repo
stringlengths
7
63
file_url
stringlengths
81
284
file_path
stringlengths
5
200
content
stringlengths
0
32.8k
language
stringclasses
1 value
license
stringclasses
7 values
commit_sha
stringlengths
40
40
retrieved_at
stringdate
2026-01-04 15:02:33
2026-01-05 05:24:06
truncated
bool
2 classes
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Storage/Show.php
app/Livewire/Storage/Show.php
<?php namespace App\Livewire\Storage; use App\Models\S3Storage; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Livewire\Component; class Show extends Component { use AuthorizesRequests; public $storage = null; public function mount() { $this->storage = S3Storage::ownedByCurrentTeam()->whereUuid(request()->storage_uuid)->first(); if (! $this->storage) { abort(404); } $this->authorize('view', $this->storage); } public function render() { return view('livewire.storage.show'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Storage/Create.php
app/Livewire/Storage/Create.php
<?php namespace App\Livewire\Storage; use App\Models\S3Storage; use App\Support\ValidationPatterns; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Illuminate\Support\Uri; use Livewire\Component; class Create extends Component { use AuthorizesRequests; public string $name; public string $description; public string $region = 'us-east-1'; public string $key; public string $secret; public string $bucket; public string $endpoint; public S3Storage $storage; protected function rules(): array { return [ 'name' => ValidationPatterns::nameRules(), 'description' => ValidationPatterns::descriptionRules(), 'region' => 'required|max:255', 'key' => 'required|max:255', 'secret' => 'required|max:255', 'bucket' => 'required|max:255', 'endpoint' => 'required|url|max:255', ]; } protected function messages(): array { return array_merge( ValidationPatterns::combinedMessages(), [ 'region.required' => 'The Region field is required.', 'region.max' => 'The Region may not be greater than 255 characters.', 'key.required' => 'The Access Key field is required.', 'key.max' => 'The Access Key may not be greater than 255 characters.', 'secret.required' => 'The Secret Key field is required.', 'secret.max' => 'The Secret Key may not be greater than 255 characters.', 'bucket.required' => 'The Bucket field is required.', 'bucket.max' => 'The Bucket may not be greater than 255 characters.', 'endpoint.required' => 'The Endpoint field is required.', 'endpoint.url' => 'The Endpoint must be a valid URL.', 'endpoint.max' => 'The Endpoint may not be greater than 255 characters.', ] ); } protected $validationAttributes = [ 'name' => 'Name', 'description' => 'Description', 'region' => 'Region', 'key' => 'Key', 'secret' => 'Secret', 'bucket' => 'Bucket', 'endpoint' => 'Endpoint', ]; public function updatedEndpoint($value) { try { if (empty($value)) { return; } if (str($value)->contains('digitaloceanspaces.com')) { $uri = Uri::of($value); $host = $uri->host(); if (preg_match('/^(.+)\.([^.]+\.digitaloceanspaces\.com)$/', $host, $matches)) { $host = $matches[2]; $value = "https://{$host}"; } } } finally { if (! str($value)->startsWith('https://') && ! str($value)->startsWith('http://')) { $value = 'https://'.$value; } $this->endpoint = $value; } } public function submit() { try { $this->authorize('create', S3Storage::class); $this->validate(); $this->storage = new S3Storage; $this->storage->name = $this->name; $this->storage->description = $this->description ?? null; $this->storage->region = $this->region; $this->storage->key = $this->key; $this->storage->secret = $this->secret; $this->storage->bucket = $this->bucket; if (empty($this->endpoint)) { $this->storage->endpoint = "https://s3.{$this->region}.amazonaws.com"; } else { $this->storage->endpoint = $this->endpoint; } $this->storage->team_id = currentTeam()->id; $this->storage->testConnection(); $this->storage->save(); return redirectRoute($this, 'storage.show', [$this->storage->uuid]); } catch (\Throwable $e) { $this->dispatch('error', 'Failed to create storage.', $e->getMessage()); // return handleError($e, $this); } } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Storage/Form.php
app/Livewire/Storage/Form.php
<?php namespace App\Livewire\Storage; use App\Models\S3Storage; use App\Support\ValidationPatterns; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Illuminate\Support\Facades\DB; use Livewire\Component; class Form extends Component { use AuthorizesRequests; public S3Storage $storage; // Explicit properties public ?string $name = null; public ?string $description = null; public string $endpoint; public string $bucket; public string $region; public string $key; public string $secret; public ?bool $isUsable = null; protected function rules(): array { return [ 'isUsable' => 'nullable|boolean', 'name' => ValidationPatterns::nameRules(required: false), 'description' => ValidationPatterns::descriptionRules(), 'region' => 'required|max:255', 'key' => 'required|max:255', 'secret' => 'required|max:255', 'bucket' => 'required|max:255', 'endpoint' => 'required|url|max:255', ]; } protected function messages(): array { return array_merge( ValidationPatterns::combinedMessages(), [ 'name.regex' => 'The Name may only contain letters, numbers, spaces, dashes (-), underscores (_), dots (.), slashes (/), colons (:), and parentheses ().', 'description.regex' => 'The Description contains invalid characters. Only letters, numbers, spaces, and common punctuation (- _ . : / () \' " , ! ? @ # % & + = [] {} | ~ ` *) are allowed.', 'region.required' => 'The Region field is required.', 'region.max' => 'The Region may not be greater than 255 characters.', 'key.required' => 'The Access Key field is required.', 'key.max' => 'The Access Key may not be greater than 255 characters.', 'secret.required' => 'The Secret Key field is required.', 'secret.max' => 'The Secret Key may not be greater than 255 characters.', 'bucket.required' => 'The Bucket field is required.', 'bucket.max' => 'The Bucket may not be greater than 255 characters.', 'endpoint.required' => 'The Endpoint field is required.', 'endpoint.url' => 'The Endpoint must be a valid URL.', 'endpoint.max' => 'The Endpoint may not be greater than 255 characters.', ] ); } protected $validationAttributes = [ 'isUsable' => 'Is Usable', 'name' => 'Name', 'description' => 'Description', 'region' => 'Region', 'key' => 'Key', 'secret' => 'Secret', 'bucket' => 'Bucket', 'endpoint' => 'Endpoint', ]; /** * Sync data between component properties and model * * @param bool $toModel If true, sync FROM properties TO model. If false, sync FROM model TO properties. */ private function syncData(bool $toModel = false): void { if ($toModel) { // Sync TO model (before save) $this->storage->name = $this->name; $this->storage->description = $this->description; $this->storage->endpoint = $this->endpoint; $this->storage->bucket = $this->bucket; $this->storage->region = $this->region; $this->storage->key = $this->key; $this->storage->secret = $this->secret; $this->storage->is_usable = $this->isUsable; } else { // Sync FROM model (on load/refresh) $this->name = $this->storage->name; $this->description = $this->storage->description; $this->endpoint = $this->storage->endpoint; $this->bucket = $this->storage->bucket; $this->region = $this->storage->region; $this->key = $this->storage->key; $this->secret = $this->storage->secret; $this->isUsable = $this->storage->is_usable; } } public function mount() { $this->syncData(false); } public function testConnection() { try { $this->authorize('validateConnection', $this->storage); $this->storage->testConnection(shouldSave: true); // Update component property to reflect the new validation status $this->isUsable = $this->storage->is_usable; return $this->dispatch('success', 'Connection is working.', 'Tested with "ListObjectsV2" action.'); } catch (\Throwable $e) { // Refresh model and sync to get the latest state $this->storage->refresh(); $this->isUsable = $this->storage->is_usable; $this->dispatch('error', 'Failed to test connection.', $e->getMessage()); } } public function delete() { try { $this->authorize('delete', $this->storage); $this->storage->delete(); return redirect()->route('storage.index'); } catch (\Throwable $e) { return handleError($e, $this); } } public function submit() { try { $this->authorize('update', $this->storage); DB::transaction(function () { $this->validate(); // Sync properties to model before saving $this->syncData(true); $this->storage->save(); // Test connection with new values - if this fails, transaction will rollback $this->storage->testConnection(shouldSave: false); // If we get here, the connection test succeeded $this->storage->is_usable = true; $this->storage->unusable_email_sent = false; $this->storage->save(); // Update local property to reflect success $this->isUsable = true; }); $this->dispatch('success', 'Storage settings updated and connection verified.'); } catch (\Throwable $e) { // Refresh the model to revert UI to database values after rollback $this->storage->refresh(); $this->syncData(false); return handleError($e, $this); } } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Storage/Index.php
app/Livewire/Storage/Index.php
<?php namespace App\Livewire\Storage; use App\Models\S3Storage; use Livewire\Component; class Index extends Component { public $s3; public function mount() { $this->s3 = S3Storage::ownedByCurrentTeam()->get(); } public function render() { return view('livewire.storage.index'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Terminal/Index.php
app/Livewire/Terminal/Index.php
<?php namespace App\Livewire\Terminal; use App\Models\Server; use Livewire\Attributes\On; use Livewire\Component; class Index extends Component { public $selected_uuid = 'default'; public $servers = []; public $containers = []; public bool $isLoadingContainers = true; public function mount() { $this->servers = Server::isReachable()->get()->filter(function ($server) { return $server->isTerminalEnabled(); }); } public function loadContainers() { try { $this->containers = $this->getAllActiveContainers(); } catch (\Exception $e) { return handleError($e, $this); } finally { $this->isLoadingContainers = false; } } private function getAllActiveContainers() { return collect($this->servers)->flatMap(function ($server) { if (! $server->isFunctional()) { return []; } return $server->loadAllContainers()->map(function ($container) use ($server) { $state = data_get_str($container, 'State')->lower(); if ($state->contains('running')) { return [ 'name' => data_get($container, 'Names'), 'connection_name' => data_get($container, 'Names'), 'uuid' => data_get($container, 'Names'), 'status' => data_get_str($container, 'State')->lower(), 'server' => $server, 'server_uuid' => $server->uuid, ]; } return null; })->filter(); })->sortBy('name'); } public function updatedSelectedUuid() { if ($this->selected_uuid === 'default') { // When cleared to default, do nothing (no error message) return; } $this->connectToContainer(); } #[On('connectToContainer')] public function connectToContainer() { if ($this->selected_uuid === 'default') { $this->dispatch('error', 'Please select a server or a container.'); return; } $container = collect($this->containers)->firstWhere('uuid', $this->selected_uuid); $this->dispatch('send-terminal-command', isset($container), $container['connection_name'] ?? $this->selected_uuid, $container['server_uuid'] ?? $this->selected_uuid ); } public function render() { return view('livewire.terminal.index'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Source/Github/Change.php
app/Livewire/Source/Github/Change.php
<?php namespace App\Livewire\Source\Github; use App\Jobs\GithubAppPermissionJob; use App\Models\GithubApp; use App\Models\PrivateKey; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Illuminate\Support\Facades\Http; use Lcobucci\JWT\Configuration; use Lcobucci\JWT\Signer\Key\InMemory; use Lcobucci\JWT\Signer\Rsa\Sha256; use Livewire\Component; class Change extends Component { use AuthorizesRequests; public string $webhook_endpoint = ''; public ?string $ipv4 = null; public ?string $ipv6 = null; public ?string $fqdn = null; public ?bool $default_permissions = true; public ?bool $preview_deployment_permissions = true; public ?bool $administration = false; public $parameters; public ?GithubApp $github_app = null; // Explicit properties public string $name; public ?string $organization = null; public string $apiUrl; public string $htmlUrl; public string $customUser; public int $customPort; public ?int $appId = null; public ?int $installationId = null; public ?string $clientId = null; public ?string $clientSecret = null; public ?string $webhookSecret = null; public bool $isSystemWide; public ?int $privateKeyId = null; public ?string $contents = null; public ?string $metadata = null; public ?string $pullRequests = null; public $applications; public $privateKeys; protected $rules = [ 'name' => 'required|string', 'organization' => 'nullable|string', 'apiUrl' => 'required|string', 'htmlUrl' => 'required|string', 'customUser' => 'required|string', 'customPort' => 'required|int', 'appId' => 'nullable|int', 'installationId' => 'nullable|int', 'clientId' => 'nullable|string', 'clientSecret' => 'nullable|string', 'webhookSecret' => 'nullable|string', 'isSystemWide' => 'required|bool', 'contents' => 'nullable|string', 'metadata' => 'nullable|string', 'pullRequests' => 'nullable|string', 'privateKeyId' => 'nullable|int', ]; public function boot() { if ($this->github_app) { $this->github_app->makeVisible(['client_secret', 'webhook_secret']); } } /** * Sync data between component properties and model * * @param bool $toModel If true, sync FROM properties TO model. If false, sync FROM model TO properties. */ private function syncData(bool $toModel = false): void { if ($toModel) { // Sync TO model (before save) $this->github_app->name = $this->name; $this->github_app->organization = $this->organization; $this->github_app->api_url = $this->apiUrl; $this->github_app->html_url = $this->htmlUrl; $this->github_app->custom_user = $this->customUser; $this->github_app->custom_port = $this->customPort; $this->github_app->app_id = $this->appId; $this->github_app->installation_id = $this->installationId; $this->github_app->client_id = $this->clientId; $this->github_app->client_secret = $this->clientSecret; $this->github_app->webhook_secret = $this->webhookSecret; $this->github_app->is_system_wide = $this->isSystemWide; $this->github_app->private_key_id = $this->privateKeyId; $this->github_app->contents = $this->contents; $this->github_app->metadata = $this->metadata; $this->github_app->pull_requests = $this->pullRequests; } else { // Sync FROM model (on load/refresh) $this->name = $this->github_app->name; $this->organization = $this->github_app->organization; $this->apiUrl = $this->github_app->api_url; $this->htmlUrl = $this->github_app->html_url; $this->customUser = $this->github_app->custom_user; $this->customPort = $this->github_app->custom_port; $this->appId = $this->github_app->app_id; $this->installationId = $this->github_app->installation_id; $this->clientId = $this->github_app->client_id; $this->clientSecret = $this->github_app->client_secret; $this->webhookSecret = $this->github_app->webhook_secret; $this->isSystemWide = $this->github_app->is_system_wide; $this->privateKeyId = $this->github_app->private_key_id; $this->contents = $this->github_app->contents; $this->metadata = $this->github_app->metadata; $this->pullRequests = $this->github_app->pull_requests; } } public function checkPermissions() { try { $this->authorize('view', $this->github_app); // Validate required fields before attempting to fetch permissions $missingFields = []; if (! $this->github_app->app_id) { $missingFields[] = 'App ID'; } if (! $this->github_app->private_key_id) { $missingFields[] = 'Private Key'; } if (! empty($missingFields)) { $fieldsList = implode(', ', $missingFields); $this->dispatch('error', "Cannot fetch permissions. Please set the following required fields first: {$fieldsList}"); return; } // Verify the private key exists and is accessible if (! $this->github_app->privateKey) { $this->dispatch('error', 'Private Key not found. Please select a valid private key.'); return; } GithubAppPermissionJob::dispatchSync($this->github_app); $this->github_app->refresh()->makeVisible('client_secret')->makeVisible('webhook_secret'); $this->dispatch('success', 'Github App permissions updated.'); } catch (\Throwable $e) { // Provide better error message for unsupported key formats $errorMessage = $e->getMessage(); if (str_contains($errorMessage, 'DECODER routines::unsupported') || str_contains($errorMessage, 'parse your key')) { $this->dispatch('error', 'The selected private key format is not supported for GitHub Apps. <br><br>Please use an RSA private key in PEM format (BEGIN RSA PRIVATE KEY). <br><br>OpenSSH format keys (BEGIN OPENSSH PRIVATE KEY) are not supported.'); return; } return handleError($e, $this); } } public function mount() { try { $github_app_uuid = request()->github_app_uuid; $this->github_app = GithubApp::ownedByCurrentTeam()->whereUuid($github_app_uuid)->firstOrFail(); $this->github_app->makeVisible(['client_secret', 'webhook_secret']); $this->privateKeys = PrivateKey::ownedByCurrentTeamCached(); $this->applications = $this->github_app->applications; $settings = instanceSettings(); // Sync data from model to properties $this->syncData(false); // Override name with kebab case for display $this->name = str($this->github_app->name)->kebab(); $this->fqdn = $settings->fqdn; if ($settings->public_ipv4) { $this->ipv4 = 'http://'.$settings->public_ipv4.':'.config('app.port'); } if ($settings->public_ipv6) { $this->ipv6 = 'http://'.$settings->public_ipv6.':'.config('app.port'); } if ($this->github_app->installation_id && session('from')) { $source_id = data_get(session('from'), 'source_id'); if (! $source_id || $this->github_app->id !== $source_id) { session()->forget('from'); } else { $parameters = data_get(session('from'), 'parameters'); $back = data_get(session('from'), 'back'); $environment_uuid = data_get($parameters, 'environment_uuid'); $project_uuid = data_get($parameters, 'project_uuid'); $type = data_get($parameters, 'type'); $destination = data_get($parameters, 'destination'); session()->forget('from'); return redirect()->route($back, [ 'environment_uuid' => $environment_uuid, 'project_uuid' => $project_uuid, 'type' => $type, 'destination' => $destination, ]); } } $this->parameters = get_route_parameters(); if (isCloud() && ! isDev()) { $this->webhook_endpoint = config('app.url'); } else { $this->webhook_endpoint = $this->ipv4 ?? ''; $this->is_system_wide = $this->github_app->is_system_wide; } } catch (\Throwable $e) { return handleError($e, $this); } } public function getGithubAppNameUpdatePath() { if (str($this->github_app->organization)->isNotEmpty()) { return "{$this->github_app->html_url}/organizations/{$this->github_app->organization}/settings/apps/{$this->github_app->name}"; } return "{$this->github_app->html_url}/settings/apps/{$this->github_app->name}"; } private function generateGithubJwt($private_key, $app_id): string { $configuration = Configuration::forAsymmetricSigner( new Sha256, InMemory::plainText($private_key), InMemory::plainText($private_key) ); $now = time(); return $configuration->builder() ->issuedBy((string) $app_id) ->permittedFor('https://api.github.com') ->identifiedBy((string) $now) ->issuedAt(new \DateTimeImmutable("@{$now}")) ->expiresAt(new \DateTimeImmutable('@'.($now + 600))) ->getToken($configuration->signer(), $configuration->signingKey()) ->toString(); } public function updateGithubAppName() { try { $this->authorize('update', $this->github_app); $privateKey = PrivateKey::ownedByCurrentTeam()->find($this->github_app->private_key_id); if (! $privateKey) { $this->dispatch('error', 'No private key found for this GitHub App.'); return; } $jwt = $this->generateGithubJwt($privateKey->private_key, $this->github_app->app_id); $response = Http::withHeaders([ 'Accept' => 'application/vnd.github+json', 'X-GitHub-Api-Version' => '2022-11-28', 'Authorization' => "Bearer {$jwt}", ])->get("{$this->github_app->api_url}/app"); if ($response->successful()) { $app_data = $response->json(); $app_slug = $app_data['slug'] ?? null; if ($app_slug) { $this->github_app->name = $app_slug; $this->name = str($app_slug)->kebab(); $privateKey->name = "github-app-{$app_slug}"; $privateKey->save(); $this->github_app->save(); $this->dispatch('success', 'GitHub App name and SSH key name synchronized successfully.'); } else { $this->dispatch('info', 'Could not find App Name (slug) in GitHub response.'); } } else { $error_message = $response->json()['message'] ?? 'Unknown error'; $this->dispatch('error', "Failed to fetch GitHub App information: {$error_message}"); } } catch (\Throwable $e) { return handleError($e, $this); } } public function submit() { try { $this->authorize('update', $this->github_app); $this->github_app->makeVisible('client_secret')->makeVisible('webhook_secret'); $this->validate(); $this->syncData(true); $this->github_app->save(); $this->dispatch('success', 'Github App updated.'); } catch (\Throwable $e) { return handleError($e, $this); } } public function createGithubAppManually() { $this->authorize('update', $this->github_app); $this->github_app->makeVisible('client_secret')->makeVisible('webhook_secret'); $this->github_app->app_id = 1234567890; $this->github_app->installation_id = 1234567890; $this->github_app->save(); // Redirect to avoid Livewire morphing issues when view structure changes return redirect()->route('source.github.show', ['github_app_uuid' => $this->github_app->uuid]) ->with('success', 'Github App updated. You can now configure the details.'); } public function instantSave() { try { $this->authorize('update', $this->github_app); $this->github_app->makeVisible('client_secret')->makeVisible('webhook_secret'); $this->syncData(true); $this->github_app->save(); $this->dispatch('success', 'Github App updated.'); } catch (\Throwable $e) { return handleError($e, $this); } } public function delete() { try { $this->authorize('delete', $this->github_app); if ($this->github_app->applications->isNotEmpty()) { $this->dispatch('error', 'This source is being used by an application. Please delete all applications first.'); $this->github_app->makeVisible('client_secret')->makeVisible('webhook_secret'); return; } $this->github_app->delete(); return redirect()->route('source.all'); } catch (\Throwable $e) { return handleError($e, $this); } } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Source/Github/Create.php
app/Livewire/Source/Github/Create.php
<?php namespace App\Livewire\Source\Github; use App\Models\GithubApp; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Livewire\Component; class Create extends Component { use AuthorizesRequests; public string $name; public ?string $organization = null; public string $api_url = 'https://api.github.com'; public string $html_url = 'https://github.com'; public string $custom_user = 'git'; public int $custom_port = 22; public bool $is_system_wide = false; public function mount() { $this->name = substr(generate_random_name(), 0, 30); } public function createGitHubApp() { try { $this->authorize('createAnyResource'); $this->validate([ 'name' => 'required|string', 'organization' => 'nullable|string', 'api_url' => 'required|string', 'html_url' => 'required|string', 'custom_user' => 'required|string', 'custom_port' => 'required|int', 'is_system_wide' => 'required|bool', ]); $payload = [ 'name' => $this->name, 'organization' => $this->organization, 'api_url' => $this->api_url, 'html_url' => $this->html_url, 'custom_user' => $this->custom_user, 'custom_port' => $this->custom_port, 'is_system_wide' => $this->is_system_wide, 'team_id' => currentTeam()->id, ]; $github_app = GithubApp::create($payload); if (session('from')) { session(['from' => session('from') + ['source_id' => $github_app->id]]); } return redirectRoute($this, 'source.github.show', ['github_app_uuid' => $github_app->uuid]); } catch (\Throwable $e) { return handleError($e, $this); } } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Server/Swarm.php
app/Livewire/Server/Swarm.php
<?php namespace App\Livewire\Server; use App\Models\Server; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Livewire\Component; class Swarm extends Component { use AuthorizesRequests; public Server $server; public array $parameters = []; public bool $isSwarmManager; public bool $isSwarmWorker; public function mount(string $server_uuid) { try { $this->server = Server::ownedByCurrentTeam()->whereUuid($server_uuid)->firstOrFail(); $this->parameters = get_route_parameters(); $this->syncData(); } catch (\Throwable) { return redirect()->route('server.index'); } } public function syncData(bool $toModel = false) { if ($toModel) { $this->authorize('update', $this->server); $this->server->settings->is_swarm_manager = $this->isSwarmManager; $this->server->settings->is_swarm_worker = $this->isSwarmWorker; $this->server->settings->save(); } else { $this->isSwarmManager = $this->server->settings->is_swarm_manager; $this->isSwarmWorker = $this->server->settings->is_swarm_worker; } } public function instantSave() { try { $this->syncData(true); $this->dispatch('success', 'Swarm settings updated.'); } catch (\Throwable $e) { return handleError($e, $this); } } public function render() { return view('livewire.server.swarm'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Server/Charts.php
app/Livewire/Server/Charts.php
<?php namespace App\Livewire\Server; use App\Models\Server; use Livewire\Component; class Charts extends Component { public Server $server; public $chartId = 'server'; public $data; public $categories; public int $interval = 5; public bool $poll = true; public function mount(string $server_uuid) { try { $this->server = Server::ownedByCurrentTeam()->whereUuid($server_uuid)->firstOrFail(); } catch (\Throwable $e) { return handleError($e, $this); } } public function pollData() { if ($this->poll || $this->interval <= 10) { $this->loadData(); if ($this->interval > 10) { $this->poll = false; } } } public function loadData() { try { $cpuMetrics = $this->server->getCpuMetrics($this->interval); $memoryMetrics = $this->server->getMemoryMetrics($this->interval); $this->dispatch("refreshChartData-{$this->chartId}-cpu", [ 'seriesData' => $cpuMetrics, ]); $this->dispatch("refreshChartData-{$this->chartId}-memory", [ 'seriesData' => $memoryMetrics, ]); } catch (\Throwable $e) { return handleError($e, $this); } } public function setInterval() { if ($this->interval <= 10) { $this->poll = true; } $this->loadData(); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Server/Proxy.php
app/Livewire/Server/Proxy.php
<?php namespace App\Livewire\Server; use App\Actions\Proxy\GetProxyConfiguration; use App\Actions\Proxy\SaveProxyConfiguration; use App\Enums\ProxyTypes; use App\Models\Server; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Livewire\Component; class Proxy extends Component { use AuthorizesRequests; public Server $server; public ?string $selectedProxy = null; public $proxySettings = null; public bool $redirectEnabled = true; public ?string $redirectUrl = null; public bool $generateExactLabels = false; /** * Cache the versions.json file data in memory for this component instance. * This avoids multiple file reads during a single request/render cycle. */ protected ?array $cachedVersionsFile = null; public function getListeners() { $teamId = auth()->user()->currentTeam()->id; return [ 'saveConfiguration' => 'submit', "echo-private:team.{$teamId},ProxyStatusChangedUI" => '$refresh', ]; } protected $rules = [ 'generateExactLabels' => 'required|boolean', ]; public function mount() { $this->selectedProxy = $this->server->proxyType(); $this->redirectEnabled = data_get($this->server, 'proxy.redirect_enabled', true); $this->redirectUrl = data_get($this->server, 'proxy.redirect_url'); $this->syncData(false); } private function syncData(bool $toModel = false): void { if ($toModel) { $this->server->settings->generate_exact_labels = $this->generateExactLabels; } else { $this->generateExactLabels = $this->server->settings->generate_exact_labels ?? false; } } /** * Get Traefik versions from cached data with in-memory optimization. * Returns array like: ['v3.5' => '3.5.6', 'v3.6' => '3.6.2'] * * This method adds an in-memory cache layer on top of the global * get_traefik_versions() helper to avoid multiple calls during * a single component lifecycle/render. */ protected function getTraefikVersions(): ?array { // In-memory cache for this component instance (per-request) if ($this->cachedVersionsFile !== null) { return data_get($this->cachedVersionsFile, 'traefik'); } // Load from global cached helper (Redis + filesystem) $versionsData = get_versions_data(); if (! $versionsData) { return null; } $this->cachedVersionsFile = $versionsData; $traefikVersions = data_get($versionsData, 'traefik'); return is_array($traefikVersions) ? $traefikVersions : null; } public function getConfigurationFilePathProperty(): string { return rtrim($this->server->proxyPath(), '/').'/docker-compose.yml'; } public function changeProxy() { $this->authorize('update', $this->server); $this->server->proxy = null; $this->server->save(); $this->dispatch('reloadWindow'); } public function selectProxy($proxy_type) { try { $this->authorize('update', $this->server); $this->server->changeProxy($proxy_type, async: false); $this->selectedProxy = $this->server->proxy->type; $this->dispatch('reloadWindow'); } catch (\Throwable $e) { return handleError($e, $this); } } public function instantSave() { try { $this->authorize('update', $this->server); $this->validate(); $this->syncData(true); $this->server->settings->save(); $this->dispatch('success', 'Settings saved.'); } catch (\Throwable $e) { return handleError($e, $this); } } public function instantSaveRedirect() { try { $this->authorize('update', $this->server); $this->server->proxy->redirect_enabled = $this->redirectEnabled; $this->server->save(); $this->server->setupDefaultRedirect(); $this->dispatch('success', 'Proxy configuration saved.'); } catch (\Throwable $e) { return handleError($e, $this); } } public function submit() { try { $this->authorize('update', $this->server); SaveProxyConfiguration::run($this->server, $this->proxySettings); $this->server->proxy->redirect_url = $this->redirectUrl; $this->server->save(); $this->server->setupDefaultRedirect(); $this->dispatch('success', 'Proxy configuration saved.'); } catch (\Throwable $e) { return handleError($e, $this); } } public function resetProxyConfiguration() { try { $this->authorize('update', $this->server); // Explicitly regenerate default configuration $this->proxySettings = GetProxyConfiguration::run($this->server, forceRegenerate: true); SaveProxyConfiguration::run($this->server, $this->proxySettings); $this->server->save(); $this->dispatch('success', 'Proxy configuration reset to default.'); } catch (\Throwable $e) { return handleError($e, $this); } } public function loadProxyConfiguration() { try { $this->proxySettings = GetProxyConfiguration::run($this->server); } catch (\Throwable $e) { return handleError($e, $this); } } /** * Get the latest Traefik version for this server's current branch. * * This compares the server's detected version against available versions * in versions.json to determine the latest patch for the current branch, * or the newest available version if no current version is detected. */ public function getLatestTraefikVersionProperty(): ?string { try { $traefikVersions = $this->getTraefikVersions(); if (! $traefikVersions) { return null; } // Get this server's current version $currentVersion = $this->server->detected_traefik_version; // If we have a current version, try to find matching branch if ($currentVersion && $currentVersion !== 'latest') { $current = ltrim($currentVersion, 'v'); if (preg_match('/^(\d+\.\d+)/', $current, $matches)) { $branch = "v{$matches[1]}"; if (isset($traefikVersions[$branch])) { $version = $traefikVersions[$branch]; return str_starts_with($version, 'v') ? $version : "v{$version}"; } } } // Return the newest available version $newestVersion = collect($traefikVersions) ->map(fn ($v) => ltrim($v, 'v')) ->sortBy(fn ($v) => $v, SORT_NATURAL) ->last(); return $newestVersion ? "v{$newestVersion}" : null; } catch (\Throwable $e) { return null; } } public function getIsTraefikOutdatedProperty(): bool { if ($this->server->proxyType() !== ProxyTypes::TRAEFIK->value) { return false; } $currentVersion = $this->server->detected_traefik_version; if (! $currentVersion || $currentVersion === 'latest') { return false; } $latestVersion = $this->latestTraefikVersion; if (! $latestVersion) { return false; } // Compare versions (strip 'v' prefix) $current = ltrim($currentVersion, 'v'); $latest = ltrim($latestVersion, 'v'); return version_compare($current, $latest, '<'); } /** * Check if a newer Traefik branch (minor version) is available for this server. * Returns the branch identifier (e.g., "v3.6") if a newer branch exists. */ public function getNewerTraefikBranchAvailableProperty(): ?string { try { if ($this->server->proxyType() !== ProxyTypes::TRAEFIK->value) { return null; } // Get this server's current version $currentVersion = $this->server->detected_traefik_version; if (! $currentVersion || $currentVersion === 'latest') { return null; } // Check if we have outdated info stored for this server (faster than computing) $outdatedInfo = $this->server->traefik_outdated_info; if ($outdatedInfo && isset($outdatedInfo['type']) && $outdatedInfo['type'] === 'minor_upgrade') { // Use the upgrade_target field if available (e.g., "v3.6") if (isset($outdatedInfo['upgrade_target'])) { return str_starts_with($outdatedInfo['upgrade_target'], 'v') ? $outdatedInfo['upgrade_target'] : "v{$outdatedInfo['upgrade_target']}"; } } // Fallback: compute from cached versions data $traefikVersions = $this->getTraefikVersions(); if (! $traefikVersions) { return null; } // Extract current branch (e.g., "3.5" from "3.5.6") $current = ltrim($currentVersion, 'v'); if (! preg_match('/^(\d+\.\d+)/', $current, $matches)) { return null; } $currentBranch = $matches[1]; // Find the newest branch that's greater than current $newestBranch = null; foreach ($traefikVersions as $branch => $version) { $branchNum = ltrim($branch, 'v'); if (version_compare($branchNum, $currentBranch, '>')) { if (! $newestBranch || version_compare($branchNum, $newestBranch, '>')) { $newestBranch = $branchNum; } } } return $newestBranch ? "v{$newestBranch}" : null; } catch (\Throwable $e) { return null; } } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Server/Navbar.php
