } else if ($filter == self::MAILBOX_DISABLED) { |
272: | $filter_clause = 'enabled = 0::bit'; |
273: | } else if ($filter == self::MAILBOX_DESTINATION) { |
274: | $filter_clause = 'COALESCE(uids."user",alias_destination) = ' . pg_escape_literal($address); |
275: | } |
276: | |
277: | if (null !== $address && $filter !== self::MAILBOX_DESTINATION) { |
278: | |
279: | $filter_clause .= ' AND email_lookup.user = \'' . pg_escape_string(strtolower($address)) . '\''; |
280: | } |
281: | if ($domain) { |
282: | $filter_clause .= ' AND email_lookup.domain = \'' . pg_escape_string(strtolower($domain)) . '\''; |
283: | } |
284: | $mailboxes = array(); |
285: | $query = ' |
286: | SELECT |
287: | email_lookup."user", |
288: | email_lookup.domain as domain, |
289: | type, |
290: | enabled, |
291: | fs_destination AS target, |
292: | uid, |
293: | COALESCE(uids."user",alias_destination) as destination |
294: | FROM |
295: | email_lookup |
296: | JOIN |
297: | domain_lookup |
298: | ON |
299: | (email_lookup.domain = domain_lookup.domain) |
300: | LEFT JOIN |
301: | uids |
302: | USING(uid) |
303: | WHERE |
304: | (domain_lookup.site_id = ' . $this->site_id . ') AND ' . $filter_clause . ' ORDER BY "user", domain;'; |
305: | $pgdb = \PostgreSQL::initialize(); |
306: | $pgdb->query($query); |
307: | while (null !== ($row = $pgdb->fetch_object())) { |
308: | $mailboxes[] = array( |
309: | 'user' => trim($row->user), |
310: | 'domain' => trim($row->domain), |
311: | 'type' => $row->type, |
312: | 'enabled' => (int)$row->enabled, |
313: | 'mailbox' => $row->destination, |
314: | 'uid' => (int)$row->uid, |
315: | 'custom' => ($filter === 'local' ? $row->target : null), |
316: | 'destination' => $row->destination |
317: | ); |
318: | } |
319: | |
320: | return $mailboxes; |
321: | } |
322: | |
323: | public function enable_address($account, $domain = null) |
324: | { |
325: | $where = 'AND email_lookup.domain = domain_lookup.domain AND domain_lookup.site_id = ' . $this->site_id; |
326: | if ($domain) { |
327: | $where .= ' AND domain_lookup.domain = \'' . pg_escape_string($domain) . '\''; |
328: | } |
329: | $pgdb = \PostgreSQL::initialize(); |
330: | $pgdb->query('UPDATE email_lookup SET enabled = 1::bit FROM domain_lookup WHERE "user" = \'' . pg_escape_string($account) . '\' ' . $where . ';'); |
331: | |
332: | return $pgdb->affected_rows() > 0; |
333: | } |
334: | |
335: | |
336: | |
337: | |
338: | public function rename_mailbox($olduser, $olddomain, $newuser, $newdomain, $newmailbox, $newtype = null) |
339: | { |
340: | return $this->modify_mailbox($olduser, $olddomain, $newuser, $newdomain, $newmailbox, $newtype); |
341: | } |
342: | |
343: | |
344: | |
345: | |
346: | |
347: | |
348: | |
349: | |
350: | |
351: | |
352: | |
353: | |
354: | |
355: | |
356: | public function modify_mailbox( |
357: | string $olduser, |
358: | string $olddomain, |
359: | string $newuser = '', |
360: | string $newdomain = '', |
361: | string $newdestination = '', |
362: | string $newtype = null |
363: | ): bool { |
364: | $args = array( |
365: | 'olduser', |
366: | 'olddomain', |
367: | 'newuser', |
368: | 'newdomain', |
369: | 'newtype' |
370: | ); |
371: | |
372: | foreach ($args as $var) { |
373: | ${$var} = strtolower((string)${$var}); |
374: | } |
375: | if (!$newuser && !$newdomain) { |
376: | $newuser = $olduser; |
377: | $newdomain = $olddomain; |
378: | } |
379: | if ($olduser === 'majordomo' && $this->majordomo_enabled() && $this->majordomo_list_mailing_lists()) { |
380: | return error('cannot remove majordomo email address while mailing lists exist'); |
381: | } |
382: | |
383: | if ($olduser && !$this->address_exists($olduser, $olddomain)) { |
384: | return error("Address `%s@%s' does not exist", $olduser, $olddomain); |
385: | } |
386: | |
387: | if ($newuser && !preg_match(Regex::EMAIL, "{$newuser}@{$newdomain}")) { |
388: | return error("Invalid email `%s'", "{$newuser}@{$newdomain}"); |
389: | } |
390: | |
391: | if (($olduser . '@' . $olddomain != $newuser . '@' . $newdomain) && $this->address_exists($newuser, |
392: | $newdomain) |
393: | ) { |
394: | return error("Email address %s@%s already exists. Can't rename!", |
395: | $newuser, $newdomain); |
396: | } |
397: | |
398: | if (!$this->transport_exists($olddomain)) { |
399: | return error("Mail domain `%s' not bound to account", $olddomain); |
400: | } |
401: | |
402: | if (!$this->transport_exists($newdomain)) { |
403: | return error("Mail domain `%s' not bound to account", $newdomain); |
404: | } |
405: | |
406: | if (!$newtype) { |
407: | $newtype = $this->mailbox_type($olduser, $olddomain); |
408: | } |
409: | |
410: | if ($newtype === self::MAILBOX_FORWARD && ($conflicts = $this->checkForwarding($newdestination))) { |
411: | return error('Remote forwarding is disabled. Following addresses would violate forwarding policy: %s', |
412: | implode(',', $conflicts) |
413: | ); |
414: | } |
415: | |
416: | $pgdb = \PostgreSQL::initialize(); |
417: | if ($newtype === self::MAILBOX_USER) { |
418: | if (!ctype_digit($newdestination)) { |
419: | $newdestination = $this->user_get_uid_from_username($newdestination); |
420: | } |
421: | if (0 !== ($uid = (int)$newdestination)) { |
422: | $local_user = $this->user_get_username_from_uid($uid); |
423: | $newdestination = self::MAILDIR_HOME; |
424: | |
425: | if (!$local_user) { |
426: | return error("Invalid mailbox destination, invalid uid `%d'", $uid); |
427: | } |
428: | } else if ($newdestination) { |
429: | if (preg_match('!^/home/([^/]+)/' . self::MAILDIR_HOME . '([/.]*)$!', $newdestination, |
430: | $match)) { |
431: | $local_user = $match[1]; |
432: | $newdestination = ltrim(str_replace(array('/', '..'), '.', $match[2]), '.'); |
433: | } else { |
434: | $local_user = $newdestination; |
435: | $newdestination = null; |
436: | } |
437: | } else { |
438: | |
439: | $local_user = $newuser; |
440: | } |
441: | $local_user = strtolower($local_user); |
442: | $users = $this->user_get_users(); |
443: | if (!isset($users[$local_user])) { |
444: | return error("User account `%s' does not exist", $local_user); |
445: | } |
446: | |
447: | $uid = (int)$users[$local_user]['uid']; |
448: | if ($newdestination == '' || $newdestination === self::MAILDIR_HOME) { |
449: | $newdestination = null; |
450: | } else { |
451: | $this->query('email_create_maildir_backend', $local_user, $newdestination); |
452: | } |
453: | $pgdb->query("UPDATE email_lookup SET \"user\" = '" . $newuser . "', domain = '" . $newdomain . "', " . |
454: | 'fs_destination = ' . (($newdestination != null) ? "'" . pg_escape_string(rtrim($newdestination, |
455: | ' /') . '/') . "'" : 'NULL') . ', ' . |
456: | 'alias_destination = NULL, uid = ' . $uid . ", type = '" . self::MAILBOX_USER . "' WHERE \"user\" = '" . pg_escape_string($olduser) . "' " . |
457: | "AND domain = '" . pg_escape_string($olddomain) . "';"); |
458: | } else { |
459: | if (!$newuser) { |
460: | return error('cannot forward catch-alls to external e-mail accounts'); |
461: | } |
462: | $newdestination = preg_replace('/\s+/m', ',', trim($newdestination, ' ,')); |
463: | if (!$newdestination) { |
464: | return error('no forwarding destination set for `%s@%s`', $newuser, $newdomain); |
465: | } |
466: | $pgdb->query("UPDATE email_lookup SET \"user\" = '" . pg_escape_string($newuser) . "', domain = '" . pg_escape_string($newdomain) . "', " . |
467: | "alias_destination = '" . pg_escape_string($newdestination) . "', uid = NULL, type = '" . |
468: | self::MAILBOX_FORWARD . "', fs_destination = NULL WHERE \"user\" = '" . |
469: | pg_escape_string($olduser) . "' AND domain = '" . pg_escape_string($olddomain) . "';"); |
470: | |
471: | } |
472: | $rows = $pgdb->affected_rows(); |
473: | $this->_shutdown_save_mailboxes(); |
474: | |
475: | return $rows > 0; |
476: | } |
477: | |
478: | |
479: | |
480: | |
481: | |
482: | |
483: | |
484: | protected function checkForwarding($destination): ?array { |
485: | |
486: | |
487: | |
488: | |
489: | |
490: | if ($this->getServiceValue('mail', 'extfwd', !MAIL_DISABLED_FORWARDING)) { |
491: | return null; |
492: | } |
493: | |
494: | if (!is_array($destination)) { |
495: | $destination = preg_split('/\s*,+\s*/', $destination); |
496: | } |
497: | |
498: | $bad = []; |
499: | $whitelisted = []; |
500: | foreach ($destination as $chk) { |
501: | if (false === ($pos = strpos($chk, '@'))) { |
502: | continue; |
503: | } |
504: | $domain = substr($chk, ++$pos); |
505: | if (!isset($whitelisted[$domain])) { |
506: | $whitelisted[$domain] = $this->transport_exists($domain); |
507: | } |
508: | |
509: | if (!$whitelisted[$domain]) { |
510: | $bad[] = $chk; |
511: | } |
512: | } |
