Signed-off-by: Kristian Feldsam <feldsam@gmail.com> Revert "[Web] Implemented SSO for domain admins" This reverts commit 6860dc8ebe2c8f53d77df5bca7787f7cb3bb4ee0. Signed-off-by: Kristian Feldsam <feldsam@gmail.com>
		
			
				
	
	
		
			469 lines
		
	
	
		
			18 KiB
		
	
	
	
		
			PHP
		
	
	
	
	
	
			
		
		
	
	
			469 lines
		
	
	
		
			18 KiB
		
	
	
	
		
			PHP
		
	
	
	
	
	
<?php
 | 
						|
function domain_admin($_action, $_data = null) {
 | 
						|
  global $pdo;
 | 
						|
  global $lang;
 | 
						|
  $_data_log = $_data;
 | 
						|
  !isset($_data_log['password']) ?: $_data_log['password'] = '*';
 | 
						|
  !isset($_data_log['password2']) ?: $_data_log['password2'] = '*';
 | 
						|
  !isset($_data_log['user_old_pass']) ?: $_data_log['user_old_pass'] = '*';
 | 
						|
  !isset($_data_log['user_new_pass']) ?: $_data_log['user_new_pass'] = '*';
 | 
						|
  !isset($_data_log['user_new_pass2']) ?: $_data_log['user_new_pass2'] = '*';
 | 
						|
  switch ($_action) {
 | 
						|
    case 'add':
 | 
						|
      $username		= strtolower(trim($_data['username']));
 | 
						|
      $password		= $_data['password'];
 | 
						|
      $password2  = $_data['password2'];
 | 
						|
      $domains    = (array)$_data['domains'];
 | 
						|
      $active     = intval($_data['active']);
 | 
						|
      if ($_SESSION['mailcow_cc_role'] != "admin") {
 | 
						|
        $_SESSION['return'][] = array(
 | 
						|
          'type' => 'danger',
 | 
						|
          'log' => array(__FUNCTION__, $_action, $_data_log),
 | 
						|
          'msg' => 'access_denied'
 | 
						|
        );
 | 
						|
        return false;
 | 
						|
      }
 | 
						|
      if (empty($domains)) {
 | 
						|
        $_SESSION['return'][] = array(
 | 
						|
          'type' => 'danger',
 | 
						|
          'log' => array(__FUNCTION__, $_action, $_data_log),
 | 
						|
          'msg' => 'domain_invalid'
 | 
						|
        );
 | 
						|
        return false;
 | 
						|
      }
 | 
						|
      if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username)) || empty ($username) || $username == 'API') {
 | 
						|
        $_SESSION['return'][] = array(
 | 
						|
          'type' => 'danger',
 | 
						|
          'log' => array(__FUNCTION__, $_action, $_data_log),
 | 
						|
          'msg' => array('username_invalid', $username)
 | 
						|
        );
 | 
						|
        return false;
 | 
						|
      }
 | 
						|
 | 
						|
      $stmt = $pdo->prepare("SELECT `username` FROM `mailbox`
 | 
						|
        WHERE `username` = :username");
 | 
						|
      $stmt->execute(array(':username' => $username));
 | 
						|
      $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
 | 
						|
 | 
						|
      $stmt = $pdo->prepare("SELECT `username` FROM `admin`
 | 
						|
        WHERE `username` = :username");
 | 
						|
      $stmt->execute(array(':username' => $username));
 | 
						|
      $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
 | 
						|
 | 
						|
      $stmt = $pdo->prepare("SELECT `username` FROM `domain_admins`
 | 
						|
        WHERE `username` = :username");
 | 
						|
      $stmt->execute(array(':username' => $username));
 | 
						|
      $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
 | 
						|
 | 
						|
      foreach ($num_results as $num_results_each) {
 | 
						|
        if ($num_results_each != 0) {
 | 
						|
          $_SESSION['return'][] = array(
 | 
						|
            'type' => 'danger',
 | 
						|
            'log' => array(__FUNCTION__, $_action, $_data_log),
 | 
						|
            'msg' => array('object_exists', htmlspecialchars($username))
 | 
						|
          );
 | 
						|
          return false;
 | 
						|
        }
 | 
						|
      }
 | 
						|
      if (password_check($password, $password2) !== true) {
 | 
						|
        continue;
 | 
						|
      }
 | 
						|
      $password_hashed = hash_password($password);
 | 
						|
      $valid_domains = 0;
 | 
						|
      foreach ($domains as $domain) {
 | 
						|