app/Livewire/Server/Navbar.php
<?php namespace App\Livewire\Server; use App\Actions\Proxy\CheckProxy; use App\Actions\Proxy\StartProxy; use App\Actions\Proxy\StopProxy; use App\Enums\ProxyTypes; use App\Jobs\RestartProxyJob; use App\Models\Server; use App\Services\ProxyDashboardCacheService; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Livewire\Component; class Navbar extends Component { use AuthorizesRequests; public Server $server; public bool $isChecking = false; public ?string $currentRoute = null; public bool $traefikDashboardAvailable = false; public ?string $serverIp = null; public ?string $proxyStatus = 'unknown'; public ?string $lastNotifiedStatus = null; public bool $restartInitiated = false; public function getListeners() { $teamId = auth()->user()->currentTeam()->id; return [ 'refreshServerShow' => 'refreshServer', "echo-private:team.{$teamId},ProxyStatusChangedUI" => 'showNotification', ]; } public function mount(Server $server) { $this->server = $server; $this->currentRoute = request()->route()->getName(); $this->serverIp = $this->server->id === 0 ? base_ip() : $this->server->ip; $this->proxyStatus = $this->server->proxy->status ?? 'unknown'; $this->loadProxyConfiguration(); } public function loadProxyConfiguration() { try { if ($this->proxyStatus === 'running') { $this->traefikDashboardAvailable = ProxyDashboardCacheService::isTraefikDashboardAvailableFromCache($this->server); } } catch (\Throwable $e) { return handleError($e, $this); } } public function restart() { try { $this->authorize('manageProxy', $this->server); // Prevent duplicate restart calls if ($this->restartInitiated) { return; } $this->restartInitiated = true; // Always use background job for all servers RestartProxyJob::dispatch($this->server); } catch (\Throwable $e) { $this->restartInitiated = false; return handleError($e, $this); } } public function checkProxy() { try { $this->authorize('manageProxy', $this->server); CheckProxy::run($this->server, true); $this->dispatch('startProxy')->self(); } catch (\Throwable $e) { return handleError($e, $this); } } public function startProxy() { try { $this->authorize('manageProxy', $this->server); $activity = StartProxy::run($this->server, force: true); $this->dispatch('activityMonitor', $activity->id); } catch (\Throwable $e) { return handleError($e, $this); } } public function stop(bool $forceStop = true) { try { $this->authorize('manageProxy', $this->server); StopProxy::dispatch($this->server, $forceStop); } catch (\Throwable $e) { return handleError($e, $this); } } public function checkProxyStatus() { if ($this->isChecking) { return; } try { $this->isChecking = true; CheckProxy::run($this->server, true); } catch (\Throwable $e) { return handleError($e, $this); } finally { $this->isChecking = false; $this->showNotification(); } } public function showNotification($event = null) { $previousStatus = $this->proxyStatus; $this->server->refresh(); $this->proxyStatus = $this->server->proxy->status ?? 'unknown'; // If event contains activityId, open activity monitor if ($event && isset($event['activityId'])) { $this->dispatch('activityMonitor', $event['activityId']); } // Reset restart flag when proxy reaches a stable state if (in_array($this->proxyStatus, ['running', 'exited', 'error'])) { $this->restartInitiated = false; } // Skip notification if we already notified about this status (prevents duplicates) if ($this->lastNotifiedStatus === $this->proxyStatus) { return; } switch ($this->proxyStatus) { case 'running': $this->loadProxyConfiguration(); // Only show "Proxy is running" notification when transitioning from a stopped/error state // Don't show during normal start/restart flows (starting, restarting, stopping) if (in_array($previousStatus, ['exited', 'stopped', 'unknown', null])) { $this->dispatch('success', 'Proxy is running.'); $this->lastNotifiedStatus = $this->proxyStatus; } break; case 'exited': // Only show "Proxy has exited" notification when transitioning from running state // Don't show during normal stop/restart flows (stopping, restarting) if (in_array($previousStatus, ['running'])) { $this->dispatch('info', 'Proxy has exited.'); $this->lastNotifiedStatus = $this->proxyStatus; } break; case 'stopping': // $this->dispatch('info', 'Proxy is stopping.'); $this->lastNotifiedStatus = $this->proxyStatus; break; case 'starting': // $this->dispatch('info', 'Proxy is starting.'); $this->lastNotifiedStatus = $this->proxyStatus; break; case 'restarting': // $this->dispatch('info', 'Proxy is restarting.'); $this->lastNotifiedStatus = $this->proxyStatus; break; case 'error': $this->dispatch('error', 'Proxy restart failed. Check logs.'); $this->lastNotifiedStatus = $this->proxyStatus; break; case 'unknown': // Don't notify for unknown status - too noisy break; default: // Don't notify for other statuses break; } } public function refreshServer() { $this->server->refresh(); $this->server->load('settings'); } /** * Check if Traefik has any outdated version info (patch or minor upgrade). * This shows a warning indicator in the navbar. */ public function getHasTraefikOutdatedProperty(): bool { if ($this->server->proxyType() !== ProxyTypes::TRAEFIK->value) { return false; } // Check if server has outdated info stored $outdatedInfo = $this->server->traefik_outdated_info; return ! empty($outdatedInfo) && isset($outdatedInfo['type']); } public function render() { return view('livewire.server.navbar'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Server/ValidateAndInstall.php
app/Livewire/Server/ValidateAndInstall.php
<?php namespace App\Livewire\Server; use App\Actions\Proxy\CheckProxy; use App\Actions\Proxy\StartProxy; use App\Events\ServerValidated; use App\Models\Server; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Livewire\Component; class ValidateAndInstall extends Component { use AuthorizesRequests; public Server $server; public int $number_of_tries = 0; public int $max_tries = 3; public bool $install = true; public $uptime = null; public $supported_os_type = null; public $prerequisites_installed = null; public $docker_installed = null; public $docker_compose_installed = null; public $docker_version = null; public $error = null; public string $installationStep = 'Prerequisites'; public bool $ask = false; protected $listeners = [ 'init', 'validateConnection', 'validateOS', 'validatePrerequisites', 'validateDockerEngine', 'validateDockerVersion', 'refresh' => '$refresh', ]; public function init(int $data = 0) { $this->uptime = null; $this->supported_os_type = null; $this->prerequisites_installed = null; $this->docker_installed = null; $this->docker_version = null; $this->docker_compose_installed = null; $this->error = null; $this->number_of_tries = $data; if (! $this->ask) { $this->dispatch('validateConnection'); } } public function startValidatingAfterAsking() { $this->ask = false; $this->init(); } public function retry() { $this->authorize('update', $this->server); $this->uptime = null; $this->supported_os_type = null; $this->prerequisites_installed = null; $this->docker_installed = null; $this->docker_compose_installed = null; $this->docker_version = null; $this->error = null; $this->number_of_tries = 0; $this->init(); } public function validateConnection() { $this->authorize('update', $this->server); ['uptime' => $this->uptime, 'error' => $error] = $this->server->validateConnection(); if (! $this->uptime) { $this->error = 'Server is not reachable. Please validate your configuration and connection.<br>Check this <a target="_blank" class="text-black underline dark:text-white" href="https://coolify.io/docs/knowledge-base/server/openssh">documentation</a> for further help. <br><br><div class="text-error">Error: '.$error.'</div>'; $this->server->update([ 'validation_logs' => $this->error, ]); return; } $this->dispatch('validateOS'); } public function validateOS() { $this->supported_os_type = $this->server->validateOS(); if (! $this->supported_os_type) { $this->error = 'Server OS type is not supported. Please install Docker manually before continuing: <a target="_blank" class="underline" href="https://docs.docker.com/engine/install/#server">documentation</a>.'; $this->server->update([ 'validation_logs' => $this->error, ]); return; } $this->dispatch('validatePrerequisites'); } public function validatePrerequisites() { $validationResult = $this->server->validatePrerequisites(); $this->prerequisites_installed = $validationResult['success']; if (! $validationResult['success']) { if ($this->install) { if ($this->number_of_tries == $this->max_tries) { $missingCommands = implode(', ', $validationResult['missing']); $this->error = "Prerequisites ({$missingCommands}) could not be installed. Please install them manually before continuing."; $this->server->update([ 'validation_logs' => $this->error, ]); return; } else { if ($this->number_of_tries <= $this->max_tries) { $this->installationStep = 'Prerequisites'; $activity = $this->server->installPrerequisites(); $this->number_of_tries++; $this->dispatch('activityMonitor', $activity->id, 'init', $this->number_of_tries, "{$this->installationStep} Installation Logs"); } return; } } else { $missingCommands = implode(', ', $validationResult['missing']); $this->error = "Prerequisites ({$missingCommands}) are not installed. Please install them before continuing."; $this->server->update([ 'validation_logs' => $this->error, ]); return; } } $this->dispatch('validateDockerEngine'); } public function validateDockerEngine() { $this->docker_installed = $this->server->validateDockerEngine(); $this->docker_compose_installed = $this->server->validateDockerCompose(); if (! $this->docker_installed || ! $this->docker_compose_installed) { if ($this->install) { if ($this->number_of_tries == $this->max_tries) { $this->error = 'Docker Engine could not be installed. Please install Docker manually before continuing: <a target="_blank" class="underline" href="https://docs.docker.com/engine/install/#server">documentation</a>.'; $this->server->update([ 'validation_logs' => $this->error, ]); return; } else { if ($this->number_of_tries <= $this->max_tries) { $this->installationStep = 'Docker'; $activity = $this->server->installDocker(); $this->number_of_tries++; $this->dispatch('activityMonitor', $activity->id, 'init', $this->number_of_tries, "{$this->installationStep} Installation Logs"); } return; } } else { $this->error = 'Docker Engine is not installed. Please install Docker manually before continuing: <a target="_blank" class="underline" href="https://docs.docker.com/engine/install/#server">documentation</a>.'; $this->server->update([ 'validation_logs' => $this->error, ]); return; } } $this->dispatch('validateDockerVersion'); } public function validateDockerVersion() { if ($this->server->isSwarm()) { $swarmInstalled = $this->server->validateDockerSwarm(); if ($swarmInstalled) { $this->dispatch('success', 'Docker Swarm is initiated.'); } } else { $this->docker_version = $this->server->validateDockerEngineVersion(); if ($this->docker_version) { // Mark validation as complete $this->server->update(['is_validating' => false]); $this->dispatch('refreshServerShow'); $this->dispatch('refreshBoardingIndex'); ServerValidated::dispatch($this->server->team_id, $this->server->uuid); $this->dispatch('success', 'Server validated, proxy is starting in a moment.'); $proxyShouldRun = CheckProxy::run($this->server, true); if (! $proxyShouldRun) { return; } // Ensure networks exist BEFORE dispatching async proxy startup // This prevents race condition where proxy tries to start before networks are created instant_remote_process(ensureProxyNetworksExist($this->server)->toArray(), $this->server, false); StartProxy::dispatch($this->server); } else { $requiredDockerVersion = str(config('constants.docker.minimum_required_version'))->before('.'); $this->error = 'Minimum Docker Engine version '.$requiredDockerVersion.' is not installed. Please install Docker manually before continuing: <a target="_blank" class="underline" href="https://docs.docker.com/engine/install/#server">documentation</a>.'; $this->server->update([ 'validation_logs' => $this->error, ]); return; } } if ($this->server->isBuildServer()) { return; } } public function render() { return view('livewire.server.validate-and-install'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Server/Advanced.php
app/Livewire/Server/Advanced.php
<?php namespace App\Livewire\Server; use App\Models\Server; use Livewire\Attributes\Validate; use Livewire\Component; class Advanced extends Component { public Server $server; public array $parameters = []; #[Validate(['string'])] public string $serverDiskUsageCheckFrequency = '0 23 * * *'; #[Validate(['integer', 'min:1', 'max:99'])] public int $serverDiskUsageNotificationThreshold = 50; #[Validate(['integer', 'min:1'])] public int $concurrentBuilds = 1; #[Validate(['integer', 'min:1'])] public int $dynamicTimeout = 1; #[Validate(['integer', 'min:1'])] public int $deploymentQueueLimit = 25; public function mount(string $server_uuid) { try { $this->server = Server::ownedByCurrentTeam()->whereUuid($server_uuid)->firstOrFail(); $this->parameters = get_route_parameters(); $this->syncData(); } catch (\Throwable) { return redirect()->route('server.index'); } } public function syncData(bool $toModel = false) { if ($toModel) { $this->authorize('update', $this->server); $this->validate(); $this->server->settings->concurrent_builds = $this->concurrentBuilds; $this->server->settings->dynamic_timeout = $this->dynamicTimeout; $this->server->settings->deployment_queue_limit = $this->deploymentQueueLimit; $this->server->settings->server_disk_usage_notification_threshold = $this->serverDiskUsageNotificationThreshold; $this->server->settings->server_disk_usage_check_frequency = $this->serverDiskUsageCheckFrequency; $this->server->settings->save(); } else { $this->concurrentBuilds = $this->server->settings->concurrent_builds; $this->dynamicTimeout = $this->server->settings->dynamic_timeout; $this->deploymentQueueLimit = $this->server->settings->deployment_queue_limit; $this->serverDiskUsageNotificationThreshold = $this->server->settings->server_disk_usage_notification_threshold; $this->serverDiskUsageCheckFrequency = $this->server->settings->server_disk_usage_check_frequency; } } public function instantSave() { try { $this->syncData(true); $this->dispatch('success', 'Server updated.'); } catch (\Throwable $e) { return handleError($e, $this); } } public function submit() { try { if (! validate_cron_expression($this->serverDiskUsageCheckFrequency)) { $this->serverDiskUsageCheckFrequency = $this->server->settings->getOriginal('server_disk_usage_check_frequency'); throw new \Exception('Invalid Cron / Human expression for Disk Usage Check Frequency.'); } $this->syncData(true); $this->dispatch('success', 'Server updated.'); } catch (\Throwable $e) { return handleError($e, $this); } } public function render() { return view('livewire.server.advanced'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Server/Resources.php
app/Livewire/Server/Resources.php
<?php namespace App\Livewire\Server; use App\Models\Server; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Livewire\Component; class Resources extends Component { use AuthorizesRequests; public ?Server $server = null; public $parameters = []; public array $unmanagedContainers = []; public $activeTab = 'managed'; public function getListeners() { $teamId = auth()->user()->currentTeam()->id; return [ "echo-private:team.{$teamId},ApplicationStatusChanged" => 'refreshStatus', ]; } public function startUnmanaged($id) { $this->server->startUnmanaged($id); $this->dispatch('success', 'Container started.'); $this->loadUnmanagedContainers(); } public function restartUnmanaged($id) { $this->server->restartUnmanaged($id); $this->dispatch('success', 'Container restarted.'); $this->loadUnmanagedContainers(); } public function stopUnmanaged($id) { $this->server->stopUnmanaged($id); $this->dispatch('success', 'Container stopped.'); $this->loadUnmanagedContainers(); } public function refreshStatus() { $this->server->refresh(); if ($this->activeTab === 'managed') { $this->loadManagedContainers(); } else { $this->loadUnmanagedContainers(); } $this->dispatch('success', 'Resource statuses refreshed.'); } public function loadManagedContainers() { try { $this->activeTab = 'managed'; $this->server->refresh(); } catch (\Throwable $e) { return handleError($e, $this); } } public function loadUnmanagedContainers() { $this->activeTab = 'unmanaged'; try { $this->unmanagedContainers = $this->server->loadUnmanagedContainers()->toArray(); } catch (\Throwable $e) { return handleError($e, $this); } } public function mount() { $this->parameters = get_route_parameters(); try { $this->server = Server::ownedByCurrentTeam()->whereUuid(request()->server_uuid)->first(); if (is_null($this->server)) { return redirect()->route('server.index'); } } catch (\Throwable $e) { return handleError($e, $this); } } public function render() { return view('livewire.server.resources'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Server/DockerCleanup.php
app/Livewire/Server/DockerCleanup.php
<?php namespace App\Livewire\Server; use App\Jobs\DockerCleanupJob; use App\Models\Server; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Livewire\Attributes\Validate; use Livewire\Component; class DockerCleanup extends Component { use AuthorizesRequests; public Server $server; public array $parameters = []; #[Validate(['string', 'required'])] public string $dockerCleanupFrequency = '*/10 * * * *'; #[Validate(['integer', 'min:1', 'max:99'])] public int $dockerCleanupThreshold = 10; #[Validate('boolean')] public bool $forceDockerCleanup = false; #[Validate('boolean')] public bool $deleteUnusedVolumes = false; #[Validate('boolean')] public bool $deleteUnusedNetworks = false; #[Validate('boolean')] public bool $disableApplicationImageRetention = false; public function mount(string $server_uuid) { try { $this->server = Server::ownedByCurrentTeam()->whereUuid($server_uuid)->firstOrFail(); $this->parameters = get_route_parameters(); $this->syncData(); } catch (\Throwable) { return redirect()->route('server.index'); } } public function syncData(bool $toModel = false) { if ($toModel) { $this->authorize('update', $this->server); $this->validate(); $this->server->settings->force_docker_cleanup = $this->forceDockerCleanup; $this->server->settings->docker_cleanup_frequency = $this->dockerCleanupFrequency; $this->server->settings->docker_cleanup_threshold = $this->dockerCleanupThreshold; $this->server->settings->delete_unused_volumes = $this->deleteUnusedVolumes; $this->server->settings->delete_unused_networks = $this->deleteUnusedNetworks; $this->server->settings->disable_application_image_retention = $this->disableApplicationImageRetention; $this->server->settings->save(); } else { $this->forceDockerCleanup = $this->server->settings->force_docker_cleanup; $this->dockerCleanupFrequency = $this->server->settings->docker_cleanup_frequency; $this->dockerCleanupThreshold = $this->server->settings->docker_cleanup_threshold; $this->deleteUnusedVolumes = $this->server->settings->delete_unused_volumes; $this->deleteUnusedNetworks = $this->server->settings->delete_unused_networks; $this->disableApplicationImageRetention = $this->server->settings->disable_application_image_retention; } } public function instantSave() { try { $this->syncData(true); $this->dispatch('success', 'Server updated.'); } catch (\Throwable $e) { return handleError($e, $this); } } public function manualCleanup() { try { $this->authorize('update', $this->server); DockerCleanupJob::dispatch($this->server, true, $this->deleteUnusedVolumes, $this->deleteUnusedNetworks); $this->dispatch('success', 'Manual cleanup job started. Depending on the amount of data, this might take a while.'); } catch (\Throwable $e) { return handleError($e, $this); } } public function submit() { try { if (! validate_cron_expression($this->dockerCleanupFrequency)) { $this->dockerCleanupFrequency = $this->server->settings->getOriginal('docker_cleanup_frequency'); throw new \Exception('Invalid Cron / Human expression for Docker Cleanup Frequency.'); } $this->syncData(true); $this->dispatch('success', 'Server updated.'); } catch (\Throwable $e) { return handleError($e, $this); } } public function render() { return view('livewire.server.docker-cleanup'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Server/Show.php
app/Livewire/Server/Show.php
<?php namespace App\Livewire\Server; use App\Actions\Server\StartSentinel; use App\Actions\Server\StopSentinel; use App\Events\ServerReachabilityChanged; use App\Models\CloudProviderToken; use App\Models\Server; use App\Services\HetznerService; use App\Support\ValidationPatterns; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Illuminate\Support\Collection; use Livewire\Attributes\Computed; use Livewire\Attributes\Locked; use Livewire\Component; class Show extends Component { use AuthorizesRequests; public Server $server; public string $name; public ?string $description = null; public string $ip; public string $user; public string $port; public ?string $validationLogs = null; public ?string $wildcardDomain = null; public bool $isReachable; public bool $isUsable; public bool $isSwarmManager; public bool $isSwarmWorker; public bool $isBuildServer; #[Locked] public bool $isBuildServerLocked = false; public bool $isMetricsEnabled; public string $sentinelToken; public ?string $sentinelUpdatedAt = null; public int $sentinelMetricsRefreshRateSeconds; public int $sentinelMetricsHistoryDays; public int $sentinelPushIntervalSeconds; public ?string $sentinelCustomUrl = null; public bool $isSentinelEnabled; public bool $isSentinelDebugEnabled; public ?string $sentinelCustomDockerImage = null; public string $serverTimezone; public ?string $hetznerServerStatus = null; public bool $hetznerServerManuallyStarted = false; public bool $isValidating = false; // Hetzner linking properties public Collection $availableHetznerTokens; public ?int $selectedHetznerTokenId = null; public ?string $manualHetznerServerId = null; public ?array $matchedHetznerServer = null; public ?string $hetznerSearchError = null; public bool $hetznerNoMatchFound = false; public function getListeners() { $teamId = $this->server->team_id ?? auth()->user()->currentTeam()->id; return [ 'refreshServerShow' => 'refresh', 'refreshServer' => '$refresh', "echo-private:team.{$teamId},SentinelRestarted" => 'handleSentinelRestarted', "echo-private:team.{$teamId},ServerValidated" => 'handleServerValidated', ]; } protected function rules(): array { return [ 'name' => ValidationPatterns::nameRules(), 'description' => ValidationPatterns::descriptionRules(), 'ip' => 'required', 'user' => 'required', 'port' => 'required', 'validationLogs' => 'nullable', 'wildcardDomain' => 'nullable|url', 'isReachable' => 'required', 'isUsable' => 'required', 'isSwarmManager' => 'required', 'isSwarmWorker' => 'required', 'isBuildServer' => 'required', 'isMetricsEnabled' => 'required', 'sentinelToken' => 'required', 'sentinelUpdatedAt' => 'nullable', 'sentinelMetricsRefreshRateSeconds' => 'required|integer|min:1', 'sentinelMetricsHistoryDays' => 'required|integer|min:1', 'sentinelPushIntervalSeconds' => 'required|integer|min:10', 'sentinelCustomUrl' => 'nullable|url', 'isSentinelEnabled' => 'required', 'isSentinelDebugEnabled' => 'required', 'serverTimezone' => 'required', ]; } protected function messages(): array { return array_merge( ValidationPatterns::combinedMessages(), [ 'ip.required' => 'The IP Address field is required.', 'user.required' => 'The User field is required.', 'port.required' => 'The Port field is required.', 'wildcardDomain.url' => 'The Wildcard Domain must be a valid URL.', 'sentinelToken.required' => 'The Sentinel Token field is required.', 'sentinelMetricsRefreshRateSeconds.required' => 'The Metrics Refresh Rate field is required.', 'sentinelMetricsRefreshRateSeconds.integer' => 'The Metrics Refresh Rate must be an integer.', 'sentinelMetricsRefreshRateSeconds.min' => 'The Metrics Refresh Rate must be at least 1 second.', 'sentinelMetricsHistoryDays.required' => 'The Metrics History Days field is required.', 'sentinelMetricsHistoryDays.integer' => 'The Metrics History Days must be an integer.', 'sentinelMetricsHistoryDays.min' => 'The Metrics History Days must be at least 1 day.', 'sentinelPushIntervalSeconds.required' => 'The Push Interval field is required.', 'sentinelPushIntervalSeconds.integer' => 'The Push Interval must be an integer.', 'sentinelPushIntervalSeconds.min' => 'The Push Interval must be at least 10 seconds.', 'sentinelCustomUrl.url' => 'The Custom Sentinel URL must be a valid URL.', 'serverTimezone.required' => 'The Server Timezone field is required.', ] ); } public function mount(string $server_uuid) { try { $this->server = Server::ownedByCurrentTeam()->whereUuid($server_uuid)->firstOrFail(); $this->syncData(); if (! $this->server->isEmpty()) { $this->isBuildServerLocked = true; } // Load saved Hetzner status and validation state $this->hetznerServerStatus = $this->server->hetzner_server_status; $this->isValidating = $this->server->is_validating ?? false; // Load Hetzner tokens for linking $this->loadHetznerTokens(); } catch (\Throwable $e) { return handleError($e, $this); } } #[Computed] public function timezones(): array { return collect(timezone_identifiers_list()) ->sort() ->values() ->toArray(); } public function syncData(bool $toModel = false) { if ($toModel) { $this->validate(); $this->authorize('update', $this->server); if (Server::where('team_id', currentTeam()->id) ->where('ip', $this->ip) ->where('id', '!