513: | |
514: | return $bad; |
515: | } |
516: | |
517: | public function address_exists($user, $domain) |
518: | { |
519: | $user = strtolower($user); |
520: | $domain = strtolower($domain); |
521: | if ($user && !preg_match(Regex::EMAIL, "{$user}@{$domain}")) { |
522: | return false; |
523: | } |
524: | $pgdb = \PostgreSQL::initialize(); |
525: | $pgdb->query('SELECT 1 FROM email_lookup JOIN domain_lookup ON (site_id = ' . $this->site_id . ') ' . |
526: | "WHERE \"user\" = '" . pg_escape_string($user) . "' AND email_lookup.domain = '" . pg_escape_string($domain) . "'"); |
527: | |
528: | return $pgdb->num_rows() > 0; |
529: | } |
530: | |
531: | |
532: | |
533: | |
534: | |
535: | |
536: | |
537: | |
538: | |
539: | public function mailbox_type($user, $domain) |
540: | { |
541: | $user = strtolower($user); |
542: | $domain = strtolower($domain); |
543: | if (!preg_match(Regex::EMAIL, $user . '@' . $domain)) { |
544: | return error('invalid address `' . $user . '@' . $domain . "'"); |
545: | } |
546: | $pgdb = \PostgreSQL::initialize(); |
547: | $pgdb->query("SELECT type FROM email_lookup WHERE \"user\" = '" . $user . "' AND domain = '" . $domain . "'"); |
548: | |
549: | if ($pgdb->num_rows() < 1) { |
550: | return null; |
551: | } |
552: | |
553: | return $pgdb->fetch_object()->type; |
554: | } |
555: | |
556: | private function _shutdown_save_mailboxes() |
557: | { |
558: | if (!IS_ISAPI) { |
559: | $this->save_mailboxes(); |
560: | } |
561: | static $called; |
562: | if (isset($called)) { |
563: | return; |
564: | } |
565: | $called = 1; |
566: | |
567: | return register_shutdown_function(array($this, 'save_mailboxes')); |
568: | } |
569: | |
570: | |
571: | |
572: | |
573: | |
574: | |
575: | |
576: | |
577: | public function save_mailboxes() |
578: | { |
579: | if (!IS_CLI) { |
580: | if (!\apnscpSession::init()->exists($this->session_id)) { |
581: | |
582: | return true; |
583: | } |
584: | return $this->query('email_save_mailboxes'); |
585: | } |
586: | |
587: | if (static::class !== self::class) { |
588: | return true; |
589: | } |
590: | |
591: | $path = $this->domain_info_path(); |
592: | if (!is_dir($path)) { |
593: | |
594: | return true; |
595: | } |
596: | $path .= '/' . self::MAILBOX_SAVE_DEFAULT; |
597: | $email = $this->dump_mailboxes(); |
598: | |
599: | return (bool)file_put_contents($path, serialize($email), LOCK_EX); |
600: | } |
601: | |
602: | |
603: | |
604: | |
605: | |
606: | |
607: | |
608: | public function dump_mailboxes(): array { |
609: | $q = 'SELECT * FROM email_lookup WHERE domain IN |
610: | (select domain FROM domain_lookup WHERE site_id = ' . $this->site_id . ')'; |
611: | $db = \PostgreSQL::pdo(); |
612: | $email = array(); |
613: | $rs = $db->query($q); |
614: | while ($row = $rs->fetch(PDO::FETCH_ASSOC)) { |
615: | $email[] = array_map(fn($i) => is_string($i) ? trim($i) : $i, $row); |
616: | } |
617: | return $email; |
618: | } |
619: | |
620: | |
621: | |
622: | |
623: | |
624: | |
625: | public function remove_alias($user, $domain) |
626: | { |
627: | return $this->delete_mailbox($user, $domain, self::MAILBOX_FORWARD); |
628: | } |
629: | |
630: | public function delete_mailbox($user, $domain, $type = '') |
631: | { |
632: | $type = strtolower($type); |
633: | if ($type == 'l' || $type == self::MAILBOX_USER) { |
634: | $type = self::MAILBOX_USER; |
635: | } else if ($type == 'f' || $type == self::MAILBOX_FORWARD) { |
636: | $type = self::MAILBOX_FORWARD; |
637: | } else if ($type != '') { |
638: | return error("unknown address type `%s'", $type); |
639: | } |
640: | |
641: | |
642: | |
643: | if ($user === 'majordomo' && $this->majordomo_enabled() && $this->majordomo_list_mailing_lists()) { |
644: | return error('cannot remove majordomo email address while mailing lists exist'); |
645: | } |
646: | |
647: | $clause = ''; |
648: | if ($type) { |
649: | $clause = "AND type = '$type' "; |
650: | } |
651: | $pgdb = \PostgreSQL::initialize(); |
652: | $pgdb->query('DELETE FROM |
653: | email_lookup |
654: | WHERE |
655: | "user" = \'' . pg_escape_string($user) . "' |
656: | AND |
657: | domain = '" . pg_escape_string($domain) . "' |
658: | $clause |
659: | AND '" . pg_escape_string($domain) . "' IN |
660: | (SELECT domain from domain_lookup WHERE site_id = " . $this->site_id . ');'); |
661: | $rows = $pgdb->affected_rows(); |
662: | $this->_shutdown_save_mailboxes(); |
663: | |
664: | return $rows > 0; |
665: | } |
666: | |
667: | public function get_mailbox($user, $domain) |
668: | { |
669: | $address = $this->list_mailboxes(self::MAILBOX_SINGLE, $user, $domain); |
670: | |
671: | return $address ? array_pop($address) : array(); |
672: | } |
673: | |
674: | public function remove_maildir($mailbox) |
675: | { |
676: | |
677: | if (!IS_CLI && posix_getuid()) { |
678: | return $this->query('email_remove_maildir', $mailbox); |
679: | } |
680: | $mailbox = trim($mailbox); |
681: | if ($mailbox[0] != '.') { |
682: | $mailbox = '.' . $mailbox; |
683: | } |
684: | if (!preg_match(Regex::EMAIL_MAILDIR_FOLDER, $mailbox)) { |
685: | return error("invalid maildir folder name `%s'", $mailbox); |
686: | } |
687: | $home = $this->user_get_user_home(); |
688: | $path = join(DIRECTORY_SEPARATOR, array($home, self::MAILDIR_HOME, $mailbox)); |
689: | if (!$this->file_delete($path, true)) { |
690: | return error("failed to remove maildir `%s'", $mailbox); |
691: | } |
692: | |
693: | $subscriptions = join(DIRECTORY_SEPARATOR, |
694: | array( |
695: | $this->domain_fs_path(), |
696: | $home, |
697: | self::MAILDIR_HOME, |
698: | 'subscriptions' |
699: | ) |
700: | ); |
701: | $sname = trim($mailbox, '.'); |
702: | if (!file_exists($subscriptions)) { |
703: | $contents = array(); |
704: | } else { |
705: | $contents = file($subscriptions, FILE_IGNORE_NEW_LINES | FILE_SKIP_EMPTY_LINES); |
706: | } |
707: | if (false === ($key = array_search($sname, $contents))) { |
708: | return true; |
709: | } |
710: | unset($contents[$key]); |
711: | file_put_contents($subscriptions, join("\n", $contents) . "\n"); |
712: | |
713: | return Filesystem::chogp($subscriptions, $this->user_id, $this->group_id, 0600); |
714: | |
715: | } |
716: | |
717: | |
718: | |
719: | |
720: | |
721: | |
722: | public function restore_mailboxes(string $file = self::MAILBOX_SAVE_DEFAULT): bool |
723: | { |
724: | if (!IS_CLI && posix_getuid()) { |
725: | return $this->query('email_restore_mailboxes', $file); |
726: | } |
727: | if (!preg_match('/^[\w_-]+$/', $file)) { |
728: | return error("invalid mailbox backup `%s'", $file); |
729: | } |
730: | $file = $this->domain_info_path() . '/' . $file; |
731: | if (!file_exists($file)) { |
732: | return error("mailbox backup `%s' not found", basename($file)); |
733: | } else if (is_link($file)) { |
734: | return error("restoration file `%s' must be regular file", $this->file_unmake_path($file)); |
735: | } |
736: | $recs = \Util_PHP::unserialize(file_get_contents($file)); |
737: | $escapef = static function ($rec) { |
738: | return '"' . $rec . '"'; |
739: | }; |
740: | $domainHash = []; |
741: | $escapev = static function ($rec) { |
742: | |
743: | if ($rec === '') { |
744: | return 'NULL'; |
745: | } |
746: | |
747: | if (ctype_digit($rec)) { |
748: | if ($rec == 0 || $rec == 1) { |
749: | |
750: | |
751: | |
752: | |
753: | $rec .= '::bit'; |
754: | } |
755: | |
756: | return $rec; |
757: | } |
758: | |
759: | return "'" . pg_escape_string($rec) . "'"; |
760: | }; |
761: | $db = \PostgreSQL::initialize()->getHandler(); |
762: | foreach ($recs as $r) { |
763: | $hostname = $r['domain']; |
764: | if (!isset($domainHash[$hostname])) { |
765: | if ($this->transport_exists($hostname)) { |
766: | $domainHash[$hostname] = true; |
767: | } else { |
768: | |
769: | [$spltsb, $spltd] = array_values($this->web_split_host($r['domain'])); |
770: | if ( !($domainHash[$hostname] = $this->add_virtual_transport($spltd, $spltsb)) ) { |
771: | warn("Failed to add mail transport `%s'", $hostname); |
772: | } |
773: | } |
774: | } |
775: | if (!$domainHash[$hostname]) { |
776: | warn("Host `%s' not attached as mail transport - skipping `%s@%s'", $hostname, $r['user'], $r['domain']); |
777: | continue; |
778: | } |
779: | $fields = array_map($escapef, array_keys($r)); |
780: | $values = array_map($escapev, array_values($r)); |
781: | $q = 'INSERT INTO email_lookup (' . implode(',', $fields) . |
782: | ') VALUES(' . implode(',', $values) . ')'; |
783: | pg_send_query($db, $q); |
784: | while (pg_connection_busy($db)) { |
785: | usleep(50); |
786: | } |
787: | $res = pg_get_result($db); |
788: | |
789: | if ($err = pg_result_error($res)) { |
790: | $errid = (int)pg_result_error_field($res, PGSQL_DIAG_SQLSTATE); |