        if (!is_valid_domain_name($domain) || mailbox('get', 'domain_details', $domain) === false) {
 | 
						|
          $_SESSION['return'][] = array(
 | 
						|
            'type' => 'danger',
 | 
						|
            'log' => array(__FUNCTION__, $_action, $_data_log),
 | 
						|
            'msg' => array('domain_invalid', htmlspecialchars($domain))
 | 
						|
          );
 | 
						|
          continue;
 | 
						|
        }
 | 
						|
        $valid_domains++;
 | 
						|
        $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
 | 
						|
            VALUES (:username, :domain, :created, :active)");
 | 
						|
        $stmt->execute(array(
 | 
						|
          ':username' => $username,
 | 
						|
          ':domain' => $domain,
 | 
						|
          ':created' => date('Y-m-d H:i:s'),
 | 
						|
          ':active' => $active
 | 
						|
        ));
 | 
						|
      }
 | 
						|
      if ($valid_domains != 0) {
 | 
						|
        $stmt = $pdo->prepare("INSERT INTO `admin` (`username`, `password`, `superadmin`, `active`)
 | 
						|
          VALUES (:username, :password_hashed, '0', :active)");
 | 
						|
        $stmt->execute(array(
 | 
						|
          ':username' => $username,
 | 
						|
          ':password_hashed' => $password_hashed,
 | 
						|
          ':active' => $active
 | 
						|
        ));
 | 
						|
      }
 | 
						|
      $stmt = $pdo->prepare("INSERT INTO `da_acl` (`username`) VALUES (:username)");
 | 
						|
      $stmt->execute(array(
 | 
						|
        ':username' => $username
 | 
						|
      ));
 | 
						|
      $_SESSION['return'][] = array(
 | 
						|
        'type' => 'success',
 | 
						|
        'log' => array(__FUNCTION__, $_action, $_data_log),
 | 
						|
        'msg' => array('domain_admin_added', htmlspecialchars($username))
 | 
						|
      );
 | 
						|
    break;
 | 
						|
    case 'edit':
 | 
						|
      if ($_SESSION['mailcow_cc_role'] != "admin" && $_SESSION['mailcow_cc_role'] != "domainadmin") {
 | 
						|
        $_SESSION['return'][] = array(
 | 
						|
          'type' => 'danger',
 | 
						|
          'log' => array(__FUNCTION__, $_action, $_data_log),
 | 
						|
          'msg' => 'access_denied'
 | 
						|
        );
 | 
						|
        return false;
 | 
						|
      }
 | 
						|
      // Administrator
 | 
						|
      if ($_SESSION['mailcow_cc_role'] == "admin") {
 | 
						|
        if (!is_array($_data['username'])) {
 | 
						|
          $usernames = array();
 | 
						|
          $usernames[] = $_data['username'];
 | 
						|
        }
 | 
						|
        else {
 | 
						|
          $usernames = $_data['username'];
 | 
						|
        }
 | 
						|
        foreach ($usernames as $username) {
 | 
						|
          $is_now = domain_admin('details', $username);
 | 
						|
          $domains = (isset($_data['domains'])) ? (array)$_data['domains'] : null;
 | 
						|
          if (!empty($is_now)) {
 | 
						|
            $active = (isset($_data['active'])) ? intval($_data['active']) : $is_now['active'];
 | 
						|
            $domains = (!empty($domains)) ? $domains : $is_now['selected_domains'];
 | 
						|
            $username_new = (!empty($_data['username_new'])) ? $_data['username_new'] : $is_now['username'];
 | 
						|
          }
 | 
						|
          else {
 | 
						|
            $_SESSION['return'][] = array(
 | 
						|
              'type' => 'danger',
 | 
						|
              'log' => array(__FUNCTION__, $_action, $_data_log),
 | 
						|
              'msg' => 'access_denied'
 | 
						|
            );
 | 
						|
            continue;
 | 
						|
          }
 | 
						|
          $password     = $_data['password'];
 | 
						|
          $password2    = $_data['password2'];
 | 
						|
          if (!empty($domains)) {
 | 
						|
            foreach ($domains as $domain) {
 | 
						|
              if (!is_valid_domain_name($domain) || mailbox('get', 'domain_details', $domain) === false) {
 | 
						|
                $_SESSION['return'][] = array(
 | 