=', $this->server->id) ->exists()) { $this->ip = $this->server->ip; throw new \Exception('This IP/Domain is already in use by another server in your team.'); } $this->server->name = $this->name; $this->server->description = $this->description; $this->server->ip = $this->ip; $this->server->user = $this->user; $this->server->port = $this->port; $this->server->validation_logs = $this->validationLogs; $this->server->save(); $this->server->settings->is_swarm_manager = $this->isSwarmManager; $this->server->settings->wildcard_domain = $this->wildcardDomain; $this->server->settings->is_swarm_worker = $this->isSwarmWorker; $this->server->settings->is_build_server = $this->isBuildServer; $this->server->settings->is_metrics_enabled = $this->isMetricsEnabled; $this->server->settings->sentinel_token = $this->sentinelToken; $this->server->settings->sentinel_metrics_refresh_rate_seconds = $this->sentinelMetricsRefreshRateSeconds; $this->server->settings->sentinel_metrics_history_days = $this->sentinelMetricsHistoryDays; $this->server->settings->sentinel_push_interval_seconds = $this->sentinelPushIntervalSeconds; $this->server->settings->sentinel_custom_url = $this->sentinelCustomUrl; $this->server->settings->is_sentinel_enabled = $this->isSentinelEnabled; $this->server->settings->is_sentinel_debug_enabled = $this->isSentinelDebugEnabled; if (! validate_timezone($this->serverTimezone)) { $this->serverTimezone = config('app.timezone'); throw new \Exception('Invalid timezone.'); } else { $this->server->settings->server_timezone = $this->serverTimezone; } $this->server->settings->save(); } else { $this->name = $this->server->name; $this->description = $this->server->description; $this->ip = $this->server->ip; $this->user = $this->server->user; $this->port = $this->server->port; $this->wildcardDomain = $this->server->settings->wildcard_domain; $this->isReachable = $this->server->settings->is_reachable; $this->isUsable = $this->server->settings->is_usable; $this->isSwarmManager = $this->server->settings->is_swarm_manager; $this->isSwarmWorker = $this->server->settings->is_swarm_worker; $this->isBuildServer = $this->server->settings->is_build_server; $this->isMetricsEnabled = $this->server->settings->is_metrics_enabled; $this->sentinelToken = $this->server->settings->sentinel_token; $this->sentinelMetricsRefreshRateSeconds = $this->server->settings->sentinel_metrics_refresh_rate_seconds; $this->sentinelMetricsHistoryDays = $this->server->settings->sentinel_metrics_history_days; $this->sentinelPushIntervalSeconds = $this->server->settings->sentinel_push_interval_seconds; $this->sentinelCustomUrl = $this->server->settings->sentinel_custom_url; $this->isSentinelEnabled = $this->server->settings->is_sentinel_enabled; $this->isSentinelDebugEnabled = $this->server->settings->is_sentinel_debug_enabled; $this->sentinelUpdatedAt = $this->server->sentinel_updated_at; $this->serverTimezone = $this->server->settings->server_timezone; $this->isValidating = $this->server->is_validating ?? false; } } public function refresh() { $this->syncData(); } public function handleSentinelRestarted($event) { // Only refresh if the event is for this server if (isset($event['serverUuid']) && $event['serverUuid'] === $this->server->uuid) { $this->server->refresh(); $this->syncData(); $this->dispatch('success', 'Sentinel has been restarted successfully.'); } } public function validateServer($install = true) { try { $this->authorize('update', $this->server); $this->validationLogs = $this->server->validation_logs = null; $this->server->save(); $this->dispatch('init', $install); } catch (\Throwable $e) { return handleError($e, $this); } } public function checkLocalhostConnection() { $this->syncData(true); ['uptime' => $uptime, 'error' => $error] = $this->server->validateConnection(); if ($uptime) { $this->dispatch('success', 'Server is reachable.'); $this->server->settings->is_reachable = $this->isReachable = true; $this->server->settings->is_usable = $this->isUsable = true; $this->server->settings->save(); ServerReachabilityChanged::dispatch($this->server); } else { $this->dispatch('error', 'Server is not reachable.', 'Please validate your configuration and connection.<br><br>Check this <a target="_blank" class="underline" href="https://coolify.io/docs/knowledge-base/server/openssh">documentation</a> for further help. <br><br>Error: '.$error); return; } } public function restartSentinel() { try { $this->authorize('manageSentinel', $this->server); $customImage = isDev() ? $this->sentinelCustomDockerImage : null; $this->server->restartSentinel($customImage); $this->dispatch('info', 'Restarting Sentinel.'); } catch (\Throwable $e) { return handleError($e, $this); } } public function updatedIsSentinelDebugEnabled($value) { try { $this->submit(); $this->restartSentinel(); } catch (\Throwable $e) { return handleError($e, $this); } } public function updatedIsMetricsEnabled($value) { try { $this->submit(); $this->restartSentinel(); } catch (\Throwable $e) { return handleError($e, $this); } } public function updatedIsBuildServer($value) { try { $this->authorize('update', $this->server); if ($value === true && $this->isSentinelEnabled) { $this->isSentinelEnabled = false; $this->isMetricsEnabled = false; $this->isSentinelDebugEnabled = false; StopSentinel::dispatch($this->server); $this->dispatch('info', 'Sentinel has been disabled as build servers cannot run Sentinel.'); } $this->submit(); // Dispatch event to refresh the navbar $this->dispatch('refreshServerShow'); } catch (\Throwable $e) { return handleError($e, $this); } } public function updatedIsSentinelEnabled($value) { try { $this->authorize('manageSentinel', $this->server); if ($value === true) { if ($this->isBuildServer) { $this->isSentinelEnabled = false; $this->dispatch('error', 'Sentinel cannot be enabled on build servers.'); return; } $customImage = isDev() ? $this->sentinelCustomDockerImage : null; StartSentinel::run($this->server, true, null, $customImage); } else { $this->isMetricsEnabled = false; $this->isSentinelDebugEnabled = false; StopSentinel::dispatch($this->server); } $this->submit(); } catch (\Throwable $e) { return handleError($e, $this); } } public function regenerateSentinelToken() { try { $this->authorize('manageSentinel', $this->server); $this->server->settings->generateSentinelToken(); $this->dispatch('success', 'Token regenerated. Restarting Sentinel.'); } catch (\Throwable $e) { return handleError($e, $this); } } public function instantSave() { try { $this->syncData(true); } catch (\Throwable $e) { return handleError($e, $this); } } public function checkHetznerServerStatus(bool $manual = false) { try { if (! $this->server->hetzner_server_id || ! $this->server->cloudProviderToken) { $this->dispatch('error', 'This server is not associated with a Hetzner Cloud server or token.'); return; } $hetznerService = new \App\Services\HetznerService($this->server->cloudProviderToken->token); $serverData = $hetznerService->getServer($this->server->hetzner_server_id); $this->hetznerServerStatus = $serverData['status'] ?? null; // Save status to database without triggering model events if ($this->server->hetzner_server_status !== $this->hetznerServerStatus) { $this->server->hetzner_server_status = $this->hetznerServerStatus; $this->server->update(['hetzner_server_status' => $this->hetznerServerStatus]); } if ($manual) { $this->dispatch('success', 'Server status refreshed: '.ucfirst($this->hetznerServerStatus ?? 'unknown')); } // If Hetzner server is off but Coolify thinks it's still reachable, update Coolify's state if ($this->hetznerServerStatus === 'off' && $this->server->settings->is_reachable) { ['uptime' => $uptime, 'error' => $error] = $this->server->validateConnection(); if ($uptime) { $this->dispatch('success', 'Server is reachable.'); $this->server->settings->is_reachable = $this->isReachable = true; $this->server->settings->is_usable = $this->isUsable = true; $this->server->settings->save(); ServerReachabilityChanged::dispatch($this->server); } else { $this->dispatch('error', 'Server is not reachable.', 'Please validate your configuration and connection.<br><br>Check this <a target="_blank" class="underline" href="https://coolify.io/docs/knowledge-base/server/openssh">documentation</a> for further help. <br><br>Error: '.$error); return; } } } catch (\Throwable $e) { return handleError($e, $this); } } public function handleServerValidated($event = null) { // Check if event is for this server if ($event && isset($event['serverUuid']) && $event['serverUuid'] !== $this->server->uuid) { return; } // Refresh server data $this->server->refresh(); $this->syncData(); // Update validation state $this->isValidating = $this->server->is_validating ?? false; // Reload Hetzner tokens in case the linking section should now be shown $this->loadHetznerTokens(); $this->dispatch('refreshServerShow'); $this->dispatch('refreshServer'); } public function startHetznerServer() { try { if (! $this->server->hetzner_server_id || ! $this->server->cloudProviderToken) { $this->dispatch('error', 'This server is not associated with a Hetzner Cloud server or token.'); return; } $hetznerService = new \App\Services\HetznerService($this->server->cloudProviderToken->token); $hetznerService->powerOnServer($this->server->hetzner_server_id); $this->hetznerServerStatus = 'starting'; $this->server->update(['hetzner_server_status' => 'starting']); $this->hetznerServerManuallyStarted = true; // Set flag to trigger auto-validation when running $this->dispatch('success', 'Hetzner server is starting...'); } catch (\Throwable $e) { return handleError($e, $this); } } public function submit() { try { $this->syncData(true); $this->dispatch('success', 'Server settings updated.'); } catch (\Throwable $e) { return handleError($e, $this); } } public function loadHetznerTokens(): void { $this->availableHetznerTokens = CloudProviderToken::ownedByCurrentTeam() ->where('provider', 'hetzner') ->get(); } public function searchHetznerServer(): void { $this->hetznerSearchError = null; $this->hetznerNoMatchFound = false; $this->matchedHetznerServer = null; if (! $this->selectedHetznerTokenId) { $this->hetznerSearchError = 'Please select a Hetzner token.'; return; } try { $this->authorize('update', $this->server); $token = $this->availableHetznerTokens->firstWhere('id', $this->selectedHetznerTokenId); if (! $token) { $this->hetznerSearchError = 'Invalid token selected.'; return; } $hetznerService = new HetznerService($token->token); $matched = $hetznerService->findServerByIp($this->server->ip); if ($matched) { $this->matchedHetznerServer = $matched; } else { $this->hetznerNoMatchFound = true; } } catch (\Throwable $e) { $this->hetznerSearchError = 'Failed to search Hetzner servers: '.$e->getMessage(); } } public function searchHetznerServerById(): void { $this->hetznerSearchError = null; $this->hetznerNoMatchFound = false; $this->matchedHetznerServer = null; if (! $this->selectedHetznerTokenId) { $this->hetznerSearchError = 'Please select a Hetzner token first.'; return; } if (! $this->manualHetznerServerId) { $this->hetznerSearchError = 'Please enter a Hetzner Server ID.'; return; } try { $this->authorize('update', $this->server); $token = $this->availableHetznerTokens->firstWhere('id', $this->selectedHetznerTokenId); if (! $token) { $this->hetznerSearchError = 'Invalid token selected.'; return; } $hetznerService = new HetznerService($token->token); $serverData = $hetznerService->getServer((int) $this->manualHetznerServerId); if (! empty($serverData)) { $this->matchedHetznerServer = $serverData; } else { $this->hetznerNoMatchFound = true; } } catch (\Throwable $e) { $this->hetznerSearchError = 'Failed to fetch Hetzner server: '.$e->getMessage(); } } public function linkToHetzner() { if (! $this->matchedHetznerServer) { $this->dispatch('error', 'No Hetzner server selected.'); return; } try { $this->authorize('update', $this->server); $token = $this->availableHetznerTokens->firstWhere('id', $this->selectedHetznerTokenId); if (! $token) { $this->dispatch('error', 'Invalid token selected.'); return; } // Verify the server exists and is accessible with the token $hetznerService = new HetznerService($token->token); $serverData = $hetznerService->getServer($this->matchedHetznerServer['id']); if (empty($serverData)) { $this->dispatch('error', 'Could not find Hetzner server with ID: '.$this->matchedHetznerServer['id']); return; } // Update the server with Hetzner details $this->server->update([ 'cloud_provider_token_id' => $this->selectedHetznerTokenId, 'hetzner_server_id' => $this->matchedHetznerServer['id'], 'hetzner_server_status' => $serverData['status'] ?? null, ]); $this->hetznerServerStatus = $serverData['status'] ?? null; // Clear the linking state $this->matchedHetznerServer = null; $this->selectedHetznerTokenId = null; $this->manualHetznerServerId = null; $this->hetznerNoMatchFound = false; $this->hetznerSearchError = null; $this->dispatch('success', 'Server successfully linked to Hetzner Cloud!'); $this->dispatch('refreshServerShow'); } catch (\Throwable $e) { return handleError($e, $this); } } public function render() { return view('livewire.server.show'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Server/Sentinel.php
app/Livewire/Server/Sentinel.php
<?php namespace App\Livewire\Server; use App\Actions\Server\StartSentinel; use App\Actions\Server\StopSentinel; use App\Models\Server; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Livewire\Attributes\Validate; use Livewire\Component; class Sentinel extends Component { use AuthorizesRequests; public Server $server; public array $parameters = []; public bool $isMetricsEnabled; #[Validate(['required'])] public string $sentinelToken; public ?string $sentinelUpdatedAt = null; #[Validate(['required', 'integer', 'min:1'])] public int $sentinelMetricsRefreshRateSeconds; #[Validate(['required', 'integer', 'min:1'])] public int $sentinelMetricsHistoryDays; #[Validate(['required', 'integer', 'min:10'])] public int $sentinelPushIntervalSeconds; #[Validate(['nullable', 'url'])] public ?string $sentinelCustomUrl = null; public bool $isSentinelEnabled; public bool $isSentinelDebugEnabled; public ?string $sentinelCustomDockerImage = null; public function getListeners() { $teamId = $this->server->team_id ?? auth()->user()->currentTeam()->id; return [ "echo-private:team.{$teamId},SentinelRestarted" => 'handleSentinelRestarted', ]; } public function mount(string $server_uuid) { try { $this->server = Server::ownedByCurrentTeam()->whereUuid($server_uuid)->firstOrFail(); $this->parameters = get_route_parameters(); $this->syncData(); } catch (\Throwable) { return redirect()->route('server.index'); } } public function syncData(bool $toModel = false) { if ($toModel) { $this->authorize('update', $this->server); $this->validate(); $this->server->settings->is_metrics_enabled = $this->isMetricsEnabled; $this->server->settings->sentinel_token = $this->sentinelToken; $this->server->settings->sentinel_metrics_refresh_rate_seconds = $this->sentinelMetricsRefreshRateSeconds; $this->server->settings->sentinel_metrics_history_days = $this->sentinelMetricsHistoryDays; $this->server->settings->sentinel_push_interval_seconds = $this->sentinelPushIntervalSeconds; $this->server->settings->sentinel_custom_url = $this->sentinelCustomUrl; $this->server->settings->is_sentinel_enabled = $this->isSentinelEnabled; $this->server->settings->is_sentinel_debug_enabled = $this->isSentinelDebugEnabled; $this->server->settings->save(); } else { $this->isMetricsEnabled = $this->server->settings->is_metrics_enabled; $this->sentinelToken = $this->server->settings->sentinel_token; $this->sentinelMetricsRefreshRateSeconds = $this->server->settings->sentinel_metrics_refresh_rate_seconds; $this->sentinelMetricsHistoryDays = $this->server->settings->sentinel_metrics_history_days; $this->sentinelPushIntervalSeconds = $this->server->settings->sentinel_push_interval_seconds; $this->sentinelCustomUrl = $this->server->settings->sentinel_custom_url; $this->isSentinelEnabled = $this->server->settings->is_sentinel_enabled; $this->isSentinelDebugEnabled = $this->server->settings->is_sentinel_debug_enabled; $this->sentinelUpdatedAt = $this->server->sentinel_updated_at; } } public function handleSentinelRestarted($event) { if ($event['serverUuid'] === $this->server->uuid) { $this->server->refresh(); $this->syncData(); $this->dispatch('success', 'Sentinel has been restarted successfully.'); } } public function restartSentinel() { try { $this->authorize('manageSentinel', $this->server); $customImage = isDev() ? $this->sentinelCustomDockerImage : null; $this->server->restartSentinel($customImage); $this->dispatch('info', 'Restarting Sentinel.'); } catch (\Throwable $e) { return handleError($e, $this); } } public function updatedIsSentinelEnabled($value) { try { $this->authorize('manageSentinel', $this->server); if ($value === true) { if ($this->server->isBuildServer()) { $this->isSentinelEnabled = false; $this->dispatch('error', 'Sentinel cannot be enabled on build servers.'); return; } $customImage = isDev() ? $this->sentinelCustomDockerImage : null; StartSentinel::run($this->server, true, null, $customImage); } else { $this->isMetricsEnabled = false; $this->isSentinelDebugEnabled = false; StopSentinel::dispatch($this->server); } $this->submit(); } catch (\Throwable $e) { return handleError($e, $this); } } public function regenerateSentinelToken() { try { $this->authorize('manageSentinel', $this->server); $this->server->settings->generateSentinelToken(); $this->dispatch('success', 'Token regenerated. Restarting Sentinel.'); } catch (\Throwable $e) { return handleError($e, $this); } } public function submit() { try { $this->syncData(true); $this->dispatch('success', 'Sentinel settings updated.'); } catch (\Throwable $e) { return handleError($e, $this); } } public function instantSave() { try { $this->syncData(true); $this->restartSentinel(); } catch (\Throwable $e) { return handleError($e, $this); } } public function render() { return view('livewire.server.sentinel'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Server/Create.php
app/Livewire/Server/Create.php
<?php namespace App\Livewire\Server; use App\Models\CloudProviderToken; use App\Models\PrivateKey; use App\Models\Team; use Livewire\Component; class Create extends Component { public $private_keys = []; public bool $limit_reached = false; public bool $has_hetzner_tokens = false; public function mount() { $this->private_keys = PrivateKey::ownedByCurrentTeamCached(); if (! isCloud()) { $this->limit_reached = false; return; } $this->limit_reached = Team::serverLimitReached(); // Check if user has Hetzner tokens $this->has_hetzner_tokens = CloudProviderToken::ownedByCurrentTeam() ->where('provider', 'hetzner') ->exists(); } public function render() { return view('livewire.server.create'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Server/LogDrains.php
app/Livewire/Server/LogDrains.php
<?php namespace App\Livewire\Server; use App\Actions\Server\StartLogDrain; use App\Actions\Server\StopLogDrain; use App\Models\Server; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Livewire\Attributes\Validate; use Livewire\Component; class LogDrains extends Component { use AuthorizesRequests; public Server $server; #[Validate(['boolean'])] public bool $isLogDrainNewRelicEnabled = false; #[Validate(['boolean'])] public bool $isLogDrainCustomEnabled = false; #[Validate(['boolean'])] public bool $isLogDrainAxiomEnabled = false; #[Validate(['string', 'nullable'])] public ?string $logDrainNewRelicLicenseKey = null; #[Validate(['url', 'nullable'])] public ?string $logDrainNewRelicBaseUri = null; #[Validate(['string', 'nullable'])] public ?string $logDrainAxiomDatasetName = null; #[Validate(['string', 'nullable'])] public ?string $logDrainAxiomApiKey = null; #[Validate(['string', 'nullable'])] public ?string $logDrainCustomConfig = null; #[Validate(['string', 'nullable'])] public ?string $logDrainCustomConfigParser = null; public function mount(string $server_uuid) { try { $this->server = Server::ownedByCurrentTeam()->whereUuid($server_uuid)->firstOrFail(); $this->syncData(); } catch (\Throwable $e) { return handleError($e, $this); } } public function syncDataNewRelic(bool $toModel = false) { if ($toModel) { $this->server->settings->is_logdrain_newrelic_enabled = $this->isLogDrainNewRelicEnabled; $this->server->settings->logdrain_newrelic_license_key = $this->logDrainNewRelicLicenseKey; $this->server->settings->logdrain_newrelic_base_uri = $this->logDrainNewRelicBaseUri; } else { $this->isLogDrainNewRelicEnabled = $this->server->settings->is_logdrain_newrelic_enabled; $this->logDrainNewRelicLicenseKey = $this->server->settings->logdrain_newrelic_license_key; $this->logDrainNewRelicBaseUri = $this->server->settings->logdrain_newrelic_base_uri; } } public function syncDataAxiom(bool $toModel = false) { if ($toModel) { $this->server->settings->is_logdrain_axiom_enabled = $this->isLogDrainAxiomEnabled; $this->server->settings->logdrain_axiom_dataset_name = $this->logDrainAxiomDatasetName; $this->server->settings->logdrain_axiom_api_key = $this->logDrainAxiomApiKey; } else { $this->isLogDrainAxiomEnabled = $this->server->settings->is_logdrain_axiom_enabled; $this->logDrainAxiomDatasetName = $this->server->settings->logdrain_axiom_dataset_name; $this->logDrainAxiomApiKey = $this->server->settings->logdrain_axiom_api_key; } } public function syncDataCustom(bool $toModel = false) { if ($toModel) { $this->server->settings->is_logdrain_custom_enabled = $this->isLogDrainCustomEnabled; $this->server->settings->logdrain_custom_config = $this->logDrainCustomConfig; $this->server->settings->logdrain_custom_config_parser = $this->logDrainCustomConfigParser; } else { $this->isLogDrainCustomEnabled = $this->server->settings->is_logdrain_custom_enabled; $this->logDrainCustomConfig = $this->server->settings->logdrain_custom_config; $this->logDrainCustomConfigParser = $this->server->settings->logdrain_custom_config_parser; } } public function syncData(bool $toModel = false, ?string $type = null) { if ($toModel) { $this->customValidation(); if ($type === 'newrelic') { $this->syncDataNewRelic($toModel); } elseif ($type === 'axiom') { $this->syncDataAxiom($toModel); } elseif ($type === 'custom') { $this->syncDataCustom($toModel); } else { $this->syncDataNewRelic($toModel); $this->syncDataAxiom($toModel); $this->syncDataCustom($toModel); } $this->server->settings->save(); } else { if ($type === 'newrelic') { $this->syncDataNewRelic($toModel); } elseif ($type === 'axiom') { $this->syncDataAxiom($toModel); } elseif ($type === 'custom') { $this->syncDataCustom($toModel); } else { $this->syncDataNewRelic($toModel); $this->syncDataAxiom($toModel); $this->syncDataCustom($toModel); } } } public function customValidation() { if ($this->isLogDrainNewRelicEnabled) { try { $this->validate([ 'logDrainNewRelicLicenseKey' => ['required'], 'logDrainNewRelicBaseUri' => ['required', 'url'], ]); } catch (\Throwable $e) { $this->isLogDrainNewRelicEnabled = false; throw $e; } } elseif ($this->isLogDrainAxiomEnabled) { try { $this->validate([ 'logDrainAxiomDatasetName' => ['required'], 'logDrainAxiomApiKey' => ['required'], ]); } catch (\Throwable $e) { $this->isLogDrainAxiomEnabled = false; throw $e; } } elseif ($this->isLogDrainCustomEnabled) { try { $this->validate([ 'logDrainCustomConfig' => ['required'], 'logDrainCustomConfigParser' => ['string', 'nullable'], ]); } catch (\Throwable $e) { $this->isLogDrainCustomEnabled = false; throw $e; } } } public function instantSave() { try { $this->authorize('update', $this->server); $this->syncData(true); if ($this->server->isLogDrainEnabled()) { StartLogDrain::run($this->server); $this->dispatch('success', 'Log drain service started.'); } else { StopLogDrain::run($this->server); $this->dispatch('success', 'Log drain service stopped.'); } } catch (\Throwable $e) { return handleError($e, $this); } } public function submit(string $type) { try { $this->authorize('update', $this->server); $this->syncData(true, $type); $this->dispatch('success', 'Settings saved.'); } catch (\Throwable $e) { return handleError($e, $this); } } public function render() { return view('livewire.server.log-drains'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Server/DockerCleanupExecutions.php
app/Livewire/Server/DockerCleanupExecutions.php
<?php namespace App\Livewire\Server; use App\Models\DockerCleanupExecution; use App\Models\Server; use Illuminate\Support\Collection; use Livewire\Component; class DockerCleanupExecutions extends Component { public Server $server; public Collection $executions; public ?int $selectedKey = null; public $selectedExecution = null; public bool $isPollingActive = false; public $currentPage = 1; public $logsPerPage = 100; public function getListeners() { $teamId = auth()->user()->currentTeam()->id; return [ "echo-private:team.{$teamId},DockerCleanupDone" => 'refreshExecutions', ]; } public function mount(Server $server) { $this->server = $server; $this->refreshExecutions(); } public function refreshExecutions(): void { $this->executions = $this->server->dockerCleanupExecutions() ->orderBy('created_at', 'desc') ->take(20) ->get(); if ($this->selectedKey) { $this->selectedExecution = DockerCleanupExecution::find($this->selectedKey); if ($this->selectedExecution && $this->selectedExecution->status !== 'running') { $this->isPollingActive = false; } } } public function selectExecution($key): void { if ($key == $this->selectedKey) { $this->selectedKey = null; $this->selectedExecution = null; $this->currentPage = 1; $this->isPollingActive = false; return; } $this->selectedKey = $key; $this->selectedExecution = DockerCleanupExecution::find($key); $this->currentPage = 1; if ($this->selectedExecution && $this->selectedExecution->status === 'running') { $this->isPollingActive = true; } } public function polling() { if ($this->selectedExecution && $this->isPollingActive) { $this->selectedExecution->refresh(); if ($this->selectedExecution->status !== 'running') { $this->isPollingActive = false; } } $this->refreshExecutions(); } public function loadMoreLogs() { $this->currentPage++; } public function getLogLinesProperty() { if (! $this->selectedExecution) { return collect(); } if (! $this->selectedExecution->message) { return collect(['Waiting for execution output...']); } $lines = collect(explode("\n", $this->selectedExecution->message)); return $lines->take($this->currentPage * $this->logsPerPage); } public function downloadLogs(int $executionId) { $execution = $this->executions->firstWhere('id', $executionId); if (! $execution) { return; } return response()->streamDownload(function () use ($execution) { echo $execution->message; }, "docker-cleanup-{$execution->uuid}.log"); } public function hasMoreLogs() { if (! $this->selectedExecution || ! $this->selectedExecution->message) { return false; } $lines = collect(explode("\n", $this->selectedExecution->message)); return $lines->count() > ($this->currentPage * $this->logsPerPage); } public function render() { return view('livewire.server.docker-cleanup-executions'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Server/Destinations.php
app/Livewire/Server/Destinations.php
<?php namespace App\Livewire\Server; use App\Jobs\ConnectProxyToNetworksJob; use App\Models\Server; use App\Models\StandaloneDocker; use App\Models\SwarmDocker; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Illuminate\Support\Collection; use Livewire\Component; class Destinations extends Component { use AuthorizesRequests; public Server $server; public Collection $networks; public function mount(string $server_uuid) { try { $this->networks = collect(); $this->server = Server::ownedByCurrentTeam()->whereUuid($server_uuid)->firstOrFail(); } catch (\Throwable $e) { return handleError($e, $this); } } private function createNetworkAndAttachToProxy() { ConnectProxyToNetworksJob::dispatchSync($this->server); } public function add($name) { if ($this->server->isSwarm()) { $this->authorize('create', SwarmDocker::class); $found = $this->server->swarmDockers()->where('network', $name)->first(); if ($found) { $this->dispatch('error', 'Network already added to this server.'); return; } else { SwarmDocker::create([ 'name' => $this->server->name.'-'.$name, 'network' => $this->name, 'server_id' => $this->server->id, ]); } } else { $this->authorize('create', StandaloneDocker::class); $found = $this->server->standaloneDockers()->where('network', $name)->first(); if ($found) { $this->dispatch('error', 'Network already added to this server.'); return; } else { StandaloneDocker::create([ 'name' => $this->server->name.'-'.$name, 'network' => $name, 'server_id' => $this->server->id, ]); } $this->createNetworkAndAttachToProxy(); } } public function scan() { if ($this->server->isSwarm()) { $alreadyAddedNetworks = $this->server->swarmDockers; } else { $alreadyAddedNetworks = $this->server->standaloneDockers; } $networks = instant_remote_process(['docker network ls --format "{{json .}}"'], $this->server, false); $this->networks = format_docker_command_output_to_json($networks)->filter(function ($network) { return $network['Name'] !== 'bridge' && $network['Name'] !== 'host' && $network['Name'] !== 'none'; })->filter(function ($network) use ($alreadyAddedNetworks) { return ! $alreadyAddedNetworks->contains('network', $network['Name']); }); if ($this->networks->count() === 0) { $this->dispatch('success', 'No new destinations found on this server.'); return; } $this->dispatch('success', 'Scan done.'); } public function render() { return view('livewire.server.destinations'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Server/Delete.php
app/Livewire/Server/Delete.php
<?php namespace App\Livewire\Server; use App\Actions\Server\DeleteServer; use App\Models\Server; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Livewire\Component; class Delete extends Component { use AuthorizesRequests; public Server $server; public bool $delete_from_hetzner = false; public function mount(string $server_uuid) { try { $this->server = Server::ownedByCurrentTeam()->whereUuid($server_uuid)->firstOrFail(); } catch (\Throwable $e) { return handleError($e, $this); } } public function delete($password) { if (! verifyPasswordConfirmation($password, $this)) { return; } try { $this->authorize('delete', $this->server); if ($this->server->hasDefinedResources()) { $this->dispatch('error', 'Server has defined resources. Please delete them first.'); return; } $this->server->delete(); DeleteServer::dispatch( $this->server->id, $this->delete_from_hetzner, $this->server->hetzner_server_id, $this->server->cloud_provider_token_id, $this->server->team_id ); return redirectRoute($this, 'server.index'); } catch (\Throwable $e) { return handleError($e, $this); } } public function render() { $checkboxes = []; if ($this->server->hetzner_server_id) { $checkboxes[] = [ 'id' => 'delete_from_hetzner', 'label' => 'Also delete server from Hetzner Cloud', 'default_warning' => 'The actual server on Hetzner Cloud will NOT be deleted.', ]; } return view('livewire.server.delete', [ 'checkboxes' => $checkboxes, ]); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Server/CloudflareTunnel.php
app/Livewire/Server/CloudflareTunnel.php
<?php namespace App\Livewire\Server; use App\Actions\Server\ConfigureCloudflared; use App\Models\Server; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Livewire\Attributes\Validate; use Livewire\Component; class CloudflareTunnel extends Component { use AuthorizesRequests; public Server $server; #[Validate(['required', 'string'])] public string $cloudflare_token; #[Validate(['required', 'string'])] public string $ssh_domain; #[Validate(['required', 'boolean'])] public bool $isCloudflareTunnelsEnabled; public function getListeners() { $teamId = auth()->user()->currentTeam()->id; return [ "echo-private:team.{$teamId},CloudflareTunnelConfigured" => 'refresh', ]; } public function refresh() { $this->server->refresh(); $this->isCloudflareTunnelsEnabled = $this->server->settings->is_cloudflare_tunnel; } public function mount(string $server_uuid) { try { $this->server = Server::ownedByCurrentTeam()->whereUuid($server_uuid)->firstOrFail(); if ($this->server->isLocalhost()) { return redirect()->route('server.show', ['server_uuid' => $server_uuid]); } $this->isCloudflareTunnelsEnabled = $this->server->settings->is_cloudflare_tunnel; } catch (\Throwable $e) { return handleError($e, $this); } } public function toggleCloudflareTunnels() { try { $this->authorize('update', $this->server); remote_process(['docker rm -f coolify-cloudflared'], $this->server, false, 10); $this->isCloudflareTunnelsEnabled = false; $this->server->settings->is_cloudflare_tunnel = false; $this->server->settings->save(); if ($this->server->ip_previous) { $this->server->update(['ip' => $this->server->ip_previous]); $this->dispatch('success', 'Cloudflare Tunnel disabled.<br><br>Manually updated the server IP address to its previous IP address.'); } else { $this->dispatch('warning', 'Cloudflare Tunnel disabled. Action required: Update the server IP address to its real IP address in the Advanced settings.'); } } catch (\Throwable $e) { return handleError($e, $this); } } public function manualCloudflareConfig() { $this->authorize('update', $this->server); $this->isCloudflareTunnelsEnabled = true; $this->server->settings->is_cloudflare_tunnel = true; $this->server->settings->save(); $this->server->refresh(); $this->dispatch('success', 'Cloudflare Tunnel enabled.'); } public function automatedCloudflareConfig() { try { $this->authorize('update', $this->server); if (str($this->ssh_domain)->contains('https://')) { $this->ssh_domain = str($this->ssh_domain)->replace('https://', '')->replace('http://', '')->trim(); $this->ssh_domain = str($this->ssh_domain)->replace('/', ''); } $activity = ConfigureCloudflared::run($this->server, $this->cloudflare_token, $this->ssh_domain); $this->dispatch('activityMonitor', $activity->id); } catch (\Throwable $e) { return handleError($e, $this); } } public function render() { return view('livewire.server.cloudflare-tunnel'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Server/Index.php