791: | |
792: | |
793: | |
794: | |
795: | |
796: | if ($errid === 23505) { |
797: | warn("skipped duplicate entry `%s@%s'", |
798: | $r['user'], $r['domain']); |
799: | } else if ($errid === 23514) { |
800: | warn("skipped entry `%s@%s': domain for `%s' not " . |
801: | 'assigned to handle mail', $r['user'], |
802: | $r['domain'], $r['domain']); |
803: | } else { |
804: | error("skipped `%s@%s': unknown query error", |
805: | $r['user'], $r['domain']); |
806: | } |
807: | } |
808: | } |
809: | |
810: | return true; |
811: | } |
812: | |
813: | public function remove_mailbox($user, $domain) |
814: | { |
815: | return $this->delete_mailbox($user, $domain); |
816: | } |
817: | |
818: | |
819: | |
820: | |
821: | |
822: | |
823: | |
824: | public function transport_exists($domain) |
825: | { |
826: | $db = \PostgreSQL::initialize(); |
827: | $q = $db->query("SELECT site_id FROM domain_lookup WHERE domain = '" . pg_escape_string($domain) . "'"); |
828: | |
829: | return $q->num_rows() > 0 && $q->fetch_object()->site_id == $this->site_id; |
830: | } |
831: | |
832: | |
833: | |
834: | |
835: | |
836: | |
837: | |
838: | |
839: | |
840: | |
841: | |
842: | |
843: | public function get_spool_size($username) |
844: | { |
845: | |
846: | if (!array_key_exists($username, $this->user_get_users())) { |
847: | return error("Invalid user `%s'", $username); |
848: | } |
849: | |
850: | return $this->query( |
851: | 'email_get_spool_size_backend', |
852: | $this->domain_fs_path() . '/home/' . $username . '/' . self::MAILDIR_HOME |
853: | ); |
854: | |
855: | } |
856: | |
857: | |
858: | |
859: | |
860: | |
861: | |
862: | |
863: | public function get_spool_size_backend($path) |
864: | { |
865: | if (!file_exists($path)) { |
866: | return 0; |
867: | } |
868: | $proc = Util_Process_Safe::exec('du -s %s', $path); |
869: | if (!$proc['success']) { |
870: | return false; |
871: | } |
872: | |
873: | return intval($proc['output']) * 1024; |
874: | } |
875: | |
876: | |
877: | |
878: | |
879: | |
880: | |
881: | public function get_vacation_options(): array |
882: | { |
883: | $prefs = array_get(\Preferences::factory($this->getAuthContext()), self::VACATION_PREFKEY, []); |
884: | $mb = Vacation::get($this->getAuthContext()); |
885: | $defaults = $mb->getDefaults(); |
886: | |
887: | return array_merge($defaults, array_intersect_key($prefs, $defaults)); |
888: | } |
889: | |
890: | public function get_vacation_message($user = null) |
891: | { |
892: | if (!IS_CLI) { |
893: | return $this->query('email_get_vacation_message', $user); |
894: | } |
895: | if (null !== $user && !($this->permission_level & PRIVILEGE_SITE)) { |
896: | return error('unprivileged user may not setup vacation responder for other users'); |
897: | } |
898: | |
899: | if (null === $user) { |
900: | $user = $this->username; |
901: | } else if (!$this->user_exists($user)) { |
902: | return error("unknown user `%s'", $user); |
903: | } |
904: | $svc = Vacation::getActiveService(); |
905: | $class = 'Vacation\\Providers\\' . $svc . '\\Options\\Message'; |
906: | $fqns = Vacation::appendNamespace($class); |
907: | |
908: | return (new $fqns)->getFromUser($user); |
909: | } |
910: | |
911: | |
912: | |
913: | |
914: | |
915: | |
916: | |
917: | |
918: | |
919: | |
920: | public function add_vacation($response, $user = null, array $flags = null) |
921: | { |
922: | deprecated_func('use enable_vacation()'); |
923: | |
924: | return $this->enable_vacation($response, $user, $flags); |
925: | } |
926: | |
927: | |
928: | |
929: | |
930: | |
931: | |
932: | |
933: | |
934: | public function enable_vacation($user = null, array $flags = null) |
935: | { |
936: | if (!IS_CLI) { |
937: | return $this->query('email_enable_vacation', $user, $flags); |
938: | } |
939: | if (null !== $user && !($this->permission_level & PRIVILEGE_SITE)) { |
940: | return error('Non-privileged user may not setup vacation responder for other users'); |
941: | } |
942: | |
943: | if (null === $user) { |
944: | $ctx = $this->getAuthContext(); |
945: | } else if (!$this->user_exists($user)) { |
946: | return error("user `%s' does not exist", $user); |
947: | } else if ($user && $flags) { |
948: | return error('changing flags of secondary users not implemented'); |
949: | } else { |
950: | $ctx = Auth::context($user, $this->site); |
951: | } |
952: | |
953: | $driver = Vacation::get($ctx); |
954: | $afi = \apnscpFunctionInterceptor::factory($ctx); |
955: | if ($flags) { |
956: | $afi->email_set_vacation_options($flags); |
957: | } |
958: | |
959: | return $driver->enable(); |
960: | } |
961: | |
962: | |
963: | |
964: | |
965: | |
966: | |
967: | |
968: | public function set_vacation_options(array $options): bool |
969: | { |
970: | $driver = Vacation::get($this->getAuthContext()); |
971: | foreach ($driver->getDefaults() as $k => $v) { |
972: | if (isset($options[$k]) && !$driver->setOption($k, $options[$k])) { |
973: | unset($options[$k]); |
974: | } |
975: | } |
976: | $pref = \Preferences::factory($this->getAuthContext()); |
977: | $pref->unlock(apnscpFunctionInterceptor::factory($this->getAuthContext())); |
978: | array_set($pref, self::VACATION_PREFKEY, $options); |
979: | |
980: | return true; |
981: | } |
982: | |
983: | public function vacation_exists($user = null) |
984: | { |
985: | if (null !== $user && (($this->permission_level & PRIVILEGE_SITE) !== PRIVILEGE_SITE)) { |
986: | return error('Unable to check vacation for non-admin account'); |
987: | } |
988: | |
989: | if (null === $user) { |
990: | $ctx = $this->getAuthContext(); |
991: | } else { |
992: | if (!$this->user_exists($user)) { |
993: | return false; |
994: | } |
995: | $ctx = Auth::context($user, $this->site); |
996: | } |
997: | |
998: | if (!$this->user_exists($ctx->username)) { |
999: | return error("Invalid user `%s'", $ctx->username); |
1000: | } |
1001: | |
1002: | return Vacation::get($ctx)->enabled(); |
1003: | } |
1004: | |
1005: | |
1006: | |
1007: | |
1008: | |
1009: | |
1010: | |
1011: | |
1012: | |
1013: | public function change_vacation_message($response, $user = null, array $flags = []) |
1014: | { |
1015: | deprecated_func('use set_vacation'); |
1016: | |
1017: | return $this->enable_vacation($response, $user, $flags); |
1018: | } |
1019: | |
1020: | |
1021: | |
1022: | |
1023: | |
1024: | |
1025: | |
1026: | public function remove_vacation(string $user = null) |
1027: | { |
1028: | if (!IS_CLI) { |
1029: | return $this->query('email_remove_vacation', $user); |
1030: | } |
1031: | |
1032: | if ($user && ($this->permission_level & PRIVILEGE_SITE) !== PRIVILEGE_SITE) { |
1033: | return error('Unable to check vacation for non-admin account'); |
1034: | } |
1035: | |
1036: | if ($user && !$this->user_exists($user)) { |
1037: | return error($user . ': invalid user'); |
1038: | } |
1039: | |
1040: | $ctx = !$user ? $this->getAuthContext() : \Auth::context($user, $this->site); |
1041: | |
1042: | return Vacation::get($ctx)->disable(); |
1043: | } |
1044: | |
1045: | |
1046: | |
1047: | |
1048: | |
1049: | |
1050: | |
1051: | |
1052: | |
1053: | |
1054: | |
1055: | public function import_from_domain(string $domain, string $src): bool |
1056: | { |
1057: | return $this->clone_domain_mailboxes($src, $domain); |
1058: | } |
1059: | |
1060: | |
1061: | |
1062: | |
1063: | |
1064: | |
1065: | |
1066: | |
1067: | |
1068: | public function clone_domain_mailboxes($source, $destination) |
1069: | { |
1070: | if ($source === $destination) { |
1071: | return error('cannot clone, source and destination same'); |
1072: | } |
1073: | $this->remove_virtual_transport($destination); |
1074: | if (!$this->add_virtual_transport($destination)) { |
1075: | return false; |
1076: | } |
1077: | |
1078: | foreach ($this->list_mailboxes(null, null, $source) as $mailbox) { |
1079: | if ($mailbox['type'] == self::MAILBOX_USER) { |
1080: | if (preg_match('!^/home/([^/]+)/' . self::MAILDIR_HOME . '/?(.*)$!', $mailbox['destination'], |
1081: | $mailbox_dest)) { |
1082: | $username = $mailbox_dest[1]; |
1083: | $subfolder = $mailbox_dest[2]; |
1084: | } else { |
1085: | $subfolder = ''; |
1086: | $username = $mailbox['destination']; |
1087: | } |
1088: | |
1089: | $this->add_mailbox($mailbox['user'], |
1090: | $destination, |
1091: | $this->user_get_uid_from_username($username), |
1092: | $subfolder); |
1093: | } else if ($mailbox['type'] == self::MAILBOX_FORWARD) { |
1094: | $this->add_alias($mailbox['user'], |
1095: | $destination, |
1096: | str_replace($source, |
1097: | $destination, |
1098: | $mailbox['destination'])); |
1099: | } |
1100: | |
1101: | if (!$mailbox['enabled']) { |