						|
                  'type' => 'danger',
 | 
						|
                  'log' => array(__FUNCTION__, $_action, $_data_log),
 | 
						|
                  'msg' => array('domain_invalid', htmlspecialchars($domain))
 | 
						|
                );
 | 
						|
                continue 2;
 | 
						|
              }
 | 
						|
            }
 | 
						|
          }
 | 
						|
          if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username_new))) {
 | 
						|
            $_SESSION['return'][] = array(
 | 
						|
              'type' => 'danger',
 | 
						|
              'log' => array(__FUNCTION__, $_action, $_data_log),
 | 
						|
              'msg' => array('username_invalid', $username_new)
 | 
						|
            );
 | 
						|
            continue;
 | 
						|
          }
 | 
						|
          if ($username_new != $username) {
 | 
						|
            if (!empty(domain_admin('details', $username_new)['username'])) {
 | 
						|
              $_SESSION['return'][] = array(
 | 
						|
                'type' => 'danger',
 | 
						|
                'log' => array(__FUNCTION__, $_action, $_data_log),
 | 
						|
                'msg' => array('username_invalid', $username_new)
 | 
						|
              );
 | 
						|
              continue;
 | 
						|
            }
 | 
						|
          }
 | 
						|
          $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
 | 
						|
          $stmt->execute(array(
 | 
						|
            ':username' => $username,
 | 
						|
          ));
 | 
						|
          $stmt = $pdo->prepare("UPDATE `da_acl` SET `username` = :username_new WHERE `username` = :username");
 | 
						|
          $stmt->execute(array(
 | 
						|
            ':username_new' => $username_new,
 | 
						|
            ':username' => $username
 | 
						|
          ));
 | 
						|
          if (!empty($domains)) {
 | 
						|
            foreach ($domains as $domain) {
 | 
						|
              $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
 | 
						|
                VALUES (:username_new, :domain, :created, :active)");
 | 
						|
              $stmt->execute(array(
 | 
						|
                ':username_new' => $username_new,
 | 
						|
                ':domain' => $domain,
 | 
						|
                ':created' => date('Y-m-d H:i:s'),
 | 
						|
                ':active' => $active
 | 
						|
              ));
 | 
						|
            }
 | 
						|
          }
 | 
						|
          if (!empty($password)) {
 | 
						|
            if (password_check($password, $password2) !== true) {
 | 
						|
              return false;
 | 
						|
            }
 | 
						|
            $password_hashed = hash_password($password);
 | 
						|
            $stmt = $pdo->prepare("UPDATE `admin` SET `username` = :username_new, `active` = :active, `password` = :password_hashed WHERE `username` = :username");
 | 
						|
            $stmt->execute(array(
 | 
						|
              ':password_hashed' => $password_hashed,
 | 
						|
              ':username_new' => $username_new,
 | 
						|
              ':username' => $username,
 | 
						|
              ':active' => $active
 | 
						|
            ));
 | 
						|
            if (isset($_data['disable_tfa'])) {
 | 
						|
              $stmt = $pdo->prepare("UPDATE `tfa` SET `active` = '0' WHERE `username` = :username");
 | 
						|
              $stmt->execute(array(':username' => $username));
 | 
						|
            }
 | 
						|
            else {
 | 
						|
              $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username_new WHERE `username` = :username");
 | 
						|
              $stmt->execute(array(':username_new' => $username_new, ':username' => $username));
 | 
						|
            }
 | 
						|
          }
 | 
						|
          else {
 | 
						|
            $stmt = $pdo->prepare("UPDATE `admin` SET `username` = :username_new, `active` = :active WHERE `username` = :username");
 | 
						|
            $stmt->execute(array(
 | 
						|
              ':username_new' => $username_new,