app/Livewire/Server/Index.php
<?php namespace App\Livewire\Server; use App\Models\Server; use Illuminate\Database\Eloquent\Collection; use Livewire\Component; class Index extends Component { public ?Collection $servers = null; public function mount() { $this->servers = Server::ownedByCurrentTeamCached(); } public function render() { return view('livewire.server.index'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Server/New/ByIp.php
app/Livewire/Server/New/ByIp.php
<?php namespace App\Livewire\Server\New; use App\Enums\ProxyTypes; use App\Models\Server; use App\Models\Team; use App\Support\ValidationPatterns; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Livewire\Attributes\Locked; use Livewire\Component; class ByIp extends Component { use AuthorizesRequests; #[Locked] public $private_keys; #[Locked] public $limit_reached; public ?int $private_key_id = null; public $new_private_key_name; public $new_private_key_description; public $new_private_key_value; public string $name; public ?string $description = null; public string $ip; public string $user = 'root'; public int $port = 22; public bool $is_build_server = false; public function mount() { $this->name = generate_random_name(); $this->private_key_id = $this->private_keys->first()?->id; } protected function rules(): array { return [ 'private_key_id' => 'nullable|integer', 'new_private_key_name' => 'nullable|string', 'new_private_key_description' => 'nullable|string', 'new_private_key_value' => 'nullable|string', 'name' => ValidationPatterns::nameRules(), 'description' => ValidationPatterns::descriptionRules(), 'ip' => 'required|string', 'user' => 'required|string', 'port' => 'required|integer|between:1,65535', 'is_build_server' => 'required|boolean', ]; } protected function messages(): array { return array_merge(ValidationPatterns::combinedMessages(), [ 'private_key_id.integer' => 'The Private Key field must be an integer.', 'private_key_id.nullable' => 'The Private Key field is optional.', 'new_private_key_name.string' => 'The Private Key Name must be a string.', 'new_private_key_description.string' => 'The Private Key Description must be a string.', 'new_private_key_value.string' => 'The Private Key Value must be a string.', 'ip.required' => 'The IP Address/Domain is required.', 'ip.string' => 'The IP Address/Domain must be a string.', 'user.required' => 'The User field is required.', 'user.string' => 'The User field must be a string.', 'port.required' => 'The Port field is required.', 'port.integer' => 'The Port field must be an integer.', 'port.between' => 'The Port field must be between 1 and 65535.', 'is_build_server.required' => 'The Build Server field is required.', 'is_build_server.boolean' => 'The Build Server field must be true or false.', ]); } public function setPrivateKey(string $private_key_id) { $this->private_key_id = $private_key_id; } public function instantSave() { // $this->dispatch('success', 'Application settings updated!'); } public function submit() { $this->validate(); try { $this->authorize('create', Server::class); if (Server::where('team_id', currentTeam()->id) ->where('ip', $this->ip) ->exists()) { return $this->dispatch('error', 'This IP/Domain is already in use by another server in your team.'); } if (is_null($this->private_key_id)) { return $this->dispatch('error', 'You must select a private key'); } if (Team::serverLimitReached()) { return $this->dispatch('error', 'You have reached the server limit for your subscription.'); } $payload = [ 'name' => $this->name, 'description' => $this->description, 'ip' => $this->ip, 'user' => $this->user, 'port' => $this->port, 'team_id' => currentTeam()->id, 'private_key_id' => $this->private_key_id, ]; if ($this->is_build_server) { data_forget($payload, 'proxy'); } $server = Server::create($payload); $server->proxy->set('status', 'exited'); $server->proxy->set('type', ProxyTypes::TRAEFIK->value); $server->save(); $server->settings->is_build_server = $this->is_build_server; $server->settings->save(); return redirectRoute($this, 'server.show', [$server->uuid]); } catch (\Throwable $e) { return handleError($e, $this); } } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Server/New/ByHetzner.php
app/Livewire/Server/New/ByHetzner.php
<?php namespace App\Livewire\Server\New; use App\Enums\ProxyTypes; use App\Models\CloudInitScript; use App\Models\CloudProviderToken; use App\Models\PrivateKey; use App\Models\Server; use App\Models\Team; use App\Rules\ValidHostname; use App\Services\HetznerService; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Illuminate\Support\Collection; use Illuminate\Support\Facades\Http; use Livewire\Attributes\Locked; use Livewire\Component; class ByHetzner extends Component { use AuthorizesRequests; // Step tracking public int $current_step = 1; // Locked data #[Locked] public Collection $available_tokens; #[Locked] public $private_keys; #[Locked] public $limit_reached; // Step 1: Token selection public ?int $selected_token_id = null; // Step 2: Server configuration public array $locations = []; public array $images = []; public array $serverTypes = []; public array $hetznerSshKeys = []; public ?string $selected_location = null; public ?int $selected_image = null; public ?string $selected_server_type = null; public array $selectedHetznerSshKeyIds = []; public string $server_name = ''; public ?int $private_key_id = null; public bool $loading_data = false; public bool $enable_ipv4 = true; public bool $enable_ipv6 = true; public ?string $cloud_init_script = null; public bool $save_cloud_init_script = false; public ?string $cloud_init_script_name = null; public ?int $selected_cloud_init_script_id = null; #[Locked] public Collection $saved_cloud_init_scripts; public bool $from_onboarding = false; public function mount() { $this->authorize('viewAny', CloudProviderToken::class); $this->loadTokens(); $this->loadSavedCloudInitScripts(); $this->server_name = generate_random_name(); $this->private_keys = PrivateKey::ownedAndOnlySShKeys()->where('id', '!=', 0)->get(); if ($this->private_keys->count() > 0) { $this->private_key_id = $this->private_keys->first()->id; } } public function loadSavedCloudInitScripts() { $this->saved_cloud_init_scripts = CloudInitScript::ownedByCurrentTeam()->get(); } public function getListeners() { return [ 'tokenAdded' => 'handleTokenAdded', 'privateKeyCreated' => 'handlePrivateKeyCreated', 'modalClosed' => 'resetSelection', ]; } public function resetSelection() { $this->selected_token_id = null; $this->current_step = 1; $this->cloud_init_script = null; $this->save_cloud_init_script = false; $this->cloud_init_script_name = null; $this->selected_cloud_init_script_id = null; } public function loadTokens() { $this->available_tokens = CloudProviderToken::ownedByCurrentTeam() ->where('provider', 'hetzner') ->get(); } public function handleTokenAdded($tokenId) { // Refresh token list $this->loadTokens(); // Auto-select the new token $this->selected_token_id = $tokenId; // Automatically proceed to next step $this->nextStep(); } public function handlePrivateKeyCreated($keyId) { // Refresh private keys list $this->private_keys = PrivateKey::ownedAndOnlySShKeys()->where('id', '!=', 0)->get(); // Auto-select the new key $this->private_key_id = $keyId; // Clear validation errors for private_key_id $this->resetErrorBag('private_key_id'); } protected function rules(): array { $rules = [ 'selected_token_id' => 'required|integer|exists:cloud_provider_tokens,id', ]; if ($this->current_step === 2) { $rules = array_merge($rules, [ 'server_name' => ['required', 'string', 'max:253', new ValidHostname], 'selected_location' => 'required|string', 'selected_image' => 'required|integer', 'selected_server_type' => 'required|string', 'private_key_id' => 'required|integer|exists:private_keys,id,team_id,'.currentTeam()->id, 'selectedHetznerSshKeyIds' => 'nullable|array', 'selectedHetznerSshKeyIds.*' => 'integer', 'enable_ipv4' => 'required|boolean', 'enable_ipv6' => 'required|boolean', 'cloud_init_script' => ['nullable', 'string', new \App\Rules\ValidCloudInitYaml], 'save_cloud_init_script' => 'boolean', 'cloud_init_script_name' => 'nullable|string|max:255', 'selected_cloud_init_script_id' => 'nullable|integer|exists:cloud_init_scripts,id', ]); } return $rules; } protected function messages(): array { return [ 'selected_token_id.required' => 'Please select a Hetzner token.', 'selected_token_id.exists' => 'Selected token not found.', ]; } public function selectToken(int $tokenId) { $this->selected_token_id = $tokenId; } private function validateHetznerToken(string $token): bool { try { $response = Http::withHeaders([ 'Authorization' => 'Bearer '.$token, ])->timeout(10)->get('https://api.hetzner.cloud/v1/servers'); return $response->successful(); } catch (\Throwable $e) { return false; } } private function getHetznerToken(): string { if ($this->selected_token_id) { $token = $this->available_tokens->firstWhere('id', $this->selected_token_id); return $token ? $token->token : ''; } return ''; } public function nextStep() { // Validate step 1 - just need a token selected $this->validate([ 'selected_token_id' => 'required|integer|exists:cloud_provider_tokens,id', ]); try { $hetznerToken = $this->getHetznerToken(); if (! $hetznerToken) { return $this->dispatch('error', 'Please select a valid Hetzner token.'); } // Load Hetzner data $this->loadHetznerData($hetznerToken); // Move to step 2 $this->current_step = 2; } catch (\Throwable $e) { return handleError($e, $this); } } public function previousStep() { $this->current_step = 1; } private function loadHetznerData(string $token) { $this->loading_data = true; try { $hetznerService = new HetznerService($token); $this->locations = $hetznerService->getLocations(); $this->serverTypes = $hetznerService->getServerTypes(); // Get images and sort by name $images = $hetznerService->getImages(); $this->images = collect($images) ->filter(function ($image) { // Only system images if (! isset($image['type']) || $image['type'] !== 'system') { return false; } // Filter out deprecated images if (isset($image['deprecated']) && $image['deprecated'] === true) { return false; } return true; }) ->sortBy('name') ->values() ->toArray(); // Load SSH keys from Hetzner $this->hetznerSshKeys = $hetznerService->getSshKeys(); $this->loading_data = false; } catch (\Throwable $e) { $this->loading_data = false; throw $e; } } private function getCpuVendorInfo(array $serverType): ?string { $name = strtolower($serverType['name'] ?? ''); if (str_starts_with($name, 'ccx')) { return 'AMD Milan EPYC™'; } elseif (str_starts_with($name, 'cpx')) { return 'AMD EPYC™'; } elseif (str_starts_with($name, 'cx')) { return 'Intel®/AMD'; } elseif (str_starts_with($name, 'cax')) { return 'Ampere®'; } return null; } public function getAvailableServerTypesProperty() { ray('Getting available server types', [ 'selected_location' => $this->selected_location, 'total_server_types' => count($this->serverTypes), ]); if (! $this->selected_location) { return $this->serverTypes; } $filtered = collect($this->serverTypes) ->filter(function ($type) { if (! isset($type['locations'])) { return false; } $locationNames = collect($type['locations'])->pluck('name')->toArray(); return in_array($this->selected_location, $locationNames); }) ->map(function ($serverType) { $serverType['cpu_vendor_info'] = $this->getCpuVendorInfo($serverType); return $serverType; }) ->values() ->toArray(); ray('Filtered server types', [ 'selected_location' => $this->selected_location, 'filtered_count' => count($filtered), ]); return $filtered; } public function getAvailableImagesProperty() { ray('Getting available images', [ 'selected_server_type' => $this->selected_server_type, 'total_images' => count($this->images), 'images' => $this->images, ]); if (! $this->selected_server_type) { return $this->images; } $serverType = collect($this->serverTypes)->firstWhere('name', $this->selected_server_type); ray('Server type data', $serverType); if (! $serverType || ! isset($serverType['architecture'])) { ray('No architecture in server type, returning all'); return $this->images; } $architecture = $serverType['architecture']; $filtered = collect($this->images) ->filter(fn ($image) => ($image['architecture'] ?? null) === $architecture) ->values() ->toArray(); ray('Filtered images', [ 'architecture' => $architecture, 'filtered_count' => count($filtered), ]); return $filtered; } public function getSelectedServerPriceProperty(): ?string { if (! $this->selected_server_type) { return null; } $serverType = collect($this->serverTypes)->firstWhere('name', $this->selected_server_type); if (! $serverType || ! isset($serverType['prices'][0]['price_monthly']['gross'])) { return null; } $price = $serverType['prices'][0]['price_monthly']['gross']; return '€'.number_format($price, 2); } public function updatedSelectedLocation($value) { ray('Location selected', $value); // Reset server type and image when location changes $this->selected_server_type = null; $this->selected_image = null; } public function updatedSelectedServerType($value) { ray('Server type selected', $value); // Reset image when server type changes $this->selected_image = null; } public function updatedSelectedImage($value) { ray('Image selected', $value); } public function updatedSelectedCloudInitScriptId($value) { if ($value) { $script = CloudInitScript::ownedByCurrentTeam()->findOrFail($value); $this->cloud_init_script = $script->script; $this->cloud_init_script_name = $script->name; } } public function clearCloudInitScript() { $this->selected_cloud_init_script_id = null; $this->cloud_init_script = ''; $this->cloud_init_script_name = ''; $this->save_cloud_init_script = false; } private function createHetznerServer(string $token): array { $hetznerService = new HetznerService($token); // Get the private key and extract public key $privateKey = PrivateKey::ownedByCurrentTeam()->findOrFail($this->private_key_id); $publicKey = $privateKey->getPublicKey(); $md5Fingerprint = PrivateKey::generateMd5Fingerprint($privateKey->private_key); ray('Private Key Info', [ 'private_key_id' => $this->private_key_id, 'sha256_fingerprint' => $privateKey->fingerprint, 'md5_fingerprint' => $md5Fingerprint, ]); // Check if SSH key already exists on Hetzner by comparing MD5 fingerprints $existingSshKeys = $hetznerService->getSshKeys(); $existingKey = null; ray('Existing SSH Keys on Hetzner', $existingSshKeys); foreach ($existingSshKeys as $key) { if ($key['fingerprint'] === $md5Fingerprint) { $existingKey = $key; break; } } // Upload SSH key if it doesn't exist if ($existingKey) { $sshKeyId = $existingKey['id']; ray('Using existing SSH key', ['ssh_key_id' => $sshKeyId]); } else { $sshKeyName = $privateKey->name; $uploadedKey = $hetznerService->uploadSshKey($sshKeyName, $publicKey); $sshKeyId = $uploadedKey['id']; ray('Uploaded new SSH key', ['ssh_key_id' => $sshKeyId, 'name' => $sshKeyName]); } // Normalize server name to lowercase for RFC 1123 compliance $normalizedServerName = strtolower(trim($this->server_name)); // Prepare SSH keys array: Coolify key + user-selected Hetzner keys $sshKeys = array_merge( [$sshKeyId], // Coolify key (always included) $this->selectedHetznerSshKeyIds // User-selected Hetzner keys ); // Remove duplicates in case the Coolify key was also selected $sshKeys = array_unique($sshKeys); $sshKeys = array_values($sshKeys); // Re-index array // Prepare server creation parameters $params = [ 'name' => $normalizedServerName, 'server_type' => $this->selected_server_type, 'image' => $this->selected_image, 'location' => $this->selected_location, 'start_after_create' => true, 'ssh_keys' => $sshKeys, 'public_net' => [ 'enable_ipv4' => $this->enable_ipv4, 'enable_ipv6' => $this->enable_ipv6, ], ]; // Add cloud-init script if provided if (! empty($this->cloud_init_script)) { $params['user_data'] = $this->cloud_init_script; } ray('Server creation parameters', $params); // Create server on Hetzner $hetznerServer = $hetznerService->createServer($params); ray('Hetzner server created', $hetznerServer); return $hetznerServer; } public function submit() { $this->validate(); try { $this->authorize('create', Server::class); if (Team::serverLimitReached()) { return $this->dispatch('error', 'You have reached the server limit for your subscription.'); } // Save cloud-init script if requested if ($this->save_cloud_init_script && ! empty($this->cloud_init_script) && ! empty($this->cloud_init_script_name)) { $this->authorize('create', CloudInitScript::class); CloudInitScript::create([ 'team_id' => currentTeam()->id, 'name' => $this->cloud_init_script_name, 'script' => $this->cloud_init_script, ]); } $hetznerToken = $this->getHetznerToken(); // Create server on Hetzner $hetznerServer = $this->createHetznerServer($hetznerToken); // Determine IP address to use (prefer IPv4, fallback to IPv6) $ipAddress = null; if ($this->enable_ipv4 && isset($hetznerServer['public_net']['ipv4']['ip'])) { $ipAddress = $hetznerServer['public_net']['ipv4']['ip']; } elseif ($this->enable_ipv6 && isset($hetznerServer['public_net']['ipv6']['ip'])) { $ipAddress = $hetznerServer['public_net']['ipv6']['ip']; } if (! $ipAddress) { throw new \Exception('No public IP address available. Enable at least one of IPv4 or IPv6.'); } // Create server in Coolify database $server = Server::create([ 'name' => $this->server_name, 'ip' => $ipAddress, 'user' => 'root', 'port' => 22, 'team_id' => currentTeam()->id, 'private_key_id' => $this->private_key_id, 'cloud_provider_token_id' => $this->selected_token_id, 'hetzner_server_id' => $hetznerServer['id'], ]); $server->proxy->set('status', 'exited'); $server->proxy->set('type', ProxyTypes::TRAEFIK->value); $server->save(); if ($this->from_onboarding) { // Complete the boarding when server is successfully created via Hetzner currentTeam()->update([ 'show_boarding' => false, ]); refreshSession(); return redirectRoute($this, 'server.show', [$server->uuid]); } return redirectRoute($this, 'server.show', [$server->uuid]); } catch (\Throwable $e) { return handleError($e, $this); } } public function render() { return view('livewire.server.new.by-hetzner'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Server/PrivateKey/Show.php
app/Livewire/Server/PrivateKey/Show.php
<?php namespace App\Livewire\Server\PrivateKey; use App\Models\PrivateKey; use App\Models\Server; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Illuminate\Support\Facades\DB; use Livewire\Component; class Show extends Component { use AuthorizesRequests; public Server $server; public $privateKeys = []; public $parameters = []; public function mount(string $server_uuid) { try { $this->server = Server::ownedByCurrentTeam()->whereUuid($server_uuid)->firstOrFail(); $this->privateKeys = PrivateKey::ownedByCurrentTeam()->get()->where('is_git_related', false); } catch (\Throwable $e) { return handleError($e, $this); } } public function setPrivateKey($privateKeyId) { $ownedPrivateKey = PrivateKey::ownedByCurrentTeam()->find($privateKeyId); if (is_null($ownedPrivateKey)) { $this->dispatch('error', 'You are not allowed to use this private key.'); return; } try { $this->authorize('update', $this->server); DB::transaction(function () use ($ownedPrivateKey) { $this->server->privateKey()->associate($ownedPrivateKey); $this->server->save(); ['uptime' => $uptime, 'error' => $error] = $this->server->validateConnection(justCheckingNewKey: true); if (! $uptime) { throw new \Exception($error); } }); $this->dispatch('success', 'Private key updated successfully.'); $this->dispatch('refreshServerShow'); } catch (\Exception $e) { $this->server->refresh(); $this->server->validateConnection(); $this->dispatch('error', $e->getMessage()); } } public function checkConnection() { try { ['uptime' => $uptime, 'error' => $error] = $this->server->validateConnection(); if ($uptime) { $this->dispatch('success', 'Server is reachable.'); $this->dispatch('refreshServerShow'); } else { $this->dispatch('error', 'Server is not reachable.<br><br>Check this <a target="_blank" class="underline" href="https://coolify.io/docs/knowledge-base/server/openssh">documentation</a> for further help.<br><br>Error: '.$error); return; } } catch (\Throwable $e) { return handleError($e, $this); } } public function render() { return view('livewire.server.private-key.show'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Server/CloudProviderToken/Show.php
app/Livewire/Server/CloudProviderToken/Show.php
<?php namespace App\Livewire\Server\CloudProviderToken; use App\Models\CloudProviderToken; use App\Models\Server; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Livewire\Component; class Show extends Component { use AuthorizesRequests; public Server $server; public $cloudProviderTokens = []; public $parameters = []; public function mount(string $server_uuid) { try { $this->server = Server::ownedByCurrentTeam()->whereUuid($server_uuid)->firstOrFail(); $this->loadTokens(); } catch (\Throwable $e) { return handleError($e, $this); } } public function getListeners() { return [ 'tokenAdded' => 'handleTokenAdded', ]; } public function loadTokens() { $this->cloudProviderTokens = CloudProviderToken::ownedByCurrentTeam() ->where('provider', 'hetzner') ->get(); } public function handleTokenAdded($tokenId) { $this->loadTokens(); } public function setCloudProviderToken($tokenId) { $ownedToken = CloudProviderToken::ownedByCurrentTeam()->find($tokenId); if (is_null($ownedToken)) { $this->dispatch('error', 'You are not allowed to use this token.'); return; } try { $this->authorize('update', $this->server); // Validate the token works and can access this specific server $validationResult = $this->validateTokenForServer($ownedToken); if (! $validationResult['valid']) { $this->dispatch('error', $validationResult['error']); return; } $this->server->cloudProviderToken()->associate($ownedToken); $this->server->save(); $this->dispatch('success', 'Hetzner token updated successfully.'); $this->dispatch('refreshServerShow'); } catch (\Exception $e) { $this->server->refresh(); $this->dispatch('error', $e->getMessage()); } } private function validateTokenForServer(CloudProviderToken $token): array { try { // First, validate the token itself $response = \Illuminate\Support\Facades\Http::withHeaders([ 'Authorization' => 'Bearer '.$token->token, ])->timeout(10)->get('https://api.hetzner.cloud/v1/servers'); if (! $response->successful()) { return [ 'valid' => false, 'error' => 'This token is invalid or has insufficient permissions.', ]; } // Check if this token can access the specific Hetzner server if ($this->server->hetzner_server_id) { $serverResponse = \Illuminate\Support\Facades\Http::withHeaders([ 'Authorization' => 'Bearer '.$token->token, ])->timeout(10)->get("https://api.hetzner.cloud/v1/servers/{$this->server->hetzner_server_id}"); if (! $serverResponse->successful()) { return [ 'valid' => false, 'error' => 'This token cannot access this server. It may belong to a different Hetzner project.', ]; } } return ['valid' => true]; } catch (\Throwable $e) { return [ 'valid' => false, 'error' => 'Failed to validate token: '.$e->getMessage(), ]; } } public function validateToken() { try { $token = $this->server->cloudProviderToken; if (! $token) { $this->dispatch('error', 'No Hetzner token is associated with this server.'); return; } $response = \Illuminate\Support\Facades\Http::withHeaders([ 'Authorization' => 'Bearer '.$token->token, ])->timeout(10)->get('https://api.hetzner.cloud/v1/servers'); if ($response->successful()) { $this->dispatch('success', 'Hetzner token is valid and working.'); } else { $this->dispatch('error', 'Hetzner token is invalid or has insufficient permissions.'); } } catch (\Throwable $e) { return handleError($e, $this); } } public function render() { return view('livewire.server.cloud-provider-token.show'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Server/CaCertificate/Show.php
app/Livewire/Server/CaCertificate/Show.php
<?php namespace App\Livewire\Server\CaCertificate; use App\Helpers\SslHelper; use App\Jobs\RegenerateSslCertJob; use App\Models\Server; use App\Models\SslCertificate; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Illuminate\Support\Carbon; use Livewire\Attributes\Locked; use Livewire\Component; class Show extends Component { use AuthorizesRequests; #[Locked] public Server $server; public ?SslCertificate $caCertificate = null; public $showCertificate = false; public $certificateContent = ''; public ?Carbon $certificateValidUntil = null; public function mount(string $server_uuid) { try { $this->server = Server::ownedByCurrentTeam()->whereUuid($server_uuid)->firstOrFail(); $this->loadCaCertificate(); } catch (\Throwable $e) { return redirect()->route('server.index'); } } public function loadCaCertificate() { $this->caCertificate = $this->server->sslCertificates()->where('is_ca_certificate', true)->first(); if ($this->caCertificate) { $this->certificateContent = $this->caCertificate->ssl_certificate; $this->certificateValidUntil = $this->caCertificate->valid_until; } } public function toggleCertificate() { $this->showCertificate = ! $this->showCertificate; } public function saveCaCertificate() { try { $this->authorize('manageCaCertificate', $this->server); if (! $this->certificateContent) { throw new \Exception('Certificate content cannot be empty.'); } if (! openssl_x509_read($this->certificateContent)) { throw new \Exception('Invalid certificate format.'); } if ($this->caCertificate) { $this->caCertificate->ssl_certificate = $this->certificateContent; $this->caCertificate->save(); $this->loadCaCertificate(); $this->writeCertificateToServer(); dispatch(new RegenerateSslCertJob( server_id: $this->server->id, force_regeneration: true )); } $this->dispatch('success', 'CA Certificate saved successfully.'); } catch (\Throwable $e) { return handleError($e, $this); } } public function regenerateCaCertificate() { try { $this->authorize('manageCaCertificate', $this->server); SslHelper::generateSslCertificate( commonName: 'Coolify CA Certificate', serverId: $this->server->id, isCaCertificate: true, validityDays: 10 * 365 ); $this->loadCaCertificate(); $this->writeCertificateToServer(); dispatch(new RegenerateSslCertJob( server_id: $this->server->id, force_regeneration: true )); $this->loadCaCertificate(); $this->dispatch('success', 'CA Certificate regenerated successfully.'); } catch (\Throwable $e) { return handleError($e, $this); } } private function writeCertificateToServer() { $caCertPath = config('constants.coolify.base_config_path').'/ssl/'; $commands = collect([ "mkdir -p $caCertPath", "chown -R 9999:root $caCertPath", "chmod -R 700 $caCertPath", "rm -rf $caCertPath/coolify-ca.crt", "echo '{$this->certificateContent}' > $caCertPath/coolify-ca.crt", "chmod 644 $caCertPath/coolify-ca.crt", ]); remote_process($commands, $this->server); } public function render() { return view('livewire.server.ca-certificate.show'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Server/Security/TerminalAccess.php
app/Livewire/Server/Security/TerminalAccess.php
<?php namespace App\Livewire\Server\Security; use App\Models\Server; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Livewire\Attributes\Validate; use Livewire\Component; class TerminalAccess extends Component { use AuthorizesRequests; public Server $server; public array $parameters = []; #[Validate(['boolean'])] public bool $isTerminalEnabled = false; public function mount(string $server_uuid) { try { $this->server = Server::ownedByCurrentTeam()->whereUuid($server_uuid)->firstOrFail(); $this->authorize('update', $this->server); $this->parameters = get_route_parameters(); $this->syncData(); } catch (\Throwable) { return redirect()->route('server.index'); } } public function toggleTerminal($password) { try { $this->authorize('update', $this->server); // Check if user is admin or owner if (! auth()->user()->isAdmin()) { throw new \Exception('Only team administrators and owners can modify terminal access.'); } // Verify password if (! verifyPasswordConfirmation($password, $this)) { return; } // Toggle the terminal setting $this->server->settings->is_terminal_enabled = ! $this->server->settings->is_terminal_enabled; $this->server->settings->save(); // Update the local property $this->isTerminalEnabled = $this->server->settings->is_terminal_enabled; $status = $this->isTerminalEnabled ? 'enabled' : 'disabled'; $this->dispatch('success', "Terminal access has been {$status}."); } catch (\Throwable $e) { return handleError($e, $this); } } public function syncData(bool $toModel = false) { if ($toModel) { $this->authorize('update', $this->server); $this->validate(); // No other fields to sync for terminal access } else { $this->isTerminalEnabled = $this->server->settings->is_terminal_enabled; } } public function render() { return view('livewire.server.security.terminal-access'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Server/Security/Patches.php
app/Livewire/Server/Security/Patches.php