1102: | $this->disable_address($mailbox['user'], $mailbox['domain']); |
1103: | } |
1104: | |
1105: | } |
1106: | |
1107: | return true; |
1108: | } |
1109: | |
1110: | |
1111: | |
1112: | |
1113: | |
1114: | |
1115: | |
1116: | |
1117: | public function remove_virtual_transport($domain, $keepdns = null) |
1118: | { |
1119: | $pgdb = \PostgreSQL::initialize(); |
1120: | $q = $pgdb->query("SELECT site_id FROM domain_lookup WHERE domain = '" . pg_escape_string($domain) . "'"); |
1121: | if ($q->num_rows() < 1) { |
1122: | return false; |
1123: | } |
1124: | |
1125: | $site_id = $pgdb->fetch_object()->site_id; |
1126: | |
1127: | if ($site_id && $site_id != $this->site_id) { |
1128: | return error('Table entry ' . $domain . ' owned by another site (' . $site_id . ')'); |
1129: | } else if ($pgdb->num_rows() < 1) { |
1130: | return error('Domain ' . $domain . ' not found in table'); |
1131: | } |
1132: | if ($this->majordomo_enabled()) { |
1133: | foreach ($this->majordomo_list_mailing_lists() as $list) { |
1134: | $tmp = $this->majordomo_get_domain_from_list_name($list); |
1135: | if ($tmp == $domain) { |
1136: | warn("Mailing list `%s' sends from `%s'. Delete via Mail > Mailing Lists", $list, $domain); |
1137: | } |
1138: | } |
1139: | } |
1140: | $pgdb->query("DELETE FROM domain_lookup WHERE domain = '" . pg_escape_string($domain) . "' AND site_id = " . (int)$this->site_id . ';'); |
1141: | $ok = $pgdb->affected_rows() > 0; |
1142: | |
1143: | if (!$this->dns_configured()) { |
1144: | return warn("DNS is not configured for `%s' - unable to remove MX records automatically", $domain); |
1145: | } |
1146: | |
1147: | if (!$this->dns_zone_exists($domain)) { |
1148: | |
1149: | return true; |
1150: | } |
1151: | |
1152: | if ($keepdns) { |
1153: | return $ok; |
1154: | } |
1155: | |
1156: | $split = $this->web_split_host($domain); |
1157: | $mailrecords = $this->provisioning_records($split['domain'], $split['subdomain']); |
1158: | if (null === $keepdns) { |
1159: | |
1160: | $hostname = ltrim($split['subdomain'] . '.' . $split['domain'], '.'); |
1161: | $rec = $this->dns_get_records($split['subdomain'], 'MX', $split['domain']); |
1162: | |
1163: | if (!is_array($rec)) { |
1164: | warn("error retrieving mx records for `%s'", $hostname); |
1165: | Error_Reporter::report("unable to remove record for `%s'", $hostname); |
1166: | return $ok; |
1167: | } |
1168: | if (!count($rec)) { |
1169: | |
1170: | info("no MX records found for hostname `%s'", $hostname); |
1171: | return $ok; |
1172: | } |
1173: | |
1174: | |
1175: | $rec = array_pop($rec); |
1176: | |
1177: | |
1178: | |
1179: | $match = new Record($hostname, [ |
1180: | 'name' => $rec['subdomain'], |
1181: | 'rr' => 'MX', |
1182: | 'parameter' => $rec['parameter'], |
1183: | ]); |
1184: | $match2 = $match; |
1185: | |
1186: | foreach ($mailrecords as $r) { |
1187: | if (!$r->is($match)) { |
1188: | continue; |
1189: | } |
1190: | [$priority, $target] = preg_split('/\s+/', $match['parameter'], 2, PREG_SPLIT_NO_EMPTY); |
1191: | foreach ($mailrecords as $r2) { |
1192: | if ($r2->matches('hostname', $target)) { |
1193: | $match2 = $r2; |
1194: | break; |
1195: | } |
1196: | } |
1197: | |
1198: | break; |
1199: | } |
1200: | |
1201: | $keepdns = $match2 === $match; |
1202: | |
1203: | if ($keepdns) { |
1204: | warn("MX record for `%s' points to third-party server and thus will not be removed from local DNS", |
1205: | $domain); |
1206: | return -1; |
1207: | } |
1208: | } |
1209: | |
1210: | foreach ($mailrecords as $r) { |
1211: | if ($this->dns_record_exists($r->getZone(), $r['name'], $r['rr'], $r['parameter'])) { |
1212: | if (!$this->dns_remove_record($r->getZone(), $r['name'], $r['rr'], $r['parameter'])) { |
1213: | warn( |
1214: | 'Failed to remove record %s.%s (%s) => %s', |
1215: | $r['name'], |
1216: | $r->getZone(), |
1217: | $r['rr'], |
1218: | $r['parameter'] |
1219: | ); |
1220: | } |
1221: | } |
1222: | } |
1223: | |
1224: | return $ok; |
1225: | } |
1226: | |
1227: | |
1228: | |
1229: | |
1230: | |
1231: | |
1232: | |
1233: | |
1234: | |
1235: | |
1236: | public function get_records(string $domain, string $subdomain = ''): array |
1237: | { |
1238: | deprecated_func('use provisioning_records()'); |
1239: | return $this->provisioning_records($domain, $subdomain); |
1240: | } |
1241: | |
1242: | |
1243: | |
1244: | |
1245: | |
1246: | |
1247: | |
1248: | |
1249: | public function provisioning_records(string $domain, string $subdomain = ''): array |
1250: | { |
1251: | if (!IS_CLI) { |
1252: | return $this->query('email_provisioning_records', $domain, $subdomain); |
1253: | } |
1254: | if (!$this->enabled() || ($this->getServiceValue('mail', 'provider') === 'builtin' && |
1255: | !$this->transport_exists(ltrim("$subdomain.$domain", '.')))) |
1256: | { |
1257: | |
1258: | |
1259: | |
1260: | return []; |
1261: | } |
1262: | |
1263: | $ttl = $this->dns_get_default('ttl'); |
1264: | $myips = $this->get_mail_ip(); |
1265: | $template = BladeLite::factory('templates/dns')->render('email', [ |
1266: | 'svc' => \Opcenter\SiteConfiguration::shallow($this->getAuthContext()), |
1267: | 'ttl' => $ttl, |
1268: | 'zone' => $domain, |
1269: | 'subdomain' => $subdomain, |
1270: | 'hostname' => ltrim(implode('.', [$subdomain, $domain]), '.'), |
1271: | 'ips' => (array)$myips, |
1272: | 'dkim' => Dkim::instantiateContexted($this->getAuthContext()) |
1273: | ]); |
1274: | |
1275: | $regex = Regex::compile(Regex::DNS_AXFR_REC_DOMAIN, [ |
1276: | 'rr' => implode('|', $this->dns_permitted_records() + [99999 => 'SOA']), |
1277: | 'domain' => $domain |
1278: | ]); |
1279: | if (!preg_match_all($regex, $template, $matches, PREG_SET_ORDER)) { |
1280: | debug('No provisioning records discovered from template'); |
1281: | return []; |
1282: | } |
1283: | $records = []; |
1284: | foreach ($matches as $record) { |
1285: | $records[] = new Record($domain, [ |
1286: | 'ttl' => $record['ttl'], |
1287: | 'parameter' => $record['parameter'], |
1288: | 'rr' => $record['rr'], |
1289: | 'name' => rtrim($record['subdomain'], '.') |
1290: | ]); |
1291: | } |
1292: | return $records; |
1293: | } |
1294: | |
1295: | |
1296: | |
1297: | |
1298: | |
1299: | |
1300: | |
1301: | |
1302: | public function add_virtual_transport($domain, $subdomain = '') |
1303: | { |
1304: | $aliases = $this->aliases_list_aliases(); |
1305: | if (($domain !== $this->domain) && !in_array($domain, $aliases, true)) { |
1306: | return error("domain `%s' not owned by site", $domain); |
1307: | } |
1308: | $transport = ($subdomain ? $subdomain . '.' : '') . $domain; |
1309: | $pgdb = \PostgreSQL::initialize(); |
1310: | $rs = $pgdb->query("SELECT site_id FROM domain_lookup WHERE domain = '" . pg_escape_string($transport) . "'"); |
1311: | $nr = $pgdb->num_rows(); |
1312: | |
1313: | if ($nr > 0) { |
1314: | $site = (int)$rs->fetch_object()->site_id; |
1315: | if ($site !== $this->site_id) { |
1316: | return error("table entry `%(transport)s' owned by another site (%(id)d)", |
1317: | ['transport' => $transport, 'id' => $site]); |
1318: | } |
1319: | |
1320: | return true; |
1321: | } |
1322: | $pgdb->query("INSERT INTO domain_lookup (domain, site_id) VALUES('" . pg_escape_string($transport) . "', " . (int)$this->site_id . ');'); |
1323: | if ($pgdb->affected_rows() < 1) { |
1324: | return error("failed to add e-mail transport `%s'", $transport); |
1325: | } |
1326: | |
1327: | if (!$this->dns_domain_uses_nameservers($domain)) { |
1328: | $nsrecs = join(', ', $this->dns_get_hosting_nameservers($domain)); |
1329: | warn('Domain %(domain)s uses third-party nameservers to provide DNS. Continuing to make ' . |
1330: | 'local MX records on local nameservers. Email configuration in Mail > Manage Mailboxes ' . |
1331: | 'will not be reflected until nameservers are changed to %(nsrecs)s', |
1332: | ['domain' => $domain, 'nsrecs' => $nsrecs] |
1333: | ); |
1334: | } |
1335: | |
1336: | |
1337: | |
1338: | |
1339: | |
1340: | if (!$this->dns_configured() || !$this->dns_zone_exists($domain)) { |
1341: | return warn("DNS is not configured for `%s' - unable to provision DNS automatically", $domain); |
1342: | } |
1343: | |
1344: | $hostname = ltrim($subdomain . '.' . $domain, '.'); |
1345: | $uuidRecord = $this->dns_get_records($this->dns_uuid_name(), 'TXT', $hostname); |
1346: | if (($chk = array_get($uuidRecord, '0.parameter')) && $chk && $chk !== $this->dns_uuid()) { |
1347: | return warn("UUID %(check)s does not match expected %(expected)s. Not provisioning DNS records for %(hostname)s", [ |
1348: | 'check' => $chk, |
1349: | 'expected' => $this->dns_uuid(), |
1350: | 'hostname' => $hostname |
1351: | ]); |
1352: | } |