 | 
						|
              ':username' => $username,
 | 
						|
              ':active' => $active
 | 
						|
            ));
 | 
						|
            if (isset($_data['disable_tfa'])) {
 | 
						|
              $stmt = $pdo->prepare("UPDATE `tfa` SET `active` = '0' WHERE `username` = :username");
 | 
						|
              $stmt->execute(array(':username' => $username));
 | 
						|
            }
 | 
						|
            else {
 | 
						|
              $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username_new WHERE `username` = :username");
 | 
						|
              $stmt->execute(array(':username_new' => $username_new, ':username' => $username));
 | 
						|
            }
 | 
						|
          }
 | 
						|
          $_SESSION['return'][] = array(
 | 
						|
            'type' => 'success',
 | 
						|
            'log' => array(__FUNCTION__, $_action, $_data_log),
 | 
						|
            'msg' => array('domain_admin_modified', htmlspecialchars($username))
 | 
						|
          );
 | 
						|
        }
 | 
						|
        return true;
 | 
						|
      }
 | 
						|
      // Domain administrator
 | 
						|
      // Can only edit itself
 | 
						|
      elseif ($_SESSION['mailcow_cc_role'] == "domainadmin") {
 | 
						|
        $username = $_SESSION['mailcow_cc_username'];
 | 
						|
        $password_old		= $_data['user_old_pass'];
 | 
						|
        $password_new	= $_data['user_new_pass'];
 | 
						|
        $password_new2	= $_data['user_new_pass2'];
 | 
						|
 | 
						|
        $stmt = $pdo->prepare("SELECT `password` FROM `admin`
 | 
						|
            WHERE `username` = :user");
 | 
						|
        $stmt->execute(array(':user' => $username));
 | 
						|
        $row = $stmt->fetch(PDO::FETCH_ASSOC);
 | 
						|
        if (!verify_hash($row['password'], $password_old)) {
 | 
						|
          $_SESSION['return'][] = array(
 | 
						|
            'type' => 'danger',
 | 
						|
            'log' => array(__FUNCTION__, $_action, $_data_log),
 | 
						|
            'msg' => 'access_denied'
 | 
						|
          );
 | 
						|
          return false;
 | 
						|
        }
 | 
						|
        if (password_check($password_new, $password_new2) !== true) {
 | 
						|
          return false;
 | 
						|
        }
 | 
						|
        $password_hashed = hash_password($password_new);
 | 
						|
        $stmt = $pdo->prepare("UPDATE `admin` SET `password` = :password_hashed WHERE `username` = :username");
 | 
						|
        $stmt->execute(array(
 | 
						|
          ':password_hashed' => $password_hashed,
 | 
						|
          ':username' => $username
 | 
						|
        ));
 | 
						|
        $_SESSION['return'][] = array(
 | 
						|
          'type' => 'success',
 | 
						|
          'log' => array(__FUNCTION__, $_action, $_data_log),
 | 
						|
          'msg' => array('domain_admin_modified', htmlspecialchars($username))
 | 
						|
        );
 | 
						|
      }
 | 
						|
    break;
 | 
						|
    case 'delete':
 | 
						|
      if ($_SESSION['mailcow_cc_role'] != "admin") {
 | 
						|
        $_SESSION['return'][] = array(
 | 
						|
          'type' => 'danger',
 | 
						|
          'log' => array(__FUNCTION__, $_action, $_data_log),
 | 
						|
          'msg' => 'access_denied'
 | 
						|
        );
 | 
						|
        return false;
 | 
						|
      }
 | 
						|
      $usernames = (array)$_data['username'];
 | 
						|
      foreach ($usernames as $username) {
 | 
						|
        if (empty(domain_admin('details', $username))) {
 | 
						|
          $_SESSION['return'][] = array(
 | 
						|
            'type' => 'danger',
 | 
						|
            'log' => array(__FUNCTION__, $_action, $_data_log),
 | 
						|
            'msg' => array('username_invalid', $username)
 | 
						|
          );
 | 
						|
          continue;
 | 
						|
        }
 | 
						|
        $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
 | 
						|
        $stmt->execute(array(
 | 
						|
          ':username' => $username,
 | 
						|
        ));
 | 