<?php namespace App\Livewire\Server\Security; use App\Actions\Server\CheckUpdates; use App\Actions\Server\UpdatePackage; use App\Events\ServerPackageUpdated; use App\Models\Server; use App\Notifications\Server\ServerPatchCheck; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Livewire\Component; class Patches extends Component { use AuthorizesRequests; public array $parameters; public Server $server; public ?int $totalUpdates = null; public ?array $updates = null; public ?string $error = null; public ?string $osId = null; public ?string $packageManager = null; public function getListeners() { $teamId = auth()->user()->currentTeam()->id; return [ "echo-private:team.{$teamId},ServerPackageUpdated" => 'checkForUpdatesDispatch', ]; } public function mount() { $this->parameters = get_route_parameters(); $this->server = Server::ownedByCurrentTeam()->whereUuid($this->parameters['server_uuid'])->firstOrFail(); $this->authorize('viewSecurity', $this->server); } public function checkForUpdatesDispatch() { $this->totalUpdates = null; $this->updates = null; $this->error = null; $this->osId = null; $this->packageManager = null; $this->dispatch('checkForUpdatesDispatch'); } public function checkForUpdates() { $job = CheckUpdates::run($this->server); if (isset($job['error'])) { $this->error = data_get($job, 'error', 'Something went wrong.'); } else { $this->totalUpdates = data_get($job, 'total_updates', 0); $this->updates = data_get($job, 'updates', []); $this->osId = data_get($job, 'osId', null); $this->packageManager = data_get($job, 'package_manager', null); } } public function updateAllPackages() { $this->authorize('update', $this->server); if (! $this->packageManager || ! $this->osId) { $this->dispatch('error', message: 'Run "Check for updates" first.'); return; } try { $activity = UpdatePackage::run( server: $this->server, packageManager: $this->packageManager, osId: $this->osId, all: true ); $this->dispatch('activityMonitor', $activity->id, ServerPackageUpdated::class); } catch (\Exception $e) { $this->dispatch('error', message: $e->getMessage()); } } public function updatePackage($package) { try { $this->authorize('update', $this->server); $activity = UpdatePackage::run(server: $this->server, packageManager: $this->packageManager, osId: $this->osId, package: $package); $this->dispatch('activityMonitor', $activity->id, ServerPackageUpdated::class); } catch (\Exception $e) { $this->dispatch('error', message: $e->getMessage()); } } public function sendTestEmail() { if (! isDev()) { $this->dispatch('error', message: 'Test email functionality is only available in development mode.'); return; } try { // Get current patch data or create test data if none exists $testPatchData = $this->createTestPatchData(); // Send test notification $this->server->team->notify(new ServerPatchCheck($this->server, $testPatchData)); $this->dispatch('success', 'Test email sent successfully! Check your email inbox.'); } catch (\Exception $e) { $this->dispatch('error', message: 'Failed to send test email: '.$e->getMessage()); } } private function createTestPatchData(): array { // If we have real patch data, use it if (isset($this->updates) && is_array($this->updates) && count($this->updates) > 0) { return [ 'total_updates' => $this->totalUpdates, 'updates' => $this->updates, 'osId' => $this->osId, 'package_manager' => $this->packageManager, ]; } // Otherwise create realistic test data return [ 'total_updates' => 8, 'updates' => [ [ 'package' => 'docker-ce', 'current_version' => '24.0.7-1', 'new_version' => '25.0.1-1', ], [ 'package' => 'nginx', 'current_version' => '1.20.2-1', 'new_version' => '1.22.1-1', ], [ 'package' => 'kernel-generic', 'current_version' => '5.15.0-89', 'new_version' => '5.15.0-91', ], [ 'package' => 'openssh-server', 'current_version' => '8.9p1-3', 'new_version' => '9.0p1-1', ], [ 'package' => 'curl', 'current_version' => '7.81.0-1', 'new_version' => '7.85.0-1', ], [ 'package' => 'git', 'current_version' => '2.34.1-1', 'new_version' => '2.39.1-1', ], [ 'package' => 'python3', 'current_version' => '3.10.6-1', 'new_version' => '3.11.0-1', ], [ 'package' => 'htop', 'current_version' => '3.2.1-1', 'new_version' => '3.2.2-1', ], ], 'osId' => $this->osId ?? 'ubuntu', 'package_manager' => $this->packageManager ?? 'apt', ]; } public function render() { return view('livewire.server.security.patches'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Server/Proxy/Logs.php
app/Livewire/Server/Proxy/Logs.php
<?php namespace App\Livewire\Server\Proxy; use App\Models\Server; use Livewire\Component; class Logs extends Component { public ?Server $server = null; public $parameters = []; public function mount() { $this->parameters = get_route_parameters(); try { $this->server = Server::ownedByCurrentTeam()->whereUuid(request()->server_uuid)->first(); if (is_null($this->server)) { return redirect()->route('server.index'); } } catch (\Throwable $e) { return handleError($e, $this); } } public function render() { return view('livewire.server.proxy.logs'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Server/Proxy/DynamicConfigurationNavbar.php
app/Livewire/Server/Proxy/DynamicConfigurationNavbar.php
<?php namespace App\Livewire\Server\Proxy; use App\Models\Server; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Livewire\Component; class DynamicConfigurationNavbar extends Component { use AuthorizesRequests; public $server_id; public Server $server; public $fileName = ''; public $value = ''; public $newFile = false; public function delete(string $fileName) { $this->authorize('update', $this->server); $proxy_path = $this->server->proxyPath(); $proxy_type = $this->server->proxyType(); // Decode filename: pipes are used to encode dots for Livewire property binding // (e.g., 'my|service.yaml' -> 'my.service.yaml') // This must happen BEFORE validation because validateShellSafePath() correctly // rejects pipe characters as dangerous shell metacharacters $file = str_replace('|', '.', $fileName); // Validate filename to prevent command injection validateShellSafePath($file, 'proxy configuration filename'); if ($proxy_type === 'CADDY' && $file === 'Caddyfile') { $this->dispatch('error', 'Cannot delete Caddyfile.'); return; } $fullPath = "{$proxy_path}/dynamic/{$file}"; $escapedPath = escapeshellarg($fullPath); instant_remote_process(["rm -f {$escapedPath}"], $this->server); if ($proxy_type === 'CADDY') { $this->server->reloadCaddy(); } $this->dispatch('success', 'File deleted.'); $this->dispatch('loadDynamicConfigurations'); $this->dispatch('refresh'); } public function render() { return view('livewire.server.proxy.dynamic-configuration-navbar'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Server/Proxy/NewDynamicConfiguration.php
app/Livewire/Server/Proxy/NewDynamicConfiguration.php
<?php namespace App\Livewire\Server\Proxy; use App\Enums\ProxyTypes; use App\Models\Server; use App\Rules\ValidProxyConfigFilename; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Livewire\Component; use Symfony\Component\Yaml\Yaml; class NewDynamicConfiguration extends Component { use AuthorizesRequests; public string $fileName = ''; public string $value = ''; public bool $newFile = false; public Server $server; public $server_id; public $parameters = []; public function mount() { $this->server = Server::ownedByCurrentTeam()->whereId($this->server_id)->first(); $this->parameters = get_route_parameters(); if ($this->fileName !== '') { $this->fileName = str_replace('|', '.', $this->fileName); } } public function addDynamicConfiguration() { try { $this->authorize('update', $this->server); $this->validate([ 'fileName' => ['required', new ValidProxyConfigFilename], 'value' => 'required', ]); // Additional security validation to prevent command injection validateShellSafePath($this->fileName, 'proxy configuration filename'); if (data_get($this->parameters, 'server_uuid')) { $this->server = Server::ownedByCurrentTeam()->whereUuid(data_get($this->parameters, 'server_uuid'))->first(); } if (is_null($this->server)) { return redirect()->route('server.index'); } $proxy_type = $this->server->proxyType(); if ($proxy_type === ProxyTypes::TRAEFIK->value) { if (! str($this->fileName)->endsWith('.yaml') && ! str($this->fileName)->endsWith('.yml')) { $this->fileName = "{$this->fileName}.yaml"; } if ($this->fileName === 'coolify.yaml') { $this->dispatch('error', 'File name is reserved.'); return; } } elseif ($proxy_type === 'CADDY') { if (! str($this->fileName)->endsWith('.caddy')) { $this->fileName = "{$this->fileName}.caddy"; } } $proxy_path = $this->server->proxyPath(); $file = "{$proxy_path}/dynamic/{$this->fileName}"; $escapedFile = escapeshellarg($file); if ($this->newFile) { $exists = instant_remote_process(["test -f {$escapedFile} && echo 1 || echo 0"], $this->server); if ($exists == 1) { $this->dispatch('error', 'File already exists'); return; } } if ($proxy_type === ProxyTypes::TRAEFIK->value) { $yaml = Yaml::parse($this->value); $yaml = Yaml::dump($yaml, 10, 2); $this->value = $yaml; } $base64_value = base64_encode($this->value); instant_remote_process([ "echo '{$base64_value}' | base64 -d | tee {$escapedFile} > /dev/null", ], $this->server); if ($proxy_type === 'CADDY') { $this->server->reloadCaddy(); } $this->dispatch('loadDynamicConfigurations'); $this->dispatch('dynamic-configuration-added'); $this->dispatch('success', 'Dynamic configuration saved.'); } catch (\Throwable $e) { return handleError($e, $this); } } public function render() { return view('livewire.server.proxy.new-dynamic-configuration'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Server/Proxy/Show.php
app/Livewire/Server/Proxy/Show.php
<?php namespace App\Livewire\Server\Proxy; use App\Models\Server; use Livewire\Component; class Show extends Component { public ?Server $server = null; public $parameters = []; public function mount() { $this->parameters = get_route_parameters(); try { $this->server = Server::ownedByCurrentTeam()->whereUuid(request()->server_uuid)->firstOrFail(); } catch (\Throwable $e) { return handleError($e, $this); } } public function render() { return view('livewire.server.proxy.show'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Server/Proxy/DynamicConfigurations.php
app/Livewire/Server/Proxy/DynamicConfigurations.php
<?php namespace App\Livewire\Server\Proxy; use App\Models\Server; use Illuminate\Support\Collection; use Livewire\Component; class DynamicConfigurations extends Component { public ?Server $server = null; public $parameters = []; public Collection $contents; public function getListeners() { $teamId = auth()->user()->currentTeam()->id; return [ "echo-private:team.{$teamId},ProxyStatusChangedUI" => 'loadDynamicConfigurations', 'loadDynamicConfigurations', ]; } protected $rules = [ 'contents.*' => 'nullable|string', ]; public function initLoadDynamicConfigurations() { $this->loadDynamicConfigurations(); } public function loadDynamicConfigurations() { $proxy_path = $this->server->proxyPath(); $files = instant_remote_process(["mkdir -p $proxy_path/dynamic && ls -1 {$proxy_path}/dynamic"], $this->server); $files = collect(explode("\n", $files))->filter(fn ($file) => ! empty($file)); $files = $files->map(fn ($file) => trim($file)); $files = $files->sort(); $contents = collect([]); foreach ($files as $file) { $without_extension = str_replace('.', '|', $file); $content = instant_remote_process(["cat {$proxy_path}/dynamic/{$file}"], $this->server); $contents[$without_extension] = $content ?? ''; } $this->contents = $contents; $this->dispatch('$refresh'); $this->dispatch('success', 'Dynamic configurations loaded.'); } public function mount() { $this->parameters = get_route_parameters(); try { $this->server = Server::ownedByCurrentTeam()->whereUuid(request()->server_uuid)->first(); if (is_null($this->server)) { return redirect()->route('server.index'); } } catch (\Throwable $e) { return handleError($e, $this); } } public function render() { return view('livewire.server.proxy.dynamic-configurations'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Notifications/Discord.php
app/Livewire/Notifications/Discord.php
<?php namespace App\Livewire\Notifications; use App\Models\DiscordNotificationSettings; use App\Models\Team; use App\Notifications\Test; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Livewire\Attributes\Validate; use Livewire\Component; class Discord extends Component { use AuthorizesRequests; public Team $team; public DiscordNotificationSettings $settings; #[Validate(['boolean'])] public bool $discordEnabled = false; #[Validate(['url', 'nullable'])] public ?string $discordWebhookUrl = null; #[Validate(['boolean'])] public bool $deploymentSuccessDiscordNotifications = false; #[Validate(['boolean'])] public bool $deploymentFailureDiscordNotifications = true; #[Validate(['boolean'])] public bool $statusChangeDiscordNotifications = false; #[Validate(['boolean'])] public bool $backupSuccessDiscordNotifications = false; #[Validate(['boolean'])] public bool $backupFailureDiscordNotifications = true; #[Validate(['boolean'])] public bool $scheduledTaskSuccessDiscordNotifications = false; #[Validate(['boolean'])] public bool $scheduledTaskFailureDiscordNotifications = true; #[Validate(['boolean'])] public bool $dockerCleanupSuccessDiscordNotifications = false; #[Validate(['boolean'])] public bool $dockerCleanupFailureDiscordNotifications = true; #[Validate(['boolean'])] public bool $serverDiskUsageDiscordNotifications = true; #[Validate(['boolean'])] public bool $serverReachableDiscordNotifications = false; #[Validate(['boolean'])] public bool $serverUnreachableDiscordNotifications = true; #[Validate(['boolean'])] public bool $serverPatchDiscordNotifications = false; #[Validate(['boolean'])] public bool $traefikOutdatedDiscordNotifications = true; #[Validate(['boolean'])] public bool $discordPingEnabled = true; public function mount() { try { $this->team = auth()->user()->currentTeam(); $this->settings = $this->team->discordNotificationSettings; $this->authorize('view', $this->settings); $this->syncData(); } catch (\Throwable $e) { return handleError($e, $this); } } public function syncData(bool $toModel = false) { if ($toModel) { $this->validate(); $this->authorize('update', $this->settings); $this->settings->discord_enabled = $this->discordEnabled; $this->settings->discord_webhook_url = $this->discordWebhookUrl; $this->settings->deployment_success_discord_notifications = $this->deploymentSuccessDiscordNotifications; $this->settings->deployment_failure_discord_notifications = $this->deploymentFailureDiscordNotifications; $this->settings->status_change_discord_notifications = $this->statusChangeDiscordNotifications; $this->settings->backup_success_discord_notifications = $this->backupSuccessDiscordNotifications; $this->settings->backup_failure_discord_notifications = $this->backupFailureDiscordNotifications; $this->settings->scheduled_task_success_discord_notifications = $this->scheduledTaskSuccessDiscordNotifications; $this->settings->scheduled_task_failure_discord_notifications = $this->scheduledTaskFailureDiscordNotifications; $this->settings->docker_cleanup_success_discord_notifications = $this->dockerCleanupSuccessDiscordNotifications; $this->settings->docker_cleanup_failure_discord_notifications = $this->dockerCleanupFailureDiscordNotifications; $this->settings->server_disk_usage_discord_notifications = $this->serverDiskUsageDiscordNotifications; $this->settings->server_reachable_discord_notifications = $this->serverReachableDiscordNotifications; $this->settings->server_unreachable_discord_notifications = $this->serverUnreachableDiscordNotifications; $this->settings->server_patch_discord_notifications = $this->serverPatchDiscordNotifications; $this->settings->traefik_outdated_discord_notifications = $this->traefikOutdatedDiscordNotifications; $this->settings->discord_ping_enabled = $this->discordPingEnabled; $this->settings->save(); refreshSession(); } else { $this->discordEnabled = $this->settings->discord_enabled; $this->discordWebhookUrl = $this->settings->discord_webhook_url; $this->deploymentSuccessDiscordNotifications = $this->settings->deployment_success_discord_notifications; $this->deploymentFailureDiscordNotifications = $this->settings->deployment_failure_discord_notifications; $this->statusChangeDiscordNotifications = $this->settings->status_change_discord_notifications; $this->backupSuccessDiscordNotifications = $this->settings->backup_success_discord_notifications; $this->backupFailureDiscordNotifications = $this->settings->backup_failure_discord_notifications; $this->scheduledTaskSuccessDiscordNotifications = $this->settings->scheduled_task_success_discord_notifications; $this->scheduledTaskFailureDiscordNotifications = $this->settings->scheduled_task_failure_discord_notifications; $this->dockerCleanupSuccessDiscordNotifications = $this->settings->docker_cleanup_success_discord_notifications; $this->dockerCleanupFailureDiscordNotifications = $this->settings->docker_cleanup_failure_discord_notifications; $this->serverDiskUsageDiscordNotifications = $this->settings->server_disk_usage_discord_notifications; $this->serverReachableDiscordNotifications = $this->settings->server_reachable_discord_notifications; $this->serverUnreachableDiscordNotifications = $this->settings->server_unreachable_discord_notifications; $this->serverPatchDiscordNotifications = $this->settings->server_patch_discord_notifications; $this->traefikOutdatedDiscordNotifications = $this->settings->traefik_outdated_discord_notifications; $this->discordPingEnabled = $this->settings->discord_ping_enabled; } } public function instantSaveDiscordPingEnabled() { try { $original = $this->discordPingEnabled; $this->validate([ 'discordPingEnabled' => 'required', ]); $this->saveModel(); } catch (\Throwable $e) { $this->discordPingEnabled = $original; return handleError($e, $this); } } public function instantSaveDiscordEnabled() { try { $original = $this->discordEnabled; $this->validate([ 'discordWebhookUrl' => 'required', ], [ 'discordWebhookUrl.required' => 'Discord Webhook URL is required.', ]); $this->saveModel(); } catch (\Throwable $e) { $this->discordEnabled = $original; return handleError($e, $this); } } public function instantSave() { try { $this->syncData(true); } catch (\Throwable $e) { return handleError($e, $this); } } public function submit() { try { $this->resetErrorBag(); $this->syncData(true); $this->saveModel(); } catch (\Throwable $e) { return handleError($e, $this); } } public function saveModel() { $this->syncData(true); refreshSession(); $this->dispatch('success', 'Settings saved.'); } public function sendTestNotification() { try { $this->authorize('sendTest', $this->settings); $this->team->notify(new Test(channel: 'discord')); $this->dispatch('success', 'Test notification sent.'); } catch (\Throwable $e) { return handleError($e, $this); } } public function render() { return view('livewire.notifications.discord'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Notifications/Pushover.php
app/Livewire/Notifications/Pushover.php
<?php namespace App\Livewire\Notifications; use App\Models\PushoverNotificationSettings; use App\Models\Team; use App\Notifications\Test; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Livewire\Attributes\Locked; use Livewire\Attributes\Validate; use Livewire\Component; class Pushover extends Component { use AuthorizesRequests; protected $listeners = ['refresh' => '$refresh']; #[Locked] public Team $team; #[Locked] public PushoverNotificationSettings $settings; #[Validate(['boolean'])] public bool $pushoverEnabled = false; #[Validate(['nullable', 'string'])] public ?string $pushoverUserKey = null; #[Validate(['nullable', 'string'])] public ?string $pushoverApiToken = null; #[Validate(['boolean'])] public bool $deploymentSuccessPushoverNotifications = false; #[Validate(['boolean'])] public bool $deploymentFailurePushoverNotifications = true; #[Validate(['boolean'])] public bool $statusChangePushoverNotifications = false; #[Validate(['boolean'])] public bool $backupSuccessPushoverNotifications = false; #[Validate(['boolean'])] public bool $backupFailurePushoverNotifications = true; #[Validate(['boolean'])] public bool $scheduledTaskSuccessPushoverNotifications = false; #[Validate(['boolean'])] public bool $scheduledTaskFailurePushoverNotifications = true; #[Validate(['boolean'])] public bool $dockerCleanupSuccessPushoverNotifications = false; #[Validate(['boolean'])] public bool $dockerCleanupFailurePushoverNotifications = true; #[Validate(['boolean'])] public bool $serverDiskUsagePushoverNotifications = true; #[Validate(['boolean'])] public bool $serverReachablePushoverNotifications = false; #[Validate(['boolean'])] public bool $serverUnreachablePushoverNotifications = true; #[Validate(['boolean'])] public bool $serverPatchPushoverNotifications = false; #[Validate(['boolean'])] public bool $traefikOutdatedPushoverNotifications = true; public function mount() { try { $this->team = auth()->user()->currentTeam(); $this->settings = $this->team->pushoverNotificationSettings; $this->authorize('view', $this->settings); $this->syncData(); } catch (\Throwable $e) { return handleError($e, $this); } } public function syncData(bool $toModel = false) { if ($toModel) { $this->validate(); $this->authorize('update', $this->settings); $this->settings->pushover_enabled = $this->pushoverEnabled; $this->settings->pushover_user_key = $this->pushoverUserKey; $this->settings->pushover_api_token = $this->pushoverApiToken; $this->settings->deployment_success_pushover_notifications = $this->deploymentSuccessPushoverNotifications; $this->settings->deployment_failure_pushover_notifications = $this->deploymentFailurePushoverNotifications; $this->settings->status_change_pushover_notifications = $this->statusChangePushoverNotifications; $this->settings->backup_success_pushover_notifications = $this->backupSuccessPushoverNotifications; $this->settings->backup_failure_pushover_notifications = $this->backupFailurePushoverNotifications; $this->settings->scheduled_task_success_pushover_notifications = $this->scheduledTaskSuccessPushoverNotifications; $this->settings->scheduled_task_failure_pushover_notifications = $this->scheduledTaskFailurePushoverNotifications; $this->settings->docker_cleanup_success_pushover_notifications = $this->dockerCleanupSuccessPushoverNotifications; $this->settings->docker_cleanup_failure_pushover_notifications = $this->dockerCleanupFailurePushoverNotifications; $this->settings->server_disk_usage_pushover_notifications = $this->serverDiskUsagePushoverNotifications; $this->settings->server_reachable_pushover_notifications = $this->serverReachablePushoverNotifications; $this->settings->server_unreachable_pushover_notifications = $this->serverUnreachablePushoverNotifications; $this->settings->server_patch_pushover_notifications = $this->serverPatchPushoverNotifications; $this->settings->traefik_outdated_pushover_notifications = $this->traefikOutdatedPushoverNotifications; $this->settings->save(); refreshSession(); } else { $this->pushoverEnabled = $this->settings->pushover_enabled; $this->pushoverUserKey = $this->settings->pushover_user_key; $this->pushoverApiToken = $this->settings->pushover_api_token; $this->deploymentSuccessPushoverNotifications = $this->settings->deployment_success_pushover_notifications; $this->deploymentFailurePushoverNotifications = $this->settings->deployment_failure_pushover_notifications; $this->statusChangePushoverNotifications = $this->settings->status_change_pushover_notifications; $this->backupSuccessPushoverNotifications = $this->settings->backup_success_pushover_notifications; $this->backupFailurePushoverNotifications = $this->settings->backup_failure_pushover_notifications; $this->scheduledTaskSuccessPushoverNotifications = $this->settings->scheduled_task_success_pushover_notifications; $this->scheduledTaskFailurePushoverNotifications = $this->settings->scheduled_task_failure_pushover_notifications; $this->dockerCleanupSuccessPushoverNotifications = $this->settings->docker_cleanup_success_pushover_notifications; $this->dockerCleanupFailurePushoverNotifications = $this->settings->docker_cleanup_failure_pushover_notifications; $this->serverDiskUsagePushoverNotifications = $this->settings->server_disk_usage_pushover_notifications; $this->serverReachablePushoverNotifications = $this->settings->server_reachable_pushover_notifications; $this->serverUnreachablePushoverNotifications = $this->settings->server_unreachable_pushover_notifications; $this->serverPatchPushoverNotifications = $this->settings->server_patch_pushover_notifications; $this->traefikOutdatedPushoverNotifications = $this->settings->traefik_outdated_pushover_notifications; } } public function instantSavePushoverEnabled() { try { $this->validate([ 'pushoverUserKey' => 'required', 'pushoverApiToken' => 'required', ], [ 'pushoverUserKey.required' => 'Pushover User Key is required.', 'pushoverApiToken.required' => 'Pushover API Token is required.', ]); $this->saveModel(); } catch (\Throwable $e) { $this->pushoverEnabled = false; return handleError($e, $this); } finally { $this->dispatch('refresh'); } } public function instantSave() { try { $this->syncData(true); } catch (\Throwable $e) { return handleError($e, $this); } finally { $this->dispatch('refresh'); } } public function submit() { try { $this->resetErrorBag(); $this->syncData(true); $this->saveModel(); } catch (\Throwable $e) { return handleError($e, $this); } } public function saveModel() { $this->syncData(true); refreshSession(); $this->dispatch('success', 'Settings saved.'); } public function sendTestNotification() { try { $this->authorize('sendTest', $this->settings); $this->team->notify(new Test(channel: 'pushover')); $this->dispatch('success', 'Test notification sent.'); } catch (\Throwable $e) { return handleError($e, $this); } } public function render() { return view('livewire.notifications.pushover'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Notifications/Email.php
app/Livewire/Notifications/Email.php
<?php namespace App\Livewire\Notifications; use App\Models\EmailNotificationSettings; use App\Models\Team; use App\Notifications\Test; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Illuminate\Support\Facades\RateLimiter; use Livewire\Attributes\Locked; use Livewire\Attributes\Validate; use Livewire\Component; class Email extends Component { use AuthorizesRequests; protected $listeners = ['refresh' => '$refresh']; #[Locked] public Team $team; #[Locked] public EmailNotificationSettings $settings; #[Locked] public string $emails; #[Validate(['boolean'])] public bool $smtpEnabled = false; #[Validate(['nullable', 'email'])] public ?string $smtpFromAddress = null; #[Validate(['nullable', 'string'])] public ?string $smtpFromName = null; #[Validate(['nullable', 'string'])] public ?string $smtpRecipients = null; #[Validate(['nullable', 'string'])] public ?string $smtpHost = null; #[Validate(['nullable', 'numeric', 'min:1', 'max:65535'])] public ?int $smtpPort = null; #[Validate(['nullable', 'string', 'in:starttls,tls,none'])] public ?string $smtpEncryption = null; #[Validate(['nullable', 'string'])] public ?string $smtpUsername = null; #[Validate(['nullable', 'string'])] public ?string $smtpPassword = null; #[Validate(['nullable', 'numeric'])] public ?int $smtpTimeout = null; #[Validate(['boolean'])] public bool $resendEnabled = false; #[Validate(['nullable', 'string'])] public ?string $resendApiKey = null; #[Validate(['boolean'])] public bool $useInstanceEmailSettings = false; #[Validate(['boolean'])] public bool $deploymentSuccessEmailNotifications = false; #[Validate(['boolean'])] public bool $deploymentFailureEmailNotifications = true; #[Validate(['boolean'])] public bool $statusChangeEmailNotifications = false; #[Validate(['boolean'])] public bool $backupSuccessEmailNotifications = false; #[Validate(['boolean'])] public bool $backupFailureEmailNotifications = true; #[Validate(['boolean'])] public bool $scheduledTaskSuccessEmailNotifications = false; #[Validate(['boolean'])] public bool $scheduledTaskFailureEmailNotifications = true; #[Validate(['boolean'])] public bool $dockerCleanupSuccessEmailNotifications = false; #[Validate(['boolean'])] public bool $dockerCleanupFailureEmailNotifications = true; #[Validate(['boolean'])] public bool $serverDiskUsageEmailNotifications = true; #[Validate(['boolean'])] public bool $serverReachableEmailNotifications = false; #[Validate(['boolean'])] public bool $serverUnreachableEmailNotifications = true; #[Validate(['boolean'])] public bool $serverPatchEmailNotifications = false; #[Validate(['boolean'])] public bool $traefikOutdatedEmailNotifications = true; #[Validate(['nullable', 'email'])] public ?string $testEmailAddress = null; public function mount() { try { $this->team = auth()->user()->currentTeam(); $this->emails = auth()->user()->email; $this->settings = $this->team->emailNotificationSettings; $this->authorize('view', $this->settings); $this->syncData(); $this->testEmailAddress = auth()->user()->email; } catch (\Throwable $e) { return handleError($e, $this); } } public function syncData(bool $toModel = false) { if ($toModel) { $this->validate(); $this->authorize('update', $this->settings); $this->settings->smtp_enabled = $this->smtpEnabled; $this->settings->smtp_from_address = $this->smtpFromAddress; $this->settings->smtp_from_name = $this->smtpFromName; $this->settings->smtp_recipients = $this->smtpRecipients; $this->settings->smtp_host = $this->smtpHost; $this->settings->smtp_port = $this->smtpPort; $this->settings->smtp_encryption = $this->smtpEncryption; $this->settings->smtp_username = $this->smtpUsername; $this->settings->smtp_password = $this->smtpPassword; $this->settings->smtp_timeout = $this->smtpTimeout; $this->settings->resend_enabled = $this->resendEnabled; $this->settings->resend_api_key = $this->resendApiKey; $this->settings->use_instance_email_settings = $this->useInstanceEmailSettings; $this->settings->deployment_success_email_notifications = $this->deploymentSuccessEmailNotifications; $this->settings->deployment_failure_email_notifications = $this->deploymentFailureEmailNotifications; $this->settings->status_change_email_notifications = $this->statusChangeEmailNotifications; $this->settings->backup_success_email_notifications = $this->backupSuccessEmailNotifications; $this->settings->backup_failure_email_notifications = $this->backupFailureEmailNotifications; $this->settings->scheduled_task_success_email_notifications = $this->scheduledTaskSuccessEmailNotifications; $this->settings->scheduled_task_failure_email_notifications = $this->scheduledTaskFailureEmailNotifications; $this->settings->docker_cleanup_success_email_notifications = $this->dockerCleanupSuccessEmailNotifications; $this->settings->docker_cleanup_failure_email_notifications = $this->dockerCleanupFailureEmailNotifications; $this->settings->server_disk_usage_email_notifications = $this->serverDiskUsageEmailNotifications; $this->settings->server_reachable_email_notifications = $this->serverReachableEmailNotifications; $this->settings->server_unreachable_email_notifications = $this->serverUnreachableEmailNotifications; $this->settings->server_patch_email_notifications = $this->serverPatchEmailNotifications; $this->settings->traefik_outdated_email_notifications = $this->traefikOutdatedEmailNotifications; $this->settings->save(); } else { $this->smtpEnabled = $this->settings->smtp_enabled; $this->smtpFromAddress = $this->settings->smtp_from_address; $this->smtpFromName = $this->settings->smtp_from_name; $this->smtpRecipients = $this->settings->smtp_recipients; $this->smtpHost = $this->settings->smtp_host; $this->smtpPort = $this->settings->smtp_port; $this->smtpEncryption = $this->settings->smtp_encryption; $this->smtpUsername = $this->settings->smtp_username; $this->smtpPassword = $this->settings->smtp_password; $this->smtpTimeout = $this->settings->smtp_timeout; $this->resendEnabled = $this->settings->resend_enabled; $this->resendApiKey = $this->settings->resend_api_key; $this->useInstanceEmailSettings = $this->settings->use_instance_email_settings; $this->deploymentSuccessEmailNotifications = $this->settings->deployment_success_email_notifications; $this->deploymentFailureEmailNotifications = $this->settings->deployment_failure_email_notifications; $this->statusChangeEmailNotifications = $this->settings->status_change_email_notifications; $this->backupSuccessEmailNotifications = $this->settings->backup_success_email_notifications; $this->backupFailureEmailNotifications = $this->settings->backup_failure_email_notifications; $this->scheduledTaskSuccessEmailNotifications = $this->settings->scheduled_task_success_email_notifications; $this->scheduledTaskFailureEmailNotifications = $this->settings->scheduled_task_failure_email_notifications; $this->dockerCleanupSuccessEmailNotifications = $this->settings->docker_cleanup_success_email_notifications; $this->dockerCleanupFailureEmailNotifications = $this->settings->docker_cleanup_failure_email_notifications; $this->serverDiskUsageEmailNotifications = $this->settings->server_disk_usage_email_notifications; $this->serverReachableEmailNotifications = $this->settings->server_reachable_email_notifications; $this->serverUnreachableEmailNotifications = $this->settings->server_unreachable_email_notifications; $this->serverPatchEmailNotifications = $this->settings->server_patch_email_notifications; $this->traefikOutdatedEmailNotifications = $this->settings->traefik_outdated_email_notifications; } } public function submit() { try { $this->resetErrorBag(); $this->saveModel(); } catch (\Throwable $e) { return handleError($e, $this); } } public function saveModel() { $this->syncData(true); $this->dispatch('success', 'Email notifications settings updated.'); } public function instantSave(?string $type = null) { try { $this->resetErrorBag(); if ($type === 'SMTP') { $this->submitSmtp(); } elseif ($type === 'Resend') { $this->submitResend(); } else { $this->smtpEnabled = false; $this->resendEnabled = false; $this->saveModel(); return; } } catch (\Throwable $e) { if ($type === 'SMTP') { $this->smtpEnabled = false; } elseif ($type === 'Resend') { $this->resendEnabled = false; } return handleError($e, $this); } finally { $this->dispatch('refresh'); } } public function submitSmtp() { try { $this->resetErrorBag(); $this->validate([ 'smtpEnabled' => 'boolean', 'smtpFromAddress' => 'required|email', 'smtpFromName' => 'required|string', 'smtpHost' => 'required|string', 'smtpPort' => 'required|numeric', 'smtpEncryption' => 'required|string|in:starttls,tls,none', 'smtpUsername' => 'nullable|string', 'smtpPassword' => 'nullable|string', 'smtpTimeout' => 'nullable|numeric', ], [ 'smtpFromAddress.required' => 'From Address is required.', 'smtpFromAddress.email' => 'Please enter a valid email address.', 'smtpFromName.required' => 'From Name is required.', 'smtpHost.required' => 'SMTP Host is required.', 'smtpPort.required' => 'SMTP Port is required.', 'smtpPort.numeric' => 'SMTP Port must be a number.', 'smtpEncryption.required' => 'Encryption type is required.', ]); if ($this->smtpEnabled) { $this->settings->resend_enabled = $this->resendEnabled = false; } $this->settings->smtp_enabled = $this->smtpEnabled; $this->settings->smtp_from_address = $this->smtpFromAddress; $this->settings->smtp_from_name = $this->smtpFromName; $this->settings->smtp_host = $this->smtpHost; $this->settings->smtp_port = $this->smtpPort; $this->settings->smtp_encryption = $this->smtpEncryption; $this->settings->smtp_username = $this->smtpUsername; $this->settings->smtp_password = $this->smtpPassword; $this->settings->smtp_timeout = $this->smtpTimeout; $this->settings->save(); $this->dispatch('success', 'SMTP settings updated.'); } catch (\Throwable $e) { $this->smtpEnabled = false; return handleError($e, $this); } } public function submitResend() { try { $this->resetErrorBag(); $this->validate([ 'resendEnabled' => 'boolean', 'resendApiKey' => 'required|string', 'smtpFromAddress' => 'required|email', 'smtpFromName' => 'required|string', ], [ 'resendApiKey.required' => 'Resend API Key is required.', 'smtpFromAddress.required' => 'From Address is required.', 'smtpFromAddress.email' => 'Please enter a valid email address.', 'smtpFromName.required' => 'From Name is required.', ]); if ($this->resendEnabled) { $this->settings->smtp_enabled = $this->smtpEnabled = false; } $this->settings->resend_enabled = $this->resendEnabled; $this->settings->resend_api_key = $this->resendApiKey; $this->settings->smtp_from_address = $this->smtpFromAddress; $this->settings->smtp_from_name = $this->smtpFromName; $this->settings->save(); $this->dispatch('success', 'Resend settings updated.'); } catch (\Throwable $e) { return handleError($e, $this); } } public function sendTestEmail() { try { $this->authorize('sendTest', $this->settings); $this->validate([ 'testEmailAddress' => 'required|email', ], [ 'testEmailAddress.required' => 'Test email address is required.', 'testEmailAddress.email' => 'Please enter a valid email address.', ]); $executed = RateLimiter::attempt( 'test-email:'.$this->team->id, $perMinute = 0, function () { $this->team?->notifyNow(new Test($this->testEmailAddress, 'email')); $this->dispatch('success', 'Test Email sent.'); }, $decaySeconds = 10, ); if (! $executed) { throw new \Exception('Too many messages sent!'); } } catch (\Throwable $e) { return handleError($e, $this); } } public function copyFromInstanceSettings() { $this->authorize('update', $this->settings); $settings = instanceSettings(); $this->smtpFromAddress = $settings->smtp_from_address; $this->smtpFromName = $settings->smtp_from_name; if ($settings->smtp_enabled) { $this->smtpEnabled = true; $this->resendEnabled = false; } $this->smtpRecipients = $settings->smtp_recipients; $this->smtpHost = $settings->smtp_host; $this->smtpPort = $settings->smtp_port; $this->smtpEncryption = $settings->smtp_encryption; $this->smtpUsername = $settings->smtp_username; $this->smtpPassword = $settings->smtp_password; $this->smtpTimeout = $settings->smtp_timeout; if ($settings->resend_enabled) { $this->resendEnabled = true; $this->smtpEnabled = false; } $this->resendApiKey = $settings->resend_api_key; $this->saveModel(); } public function render() { return view('livewire.notifications.email'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Notifications/Webhook.php
app/Livewire/Notifications/Webhook.php
<?php namespace App\Livewire\Notifications; use App\Models\Team; use App\Models\WebhookNotificationSettings; use App\Notifications\Test; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Livewire\Attributes\Validate; use Livewire\Component; class Webhook extends Component { use AuthorizesRequests; public Team $team; public WebhookNotificationSettings $settings; #[Validate(['boolean'])] public bool $webhookEnabled = false; #[Validate(['url', 'nullable'])] public ?string $webhookUrl = null; #[Validate(['boolean'])] public bool $deploymentSuccessWebhookNotifications = false; #[Validate(['boolean'])] public bool $deploymentFailureWebhookNotifications = true; #[Validate(['boolean'])] public bool $statusChangeWebhookNotifications = false; #[Validate(['boolean'])] public bool $backupSuccessWebhookNotifications = false; #[Validate(['boolean'])] public bool $backupFailureWebhookNotifications = true; #[Validate(['boolean'])] public bool $scheduledTaskSuccessWebhookNotifications = false; #[Validate(['boolean'])] public bool $scheduledTaskFailureWebhookNotifications = true; #[Validate(['boolean'])] public bool $dockerCleanupSuccessWebhookNotifications = false; #[Validate(['boolean'])] public bool $dockerCleanupFailureWebhookNotifications = true; #[Validate(['boolean'])] public bool $serverDiskUsageWebhookNotifications = true; #[Validate(['boolean'])] public bool $serverReachableWebhookNotifications = false; #[Validate(['boolean'])] public bool $serverUnreachableWebhookNotifications = true; #[Validate(['boolean'])] public bool $serverPatchWebhookNotifications = false; #[Validate(['boolean'])] public bool $traefikOutdatedWebhookNotifications = true; public function mount() { try { $this->team = auth()->user()->currentTeam(); $this->settings = $this->team->webhookNotificationSettings; $this->authorize('view', $this->settings); $this->syncData(); } catch (\Throwable $e) { return handleError($e, $this); } } public function syncData(bool $toModel = false) { if ($toModel) { $this->validate(); $this->authorize('update', $this->settings); $this->settings->webhook_enabled = $this->webhookEnabled; $this->settings->webhook_url = $this->webhookUrl; $this->settings->deployment_success_webhook_notifications = $this->deploymentSuccessWebhookNotifications; $this->settings->deployment_failure_webhook_notifications = $this->deploymentFailureWebhookNotifications; $this->settings->status_change_webhook_notifications = $this->statusChangeWebhookNotifications; $this->settings->backup_success_webhook_notifications = $this->backupSuccessWebhookNotifications; $this->settings->backup_failure_webhook_notifications = $this->backupFailureWebhookNotifications; $this->settings->scheduled_task_success_webhook_notifications = $this->scheduledTaskSuccessWebhookNotifications; $this->settings->scheduled_task_failure_webhook_notifications = $this->scheduledTaskFailureWebhookNotifications; $this->settings->docker_cleanup_success_webhook_notifications = $this->dockerCleanupSuccessWebhookNotifications; $this->settings->docker_cleanup_failure_webhook_notifications = $this->dockerCleanupFailureWebhookNotifications; $this->settings->server_disk_usage_webhook_notifications = $this->serverDiskUsageWebhookNotifications; $this->settings->server_reachable_webhook_notifications = $this->serverReachableWebhookNotifications; $this->settings->server_unreachable_webhook_notifications = $this->serverUnreachableWebhookNotifications; $this->settings->server_patch_webhook_notifications = $this->serverPatchWebhookNotifications; $this->settings->traefik_outdated_webhook_notifications = $this->traefikOutdatedWebhookNotifications; $this->settings->save(); refreshSession(); } else { $this->webhookEnabled = $this->settings->webhook_enabled; $this->webhookUrl = $this->settings->webhook_url; $this->deploymentSuccessWebhookNotifications = $this->settings->deployment_success_webhook_notifications; $this->deploymentFailureWebhookNotifications = $this->settings->deployment_failure_webhook_notifications; $this->statusChangeWebhookNotifications = $this->settings->status_change_webhook_notifications; $this->backupSuccessWebhookNotifications = $this->settings->backup_success_webhook_notifications; $this->backupFailureWebhookNotifications = $this->settings->backup_failure_webhook_notifications; $this->scheduledTaskSuccessWebhookNotifications = $this->settings->scheduled_task_success_webhook_notifications; $this->scheduledTaskFailureWebhookNotifications = $this->settings->scheduled_task_failure_webhook_notifications; $this->dockerCleanupSuccessWebhookNotifications = $this->settings->docker_cleanup_success_webhook_notifications; $this->dockerCleanupFailureWebhookNotifications = $this->settings->docker_cleanup_failure_webhook_notifications; $this->serverDiskUsageWebhookNotifications = $this->settings->server_disk_usage_webhook_notifications; $this->serverReachableWebhookNotifications = $this->settings->server_reachable_webhook_notifications; $this->serverUnreachableWebhookNotifications = $this->settings->server_unreachable_webhook_notifications; $this->serverPatchWebhookNotifications = $this->settings->server_patch_webhook_notifications; $this->traefikOutdatedWebhookNotifications = $this->settings->traefik_outdated_webhook_notifications; } } public function instantSaveWebhookEnabled() { try { $original = $this->webhookEnabled; $this->validate([ 'webhookUrl' => 'required', ], [ 'webhookUrl.required' => 'Webhook URL is required.', ]); $this->saveModel(); } catch (\Throwable $e) { $this->webhookEnabled = $original; return handleError($e, $this); } } public function instantSave() { try { $this->syncData(true); } catch (\Throwable $e) { return handleError($e, $this); } } public function submit() { try { $this->resetErrorBag(); $this->syncData(true); $this->saveModel(); } catch (\Throwable $e) { return handleError($e, $this); } } public function saveModel() { $this->syncData(true); refreshSession(); if (isDev()) { ray('Webhook settings saved', [ 'webhook_enabled' => $this->settings->webhook_enabled, 'webhook_url' => $this->settings->webhook_url, ]); } $this->dispatch('success', 'Settings saved.'); } public function sendTestNotification() { try { $this->authorize('sendTest', $this->settings); if (isDev()) { ray('Sending test webhook notification', [ 'team_id' => $this->team->id, 'webhook_url' => $this->settings->webhook_url, ]); } $this->team->notify(new Test(channel: 'webhook')); $this->dispatch('success', 'Test notification sent.'); } catch (\Throwable $e) { return handleError($e, $this); } } public function render() { return view('livewire.notifications.webhook'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Notifications/Slack.php
app/Livewire/Notifications/Slack.php
<?php namespace App\Livewire\Notifications; use App\Models\SlackNotificationSettings; use App\Models\Team; use App\Notifications\Test; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Livewire\Attributes\Locked; use Livewire\Attributes\Validate; use Livewire\Component; class Slack extends Component { use AuthorizesRequests; protected $listeners = ['refresh' => '$refresh']; #[Locked] public Team $team; #[Locked] public SlackNotificationSettings $settings; #[Validate(['boolean'])] public bool $slackEnabled = false; #[Validate(['url', 'nullable'])] public ?string $slackWebhookUrl = null; #[Validate(['boolean'])] public bool $deploymentSuccessSlackNotifications = false; #[Validate(['boolean'])] public bool $deploymentFailureSlackNotifications = true; #[Validate(['boolean'])] public bool $statusChangeSlackNotifications = false; #[Validate(['boolean'])] public bool $backupSuccessSlackNotifications = false; #[Validate(['boolean'])] public bool $backupFailureSlackNotifications = true; #[Validate(['boolean'])] public bool $scheduledTaskSuccessSlackNotifications = false; #[Validate(['boolean'])] public bool $scheduledTaskFailureSlackNotifications = true; #[Validate(['boolean'])] public bool $dockerCleanupSuccessSlackNotifications = false; #[Validate(['boolean'])] public bool $dockerCleanupFailureSlackNotifications = true; #[Validate(['boolean'])] public bool $serverDiskUsageSlackNotifications = true; #[Validate(['boolean'])] public bool $serverReachableSlackNotifications = false; #[Validate(['boolean'])] public bool $serverUnreachableSlackNotifications = true; #[Validate(['boolean'])] public bool $serverPatchSlackNotifications = false; #[Validate(['boolean'])] public bool $traefikOutdatedSlackNotifications = true; public function mount() { try { $this->team = auth()->user()->currentTeam(); $this->settings = $this->team->slackNotificationSettings; $this->authorize('view', $this->settings); $this->syncData(); } catch (\Throwable $e) { return handleError($e, $this); } } public function syncData(bool $toModel = false) { if ($toModel) { $this->validate(); $this->authorize('update', $this->settings); $this->settings->slack_enabled = $this->slackEnabled; $this->settings->slack_webhook_url = $this->slackWebhookUrl; $this->settings->deployment_success_slack_notifications = $this->deploymentSuccessSlackNotifications; $this->settings->deployment_failure_slack_notifications = $this->deploymentFailureSlackNotifications; $this->settings->status_change_slack_notifications = $this->statusChangeSlackNotifications; $this->settings->backup_success_slack_notifications = $this->backupSuccessSlackNotifications; $this->settings->backup_failure_slack_notifications = $this->backupFailureSlackNotifications; $this->settings->scheduled_task_success_slack_notifications = $this->scheduledTaskSuccessSlackNotifications; $this->settings->scheduled_task_failure_slack_notifications = $this->scheduledTaskFailureSlackNotifications; $this->settings->docker_cleanup_success_slack_notifications = $this->dockerCleanupSuccessSlackNotifications; $this->settings->docker_cleanup_failure_slack_notifications = $this->dockerCleanupFailureSlackNotifications; $this->settings->server_disk_usage_slack_notifications = $this->serverDiskUsageSlackNotifications; $this->settings->server_reachable_slack_notifications = $this->serverReachableSlackNotifications; $this->settings->server_unreachable_slack_notifications = $this->serverUnreachableSlackNotifications; $this->settings->server_patch_slack_notifications = $this->serverPatchSlackNotifications; $this->settings->traefik_outdated_slack_notifications = $this->traefikOutdatedSlackNotifications; $this->settings->save(); refreshSession(); } else { $this->slackEnabled = $this->settings->slack_enabled; $this->slackWebhookUrl = $this->settings->slack_webhook_url; $this->deploymentSuccessSlackNotifications = $this->settings->deployment_success_slack_notifications; $this->deploymentFailureSlackNotifications = $this->settings->deployment_failure_slack_notifications; $this->statusChangeSlackNotifications = $this->settings->status_change_slack_notifications; $this->backupSuccessSlackNotifications = $this->settings->backup_success_slack_notifications; $this->backupFailureSlackNotifications = $this->settings->backup_failure_slack_notifications; $this->scheduledTaskSuccessSlackNotifications = $this->settings->scheduled_task_success_slack_notifications; $this->scheduledTaskFailureSlackNotifications = $this->settings->scheduled_task_failure_slack_notifications; $this->dockerCleanupSuccessSlackNotifications = $this->settings->docker_cleanup_success_slack_notifications; $this->dockerCleanupFailureSlackNotifications = $this->settings->docker_cleanup_failure_slack_notifications; $this->serverDiskUsageSlackNotifications = $this->settings->server_disk_usage_slack_notifications; $this->serverReachableSlackNotifications = $this->settings->server_reachable_slack_notifications; $this->serverUnreachableSlackNotifications = $this->settings->server_unreachable_slack_notifications; $this->serverPatchSlackNotifications = $this->settings->server_patch_slack_notifications; $this->traefikOutdatedSlackNotifications = $this->settings->traefik_outdated_slack_notifications; } } public function instantSaveSlackEnabled() { try { $this->validate([ 'slackWebhookUrl' => 'required', ], [ 'slackWebhookUrl.required' => 'Slack Webhook URL is required.', ]); $this->saveModel(); } catch (\Throwable $e) { $this->slackEnabled = false; return handleError($e, $this); } finally { $this->dispatch('refresh'); } } public function instantSave() { try { $this->syncData(true); } catch (\Throwable $e) { return handleError($e, $this); } finally { $this->dispatch('refresh'); } } public function submit() { try { $this->resetErrorBag(); $this->syncData(true); $this->saveModel(); } catch (\Throwable $e) { return handleError($e, $this); } } public function saveModel() { $this->syncData(true); refreshSession(); $this->dispatch('success', 'Settings saved.'); } public function sendTestNotification() { try { $this->authorize('sendTest', $this->settings); $this->team->notify(new Test(channel: 'slack')); $this->dispatch('success', 'Test notification sent.'); } catch (\Throwable $e) { return handleError($e, $this); } } public function render() { return view('livewire.notifications.slack'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Notifications/Telegram.php
app/Livewire/Notifications/Telegram.php
<?php namespace App\Livewire\Notifications; use App\Models\Team; use App\Models\TelegramNotificationSettings; use App\Notifications\Test; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Livewire\Attributes\Locked; use Livewire\Attributes\Validate; use Livewire\Component; class Telegram extends Component { use AuthorizesRequests; protected $listeners = ['refresh' => '$refresh']; #[Locked] public Team $team; #[Locked] public TelegramNotificationSettings $settings; #[Validate(['boolean'])] public bool $telegramEnabled = false; #[Validate(['nullable', 'string'])] public ?string $telegramToken = null; #[Validate(['nullable', 'string'])] public ?string $telegramChatId = null; #[Validate(['boolean'])] public bool $deploymentSuccessTelegramNotifications = false; #[Validate(['boolean'])] public bool $deploymentFailureTelegramNotifications = true; #[Validate(['boolean'])] public bool $statusChangeTelegramNotifications = false; #[Validate(['boolean'])] public bool $backupSuccessTelegramNotifications = false; #[Validate(['boolean'])] public bool $backupFailureTelegramNotifications = true; #[Validate(['boolean'])] public bool $scheduledTaskSuccessTelegramNotifications = false; #[Validate(['boolean'])] public bool $scheduledTaskFailureTelegramNotifications = true; #[Validate(['boolean'])] public bool $dockerCleanupSuccessTelegramNotifications = false; #[Validate(['boolean'])] public bool $dockerCleanupFailureTelegramNotifications = true; #[Validate(['boolean'])] public bool $serverDiskUsageTelegramNotifications = true; #[Validate(['boolean'])] public bool $serverReachableTelegramNotifications = false; #[Validate(['boolean'])] public bool $serverUnreachableTelegramNotifications = true; #[Validate(['boolean'])] public bool $serverPatchTelegramNotifications = false; #[Validate(['boolean'])] public bool $traefikOutdatedTelegramNotifications = true; #[Validate(['nullable', 'string'])] public ?string $telegramNotificationsDeploymentSuccessThreadId = null; #[Validate(['nullable', 'string'])] public ?string $telegramNotificationsDeploymentFailureThreadId = null; #[Validate(['nullable', 'string'])] public ?string $telegramNotificationsStatusChangeThreadId = null; #[Validate(['nullable', 'string'])] public ?string $telegramNotificationsBackupSuccessThreadId = null; #[Validate(['nullable', 'string'])] public ?string $telegramNotificationsBackupFailureThreadId = null; #[Validate(['nullable', 'string'])] public ?string $telegramNotificationsScheduledTaskSuccessThreadId = null; #[Validate(['nullable', 'string'])] public ?string $telegramNotificationsScheduledTaskFailureThreadId = null; #[Validate(['nullable', 'string'])] public ?string $telegramNotificationsDockerCleanupSuccessThreadId = null; #[Validate(['nullable', 'string'])] public ?string $telegramNotificationsDockerCleanupFailureThreadId = null; #[Validate(['nullable', 'string'])] public ?string $telegramNotificationsServerDiskUsageThreadId = null; #[Validate(['nullable', 'string'])] public ?string $telegramNotificationsServerReachableThreadId = null; #[Validate(['nullable', 'string'])] public ?string $telegramNotificationsServerUnreachableThreadId = null; #[Validate(['nullable', 'string'])] public ?string $telegramNotificationsServerPatchThreadId = null; #[Validate(['nullable', 'string'])] public ?string $telegramNotificationsTraefikOutdatedThreadId = null; public function mount() { try { $this->team = auth()->user()->currentTeam(); $this->settings = $this->team->telegramNotificationSettings; $this->authorize('view', $this->settings); $this->syncData(); } catch (\Throwable $e) { return handleError($e, $this); } } public function syncData(bool $toModel = false) { if ($toModel) { $this->validate(); $this->authorize('update', $this->settings); $this->settings->telegram_enabled = $this->telegramEnabled; $this->settings->telegram_token = $this->telegramToken; $this->settings->telegram_chat_id = $this->telegramChatId; $this->settings->deployment_success_telegram_notifications = $this->deploymentSuccessTelegramNotifications; $this->settings->deployment_failure_telegram_notifications = $this->deploymentFailureTelegramNotifications; $this->settings->status_change_telegram_notifications = $this->statusChangeTelegramNotifications; $this->settings->backup_success_telegram_notifications = $this->backupSuccessTelegramNotifications; $this->settings->backup_failure_telegram_notifications = $this->backupFailureTelegramNotifications; $this->settings->scheduled_task_success_telegram_notifications = $this->scheduledTaskSuccessTelegramNotifications; $this->settings->scheduled_task_failure_telegram_notifications = $this->scheduledTaskFailureTelegramNotifications; $this->settings->docker_cleanup_success_telegram_notifications = $this->dockerCleanupSuccessTelegramNotifications; $this->settings->docker_cleanup_failure_telegram_notifications = $this->dockerCleanupFailureTelegramNotifications; $this->settings->server_disk_usage_telegram_notifications = $this->serverDiskUsageTelegramNotifications; $this->settings->server_reachable_telegram_notifications = $this->serverReachableTelegramNotifications; $this->settings->server_unreachable_telegram_notifications = $this->serverUnreachableTelegramNotifications; $this->settings->server_patch_telegram_notifications = $this->serverPatchTelegramNotifications; $this->settings->traefik_outdated_telegram_notifications = $this->traefikOutdatedTelegramNotifications; $this->settings->telegram_notifications_deployment_success_thread_id = $this->telegramNotificationsDeploymentSuccessThreadId; $this->settings->telegram_notifications_deployment_failure_thread_id = $this->telegramNotificationsDeploymentFailureThreadId; $this->settings->telegram_notifications_status_change_thread_id = $this->telegramNotificationsStatusChangeThreadId; $this->settings->telegram_notifications_backup_success_thread_id = $this->telegramNotificationsBackupSuccessThreadId; $this->settings->telegram_notifications_backup_failure_thread_id = $this->telegramNotificationsBackupFailureThreadId; $this->settings->telegram_notifications_scheduled_task_success_thread_id = $this->telegramNotificationsScheduledTaskSuccessThreadId; $this->settings->telegram_notifications_scheduled_task_failure_thread_id = $this->telegramNotificationsScheduledTaskFailureThreadId; $this->settings->telegram_notifications_docker_cleanup_success_thread_id = $this->telegramNotificationsDockerCleanupSuccessThreadId; $this->settings->telegram_notifications_docker_cleanup_failure_thread_id = $this->telegramNotificationsDockerCleanupFailureThreadId; $this->settings->telegram_notifications_server_disk_usage_thread_id = $this->telegramNotificationsServerDiskUsageThreadId; $this->settings->telegram_notifications_server_reachable_thread_id = $this->telegramNotificationsServerReachableThreadId; $this->settings->telegram_notifications_server_unreachable_thread_id = $this->telegramNotificationsServerUnreachableThreadId; $this->settings->telegram_notifications_server_patch_thread_id = $this->telegramNotificationsServerPatchThreadId; $this->settings->telegram_notifications_traefik_outdated_thread_id = $this->telegramNotificationsTraefikOutdatedThreadId; $this->settings->save(); } else { $this->telegramEnabled = $this->settings->telegram_enabled; $this->telegramToken = $this->settings->telegram_token; $this->telegramChatId = $this->settings->telegram_chat_id; $this->deploymentSuccessTelegramNotifications = $this->settings->deployment_success_telegram_notifications; $this->deploymentFailureTelegramNotifications = $this->settings->deployment_failure_telegram_notifications; $this->statusChangeTelegramNotifications = $this->settings->status_change_telegram_notifications; $this->backupSuccessTelegramNotifications = $this->settings->backup_success_telegram_notifications; $this->backupFailureTelegramNotifications = $this->settings->backup_failure_telegram_notifications; $this->scheduledTaskSuccessTelegramNotifications = $this->settings->scheduled_task_success_telegram_notifications; $this->scheduledTaskFailureTelegramNotifications = $this->settings->scheduled_task_failure_telegram_notifications; $this->dockerCleanupSuccessTelegramNotifications = $this->settings->docker_cleanup_success_telegram_notifications; $this->dockerCleanupFailureTelegramNotifications = $this->settings->docker_cleanup_failure_telegram_notifications; $this->serverDiskUsageTelegramNotifications = $this->settings->server_disk_usage_telegram_notifications; $this->serverReachableTelegramNotifications = $this->settings->server_reachable_telegram_notifications; $this->serverUnreachableTelegramNotifications = $this->settings->server_unreachable_telegram_notifications; $this->serverPatchTelegramNotifications = $this->settings->server_patch_telegram_notifications; $this->traefikOutdatedTelegramNotifications = $this->settings->traefik_outdated_telegram_notifications; $this->telegramNotificationsDeploymentSuccessThreadId = $this->settings->telegram_notifications_deployment_success_thread_id; $this->telegramNotificationsDeploymentFailureThreadId = $this->settings->telegram_notifications_deployment_failure_thread_id; $this->telegramNotificationsStatusChangeThreadId = $this->settings->telegram_notifications_status_change_thread_id; $this->telegramNotificationsBackupSuccessThreadId = $this->settings->telegram_notifications_backup_success_thread_id; $this->telegramNotificationsBackupFailureThreadId = $this->settings->telegram_notifications_backup_failure_thread_id; $this->telegramNotificationsScheduledTaskSuccessThreadId = $this->settings->telegram_notifications_scheduled_task_success_thread_id; $this->telegramNotificationsScheduledTaskFailureThreadId = $this->settings->telegram_notifications_scheduled_task_failure_thread_id; $this->telegramNotificationsDockerCleanupSuccessThreadId = $this->settings->telegram_notifications_docker_cleanup_success_thread_id; $this->telegramNotificationsDockerCleanupFailureThreadId = $this->settings->telegram_notifications_docker_cleanup_failure_thread_id; $this->telegramNotificationsServerDiskUsageThreadId = $this->settings->telegram_notifications_server_disk_usage_thread_id; $this->telegramNotificationsServerReachableThreadId = $this->settings->telegram_notifications_server_reachable_thread_id; $this->telegramNotificationsServerUnreachableThreadId = $this->settings->telegram_notifications_server_unreachable_thread_id; $this->telegramNotificationsServerPatchThreadId = $this->settings->telegram_notifications_server_patch_thread_id; $this->telegramNotificationsTraefikOutdatedThreadId = $this->settings->telegram_notifications_traefik_outdated_thread_id; } } public function instantSave() { try { $this->syncData(true); } catch (\Throwable $e) { return handleError($e, $this); } finally { $this->dispatch('refresh'); } } public function submit() { try { $this->resetErrorBag(); $this->syncData(true); $this->saveModel(); } catch (\Throwable $e) { return handleError($e, $this); } } public function instantSaveTelegramEnabled() { try { $this->validate([ 'telegramToken' => 'required', 'telegramChatId' => 'required', ], [ 'telegramToken.required' => 'Telegram Token is required.', 'telegramChatId.required' => 'Telegram Chat ID is required.', ]); $this->saveModel(); } catch (\Throwable $e) { $this->telegramEnabled = false; return handleError($e, $this); } finally { $this->dispatch('refresh'); } } public function saveModel() { $this->syncData(true); refreshSession(); $this->dispatch('success', 'Settings saved.'); } public function sendTestNotification() { try { $this->authorize('sendTest', $this->settings); $this->team->notify(new Test(channel: 'telegram')); $this->dispatch('success', 'Test notification sent.'); } catch (\Throwable $e) { return handleError($e, $this); } } public function render() { return view('livewire.notifications.telegram'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Boarding/Index.php