1353: | $mailrecords = $this->provisioning_records($domain, $subdomain); |
1354: | $srvrec = $this->dns_get_records($subdomain, 'MX', $domain); |
1355: | |
1356: | if ($srvrec) { |
1357: | |
1358: | $srvrec = array_pop($srvrec); |
1359: | |
1360: | $match = new Record($domain, [ |
1361: | 'name' => $srvrec['subdomain'], |
1362: | 'rr' => 'MX', |
1363: | 'parameter' => $srvrec['parameter'], |
1364: | ]); |
1365: | $match2 = $match; |
1366: | |
1367: | foreach ($mailrecords as $r) { |
1368: | if (!$r->is($match)) { |
1369: | continue; |
1370: | } |
1371: | |
1372: | [$priority, $target] = preg_split('/\s+/', $match['parameter'], 2, PREG_SPLIT_NO_EMPTY); |
1373: | foreach ($mailrecords as $r2) { |
1374: | if ($r2->matches('hostname', $target)) { |
1375: | $match2 = $r2; |
1376: | break; |
1377: | } |
1378: | } |
1379: | |
1380: | break; |
1381: | } |
1382: | |
1383: | $hasCustomRecords = $match2 === $match; |
1384: | |
1385: | if ($hasCustomRecords) { |
1386: | $hostname = trim(implode('.', [$match['name'], $match['zone']]), '.'); |
1387: | return warn('MX record for %s points to %s, not overwriting! Email will not ' . |
1388: | 'route properly until MX records are reset via Toolbox in DNS Manager.', |
1389: | $hostname, |
1390: | $srvrec['parameter'] |
1391: | ); |
1392: | } |
1393: | |
1394: | } |
1395: | |
1396: | foreach ($mailrecords as $r) { |
1397: | if (($r['rr'] === 'A' || $r['rr'] === 'AAAA') && $this->dns_record_exists($r->getZone(), $r['name'], 'CNAME')) { |
1398: | info('Record %(subdomain)s%(domain)s already exists as CNAME - not adding %(rr)s', |
1399: | [ |
1400: | 'rr' => $r['rr'], |
1401: | 'subdomain' => ltrim($subdomain . '.', '.'), |
1402: | 'domain' => $r->getZone() |
1403: | ] |
1404: | ); |
1405: | continue; |
1406: | } |
1407: | if (!$this->dns_record_exists($r->getZone(), $r['name'], $r['rr'], $r['parameter'])) { |
1408: | $this->dns_add_record($r->getZone(), $r['name'], $r['rr'], $r['parameter']); |
1409: | } |
1410: | } |
1411: | |
1412: | return true; |
1413: | } |
1414: | |
1415: | |
1416: | |
1417: | |
1418: | |
1419: | |
1420: | |
1421: | |
1422: | |
1423: | |
1424: | |
1425: | public function add_mailbox($user, $domain, $uid, $mailbox = '') |
1426: | { |
1427: | $user = strtolower(trim($user)); |
1428: | $domain = strtolower(trim($domain)); |
1429: | if ($this->address_exists($user, $domain)) { |
1430: | if (!$user) { |
1431: | return error("catch-all for $domain already exists"); |
1432: | } |
1433: | |
1434: | return error('%s@%s: address exists', $user, $domain); |
1435: | } |
1436: | |
1437: | if ($user && !preg_match(Regex::EMAIL, "{$user}@{$domain}")) { |
1438: | return error("Invalid email `%s'", "{$user}@{$domain}"); |
1439: | } |
1440: | |
1441: | if (!$this->transport_exists($domain)) { |
1442: | return error("Mail transport `%s' not bound to account", $domain); |
1443: | } |
1444: | $mailbox = ltrim(str_replace(array('/', '..'), '.', $mailbox), '.'); |
1445: | $uid = (int)$uid; |
1446: | $pgdb = \PostgreSQL::initialize(); |
1447: | if ($mailbox) { |
1448: | $pgdb->query('SELECT "user" as name FROM uids WHERE uid = ' . $uid . ' AND site_id = ' . $this->site_id); |
1449: | $luser = $pgdb->fetch_object(); |
1450: | if (!$luser) { |
1451: | return error("lookup failed for `%s' with uid `%s'", $user, $uid); |
1452: | } |
1453: | $luser = trim($luser->name); |
1454: | $this->query('email_create_maildir_backend', $luser, $mailbox); |
1455: | $mailbox = pg_escape_string($mailbox); |
1456: | } |
1457: | |
1458: | $pgdb->query("INSERT INTO email_lookup (\"user\", domain, uid, type, enabled, fs_destination) |
1459: | VALUES ('" . pg_escape_string($user) . "', |
1460: | '" . pg_escape_string($domain) . "', |
1461: | " . intval($uid) . ", |
1462: | '" . self::MAILBOX_USER . "', |
1463: | 1::bit, |
1464: | " . ($mailbox ? "'" . $mailbox . "'" : 'NULL') . ');'); |
1465: | $rows = $pgdb->affected_rows(); |
1466: | |
1467: | $this->_shutdown_save_mailboxes(); |
1468: | |
1469: | return $rows > 0 ?: error('Failed to create mailbox: %s', $pgdb->error); |
1470: | |
1471: | } |
1472: | |
1473: | public function add_alias($user, $domain, $destination) |
1474: | { |
1475: | $user = strtolower($user); |
1476: | $domain = strtolower($domain); |
1477: | if ($this->address_exists($user, $domain)) { |
1478: | return error('%s@%s: address exists', $user, $domain); |
1479: | } |
1480: | |
1481: | if ($conflicts = $this->checkForwarding($destination)) { |
1482: | return error('Remote forwarding is disabled. Following addresses would violate forwarding policy: %s', |
1483: | implode(',', $conflicts) |
1484: | ); |
1485: | } |
1486: | |
1487: | if (!$this->transport_exists($domain)) { |
1488: | return error("Mail transport `%s' not bound to account", $domain); |
1489: | } |
1490: | $user = trim($user); |
1491: | if (!$user && !$this->getServiceValue('mail', 'catchallfwd', MAIL_FORWARDED_CATCHALL)) { |
1492: | return error('catch-all may not be forwarded'); |
1493: | } |
1494: | $destination = preg_replace('/\s+|,+/', ',', trim($destination, ' ,')); |
1495: | if (!$destination) { |
1496: | return error('no destination specified'); |
1497: | } |
1498: | $pgdb = \PostgreSQL::initialize(); |
1499: | $pgdb->query('INSERT INTO email_lookup ' . |
1500: | '("user", domain, alias_destination, type, enabled) ' . |
1501: | "VALUES('" . pg_escape_string($user) . "', '" . pg_escape_string($domain) . "', '" . |
1502: | trim(pg_escape_string($destination), ',') . "', '" . self::MAILBOX_FORWARD . "', 1::bit);"); |
1503: | $rows = $pgdb->affected_rows(); |
1504: | $this->_shutdown_save_mailboxes(); |
1505: | |
1506: | return $rows > 0; |
1507: | } |
1508: | |
1509: | public function disable_address($account, $domain = null) |
1510: | { |
1511: | $where = 'AND email_lookup.domain = domain_lookup.domain AND domain_lookup.site_id = ' . $this->site_id; |
1512: | if ($domain) { |
1513: | $where .= 'AND domain_lookup.domain = \'' . pg_escape_string($domain) . '\''; |
1514: | } |
1515: | $pgdb = \PostgreSQL::initialize(); |
1516: | $pgdb->query('UPDATE email_lookup SET enabled = 0::bit FROM domain_lookup WHERE "user" = \'' . pg_escape_string($account) . '\' ' . $where . ';'); |
1517: | |
1518: | return $pgdb->affected_rows() > 0; |
1519: | } |
1520: | |
1521: | |
1522: | |
1523: | |
1524: | |
1525: | |
1526: | public function get_mail_ip(): array |
1527: | { |
1528: | $ips = []; |
1529: | if ($tmp = $this->dns_get_public_ip()) { |
1530: | $ips = (array)$tmp; |
1531: | } |
1532: | if ($tmp = $this->dns_get_public_ip6()) { |
1533: | $ips = array_merge($ips, (array)$tmp); |
1534: | } |
1535: | |
1536: | return $ips; |
1537: | } |
1538: | |
1539: | |
1540: | |
1541: | |
1542: | |
1543: | |
1544: | |
1545: | |
1546: | |
1547: | public function set_webmail_location(string $app, ?string $subdomain): bool |
1548: | { |
1549: | if (!IS_CLI) { |
1550: | return $this->query('email_set_webmail_location', $app, $subdomain); |
1551: | } |
1552: | |
1553: | $webmailInstance = Webmail::instantiateContexted($this->getAuthContext()); |
1554: | if (!$webmailInstance->exists($app)) { |
1555: | return error("unknown webmail app `%s'", $app); |
1556: | } |
1557: | |
1558: | $dnsRecords = $this->email_provisioning_records($this->email_list_virtual_transports()[0] ?? $this->domain); |
1559: | $locations = $this->webmail_apps(); |
1560: | $oldsubdomain = $locations[$app]; |
1561: | |
1562: | $keepDns = (bool)array_first($dnsRecords, function (Record $record) use ($oldsubdomain) { |
1563: | if (!($record['zone'] === $this->domain && $record['name'] === '' && $record['rr'] === 'MX')) { |
1564: | return false; |
1565: | } |
1566: | |
1567: | return !strcasecmp(rtrim($record->getMeta('data'), '.'), "$oldsubdomain." . $record['zone']); |
1568: | }); |
1569: | |
1570: | defer($_, function () { |
1571: | $cache = Cache_Account::spawn($this->getAuthContext()); |
1572: | $cache->del(Webmail::CACHE_KEY); |
1573: | }); |
1574: | |
1575: | if (null === $subdomain) { |
1576: | if ($webmailInstance->assigned($app)) { |
1577: | $this->web_remove_subdomain($oldsubdomain, $keepDns); |
1578: | } |
1579: | return $webmailInstance->forget($app); |
1580: | } |
1581: | |
1582: | $subdomain = strtolower($subdomain); |
1583: | if ($oldsubdomain === $subdomain) { |
1584: | return true; |
1585: | } |
1586: | if (!preg_match(Regex::SUBDOMAIN, $subdomain)) { |
1587: | return error("invalid subdomain `%s'", $subdomain); |
1588: | } |
1589: | |
1590: | if ($this->web_subdomain_exists($subdomain)) { |
1591: | return error("subdomain `%s' already exists - cannot overwrite", $subdomain); |
1592: | } |
1593: | |
1594: | |
1595: | if ($this->web_subdomain_exists($oldsubdomain) && !$this->web_remove_subdomain($oldsubdomain, $keepDns)) { |