						|
        $stmt = $pdo->prepare("DELETE FROM `admin` WHERE `username` = :username");
 | 
						|
        $stmt->execute(array(
 | 
						|
          ':username' => $username,
 | 
						|
        ));
 | 
						|
        $stmt = $pdo->prepare("DELETE FROM `da_acl` WHERE `username` = :username");
 | 
						|
        $stmt->execute(array(
 | 
						|
          ':username' => $username,
 | 
						|
        ));
 | 
						|
        $stmt = $pdo->prepare("DELETE FROM `tfa` WHERE `username` = :username");
 | 
						|
        $stmt->execute(array(
 | 
						|
          ':username' => $username,
 | 
						|
        ));
 | 
						|
        $stmt = $pdo->prepare("DELETE FROM `fido2` WHERE `username` = :username");
 | 
						|
        $stmt->execute(array(
 | 
						|
          ':username' => $username,
 | 
						|
        ));
 | 
						|
        $_SESSION['return'][] = array(
 | 
						|
          'type' => 'success',
 | 
						|
          'log' => array(__FUNCTION__, $_action, $_data_log),
 | 
						|
          'msg' => array('domain_admin_removed', htmlspecialchars($username))
 | 
						|
        );
 | 
						|
      }
 | 
						|
    break;
 | 
						|
    case 'get':
 | 
						|
      $domainadmins = array();
 | 
						|
      if ($_SESSION['mailcow_cc_role'] != "admin") {
 | 
						|
        $_SESSION['return'][] = array(
 | 
						|
          'type' => 'danger',
 | 
						|
          'log' => array(__FUNCTION__, $_action, $_data_log),
 | 
						|
          'msg' => 'access_denied'
 | 
						|
        );
 | 
						|
        return false;
 | 
						|
      }
 | 
						|
      $stmt = $pdo->query("SELECT DISTINCT
 | 
						|
        `username`
 | 
						|
          FROM `domain_admins`
 | 
						|
            WHERE `username` IN (
 | 
						|
              SELECT `username` FROM `admin`
 | 
						|
                WHERE `superadmin`!='1'
 | 
						|
            )");
 | 
						|
      $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
 | 
						|
      while ($row = array_shift($rows)) {
 | 
						|
        $domainadmins[] = $row['username'];
 | 
						|
      }
 | 
						|
      return $domainadmins;
 | 
						|
    break;
 | 
						|
    case 'details':
 | 
						|
      $domainadmindata = array();
 | 
						|
      if ($_SESSION['mailcow_cc_role'] == "domainadmin" && $_data != $_SESSION['mailcow_cc_username']) {
 | 
						|
        return false;
 | 
						|
      }
 | 
						|
      elseif ($_SESSION['mailcow_cc_role'] != "admin" || !isset($_data)) {
 | 
						|
        return false;
 | 
						|
      }
 | 
						|
      if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $_data))) {
 | 
						|
        return false;
 | 
						|
      }
 | 
						|
      $stmt = $pdo->prepare("SELECT
 | 
						|
        `tfa`.`active` AS `tfa_active`,
 | 
						|
        `domain_admins`.`username`,
 | 
						|
        `domain_admins`.`created`,
 | 
						|
        `domain_admins`.`active` AS `active`
 | 
						|
          FROM `domain_admins`
 | 
						|
          LEFT OUTER JOIN `tfa` ON `tfa`.`username`=`domain_admins`.`username`
 | 
						|
            WHERE `domain_admins`.`username`= :domain_admin");
 | 
						|
      $stmt->execute(array(
 | 
						|
        ':domain_admin' => $_data
 | 
						|
      ));
 | 
						|
      $row = $stmt->fetch(PDO::FETCH_ASSOC);
 | 
						|
      if (empty($row)) {
 | 
						|
        return false;
 | 
						|
      }
 | 
						|
      $domainadmindata['username'] = $row['username'];
 | 
						|
      $domainadmindata['tfa_active'] = (is_null($row['tfa_active'])) ? 0 : $row['tfa_active'];
 | 
						|
      $domainadmindata['tfa_active_int'] = (is_null($row['tfa_active'])) ? 0 : $row['tfa_active'];
 | 
						|
      $domainadmindata['active'] = $row['active'];
 | 
						|
      $domainadmindata['active_int'] = $row['active'];
 | 
						|
      $domainadmindata['created'] = $row['created'];
 | 
						|
      // GET SELECTED
 | 
						|
      $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
 | 
						|
        WHERE `domain` IN (
 | 
						|