app/Livewire/Boarding/Index.php
<?php namespace App\Livewire\Boarding; use App\Enums\ProxyTypes; use App\Models\PrivateKey; use App\Models\Project; use App\Models\Server; use App\Models\Team; use App\Services\ConfigurationRepository; use Illuminate\Support\Collection; use Livewire\Component; use Visus\Cuid2\Cuid2; class Index extends Component { protected $listeners = [ 'refreshBoardingIndex' => 'validateServer', 'prerequisitesInstalled' => 'handlePrerequisitesInstalled', ]; #[\Livewire\Attributes\Url(as: 'step', history: true)] public string $currentState = 'welcome'; #[\Livewire\Attributes\Url(keep: true)] public ?string $selectedServerType = null; public ?Collection $privateKeys = null; #[\Livewire\Attributes\Url(keep: true)] public ?int $selectedExistingPrivateKey = null; #[\Livewire\Attributes\Url(keep: true)] public ?string $privateKeyType = null; public ?string $privateKey = null; public ?string $publicKey = null; public ?string $privateKeyName = null; public ?string $privateKeyDescription = null; public ?PrivateKey $createdPrivateKey = null; public ?Collection $servers = null; #[\Livewire\Attributes\Url(keep: true)] public ?int $selectedExistingServer = null; public ?string $remoteServerName = null; public ?string $remoteServerDescription = null; public ?string $remoteServerHost = null; public ?int $remoteServerPort = 22; public ?string $remoteServerUser = 'root'; public bool $isSwarmManager = false; public bool $isCloudflareTunnel = false; public ?Server $createdServer = null; public Collection $projects; #[\Livewire\Attributes\Url(keep: true)] public ?int $selectedProject = null; public ?Project $createdProject = null; public bool $dockerInstallationStarted = false; public string $serverPublicKey; public bool $serverReachable = true; public ?string $minDockerVersion = null; public int $prerequisiteInstallAttempts = 0; public int $maxPrerequisiteInstallAttempts = 3; public function mount() { if (auth()->user()?->isMember() && auth()->user()->currentTeam()->show_boarding === true) { return redirect()->route('dashboard'); } $this->minDockerVersion = str(config('constants.docker.minimum_required_version'))->before('.'); $this->privateKeyName = generate_random_name(); $this->remoteServerName = generate_random_name(); // Initialize collections to avoid null errors if ($this->privateKeys === null) { $this->privateKeys = collect(); } if ($this->servers === null) { $this->servers = collect(); } if (! isset($this->projects)) { $this->projects = collect(); } // Restore state when coming from URL with query params if ($this->selectedServerType === 'localhost' && $this->selectedExistingServer === 0) { $this->createdServer = Server::find(0); if ($this->createdServer) { $this->serverPublicKey = $this->createdServer->privateKey->getPublicKey(); } } if ($this->selectedServerType === 'remote') { if ($this->privateKeys->isEmpty()) { $this->privateKeys = PrivateKey::ownedAndOnlySShKeys(['name'])->where('id', '!=', 0)->get(); } if ($this->servers->isEmpty()) { $this->servers = Server::ownedByCurrentTeam(['name'])->where('id', '!=', 0)->get(); } if ($this->selectedExistingServer) { $this->createdServer = Server::find($this->selectedExistingServer); if ($this->createdServer) { $this->serverPublicKey = $this->createdServer->privateKey->getPublicKey(); $this->updateServerDetails(); } } if ($this->selectedExistingPrivateKey) { $this->createdPrivateKey = PrivateKey::where('team_id', currentTeam()->id) ->where('id', $this->selectedExistingPrivateKey) ->first(); if ($this->createdPrivateKey) { $this->privateKey = $this->createdPrivateKey->private_key; $this->publicKey = $this->createdPrivateKey->getPublicKey(); } } // Auto-regenerate key pair for "Generate with Coolify" mode on page refresh if ($this->privateKeyType === 'create' && empty($this->privateKey)) { $this->createNewPrivateKey(); } } if ($this->selectedProject) { $this->createdProject = Project::find($this->selectedProject); if (! $this->createdProject) { $this->projects = Project::ownedByCurrentTeam(['name'])->get(); } } // Load projects when on create-project state (for page refresh) if ($this->currentState === 'create-project' && $this->projects->isEmpty()) { $this->projects = Project::ownedByCurrentTeam(['name'])->get(); } } public function explanation() { if (isCloud()) { return $this->setServerType('remote'); } $this->currentState = 'select-server-type'; } public function restartBoarding() { return redirect()->route('onboarding'); } public function skipBoarding() { Team::find(currentTeam()->id)->update([ 'show_boarding' => false, ]); refreshSession(); return redirect()->route('dashboard'); } public function setServerType(string $type) { $this->selectedServerType = $type; if ($this->selectedServerType === 'localhost') { $this->createdServer = Server::find(0); $this->selectedExistingServer = 0; if (! $this->createdServer) { return $this->dispatch('error', 'Localhost server is not found. Something went wrong during installation. Please try to reinstall or contact support.'); } $this->serverPublicKey = $this->createdServer->privateKey->getPublicKey(); return $this->validateServer('localhost'); } elseif ($this->selectedServerType === 'remote') { $this->privateKeys = PrivateKey::ownedAndOnlySShKeys(['name'])->where('id', '!=', 0)->get(); // Auto-select first key if available for better UX if ($this->privateKeys->count() > 0) { $this->selectedExistingPrivateKey = $this->privateKeys->first()->id; } // Onboarding always creates new servers, skip existing server selection $this->currentState = 'private-key'; } } private function updateServerDetails() { if ($this->createdServer) { $this->remoteServerPort = $this->createdServer->port; $this->remoteServerUser = $this->createdServer->user; } } public function getProxyType() { $this->selectProxy(ProxyTypes::TRAEFIK->value); $this->getProjects(); } public function selectExistingPrivateKey() { if (is_null($this->selectedExistingPrivateKey)) { $this->dispatch('error', 'Please select a private key.'); return; } $this->createdPrivateKey = PrivateKey::where('team_id', currentTeam()->id)->where('id', $this->selectedExistingPrivateKey)->first(); $this->privateKey = $this->createdPrivateKey->private_key; $this->currentState = 'create-server'; } public function createNewServer() { $this->selectedExistingServer = null; $this->currentState = 'private-key'; } public function setPrivateKey(string $type) { $this->selectedExistingPrivateKey = null; $this->privateKeyType = $type; if ($type === 'create') { $this->createNewPrivateKey(); } else { $this->privateKey = null; $this->publicKey = null; } $this->currentState = 'create-private-key'; } public function savePrivateKey() { $this->validate([ 'privateKeyName' => 'required|string|max:255', 'privateKeyDescription' => 'nullable|string|max:255', 'privateKey' => 'required|string', ]); try { $privateKey = PrivateKey::createAndStore([ 'name' => $this->privateKeyName, 'description' => $this->privateKeyDescription, 'private_key' => $this->privateKey, 'team_id' => currentTeam()->id, ]); $this->createdPrivateKey = $privateKey; $this->currentState = 'create-server'; } catch (\Exception $e) { $this->addError('privateKey', 'Failed to save private key: '.$e->getMessage()); } } public function saveServer() { $this->validate([ 'remoteServerName' => 'required|string', 'remoteServerHost' => 'required|string', 'remoteServerPort' => 'required|integer', 'remoteServerUser' => 'required|string', ]); $this->privateKey = formatPrivateKey($this->privateKey); $foundServer = Server::whereIp($this->remoteServerHost)->first(); if ($foundServer) { return $this->dispatch('error', 'IP address is already in use by another team.'); } $this->createdServer = Server::create([ 'name' => $this->remoteServerName, 'ip' => $this->remoteServerHost, 'port' => $this->remoteServerPort, 'user' => $this->remoteServerUser, 'description' => $this->remoteServerDescription, 'private_key_id' => $this->createdPrivateKey->id, 'team_id' => currentTeam()->id, ]); $this->createdServer->settings->is_swarm_manager = $this->isSwarmManager; $this->createdServer->settings->is_cloudflare_tunnel = $this->isCloudflareTunnel; $this->createdServer->settings->save(); $this->selectedExistingServer = $this->createdServer->id; $this->currentState = 'validate-server'; } public function installServer() { $this->dispatch('init', true); } public function validateServer() { try { $this->disableSshMux(); // EC2 does not have `uptime` command, lol instant_remote_process(['ls /'], $this->createdServer, true); $this->createdServer->settings()->update([ 'is_reachable' => true, ]); $this->serverReachable = true; } catch (\Throwable $e) { $this->serverReachable = false; $this->createdServer->settings()->update([ 'is_reachable' => false, ]); return handleError(error: $e, livewire: $this); } try { // Check prerequisites $validationResult = $this->createdServer->validatePrerequisites(); if (! $validationResult['success']) { // Check if we've exceeded max attempts if ($this->prerequisiteInstallAttempts >= $this->maxPrerequisiteInstallAttempts) { $missingCommands = implode(', ', $validationResult['missing']); throw new \Exception("Prerequisites ({$missingCommands}) could not be installed after {$this->maxPrerequisiteInstallAttempts} attempts. Please install them manually."); } // Start async installation and wait for completion via ActivityMonitor $activity = $this->createdServer->installPrerequisites(); $this->prerequisiteInstallAttempts++; $this->dispatch('activityMonitor', $activity->id, 'prerequisitesInstalled'); // Return early - handlePrerequisitesInstalled() will be called when installation completes return; } // Prerequisites are already installed, continue with validation $this->continueValidation(); } catch (\Throwable $e) { return handleError(error: $e, livewire: $this); } } public function handlePrerequisitesInstalled() { try { // Revalidate prerequisites after installation completes $validationResult = $this->createdServer->validatePrerequisites(); if (! $validationResult['success']) { // Installation completed but prerequisites still missing - retry $missingCommands = implode(', ', $validationResult['missing']); if ($this->prerequisiteInstallAttempts >= $this->maxPrerequisiteInstallAttempts) { throw new \Exception("Prerequisites ({$missingCommands}) could not be installed after {$this->maxPrerequisiteInstallAttempts} attempts. Please install them manually."); } // Try again $activity = $this->createdServer->installPrerequisites(); $this->prerequisiteInstallAttempts++; $this->dispatch('activityMonitor', $activity->id, 'prerequisitesInstalled'); return; } // Prerequisites validated successfully - continue with Docker validation $this->continueValidation(); } catch (\Throwable $e) { return handleError(error: $e, livewire: $this); } } private function continueValidation() { try { $dockerVersion = instant_remote_process(["docker version|head -2|grep -i version| awk '{print $2}'"], $this->createdServer, true); $dockerVersion = checkMinimumDockerEngineVersion($dockerVersion); if (is_null($dockerVersion)) { $this->currentState = 'validate-server'; throw new \Exception('Docker not found or old version is installed.'); } $this->createdServer->settings()->update([ 'is_usable' => true, ]); $this->getProxyType(); } catch (\Throwable $e) { $this->createdServer->settings()->update([ 'is_usable' => false, ]); return handleError(error: $e, livewire: $this); } } public function selectProxy(?string $proxyType = null) { if (! $proxyType) { return $this->getProjects(); } $this->createdServer->proxy->type = $proxyType; $this->createdServer->proxy->status = 'exited'; $this->createdServer->proxy->last_saved_settings = null; $this->createdServer->proxy->last_applied_settings = null; $this->createdServer->save(); $this->getProjects(); } public function getProjects() { $this->projects = Project::ownedByCurrentTeam(['name'])->get(); if ($this->projects->count() > 0) { $this->selectedProject = $this->projects->first()->id; } $this->currentState = 'create-project'; } public function selectExistingProject() { $this->createdProject = Project::find($this->selectedProject); $this->currentState = 'create-resource'; } public function createNewProject() { $this->createdProject = Project::create([ 'name' => 'My first project', 'team_id' => currentTeam()->id, 'uuid' => (string) new Cuid2, ]); $this->currentState = 'create-resource'; } public function showNewResource() { $this->skipBoarding(); return redirect()->route( 'project.resource.create', [ 'project_uuid' => $this->createdProject->uuid, 'environment_uuid' => $this->createdProject->environments->first()->uuid, 'server' => $this->createdServer->id, ] ); } public function saveAndValidateServer() { $this->validate([ 'remoteServerPort' => 'required|integer|min:1|max:65535', 'remoteServerUser' => 'required|string', ]); $this->createdServer->update([ 'port' => $this->remoteServerPort, 'user' => $this->remoteServerUser, 'timezone' => 'UTC', ]); $this->validateServer(); } private function createNewPrivateKey() { $this->privateKeyName = generate_random_name(); $this->privateKeyDescription = 'Created by Coolify'; ['private' => $this->privateKey, 'public' => $this->publicKey] = generateSSHKey(); } private function disableSshMux(): void { $configRepository = app(ConfigurationRepository::class); $configRepository->disableSshMux(); } public function render() { return view('livewire.boarding.index')->layout('layouts.boarding'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/SharedVariables/Index.php
app/Livewire/SharedVariables/Index.php
<?php namespace App\Livewire\SharedVariables; use Livewire\Component; class Index extends Component { public function render() { return view('livewire.shared-variables.index'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/SharedVariables/Project/Show.php
app/Livewire/SharedVariables/Project/Show.php
<?php namespace App\Livewire\SharedVariables\Project; use App\Models\Project; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Illuminate\Support\Facades\DB; use Livewire\Component; class Show extends Component { use AuthorizesRequests; public Project $project; public string $view = 'normal'; public ?string $variables = null; protected $listeners = ['refreshEnvs' => 'refreshEnvs', 'saveKey' => 'saveKey', 'environmentVariableDeleted' => 'refreshEnvs']; public function saveKey($data) { try { $this->authorize('update', $this->project); $found = $this->project->environment_variables()->where('key', $data['key'])->first(); if ($found) { throw new \Exception('Variable already exists.'); } $this->project->environment_variables()->create([ 'key' => $data['key'], 'value' => $data['value'], 'is_multiline' => $data['is_multiline'], 'is_literal' => $data['is_literal'], 'type' => 'project', 'team_id' => currentTeam()->id, ]); $this->project->refresh(); $this->getDevView(); } catch (\Throwable $e) { return handleError($e, $this); } } public function mount() { $projectUuid = request()->route('project_uuid'); $teamId = currentTeam()->id; $project = Project::where('team_id', $teamId)->where('uuid', $projectUuid)->first(); if (! $project) { return redirect()->route('dashboard'); } $this->project = $project; $this->getDevView(); } public function switch() { $this->authorize('view', $this->project); $this->view = $this->view === 'normal' ? 'dev' : 'normal'; $this->getDevView(); } public function getDevView() { $this->variables = $this->formatEnvironmentVariables($this->project->environment_variables->sortBy('key')); } private function formatEnvironmentVariables($variables) { return $variables->map(function ($item) { if ($item->is_shown_once) { return "$item->key=(Locked Secret, delete and add again to change)"; } if ($item->is_multiline) { return "$item->key=(Multiline environment variable, edit in normal view)"; } return "$item->key=$item->value"; })->join("\n"); } public function submit() { try { $this->authorize('update', $this->project); $this->handleBulkSubmit(); $this->getDevView(); } catch (\Throwable $e) { return handleError($e, $this); } finally { $this->refreshEnvs(); } } private function handleBulkSubmit() { $variables = parseEnvFormatToArray($this->variables); $changesMade = DB::transaction(function () use ($variables) { // Delete removed variables $deletedCount = $this->deleteRemovedVariables($variables); // Update or create variables $updatedCount = $this->updateOrCreateVariables($variables); return $deletedCount > 0 || $updatedCount > 0; }); if ($changesMade) { $this->dispatch('success', 'Environment variables updated.'); } } private function deleteRemovedVariables($variables) { $variablesToDelete = $this->project->environment_variables()->whereNotIn('key', array_keys($variables))->get(); if ($variablesToDelete->isEmpty()) { return 0; } $this->project->environment_variables()->whereNotIn('key', array_keys($variables))->delete(); return $variablesToDelete->count(); } private function updateOrCreateVariables($variables) { $count = 0; foreach ($variables as $key => $value) { $found = $this->project->environment_variables()->where('key', $key)->first(); if ($found) { if (! $found->is_shown_once && ! $found->is_multiline) { if ($found->value !== $value) { $found->value = $value; $found->save(); $count++; } } } else { $this->project->environment_variables()->create([ 'key' => $key, 'value' => $value, 'is_multiline' => false, 'is_literal' => false, 'type' => 'project', 'team_id' => currentTeam()->id, ]); $count++; } } return $count; } public function refreshEnvs() { $this->project->refresh(); $this->getDevView(); } public function render() { return view('livewire.shared-variables.project.show'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/SharedVariables/Project/Index.php
app/Livewire/SharedVariables/Project/Index.php
<?php namespace App\Livewire\SharedVariables\Project; use App\Models\Project; use Illuminate\Support\Collection; use Livewire\Component; class Index extends Component { public Collection $projects; public function mount() { $this->projects = Project::ownedByCurrentTeamCached(); } public function render() { return view('livewire.shared-variables.project.index'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/SharedVariables/Team/Index.php
app/Livewire/SharedVariables/Team/Index.php
<?php namespace App\Livewire\SharedVariables\Team; use App\Models\Team; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Illuminate\Support\Facades\DB; use Livewire\Component; class Index extends Component { use AuthorizesRequests; public Team $team; public string $view = 'normal'; public ?string $variables = null; protected $listeners = ['refreshEnvs' => 'refreshEnvs', 'saveKey' => 'saveKey', 'environmentVariableDeleted' => 'refreshEnvs']; public function saveKey($data) { try { $this->authorize('update', $this->team); $found = $this->team->environment_variables()->where('key', $data['key'])->first(); if ($found) { throw new \Exception('Variable already exists.'); } $this->team->environment_variables()->create([ 'key' => $data['key'], 'value' => $data['value'], 'is_multiline' => $data['is_multiline'], 'is_literal' => $data['is_literal'], 'type' => 'team', 'team_id' => currentTeam()->id, ]); $this->team->refresh(); $this->getDevView(); } catch (\Throwable $e) { return handleError($e, $this); } } public function mount() { $this->team = currentTeam(); $this->getDevView(); } public function switch() { $this->authorize('view', $this->team); $this->view = $this->view === 'normal' ? 'dev' : 'normal'; $this->getDevView(); } public function getDevView() { $this->variables = $this->formatEnvironmentVariables($this->team->environment_variables->sortBy('key')); } private function formatEnvironmentVariables($variables) { return $variables->map(function ($item) { if ($item->is_shown_once) { return "$item->key=(Locked Secret, delete and add again to change)"; } if ($item->is_multiline) { return "$item->key=(Multiline environment variable, edit in normal view)"; } return "$item->key=$item->value"; })->join("\n"); } public function submit() { try { $this->authorize('update', $this->team); $this->handleBulkSubmit(); $this->getDevView(); } catch (\Throwable $e) { return handleError($e, $this); } finally { $this->refreshEnvs(); } } private function handleBulkSubmit() { $variables = parseEnvFormatToArray($this->variables); $changesMade = false; DB::transaction(function () use ($variables, &$changesMade) { // Delete removed variables $deletedCount = $this->deleteRemovedVariables($variables); if ($deletedCount > 0) { $changesMade = true; } // Update or create variables $updatedCount = $this->updateOrCreateVariables($variables); if ($updatedCount > 0) { $changesMade = true; } }); if ($changesMade) { $this->dispatch('success', 'Environment variables updated.'); } } private function deleteRemovedVariables($variables) { $variablesToDelete = $this->team->environment_variables()->whereNotIn('key', array_keys($variables))->get(); if ($variablesToDelete->isEmpty()) { return 0; } $this->team->environment_variables()->whereNotIn('key', array_keys($variables))->delete(); return $variablesToDelete->count(); } private function updateOrCreateVariables($variables) { $count = 0; foreach ($variables as $key => $value) { $found = $this->team->environment_variables()->where('key', $key)->first(); if ($found) { if (! $found->is_shown_once && ! $found->is_multiline) { if ($found->value !== $value) { $found->value = $value; $found->save(); $count++; } } } else { $this->team->environment_variables()->create([ 'key' => $key, 'value' => $value, 'is_multiline' => false, 'is_literal' => false, 'type' => 'team', 'team_id' => currentTeam()->id, ]); $count++; } } return $count; } public function refreshEnvs() { $this->team->refresh(); $this->getDevView(); } public function render() { return view('livewire.shared-variables.team.index'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/SharedVariables/Environment/Show.php
app/Livewire/SharedVariables/Environment/Show.php
<?php namespace App\Livewire\SharedVariables\Environment; use App\Models\Application; use App\Models\Project; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Illuminate\Support\Facades\DB; use Livewire\Component; class Show extends Component { use AuthorizesRequests; public Project $project; public Application $application; public $environment; public array $parameters; public string $view = 'normal'; public ?string $variables = null; protected $listeners = ['refreshEnvs' => 'refreshEnvs', 'saveKey', 'environmentVariableDeleted' => 'refreshEnvs']; public function saveKey($data) { try { $this->authorize('update', $this->environment); $found = $this->environment->environment_variables()->where('key', $data['key'])->first(); if ($found) { throw new \Exception('Variable already exists.'); } $this->environment->environment_variables()->create([ 'key' => $data['key'], 'value' => $data['value'], 'is_multiline' => $data['is_multiline'], 'is_literal' => $data['is_literal'], 'type' => 'environment', 'team_id' => currentTeam()->id, ]); $this->environment->refresh(); $this->getDevView(); } catch (\Throwable $e) { return handleError($e, $this); } } public function mount() { $this->parameters = get_route_parameters(); $this->project = Project::ownedByCurrentTeam()->where('uuid', request()->route('project_uuid'))->firstOrFail(); $this->environment = $this->project->environments()->where('uuid', request()->route('environment_uuid'))->firstOrFail(); $this->getDevView(); } public function switch() { $this->authorize('view', $this->environment); $this->view = $this->view === 'normal' ? 'dev' : 'normal'; $this->getDevView(); } public function getDevView() { $this->variables = $this->formatEnvironmentVariables($this->environment->environment_variables->sortBy('key')); } private function formatEnvironmentVariables($variables) { return $variables->map(function ($item) { if ($item->is_shown_once) { return "$item->key=(Locked Secret, delete and add again to change)"; } if ($item->is_multiline) { return "$item->key=(Multiline environment variable, edit in normal view)"; } return "$item->key=$item->value"; })->join("\n"); } public function submit() { try { $this->authorize('update', $this->environment); $this->handleBulkSubmit(); $this->getDevView(); } catch (\Throwable $e) { return handleError($e, $this); } finally { $this->refreshEnvs(); } } private function handleBulkSubmit() { $variables = parseEnvFormatToArray($this->variables); $changesMade = false; DB::transaction(function () use ($variables, &$changesMade) { // Delete removed variables $deletedCount = $this->deleteRemovedVariables($variables); if ($deletedCount > 0) { $changesMade = true; } // Update or create variables $updatedCount = $this->updateOrCreateVariables($variables); if ($updatedCount > 0) { $changesMade = true; } }); // Only dispatch success after transaction has committed if ($changesMade) { $this->dispatch('success', 'Environment variables updated.'); } } private function deleteRemovedVariables($variables) { $variablesToDelete = $this->environment->environment_variables()->whereNotIn('key', array_keys($variables))->get(); if ($variablesToDelete->isEmpty()) { return 0; } $this->environment->environment_variables()->whereNotIn('key', array_keys($variables))->delete(); return $variablesToDelete->count(); } private function updateOrCreateVariables($variables) { $count = 0; foreach ($variables as $key => $value) { $found = $this->environment->environment_variables()->where('key', $key)->first(); if ($found) { if (! $found->is_shown_once && ! $found->is_multiline) { if ($found->value !== $value) { $found->value = $value; $found->save(); $count++; } } } else { $this->environment->environment_variables()->create([ 'key' => $key, 'value' => $value, 'is_multiline' => false, 'is_literal' => false, 'type' => 'environment', 'team_id' => currentTeam()->id, ]); $count++; } } return $count; } public function refreshEnvs() { $this->environment->refresh(); $this->getDevView(); } public function render() { return view('livewire.shared-variables.environment.show'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/SharedVariables/Environment/Index.php
app/Livewire/SharedVariables/Environment/Index.php
<?php namespace App\Livewire\SharedVariables\Environment; use App\Models\Project; use Illuminate\Support\Collection; use Livewire\Component; class Index extends Component { public Collection $projects; public function mount() { $this->projects = Project::ownedByCurrentTeamCached(); } public function render() { return view('livewire.shared-variables.environment.index'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Destination/Show.php
app/Livewire/Destination/Show.php
<?php namespace App\Livewire\Destination; use App\Models\Server; use App\Models\StandaloneDocker; use App\Models\SwarmDocker; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Livewire\Attributes\Locked; use Livewire\Attributes\Validate; use Livewire\Component; class Show extends Component { use AuthorizesRequests; #[Locked] public $destination; #[Validate(['string', 'required'])] public string $name; #[Validate(['string', 'required'])] public string $network; #[Validate(['string', 'required'])] public string $serverIp; public function mount(string $destination_uuid) { try { $destination = StandaloneDocker::whereUuid($destination_uuid)->first() ?? SwarmDocker::whereUuid($destination_uuid)->firstOrFail(); $ownedByTeam = Server::ownedByCurrentTeam()->each(function ($server) use ($destination) { if ($server->standaloneDockers->contains($destination) || $server->swarmDockers->contains($destination)) { $this->destination = $destination; $this->syncData(); } }); if ($ownedByTeam === false) { return redirect()->route('destination.index'); } $this->destination = $destination; $this->syncData(); } catch (\Throwable $e) { return handleError($e, $this); } } public function syncData(bool $toModel = false) { if ($toModel) { $this->validate(); $this->destination->name = $this->name; $this->destination->network = $this->network; $this->destination->server->ip = $this->serverIp; $this->destination->save(); } else { $this->name = $this->destination->name; $this->network = $this->destination->network; $this->serverIp = $this->destination->server->ip; } } public function submit() { try { $this->authorize('update', $this->destination); $this->syncData(true); $this->dispatch('success', 'Destination saved.'); } catch (\Throwable $e) { return handleError($e, $this); } } public function delete() { try { $this->authorize('delete', $this->destination); if ($this->destination->getMorphClass() === \App\Models\StandaloneDocker::class) { if ($this->destination->attachedTo()) { return $this->dispatch('error', 'You must delete all resources before deleting this destination.'); } instant_remote_process(["docker network disconnect {$this->destination->network} coolify-proxy"], $this->destination->server, throwError: false); instant_remote_process(['docker network rm -f '.$this->destination->network], $this->destination->server); } $this->destination->delete(); return redirect()->route('destination.index'); } catch (\Throwable $e) { return handleError($e, $this); } } public function render() { return view('livewire.destination.show'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Destination/Index.php
app/Livewire/Destination/Index.php
<?php namespace App\Livewire\Destination; use App\Models\Server; use Livewire\Attributes\Locked; use Livewire\Component; class Index extends Component { #[Locked] public $servers; public function mount() { $this->servers = Server::isUsable()->get(); } public function render() { return view('livewire.destination.index'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Destination/New/Docker.php
app/Livewire/Destination/New/Docker.php
<?php namespace App\Livewire\Destination\New; use App\Models\Server; use App\Models\StandaloneDocker; use App\Models\SwarmDocker; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Livewire\Attributes\Locked; use Livewire\Attributes\Validate; use Livewire\Component; use Visus\Cuid2\Cuid2; class Docker extends Component { use AuthorizesRequests; #[Locked] public $servers; #[Locked] public Server $selectedServer; #[Validate(['required', 'string'])] public string $name; #[Validate(['required', 'string'])] public string $network; #[Validate(['required', 'string'])] public string $serverId; #[Validate(['required', 'boolean'])] public bool $isSwarm = false; public function mount(?string $server_id = null) { $this->network = new Cuid2; $this->servers = Server::isUsable()->get(); if ($server_id) { $foundServer = $this->servers->find($server_id) ?: $this->servers->first(); if (! $foundServer) { throw new \Exception('Server not found.'); } $this->selectedServer = $foundServer; $this->serverId = $this->selectedServer->id; } else { $foundServer = $this->servers->first(); if (! $foundServer) { throw new \Exception('Server not found.'); } $this->selectedServer = $foundServer; $this->serverId = $this->selectedServer->id; } $this->generateName(); } public function updatedServerId() { $this->selectedServer = $this->servers->find($this->serverId); $this->generateName(); } public function generateName() { $name = data_get($this->selectedServer, 'name', new Cuid2); $this->name = str("{$name}-{$this->network}")->kebab(); } public function submit() { try { $this->authorize('create', StandaloneDocker::class); $this->validate(); if ($this->isSwarm) { $found = $this->selectedServer->swarmDockers()->where('network', $this->network)->first(); if ($found) { throw new \Exception('Network already added to this server.'); } else { $docker = SwarmDocker::create([ 'name' => $this->name, 'network' => $this->network, 'server_id' => $this->selectedServer->id, ]); } } else { $found = $this->selectedServer->standaloneDockers()->where('network', $this->network)->first(); if ($found) { throw new \Exception('Network already added to this server.'); } else { $docker = StandaloneDocker::create([ 'name' => $this->name, 'network' => $this->network, 'server_id' => $this->selectedServer->id, ]); } } redirectRoute($this, 'destination.show', [$docker->uuid]); } catch (\Throwable $e) { return handleError($e, $this); } } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Security/ApiTokens.php