1596: | warn("cannot remove old webmail location `%s'", $oldsubdomain); |
1597: | } |
1598: | if (!$webmailInstance->set($app, $subdomain)) { |
1599: | return false; |
1600: | } |
1601: | $fspath = $webmailInstance->getPathFromApp($app); |
1602: | if (!$this->web_add_subdomain($subdomain, $fspath)) { |
1603: | return error("Failed to map webmail `%(name)s' to `%(path)s'", [ |
1604: | 'name' => $app, |
1605: | 'path' => $fspath |
1606: | ]); |
1607: | } |
1608: | |
1609: | if ($this->letsencrypt_exists()) { |
1610: | $this->letsencrypt_append($subdomain . '.' . $this->domain); |
1611: | } |
1612: | |
1613: | return info("webmail location changed from `%(old)s' to `%(new)s'", [ |
1614: | 'old' => $oldsubdomain . '.' . $this->domain, |
1615: | 'new' => $subdomain . '.' . $this->domain |
1616: | ]); |
1617: | } |
1618: | |
1619: | public function webmail_apps() |
1620: | { |
1621: | if (!IS_CLI) { |
1622: | $cache = Cache_Account::spawn($this->getAuthContext()); |
1623: | if (false !== ($webmail = $cache->get(Webmail::CACHE_KEY))) { |
1624: | return $webmail; |
1625: | } |
1626: | $apps = $this->query('email_webmail_apps'); |
1627: | $cache->set(Webmail::CACHE_KEY, $apps); |
1628: | |
1629: | return $apps; |
1630: | } |
1631: | return Webmail::instantiateContexted($this->getAuthContext())->getAll(); |
1632: | } |
1633: | |
1634: | public function get_webmail_location($app) |
1635: | { |
1636: | $cache = Cache_Account::spawn($this->getAuthContext()); |
1637: | if (false !== ($webmail = $cache->get(Webmail::CACHE_KEY))) { |
1638: | return $webmail[$app]; |
1639: | } |
1640: | $webmail = $this->query('email_webmail_apps'); |
1641: | if (!isset($webmail[$app])) { |
1642: | return error("unknown webmail app `%s'", $app); |
1643: | } |
1644: | |
1645: | return $webmail[$app]; |
1646: | } |
1647: | |
1648: | public function _create() |
1649: | { |
1650: | |
1651: | $conf = $this->getAuthContext()->getAccount()->cur; |
1652: | $user = $conf['siteinfo']['admin_user']; |
1653: | |
1654: | $svcs = array('smtp_relay', 'imap', 'pop3'); |
1655: | $pam = new Util_Pam($this->getAuthContext()); |
1656: | foreach ($svcs as $svc) { |
1657: | if ($this->auth_is_demo() && $pam->check($user, $svc)) { |
1658: | $pam->remove($user, $svc); |
1659: | } |
1660: | } |
1661: | if (platform_is('7.5', '<')) { |
1662: | return true; |
1663: | } |
1664: | if (!$this->_create_user($user)) { |
1665: | return false; |
1666: | } |
1667: | if (!$this->transport_exists($this->domain)) { |
1668: | $this->add_virtual_transport($this->domain); |
1669: | } |
1670: | $this->add_mailbox('postmaster', $this->domain, $this->user_id); |
1671: | $this->add_mailbox($this->username, $this->domain, $this->user_id); |
1672: | } |
1673: | |
1674: | public function _create_user(string $user) |
1675: | { |
1676: | |
1677: | $this->_reload('adduser'); |
1678: | if (!$pwd = $this->user_getpwnam($user)) { |
1679: | return false; |
1680: | } |
1681: | |
1682: | if (!$pwd['home']) { |
1683: | return false; |
1684: | } |
1685: | |
1686: | |
1687: | $svc = 'imap'; |
1688: | |
1689: | $path = $this->domain_fs_path() . DIRECTORY_SEPARATOR . $pwd['home'] . |
1690: | DIRECTORY_SEPARATOR . self::MAILDIR_HOME; |
1691: | if (!is_dir($path)) { |
1692: | Opcenter\Filesystem::mkdir($path, $pwd['uid'], $this->group_id, 0700, false); |
1693: | Storage::bindTo($this->domain_fs_path())->createMaildir($this->file_unmake_path($path), |
1694: | $pwd['uid'], $pwd['gid']); |
1695: | file_put_contents($path . '/subscriptions', 'INBOX', FILE_APPEND); |
1696: | } |
1697: | |
1698: | foreach (Storage::BASE_FOLDERS as $folder) { |
1699: | $dir = $path . DIRECTORY_SEPARATOR . ".{$folder}"; |
1700: | if (!is_dir($dir)) { |
1701: | $this->create_maildir_backend($user, $folder); |
1702: | } |
1703: | |
1704: | } |
1705: | |
1706: | return true; |
1707: | } |
1708: | |
1709: | public function _reload(string $why = '', array $args = []) |
1710: | { |
1711: | |
1712: | if ($why === Ssl_Module::USER_RHOOK || $why === Ssl_Module::SYS_RHOOK) { |
1713: | if (Haproxy::exists()) { |
1714: | |
1715: | if ($this->site) { |
1716: | $this->merge_ssl($this->site); |
1717: | } |
1718: | Haproxy::restart(HTTPD_RELOAD_DELAY); |
1719: | } |
1720: | |
1721: | if (Dovecot::exists()) { |
1722: | Dovecot::restart(HTTPD_RELOAD_DELAY); |
1723: | } |
1724: | Postfix::restart(HTTPD_RELOAD_DELAY); |
1725: | return true; |
1726: | } |
1727: | |
1728: | if ($why === 'adduser') { |
1729: | |
1730: | if (!Dovecot::exists()) { |
1731: | return warn( |
1732: | "Dovecot appears to not be installed. Mail provider other than 'null' selected. Switch " . |
1733: | "provider module to `null' from `%s' to avoid unexpected side-effects.", $this->get_provider() |
1734: | ); |
1735: | } |
1736: | return Dovecot::flushAuth(); |
1737: | } |
1738: | |
1739: | return true; |
1740: | } |
1741: | |
1742: | |
1743: | |
1744: | |
1745: | |
1746: | |
1747: | |
1748: | |
1749: | public function create_maildir_backend($user, $mailbox) |
1750: | { |
1751: | $mailbox = '.' . ltrim($mailbox, '.'); |
1752: | if (!preg_match(Regex::EMAIL_MAILDIR_FOLDER, $mailbox)) { |
1753: | return error("invalid maildir folder name `%s'", $mailbox); |
1754: | } |
1755: | |
1756: | $pwd = $this->user_getpwnam($user); |
1757: | if (!$pwd) { |
1758: | return error("failed to create Maildir storage, user `%s' does not exist", $user); |
1759: | } |
1760: | |
1761: | $path = $pwd['home'] . DIRECTORY_SEPARATOR . |
1762: | static::MAILDIR_HOME . DIRECTORY_SEPARATOR . Storage::mailbox2Maildir($mailbox); |
1763: | $chkvpath = dirname($path); |
1764: | $chkrpath = $this->domain_fs_path($chkvpath); |
1765: | if (!is_dir($chkrpath)) { |
1766: | return error("mail home `%s' does not exist", $chkvpath); |
1767: | } |
1768: | |
1769: | return Storage::bindTo($this->domain_fs_path())->createMaildir($path, $pwd['uid'], |
1770: | $pwd['gid']); |
1771: | } |
1772: | |
1773: | public function create_maildir($mailbox) |
1774: | { |
1775: | if (!IS_CLI) { |
1776: | return $this->query('email_create_maildir', $mailbox); |
1777: | } |
1778: | |
1779: | return $this->create_maildir_backend($this->username, $mailbox); |
1780: | } |
1781: | |
1782: | public function _delete() |
1783: | { |
1784: | |
1785: | $pemfile = static::SSL_PROXY_DIR . '/' . $this->site . '.pem'; |
1786: | if (file_exists($pemfile)) { |
1787: | unlink($pemfile); |
1788: | } |
1789: | $conf = $this->getAuthContext()->getAccount()->cur; |
1790: | $ips = $conf['ipinfo']['ipaddrs'] + append_config((array)$conf['ipinfo6']['ipaddrs']); |
1791: | if (!$ips) { |
1792: | return true; |
1793: | } |
1794: | foreach ($ips as $ip) { |
1795: | $this->_removeMTA($ip); |
1796: | } |
1797: | $this->_removeIMAP($this->site); |
1798: | |
1799: | |
1800: | } |
1801: | |
1802: | private function _removeMTA($ip) |
1803: | { |
1804: | $hosts = file(Dns_Module::HOSTS_FILE, FILE_IGNORE_NEW_LINES | FILE_SKIP_EMPTY_LINES); |
1805: | $regex = Regex::compile( |
1806: | Regex::EMAIL_MTA_IP_RECORD, |
1807: | array( |
1808: | 'ip' => preg_quote($ip, '/') |
1809: | ) |
1810: | ); |
1811: | |
1812: | $new = array(); |
1813: | $found = false; |
1814: | foreach ($hosts as $host) { |
1815: | if (preg_match($regex, $host)) { |
1816: | $found = true; |
1817: | continue; |
1818: | } |
1819: | $new[] = $host; |
1820: | } |
1821: | $new[] = ''; |
1822: | if (!$found) { |
1823: | return -1; |
1824: | } |
1825: | |
1826: | |
1827: | |
1828: | |
1829: | |
1830: | |
1831: | return file_put_contents(Dns_Module::HOSTS_FILE, join(PHP_EOL, $new), LOCK_EX) !== false; |
1832: | } |
1833: | |
1834: | |
1835: | |
1836: | |
1837: | |
1838: | |
1839: | private function _removeIMAP($site) |
1840: | { |
1841: | $path = self::SSL_PROXY_DIR . '/' . $site; |
1842: | $extensions = array('conf', 'crt', 'key', 'pem'); |
1843: | foreach ($extensions as $ext) { |
1844: | $file = $path . '.' . $ext; |
1845: | if (file_exists($file)) { |
1846: | unlink($file); |
1847: | } |
1848: | } |
1849: | } |
1850: | |
1851: | public function _edit() |
1852: | { |
1853: | $conf_new = $this->getAuthContext()->getAccount()->new; |
1854: | $conf_old = $this->getAuthContext()->getAccount()->old; |
1855: | $user = array( |
1856: | 'old' => $conf_old['siteinfo']['admin_user'], |
1857: | 'new' => $conf_new['siteinfo']['admin_user'] |
1858: | ); |
1859: | |
1860: | if ($conf_old['mail']['provider'] === 'builtin' && $conf_new['mail']['provider'] !== 'builtin') { |
1861: | $oldInstance = $this; |
1862: | $module = Email_Module::instantiateContexted($this->getAuthContext()); |
1863: | $this->getApnscpFunctionInterceptor()->swap('email', $module); |