          SELECT `domain` FROM `domain_admins`
 | 
						|
            WHERE `username`= :domain_admin)");
 | 
						|
      $stmt->execute(array(':domain_admin' => $_data));
 | 
						|
      $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
 | 
						|
      while($row = array_shift($rows)) {
 | 
						|
        $domainadmindata['selected_domains'][] = $row['domain'];
 | 
						|
      }
 | 
						|
      // GET UNSELECTED
 | 
						|
      $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
 | 
						|
        WHERE `domain` NOT IN (
 | 
						|
          SELECT `domain` FROM `domain_admins`
 | 
						|
            WHERE `username`= :domain_admin)");
 | 
						|
      $stmt->execute(array(':domain_admin' => $_data));
 | 
						|
      $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
 | 
						|
      while($row = array_shift($rows)) {
 | 
						|
        $domainadmindata['unselected_domains'][] = $row['domain'];
 | 
						|
      }
 | 
						|
      if (!isset($domainadmindata['unselected_domains'])) {
 | 
						|
        $domainadmindata['unselected_domains'] = "";
 | 
						|
      }
 | 
						|
 | 
						|
      return $domainadmindata;
 | 
						|
    break;
 | 
						|
  }
 | 
						|
}
 | 
						|
function domain_admin_sso($_action, $_data) {
 | 
						|
  global $pdo;
 | 
						|
 | 
						|
  switch ($_action) {
 | 
						|
    case 'check':
 | 
						|
      $token = $_data;
 | 
						|
 | 
						|
      $stmt = $pdo->prepare("SELECT `t1`.`username` FROM `da_sso` AS `t1` JOIN `admin` AS `t2` ON `t1`.`username` = `t2`.`username` WHERE `t1`.`token` = :token AND `t1`.`created` > DATE_SUB(NOW(), INTERVAL '30' SECOND) AND `t2`.`active` = 1 AND `t2`.`superadmin` = 0;");
 | 
						|
      $stmt->execute(array(
 | 
						|
        ':token' => preg_replace('/[^a-zA-Z0-9-]/', '', $token)
 | 
						|
      ));
 | 
						|
      $return = $stmt->fetch(PDO::FETCH_ASSOC);
 | 
						|
      return empty($return['username']) ? false : $return['username'];
 | 
						|
    case 'issue':
 | 
						|
      if ($_SESSION['mailcow_cc_role'] != "admin") {
 | 
						|
        $_SESSION['return'][] = array(
 | 
						|
          'type' => 'danger',
 | 
						|
          'log' => array(__FUNCTION__, $_action, $_data),
 | 
						|
          'msg' => 'access_denied'
 | 
						|
        );
 | 
						|
        return false;
 | 
						|
      }
 | 
						|
 | 
						|
      $username = $_data['username'];
 | 
						|
 | 
						|
      $stmt = $pdo->prepare("SELECT `username` FROM `domain_admins`
 | 
						|
        WHERE `username` = :username");
 | 
						|
      $stmt->execute(array(':username' => $username));
 | 
						|
      $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
 | 
						|
 | 
						|
      if ($num_results < 1) {
 | 
						|
        $_SESSION['return'][] = array(
 | 
						|
          'type' => 'danger',
 | 
						|
          'log' => array(__FUNCTION__, $_action, $_data),
 | 
						|
          'msg' => array('object_doesnt_exist', htmlspecialchars($username))
 | 
						|
        );
 | 
						|
        return false;
 | 
						|
      }
 | 
						|
 | 
						|
      $token = implode('-', array(
 | 
						|
        strtoupper(bin2hex(random_bytes(3))),
 | 
						|
        strtoupper(bin2hex(random_bytes(3))),
 | 
						|
        strtoupper(bin2hex(random_bytes(3))),
 | 
						|
        strtoupper(bin2hex(random_bytes(3))),
 | 
						|
        strtoupper(bin2hex(random_bytes(3)))
 | 
						|
      ));
 | 
						|
 | 
						|
      $stmt = $pdo->prepare("INSERT INTO `da_sso` (`username`, `token`)
 | 
						|
            VALUES (:username, :token)");
 | 
						|
      $stmt->execute(array(
 | 
						|
        ':username' => $username,
 | 
						|
        ':token' => $token
 | 
						|
      ));
 | 
						|
 | 
						|
      // perform cleanup
 | 
						|
      $pdo->query("DELETE FROM `da_sso` WHERE created < DATE_SUB(NOW(), INTERVAL '30' SECOND);");
 | 
						|
 | 
						|
      return ['token' => $token];
 | 
						|
    break;
 | 
						|
  }
 | 
						|
}
 |