1864: | $this->save_mailboxes(); |
1865: | foreach ($module->list_virtual_transports() as $transport) { |
1866: | $waserr = \Error_Reporter::is_error(); |
1867: | $module->remove_virtual_transport($transport); |
1868: | if (!$waserr && \Error_Reporter::is_error()) { |
1869: | \Error_Reporter::downgrade(\Error_Reporter::E_WARNING); |
1870: | } |
1871: | } |
1872: | $this->getApnscpFunctionInterceptor()->swap('email', $oldInstance); |
1873: | |
1874: | } else if ($conf_new['mail']['provider'] === 'builtin' && $conf_old['mail']['provider'] !== 'builtin') { |
1875: | if (file_exists($this->domain_info_path(self::MAILBOX_SAVE_DEFAULT))) { |
1876: | $this->restore_mailboxes(); |
1877: | } else { |
1878: | warn("No mail transports enabled. These must be enabled under Mail > Mail Routing"); |
1879: | } |
1880: | } |
1881: | |
1882: | |
1883: | |
1884: | |
1885: | |
1886: | |
1887: | if ($user['old'] !== $user['new']) { |
1888: | |
1889: | |
1890: | $this->_edit_user( |
1891: | $user['old'], |
1892: | $user['new'], |
1893: | $this->user_getpwnam($user['new']) |
1894: | ); |
1895: | } |
1896: | |
1897: | |
1898: | |
1899: | |
1900: | |
1901: | $aliases = [ |
1902: | 'old' => array_merge($conf_old['aliases']['aliases'], (array)$conf_old['siteinfo']['domain']), |
1903: | 'new' => array_merge($conf_new['aliases']['aliases'], (array)$conf_new['siteinfo']['domain']) |
1904: | ]; |
1905: | $toremove = array_diff($aliases['old'], $aliases['new']); |
1906: | |
1907: | foreach ($toremove as $domain) { |
1908: | if ($this->transport_exists($domain)) { |
1909: | $this->remove_virtual_transport($domain); |
1910: | } |
1911: | } |
1912: | |
1913: | |
1914: | |
1915: | |
1916: | $ipcur = $conf_old['ipinfo']; |
1917: | $ipnew = $conf_new['ipinfo']; |
1918: | |
1919: | if ($ipnew === $ipcur) { |
1920: | return true; |
1921: | } |
1922: | |
1923: | if (!$ipcur['namebased'] && $ipnew['namebased']) { |
1924: | foreach ($ipcur['ipaddrs'] as $ip) { |
1925: | $this->_removeMTA($ip); |
1926: | $this->_removeIMAP($this->site); |
1927: | } |
1928: | } else if ($ipcur['namebased'] && !$ipnew['namebased']) { |
1929: | foreach ($ipnew['ipaddrs'] as $ip) { |
1930: | $this->_addMTA($ip); |
1931: | } |
1932: | } else if ($ipcur['ipaddrs'] != $ipnew['ipaddrs']) { |
1933: | $remove = array_diff($ipcur['ipaddrs'], $ipnew['ipaddrs']); |
1934: | $add = array_diff($ipnew['ipaddrs'], $ipcur['ipaddrs']); |
1935: | foreach ($remove as $ip) { |
1936: | $this->_removeMTA($ip); |
1937: | } |
1938: | foreach ($add as $ip) { |
1939: | $this->_addMTA($ip); |
1940: | } |
1941: | |
1942: | } |
1943: | return true; |
1944: | } |
1945: | |
1946: | public function _edit_user(string $userold, string $usernew, array $oldpwd) |
1947: | { |
1948: | |
1949: | $this->_reload('adduser'); |
1950: | if ($userold === $usernew) { |
1951: | return; |
1952: | } |
1953: | |
1954: | $uid = $this->user_get_uid_from_username($usernew); |
1955: | if (!$uid) { |
1956: | return error("cannot determine uid from user `%s' in mailbox translation", $userold); |
1957: | } |
1958: | $pam = new Util_Pam($this->getAuthContext()); |
1959: | mute_warn(); |
1960: | foreach ($this->_pam_services() as $svc) { |
1961: | if ($this->user_permitted($userold, $svc)) { |
1962: | $pam->remove($userold, $svc); |
1963: | |
1964: | $pam->add($usernew, $svc); |
1965: | } |
1966: | } |
1967: | unmute_warn(); |
1968: | |
1969: | |
1970: | |
1971: | |
1972: | |
1973: | $mailboxes = $this->list_mailboxes('local', $userold); |
1974: | foreach ($mailboxes as $mailbox) { |
1975: | $target = ''; |
1976: | if ($mailbox['type'] === self::MAILBOX_USER) { |
1977: | $target = '/home/' . $mailbox['mailbox'] . '/' . |
1978: | self::MAILDIR_HOME . '/' . $mailbox['custom']; |
1979: | } else if ($mailbox['mailbox'] !== self::MAILDIR_HOME) { |
1980: | $target = $mailbox['mailbox']; |
1981: | } |
1982: | $this->modify_mailbox($mailbox['user'], |
1983: | $mailbox['domain'], |
1984: | $usernew, |
1985: | $mailbox['domain'], |
1986: | $target, |
1987: | $mailbox['type'] |
1988: | ); |
1989: | } |
1990: | |
1991: | $this->_update_email_aliases($userold, $usernew); |
1992: | |
1993: | return true; |
1994: | } |
1995: | |
1996: | private function _pam_services() |
1997: | { |
1998: | return ['smtp', 'imap', 'pop3']; |
1999: | } |
2000: | |
2001: | public function user_enabled($user = null, $svc = null) |
2002: | { |
2003: | deprecated_func('Use user_permitted'); |
2004: | return $this->user_permitted($user, $svc); |
2005: | } |
2006: | |
2007: | |
2008: | |
2009: | |
2010: | |
2011: | public function user_permitted($user = null, $svc = null) |
2012: | { |
2013: | if (!$user || ($this->permission_level & PRIVILEGE_USER)) { |
2014: | $user = $this->username; |
2015: | } |
2016: | if ($svc && $svc != 'imap' && $svc != 'smtp' && $svc != 'smtp_relay' && $svc !== 'pop3') { |
2017: | return error("unknown service `%s'", $svc); |
2018: | } |
2019: | if (!$this->enabled($svc)) { |
2020: | return false; |
2021: | } |
2022: | $enabled = 1; |
2023: | if (!$svc) { |
2024: | $enabled = (new Util_Pam($this->getAuthContext()))->check($user, 'imap'); |
2025: | $svc = 'smtp_relay'; |
2026: | } else if ($svc == 'smtp') { |
2027: | $svc = 'smtp_relay'; |
2028: | } |
2029: | |
2030: | return $enabled && (new Util_Pam($this->getAuthContext()))->check($user, $svc); |
2031: | } |
2032: | |
2033: | |
2034: | |
2035: | |
2036: | |
2037: | |
2038: | |
2039: | public function enabled(string $which = null): bool |
2040: | { |
2041: | |
2042: | if (platform_is('7.5')) { |
2043: | $which = $which === 'smtp_relay' ? 'smtp' : $which; |
2044: | } else { |
2045: | $which = $which === 'smtp' ? 'smtp_relay' : $which; |
2046: | } |
2047: | if ($which && $which !== 'smtp' && $which !== 'smtp_relay' && $which !== 'imap' && $which !== 'pop3') { |
2048: | return error("unknown service `%s'", $which); |
2049: | } |
2050: | if ($which) { |
2051: | $which = platform_is('7.5') ? 'mail' : 'sendmail'; |
2052: | |
2053: | return (bool)$this->getServiceValue($which, 'enabled'); |
2054: | } |
2055: | |
2056: | return $this->enabled('smtp') && $this->enabled('imap'); |
2057: | } |
2058: | |
2059: | |
2060: | |
2061: | |
2062: | |
2063: | |
2064: | |
2065: | public function merge_ssl($site = null) { |
2066: | if (!IS_CLI) { |
2067: | return $this->query('email_merge_ssl', $site); |
2068: | } |
2069: | |
2070: | if (!MAIL_PROXY) { |
2071: | return warn('No mail proxy installed'); |
2072: | } |
2073: | if (!$site) { |
2074: | $site = Enumerate::sites(); |
2075: | } |
2076: | try { |
2077: | $sites = array_map(static function ($s) { |
2078: | if (!($site = Auth::get_site_id_from_anything($s))) { |
2079: | throw new \Exception("Unknown site `{$s}'"); |
2080: | } |
2081: | return 'site' . $site; |
2082: | }, (array)$site); |
2083: | } catch (\Exception $e) { |
2084: | return error($e->getMessage()); |
2085: | } |
2086: | |
2087: | $status = true; |
2088: | foreach ($sites as $site) { |
2089: | $context = Auth::context(null, $site); |
2090: | $afi = apnscpFunctionInterceptor::factory($context); |
2091: | if (!$afi->ssl_key_exists()) { |
2092: | continue; |
2093: | } |
2094: | if (!($ssl = $afi->ssl_get_certificates())) { |
2095: | continue; |
2096: | } |
2097: | $fst = $context->domain_fs_path(); |
2098: | if ( !($pem = Ssl::unify($ssl[0], $fst)) ) { |
2099: | $status &= error('Failed to unify SSL data into pem: %s', $site); |
2100: | continue; |
2101: | } |
2102: | $pemfile = static::SSL_PROXY_DIR . "/{$site}.pem"; |
2103: | if (!file_put_contents($pemfile, $pem)) { |
2104: | file_exists($pemfile) && unlink($pemfile); |
2105: | $status &= error("Failed to populate SSL for `%s'", $site); |
2106: | } |
2107: | } |
2108: | call_user_func([\Opcenter\Mail::serviceClass(MAIL_PROXY), 'reload']); |
2109: | |
2110: | return $status; |
2111: | |
2112: | } |
2113: | |
2114: | |
2115: | |
2116: | |
2117: | |
2118: | |
2119: | |
2120: | |
2121: | private function _update_email_aliases($user, $usernew) |
2122: | { |
2123: | $prepfunc = static function ($domain) use ($user) { |
2124: | return '\b' . preg_quote($user, '/') . '@(' . preg_quote($domain, '/') . ')\b'; |
2125: | }; |
2126: | |
2127: | $regexcb = static function ($matches) use ($usernew) { |
2128: | return $usernew . '@' . $matches[1]; |
2129: | }; |
2130: | |
2131: | $domains = $this->list_virtual_transports(); |
2132: | $regex = '/' . join('|', array_map($prepfunc, $domains)) . '/S'; |
2133: | |
2134: | $forwards = $this->list_mailboxes(self::MAILBOX_FORWARD); |
2135: | $changed = 0; |
2136: | foreach ($forwards as $forward) { |
2137: | $cnt = 0; |
2138: | $new = preg_replace_callback($regex, $regexcb, $forward['destination'], -1, $cnt); |
2139: | if ($cnt < 1) { |
2140: | continue; |
2141: | } |
2142: | if ($this->modify_mailbox( |
2143: | $forward['user'], |
2144: | $forward['domain'], |
2145: | $forward['user'], |
2146: | $forward['domain'], |
2147: | $new, |
2148: | $forward['type'] |
2149: | ) |
2150: | ) { |
2151: | if ($changed > -1) { |
2152: | $changed++; |
2153: | } |
2154: | } else { |
2155: | warn('failed to adjust mailbox `%s@%s`', $forward['user'], $forward['domain']); |
2156: | $changed = -1; |
2157: | } |
2158: | |
2159: | } |
2160: | |
2161: | return $changed; |
2162: | } |
2163: | |
2164: | public function list_virtual_transports() |
2165: | { |
2166: | $virtual = array(); |
2167: | $res = \PostgreSQL::initialize()->query('SELECT domain FROM domain_lookup WHERE site_id = ' . $this->site_id); |
2168: | while (null !== ($row = $res->fetch_object())) { |
2169: | $virtual[] = trim($row->domain); |
2170: | } |
2171: | |
2172: | return $virtual; |
2173: | } |
2174: | |
2175: | private function _addMTA($ip) |
2176: | { |
2177: | $hosts = file(Dns_Module::HOSTS_FILE, FILE_IGNORE_NEW_LINES | FILE_SKIP_EMPTY_LINES); |
2178: | $regex = Regex::compile( |
2179: | Regex::EMAIL_MTA_IP_RECORD, |
2180: | array( |
2181: | 'ip' => preg_quote($ip, '/') |
2182: | ) |
2183: | ); |
2184: | foreach ($hosts as $host) { |
2185: | if (preg_match($regex, $host)) { |
2186: | return -1; |
2187: | } |
2188: | } |
2189: | |
2190: | $hosts[] = $ip . ' internal-multihome'; |
2191: | $hosts[] = ''; |
2192: | |
2193: | return file_put_contents(Dns_Module::HOSTS_FILE, join(PHP_EOL, $hosts), LOCK_EX) !== false; |
2194: | } |
2195: | |
2196: | public function _delete_user(string $user) |
2197: | { |
2198: | foreach ($this->list_mailboxes(self::MAILBOX_DESTINATION, $user) as $mailbox) { |
2199: | $this->delete_mailbox($mailbox['user'], $mailbox['domain']); |
2200: | } |
2201: | } |
2202: | |
2203: | public function permit_user($user, $svc = null) |
2204: | { |
2205: | if ($svc && $svc != 'smtp' && $svc != 'imap' && $svc != 'smtp_relay' && $svc !== 'pop3') { |
2206: | return error('service ' . $svc . ' is unknown (imap, smtp, pop3)'); |
2207: | } |
2208: | |
2209: | if ($this->auth_is_demo()) { |
2210: | return error('Email disabled for demo account'); |
2211: | } |
2212: | |
2213: | if ($svc === 'smtp_relay') { |
2214: | $svc = 'smtp'; |
2215: | } |
2216: | |
2217: | $pam = new Util_Pam($this->getAuthContext()); |
2218: | if ($svc) { |
2219: | return $pam->add($user, $svc); |
2220: | } |
2221: | |
2222: | $ret = true; |
2223: | foreach (['imap', 'smtp', 'pop3'] as $svc) { |
2224: | $ret &= $pam->check($user, $svc) || $pam->add($user, $svc); |
2225: | } |
2226: | |
2227: | return (bool)$ret; |
2228: | } |
2229: | |
2230: | public function deny_user($user, $svc = null) |
2231: | { |
2232: | if ($svc && $svc != 'smtp' && $svc != 'imap' && $svc != 'smtp_relay' && $svc !== 'pop3') { |
2233: | return error('service ' . $svc . ' not in list'); |
2234: | } |
2235: | $pam = new Util_Pam($this->getAuthContext()); |
2236: | if (!$svc) { |
2237: | $pam->remove($user, 'smtp'); |
2238: | $svc = 'imap'; |
2239: | } else if ($svc == 'smtp') { |
2240: | $svc = 'smtp_relay'; |
2241: | } |
2242: | |
2243: | if ($svc === 'imap' && platform_is('7.5')) { |
2244: | $pam->remove($user, 'pop3'); |
2245: | } else if ($svc === 'pop3' && platform_is('7.5')) { |
2246: | $pam->remove($user, 'imap'); |
2247: | } |
2248: | |
2249: | return $pam->remove($user, $svc); |
2250: | } |
2251: | |
2252: | |
2253: | |
2254: | |
2255: | |
2256: | |
2257: | public function roll_srs(): bool |
2258: | { |
2259: | if (!IS_CLI) { |
2260: | return $this->query("email_roll_srs"); |
2261: | } |
2262: | |
2263: | if (!Postsrsd::exists()) { |
2264: | return error("Service %(name)s does not exist", ['name' => 'postsrsd']); |
2265: | } |
2266: | |
2267: | if (!Postsrsd::running()) { |
2268: | return error("Service %(name)s is inactive", ['name' => 'postsrsd']); |
2269: | } |
2270: | |
2271: | return Postsrsd::roll(); |
2272: | } |
2273: | |
2274: | |
2275: | |
2276: | |
2277: | |
2278: | |
2279: | |
2280: | |
2281: | |
2282: | public function convert_mailbox(string $src, string $dest = '~/' . Storage::MAILDIR_HOME, array $args = []): bool |
2283: | { |
2284: | if (!IS_CLI) { |
2285: | return $this->query('email_convert_mailbox', $src, $dest, $args); |
2286: | } |
2287: | |
2288: | $defaultArgs = [ |
2289: | 'to' => Storage::FORMAT, |
2290: | 'from' => 'mdbox', |
2291: | 'single' => false, |
2292: | 'oneway' => false, |
2293: | 'reverse' => false, |
2294: | 'full' => false, |
2295: | 'purge' => false, |
2296: | 'debug' => is_debug(), |
2297: | 'begin' => null, |
2298: | 'end' => null |
2299: | ]; |
2300: | |
2301: | $args += $defaultArgs; |
2302: | if (!Dovecot::exists()) { |
2303: | return error("Mail disabled on host"); |
2304: | } |
2305: | |
2306: | if (!($stat = $this->file_stat($src))) { |
2307: | return error("Path `%s' does not exist", $src); |
2308: | } |
2309: | |
2310: | if (!$stat['can_write']) { |
2311: | return error("Path is not writeable"); |
2312: | } |
2313: | |
2314: | if (!($stat = $this->file_stat(dirname($dest)))) { |
2315: | return error("Destination parent does not exist"); |
2316: | } |
2317: | |
2318: | if (!$stat['can_write']) { |
2319: | return error("Destination is not writeable"); |
2320: | } |
2321: | |
2322: | if (null !== $args['begin'] && (!is_int($args['begin']) || $args['begin'] < 0 || $args['begin'] > ($args['end'] ?? PHP_INT_MAX))) { |
2323: | return error("Invalid begin timestamp"); |
2324: | } |
2325: | |
2326: | if (null !== $args['end'] && (!is_int($args['end']) || $args['end'] < 0 || $args['end'] < $args['begin'])) { |
2327: | return error("Invalid end timestamp"); |
2328: | } |
2329: | |
2330: | $types = ['mbox', 'maildir', 'mdbox', 'sdbox']; |
2331: | if (!in_array($args['to'], $types, true)) { |
2332: | return error("Unknown target format `%s'", $args['to']); |
2333: | } |
2334: | |
2335: | if (!in_array($args['from'], $types, true)) { |
2336: | return error("Unknown source format `%s'", $args['from']); |
2337: | } |
2338: | |
2339: | $cmd = '/usr/bin/doveadm %(debug)s -o mail_location=%(out)s:%(dest)s sync ' . |
2340: | ($args['begin'] ? '-t ' . $args['begin'] : '') . ' ' . |
2341: | ($args['end'] ? '-e ' . $args['end'] : '') . ' %(reverse)s %(oneway)s %(full)s %(purge)s -u %(user)s@%(domain)s %(in)s:%(path)s'; |
2342: | $ret = \Util_Process_Safe::exec($cmd, [ |
2343: | 'uid' => $stat['uid'], |
2344: | 'user' => $stat['owner'], |
2345: | 'domain' => $this->domain, |
2346: | 'in' => $args['from'], |
2347: | 'out' => $args['to'], |
2348: | 'path' => $src, |
2349: | 'dest' => $dest, |
2350: | 'reverse' => !empty($args['reverse']) ? '-R' : null, |
2351: | 'oneway' => !empty($args['oneway']) ? '-1' : null, |
2352: | 'full' => !empty($args['full']) ? '-f' : null, |
2353: | 'debug' => !empty($args['debug']) ? '-D' : null, |
2354: | 'purge' => !empty($args['purge']) ? '-P' : null |
2355: | ], [0,2]); |
2356: | |
2357: | if (!$ret['success']) { |
2358: | return error(coalesce($ret['stderr'], $ret['stdout'])); |
2359: | } |
2360: | |
2361: | return $ret['return'] === 0 || warn("Conversion partially succeeded: %s", |
2362: | coalesce($ret['stderr'], $ret['stdout'])); |
2363: | } |
2364: | |
2365: | public function _verify_conf(ConfigurationContext $ctx): bool |
2366: | { |
2367: | return true; |
2368: | } |
2369: | |
2370: | public function _cron(Cronus $c) |
2371: | { |
2372: | $c->schedule(MAIL_SRS_AUTOROLL ?: null, 'email.roll-srs-key', $this->roll_srs(...)); |
2373: | } |
2374: | |
2375: | public function _housekeeping() |
2376: | { |
2377: | $dummyfile = webapp_path('webmail/dummyset.php'); |
2378: | $dest = '/var/www/html/dummyset.php'; |
2379: | if (!file_exists($dest) || fileinode($dummyfile) !== fileinode($dest)) { |
2380: | file_exists($dest) && unlink($dest); |
2381: | $apnscpHome = realpath(INCLUDE_PATH); |
2382: | if (!Filesystem\Mount::sameMount('/var/www/html', $apnscpHome)) { |
2383: | warn("/var and %s are on different mount points - copying dummyset", $apnscpHome); |
2384: | copy($dummyfile, $dest); |
2385: | } else { |
2386: | link($dummyfile, $dest); |
2387: | } |
2388: | } |
2389: | return true; |
2390: | } |
2391: | |
2392: | protected function buildWarningTemplates(): void |
2393: | { |
2394: | $path = '/usr/libexec/dovecot/quota-warning.sh'; |
2395: | |
2396: | $template = new \Opcenter\Provisioning\ConfigurationWriter('mail.quota-warning-command', null); |
2397: | if (!$template->shouldRefresh($path)) { |
2398: | return; |
2399: | } |
2400: | |
2401: | $template->write($path) && Filesystem::chogp($path, 0, 0, 0755); |
2402: | } |
2403: | } |