app/Livewire/Security/ApiTokens.php
<?php namespace App\Livewire\Security; use App\Models\InstanceSettings; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Laravel\Sanctum\PersonalAccessToken; use Livewire\Component; class ApiTokens extends Component { use AuthorizesRequests; public ?string $description = null; public $tokens = []; public array $permissions = ['read']; public $isApiEnabled; public bool $canUseRootPermissions = false; public bool $canUseWritePermissions = false; public function render() { return view('livewire.security.api-tokens'); } public function mount() { $this->isApiEnabled = InstanceSettings::get()->is_api_enabled; $this->canUseRootPermissions = auth()->user()->can('useRootPermissions', PersonalAccessToken::class); $this->canUseWritePermissions = auth()->user()->can('useWritePermissions', PersonalAccessToken::class); $this->getTokens(); } private function getTokens() { $this->tokens = auth()->user()->tokens->sortByDesc('created_at'); } public function updatedPermissions($permissionToUpdate) { // Check if user is trying to use restricted permissions if ($permissionToUpdate == 'root' && ! $this->canUseRootPermissions) { $this->dispatch('error', 'You do not have permission to use root permissions.'); // Remove root from permissions if it was somehow added $this->permissions = array_diff($this->permissions, ['root']); return; } if (in_array($permissionToUpdate, ['write', 'write:sensitive']) && ! $this->canUseWritePermissions) { $this->dispatch('error', 'You do not have permission to use write permissions.'); // Remove write permissions if they were somehow added $this->permissions = array_diff($this->permissions, ['write', 'write:sensitive']); return; } if ($permissionToUpdate == 'root') { $this->permissions = ['root']; } elseif ($permissionToUpdate == 'read:sensitive' && ! in_array('read', $this->permissions)) { $this->permissions[] = 'read'; } elseif ($permissionToUpdate == 'deploy') { $this->permissions = ['deploy']; } else { if (count($this->permissions) == 0) { $this->permissions = ['read']; } } sort($this->permissions); } public function addNewToken() { try { $this->authorize('create', PersonalAccessToken::class); // Validate permissions based on user role if (in_array('root', $this->permissions) && ! $this->canUseRootPermissions) { throw new \Exception('You do not have permission to create tokens with root permissions.'); } if (array_intersect(['write', 'write:sensitive'], $this->permissions) && ! $this->canUseWritePermissions) { throw new \Exception('You do not have permission to create tokens with write permissions.'); } $this->validate([ 'description' => 'required|min:3|max:255', ]); $token = auth()->user()->createToken($this->description, array_values($this->permissions)); $this->getTokens(); session()->flash('token', $token->plainTextToken); } catch (\Exception $e) { return handleError($e, $this); } } public function revoke(int $id) { try { $token = auth()->user()->tokens()->where('id', $id)->firstOrFail(); $this->authorize('delete', $token); $token->delete(); $this->getTokens(); } catch (\Exception $e) { return handleError($e, $this); } } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Security/CloudInitScripts.php
app/Livewire/Security/CloudInitScripts.php
<?php namespace App\Livewire\Security; use App\Models\CloudInitScript; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Livewire\Component; class CloudInitScripts extends Component { use AuthorizesRequests; public $scripts; public function mount() { $this->authorize('viewAny', CloudInitScript::class); $this->loadScripts(); } public function getListeners() { return [ 'scriptSaved' => 'loadScripts', ]; } public function loadScripts() { $this->scripts = CloudInitScript::ownedByCurrentTeam()->orderBy('created_at', 'desc')->get(); } public function deleteScript(int $scriptId) { try { $script = CloudInitScript::ownedByCurrentTeam()->findOrFail($scriptId); $this->authorize('delete', $script); $script->delete(); $this->loadScripts(); $this->dispatch('success', 'Cloud-init script deleted successfully.'); } catch (\Throwable $e) { return handleError($e, $this); } } public function render() { return view('livewire.security.cloud-init-scripts'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Security/CloudInitScriptForm.php
app/Livewire/Security/CloudInitScriptForm.php
<?php namespace App\Livewire\Security; use App\Models\CloudInitScript; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Livewire\Component; class CloudInitScriptForm extends Component { use AuthorizesRequests; public bool $modal_mode = true; public ?int $scriptId = null; public string $name = ''; public string $script = ''; public function mount(?int $scriptId = null) { if ($scriptId) { $this->scriptId = $scriptId; $cloudInitScript = CloudInitScript::ownedByCurrentTeam()->findOrFail($scriptId); $this->authorize('update', $cloudInitScript); $this->name = $cloudInitScript->name; $this->script = $cloudInitScript->script; } else { $this->authorize('create', CloudInitScript::class); } } protected function rules(): array { return [ 'name' => 'required|string|max:255', 'script' => ['required', 'string', new \App\Rules\ValidCloudInitYaml], ]; } protected function messages(): array { return [ 'name.required' => 'Script name is required.', 'name.max' => 'Script name cannot exceed 255 characters.', 'script.required' => 'Cloud-init script content is required.', ]; } public function save() { $this->validate(); try { if ($this->scriptId) { // Update existing script $cloudInitScript = CloudInitScript::ownedByCurrentTeam()->findOrFail($this->scriptId); $this->authorize('update', $cloudInitScript); $cloudInitScript->update([ 'name' => $this->name, 'script' => $this->script, ]); $message = 'Cloud-init script updated successfully.'; } else { // Create new script $this->authorize('create', CloudInitScript::class); CloudInitScript::create([ 'team_id' => currentTeam()->id, 'name' => $this->name, 'script' => $this->script, ]); $message = 'Cloud-init script created successfully.'; } // Only reset fields if creating (not editing) if (! $this->scriptId) { $this->reset(['name', 'script']); } $this->dispatch('scriptSaved'); $this->dispatch('success', $message); if ($this->modal_mode) { $this->dispatch('closeModal'); } } catch (\Throwable $e) { return handleError($e, $this); } } public function render() { return view('livewire.security.cloud-init-script-form'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Security/CloudTokens.php
app/Livewire/Security/CloudTokens.php
<?php namespace App\Livewire\Security; use Livewire\Component; class CloudTokens extends Component { public function render() { return view('livewire.security.cloud-tokens'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Security/CloudProviderTokenForm.php
app/Livewire/Security/CloudProviderTokenForm.php
<?php namespace App\Livewire\Security; use App\Models\CloudProviderToken; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Illuminate\Support\Facades\Http; use Livewire\Component; class CloudProviderTokenForm extends Component { use AuthorizesRequests; public bool $modal_mode = false; public string $provider = 'hetzner'; public string $token = ''; public string $name = ''; public function mount() { $this->authorize('create', CloudProviderToken::class); } protected function rules(): array { return [ 'provider' => 'required|string|in:hetzner,digitalocean', 'token' => 'required|string', 'name' => 'required|string|max:255', ]; } protected function messages(): array { return [ 'provider.required' => 'Please select a cloud provider.', 'provider.in' => 'Invalid cloud provider selected.', 'token.required' => 'API token is required.', 'name.required' => 'Token name is required.', ]; } private function validateToken(string $provider, string $token): bool { try { if ($provider === 'hetzner') { $response = Http::withHeaders([ 'Authorization' => 'Bearer '.$token, ])->timeout(10)->get('https://api.hetzner.cloud/v1/servers'); ray($response); return $response->successful(); } // Add other providers here in the future // if ($provider === 'digitalocean') { ... } return false; } catch (\Throwable $e) { return false; } } public function addToken() { $this->validate(); try { // Validate the token with the provider's API if (! $this->validateToken($this->provider, $this->token)) { return $this->dispatch('error', 'Invalid API token. Please check your token and try again.'); } $savedToken = CloudProviderToken::create([ 'team_id' => currentTeam()->id, 'provider' => $this->provider, 'token' => $this->token, 'name' => $this->name, ]); $this->reset(['token', 'name']); // Dispatch event with token ID so parent components can react $this->dispatch('tokenAdded', tokenId: $savedToken->id); $this->dispatch('success', 'Cloud provider token added successfully.'); } catch (\Throwable $e) { return handleError($e, $this); } } public function render() { return view('livewire.security.cloud-provider-token-form'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Security/CloudProviderTokens.php
app/Livewire/Security/CloudProviderTokens.php
<?php namespace App\Livewire\Security; use App\Models\CloudProviderToken; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Livewire\Component; class CloudProviderTokens extends Component { use AuthorizesRequests; public $tokens; public function mount() { $this->authorize('viewAny', CloudProviderToken::class); $this->loadTokens(); } public function getListeners() { return [ 'tokenAdded' => 'loadTokens', ]; } public function loadTokens() { $this->tokens = CloudProviderToken::ownedByCurrentTeam()->get(); } public function validateToken(int $tokenId) { try { $token = CloudProviderToken::ownedByCurrentTeam()->findOrFail($tokenId); $this->authorize('view', $token); if ($token->provider === 'hetzner') { $isValid = $this->validateHetznerToken($token->token); if ($isValid) { $this->dispatch('success', 'Hetzner token is valid.'); } else { $this->dispatch('error', 'Hetzner token validation failed. Please check the token.'); } } elseif ($token->provider === 'digitalocean') { $isValid = $this->validateDigitalOceanToken($token->token); if ($isValid) { $this->dispatch('success', 'DigitalOcean token is valid.'); } else { $this->dispatch('error', 'DigitalOcean token validation failed. Please check the token.'); } } else { $this->dispatch('error', 'Unknown provider.'); } } catch (\Throwable $e) { return handleError($e, $this); } } private function validateHetznerToken(string $token): bool { try { $response = \Illuminate\Support\Facades\Http::withToken($token) ->timeout(10) ->get('https://api.hetzner.cloud/v1/servers?per_page=1'); return $response->successful(); } catch (\Throwable $e) { return false; } } private function validateDigitalOceanToken(string $token): bool { try { $response = \Illuminate\Support\Facades\Http::withToken($token) ->timeout(10) ->get('https://api.digitalocean.com/v2/account'); return $response->successful(); } catch (\Throwable $e) { return false; } } public function deleteToken(int $tokenId) { try { $token = CloudProviderToken::ownedByCurrentTeam()->findOrFail($tokenId); $this->authorize('delete', $token); // Check if any servers are using this token if ($token->hasServers()) { $serverCount = $token->servers()->count(); $this->dispatch('error', "Cannot delete this token. It is currently used by {$serverCount} server(s). Please reassign those servers to a different token first."); return; } $token->delete(); $this->loadTokens(); $this->dispatch('success', 'Cloud provider token deleted successfully.'); } catch (\Throwable $e) { return handleError($e, $this); } } public function render() { return view('livewire.security.cloud-provider-tokens'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Security/PrivateKey/Show.php
app/Livewire/Security/PrivateKey/Show.php
<?php namespace App\Livewire\Security\PrivateKey; use App\Models\PrivateKey; use App\Support\ValidationPatterns; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Livewire\Component; class Show extends Component { use AuthorizesRequests; public PrivateKey $private_key; // Explicit properties public string $name; public ?string $description = null; public string $privateKeyValue; public bool $isGitRelated = false; public $public_key = 'Loading...'; protected function rules(): array { return [ 'name' => ValidationPatterns::nameRules(), 'description' => ValidationPatterns::descriptionRules(), 'privateKeyValue' => 'required|string', 'isGitRelated' => 'nullable|boolean', ]; } protected function messages(): array { return array_merge( ValidationPatterns::combinedMessages(), [ 'name.required' => 'The Name field is required.', 'name.regex' => 'The Name may only contain letters, numbers, spaces, dashes (-), underscores (_), dots (.), slashes (/), colons (:), and parentheses ().', 'description.regex' => 'The Description contains invalid characters. Only letters, numbers, spaces, and common punctuation (- _ . : / () \' " , ! ? @ # % & + = [] {} | ~ ` *) are allowed.', 'privateKeyValue.required' => 'The Private Key field is required.', 'privateKeyValue.string' => 'The Private Key must be a valid string.', ] ); } protected $validationAttributes = [ 'name' => 'name', 'description' => 'description', 'privateKeyValue' => 'private key', ]; /** * Sync data between component properties and model * * @param bool $toModel If true, sync FROM properties TO model. If false, sync FROM model TO properties. */ private function syncData(bool $toModel = false): void { if ($toModel) { // Sync TO model (before save) $this->private_key->name = $this->name; $this->private_key->description = $this->description; $this->private_key->private_key = $this->privateKeyValue; $this->private_key->is_git_related = $this->isGitRelated; } else { // Sync FROM model (on load/refresh) $this->name = $this->private_key->name; $this->description = $this->private_key->description; $this->privateKeyValue = $this->private_key->private_key; $this->isGitRelated = $this->private_key->is_git_related; } } public function mount() { try { $this->private_key = PrivateKey::ownedByCurrentTeam(['name', 'description', 'private_key', 'is_git_related', 'team_id'])->whereUuid(request()->private_key_uuid)->firstOrFail(); // Explicit authorization check - will throw 403 if not authorized $this->authorize('view', $this->private_key); $this->syncData(false); } catch (\Illuminate\Auth\Access\AuthorizationException $e) { abort(403, 'You do not have permission to view this private key.'); } catch (\Throwable) { abort(404); } } public function loadPublicKey() { $this->public_key = $this->private_key->getPublicKey(); if ($this->public_key === 'Error loading private key') { $this->dispatch('error', 'Failed to load public key. The private key may be invalid.'); } } public function delete() { try { $this->authorize('delete', $this->private_key); $this->private_key->safeDelete(); currentTeam()->privateKeys = PrivateKey::where('team_id', currentTeam()->id)->get(); return redirectRoute($this, 'security.private-key.index'); } catch (\Exception $e) { $this->dispatch('error', $e->getMessage()); } catch (\Throwable $e) { return handleError($e, $this); } } public function changePrivateKey() { try { $this->authorize('update', $this->private_key); $this->validate(); $this->syncData(true); $this->private_key->updatePrivateKey([ 'private_key' => formatPrivateKey($this->private_key->private_key), ]); refresh_server_connection($this->private_key); $this->dispatch('success', 'Private key updated.'); } catch (\Throwable $e) { return handleError($e, $this); } } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Security/PrivateKey/Create.php
app/Livewire/Security/PrivateKey/Create.php
<?php namespace App\Livewire\Security\PrivateKey; use App\Models\PrivateKey; use App\Support\ValidationPatterns; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Livewire\Component; class Create extends Component { use AuthorizesRequests; public string $name = ''; public string $value = ''; public ?string $from = null; public ?string $description = null; public ?string $publicKey = null; public bool $modal_mode = false; protected function rules(): array { return [ 'name' => ValidationPatterns::nameRules(), 'description' => ValidationPatterns::descriptionRules(), 'value' => 'required|string', ]; } protected function messages(): array { return array_merge( ValidationPatterns::combinedMessages(), [ 'value.required' => 'The Private Key field is required.', 'value.string' => 'The Private Key must be a valid string.', ] ); } public function generateNewRSAKey() { $this->generateNewKey('rsa'); } public function generateNewEDKey() { $this->generateNewKey('ed25519'); } private function generateNewKey($type) { $keyData = PrivateKey::generateNewKeyPair($type); $this->setKeyData($keyData); } public function updated($property) { if ($property === 'value') { $this->validatePrivateKey(); } } public function createPrivateKey() { $this->validate(); try { $this->authorize('create', PrivateKey::class); $privateKey = PrivateKey::createAndStore([ 'name' => $this->name, 'description' => $this->description, 'private_key' => trim($this->value)."\n", 'team_id' => currentTeam()->id, ]); // If in modal mode, dispatch event and don't redirect if ($this->modal_mode) { $this->dispatch('privateKeyCreated', keyId: $privateKey->id); $this->dispatch('success', 'Private key created successfully.'); return; } return $this->redirectAfterCreation($privateKey); } catch (\Throwable $e) { return handleError($e, $this); } } private function setKeyData(array $keyData) { $this->name = $keyData['name']; $this->description = $keyData['description']; $this->value = $keyData['private_key']; $this->publicKey = $keyData['public_key']; } private function validatePrivateKey() { $validationResult = PrivateKey::validateAndExtractPublicKey($this->value); $this->publicKey = $validationResult['publicKey']; if (! $validationResult['isValid']) { $this->addError('value', 'Invalid private key'); } } private function redirectAfterCreation(PrivateKey $privateKey) { return $this->from === 'server' ? redirectRoute($this, 'dashboard') : redirectRoute($this, 'security.private-key.show', ['private_key_uuid' => $privateKey->uuid]); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Security/PrivateKey/Index.php
app/Livewire/Security/PrivateKey/Index.php
<?php namespace App\Livewire\Security\PrivateKey; use App\Models\PrivateKey; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Livewire\Component; class Index extends Component { use AuthorizesRequests; public function render() { $privateKeys = PrivateKey::ownedByCurrentTeam(['name', 'uuid', 'is_git_related', 'description', 'team_id'])->get(); return view('livewire.security.private-key.index', [ 'privateKeys' => $privateKeys, ])->layout('components.layout'); } public function cleanupUnusedKeys() { $this->authorize('create', PrivateKey::class); PrivateKey::cleanupUnusedKeys(); $this->dispatch('success', 'Unused keys have been cleaned up.'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Profile/Index.php
app/Livewire/Profile/Index.php
<?php namespace App\Livewire\Profile; use Illuminate\Support\Facades\Auth; use Illuminate\Support\Facades\Hash; use Illuminate\Support\Facades\RateLimiter; use Illuminate\Validation\Rules\Password; use Livewire\Attributes\Validate; use Livewire\Component; class Index extends Component { public int $userId; public string $email; public string $current_password; public string $new_password; public string $new_password_confirmation; #[Validate('required')] public string $name; public string $new_email = ''; public string $email_verification_code = ''; public bool $show_email_change = false; public bool $show_verification = false; public function mount() { $this->userId = Auth::id(); $this->name = Auth::user()->name; $this->email = Auth::user()->email; // Check if there's a pending email change if (Auth::user()->hasEmailChangeRequest()) { $this->new_email = Auth::user()->pending_email; $this->show_verification = true; } } public function submit() { try { $this->validate([ 'name' => 'required', ]); Auth::user()->update([ 'name' => $this->name, ]); $this->dispatch('success', 'Profile updated.'); } catch (\Throwable $e) { return handleError($e, $this); } } public function requestEmailChange() { try { // For self-hosted, check if email is enabled if (! isCloud()) { $settings = instanceSettings(); if (! $settings->smtp_enabled && ! $settings->resend_enabled) { $this->dispatch('error', 'Email functionality is not configured. Please contact your administrator.'); return; } } $this->validate([ 'new_email' => ['required', 'email', 'unique:users,email'], ]); $this->new_email = strtolower($this->new_email); // Skip rate limiting in development mode if (! isDev()) { // Rate limit by current user's email (1 request per 2 minutes) $userEmailKey = 'email-change:user:'.Auth::id(); if (! RateLimiter::attempt($userEmailKey, 1, function () {}, 120)) { $seconds = RateLimiter::availableIn($userEmailKey); $this->dispatch('error', 'Too many requests. Please wait '.$seconds.' seconds before trying again.'); return; } // Rate limit by new email address (3 requests per hour per email) $newEmailKey = 'email-change:email:'.md5($this->new_email); if (! RateLimiter::attempt($newEmailKey, 3, function () {}, 3600)) { $this->dispatch('error', 'This email address has received too many verification requests. Please try again later.'); return; } // Additional rate limit by IP address (5 requests per hour) $ipKey = 'email-change:ip:'.request()->ip(); if (! RateLimiter::attempt($ipKey, 5, function () {}, 3600)) { $this->dispatch('error', 'Too many requests from your IP address. Please try again later.'); return; } } Auth::user()->requestEmailChange($this->new_email); $this->show_email_change = false; $this->show_verification = true; $this->dispatch('success', 'Verification code sent to '.$this->new_email); } catch (\Throwable $e) { return handleError($e, $this); } } public function verifyEmailChange() { try { $this->validate([ 'email_verification_code' => ['required', 'string', 'size:6'], ]); // Skip rate limiting in development mode if (! isDev()) { // Rate limit verification attempts (5 attempts per 10 minutes) $verifyKey = 'email-verify:user:'.Auth::id(); if (! RateLimiter::attempt($verifyKey, 5, function () {}, 600)) { $seconds = RateLimiter::availableIn($verifyKey); $minutes = ceil($seconds / 60); $this->dispatch('error', 'Too many verification attempts. Please wait '.$minutes.' minutes before trying again.'); // If too many failed attempts, clear the email change request for security if (RateLimiter::attempts($verifyKey) >= 10) { Auth::user()->clearEmailChangeRequest(); $this->new_email = ''; $this->email_verification_code = ''; $this->show_verification = false; $this->dispatch('error', 'Email change request cancelled due to too many failed attempts. Please start over.'); } return; } } if (! Auth::user()->isEmailChangeCodeValid($this->email_verification_code)) { $this->dispatch('error', 'Invalid or expired verification code.'); return; } if (Auth::user()->confirmEmailChange($this->email_verification_code)) { // Clear rate limiters on successful verification (only in production) if (! isDev()) { $verifyKey = 'email-verify:user:'.Auth::id(); RateLimiter::clear($verifyKey); } $this->email = Auth::user()->email; $this->new_email = ''; $this->email_verification_code = ''; $this->show_verification = false; $this->dispatch('success', 'Email address updated successfully.'); } else { $this->dispatch('error', 'Failed to update email address.'); } } catch (\Throwable $e) { return handleError($e, $this); } } public function resendVerificationCode() { try { // Check if there's a pending request if (! Auth::user()->hasEmailChangeRequest()) { $this->dispatch('error', 'No pending email change request.'); return; } // Check if enough time has passed (at least half of the expiry time) $expiryMinutes = config('constants.email_change.verification_code_expiry_minutes', 10); $halfExpiryMinutes = $expiryMinutes / 2; $codeExpiry = Auth::user()->email_change_code_expires_at; $timeSinceCreated = $codeExpiry->subMinutes($expiryMinutes)->diffInMinutes(now()); if ($timeSinceCreated < $halfExpiryMinutes) { $minutesToWait = ceil($halfExpiryMinutes - $timeSinceCreated); $this->dispatch('error', 'Please wait '.$minutesToWait.' more minutes before requesting a new code.'); return; } $pendingEmail = Auth::user()->pending_email; // Skip rate limiting in development mode if (! isDev()) { // Rate limit by email address $newEmailKey = 'email-change:email:'.md5(strtolower($pendingEmail)); if (! RateLimiter::attempt($newEmailKey, 3, function () {}, 3600)) { $this->dispatch('error', 'This email address has received too many verification requests. Please try again later.'); return; } } // Generate and send new code Auth::user()->requestEmailChange($pendingEmail); $this->dispatch('success', 'New verification code sent to '.$pendingEmail); } catch (\Throwable $e) { return handleError($e, $this); } } public function cancelEmailChange() { Auth::user()->clearEmailChangeRequest(); $this->new_email = ''; $this->email_verification_code = ''; $this->show_email_change = false; $this->show_verification = false; $this->dispatch('success', 'Email change request cancelled.'); } public function showEmailChangeForm() { $this->show_email_change = true; $this->new_email = ''; } public function resetPassword() { try { $this->validate([ 'current_password' => ['required'], 'new_password' => ['required', Password::defaults(), 'confirmed'], ]); if (! Hash::check($this->current_password, auth()->user()->password)) { $this->dispatch('error', 'Current password is incorrect.'); return; } if ($this->new_password !== $this->new_password_confirmation) { $this->dispatch('error', 'The two new passwords does not match.'); return; } auth()->user()->update([ 'password' => Hash::make($this->new_password), ]); $this->dispatch('success', 'Password updated.'); $this->current_password = ''; $this->new_password = ''; $this->new_password_confirmation = ''; $this->dispatch('reloadWindow'); } catch (\Throwable $e) { return handleError($e, $this); } } public function render() { return view('livewire.profile.index'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Settings/Advanced.php
app/Livewire/Settings/Advanced.php
<?php namespace App\Livewire\Settings; use App\Models\InstanceSettings; use App\Models\Server; use App\Rules\ValidIpOrCidr; use Livewire\Attributes\Validate; use Livewire\Component; class Advanced extends Component { #[Validate('required')] public Server $server; public InstanceSettings $settings; #[Validate('boolean')] public bool $is_registration_enabled; #[Validate('boolean')] public bool $do_not_track; #[Validate('boolean')] public bool $is_dns_validation_enabled; #[Validate('nullable|string')] public ?string $custom_dns_servers = null; #[Validate('boolean')] public bool $is_api_enabled; public ?string $allowed_ips = null; #[Validate('boolean')] public bool $is_sponsorship_popup_enabled; #[Validate('boolean')] public bool $disable_two_step_confirmation; #[Validate('boolean')] public bool $is_wire_navigate_enabled; public function rules() { return [ 'server' => 'required', 'is_registration_enabled' => 'boolean', 'do_not_track' => 'boolean', 'is_dns_validation_enabled' => 'boolean', 'custom_dns_servers' => 'nullable|string', 'is_api_enabled' => 'boolean', 'allowed_ips' => ['nullable', 'string', new ValidIpOrCidr], 'is_sponsorship_popup_enabled' => 'boolean', 'disable_two_step_confirmation' => 'boolean', 'is_wire_navigate_enabled' => 'boolean', ]; } public function mount() { if (! isInstanceAdmin()) { return redirect()->route('dashboard'); } $this->server = Server::findOrFail(0); $this->settings = instanceSettings(); $this->custom_dns_servers = $this->settings->custom_dns_servers; $this->allowed_ips = $this->settings->allowed_ips; $this->do_not_track = $this->settings->do_not_track; $this->is_registration_enabled = $this->settings->is_registration_enabled; $this->is_dns_validation_enabled = $this->settings->is_dns_validation_enabled; $this->is_api_enabled = $this->settings->is_api_enabled; $this->disable_two_step_confirmation = $this->settings->disable_two_step_confirmation; $this->is_sponsorship_popup_enabled = $this->settings->is_sponsorship_popup_enabled; $this->is_wire_navigate_enabled = $this->settings->is_wire_navigate_enabled ?? true; } public function submit() { try { $this->validate(); $this->custom_dns_servers = str($this->custom_dns_servers)->replaceEnd(',', '')->trim(); $this->custom_dns_servers = str($this->custom_dns_servers)->trim()->explode(',')->map(function ($dns) { return str($dns)->trim()->lower(); })->unique()->implode(','); // Handle allowed IPs with subnet support and 0.0.0.0 special case $this->allowed_ips = str($this->allowed_ips)->replaceEnd(',', '')->trim(); // Only validate and clean up if we have IPs and it's not 0.0.0.0 (allow all) if (! empty($this->allowed_ips) && ! in_array('0.0.0.0', array_map('trim', explode(',', $this->allowed_ips)))) { $invalidEntries = []; $validEntries = str($this->allowed_ips)->trim()->explode(',')->map(function ($entry) use (&$invalidEntries) { $entry = str($entry)->trim()->toString(); if (empty($entry)) { return null; } // Check if it's valid CIDR notation if (str_contains($entry, '/')) { [$ip, $mask] = explode('/', $entry); if (filter_var($ip, FILTER_VALIDATE_IP) && is_numeric($mask) && $mask >= 0 && $mask <= 32) { return $entry; } $invalidEntries[] = $entry; return null; } // Check if it's a valid IP address if (filter_var($entry, FILTER_VALIDATE_IP)) { return $entry; } $invalidEntries[] = $entry; return null; })->filter()->unique(); if (! empty($invalidEntries)) { $this->dispatch('error', 'Invalid IP addresses or subnets: '.implode(', ', $invalidEntries)); return; } if ($validEntries->isEmpty()) { $this->dispatch('error', 'No valid IP addresses or subnets provided'); return; } $this->allowed_ips = $validEntries->implode(','); } $this->instantSave(); } catch (\Exception $e) { return handleError($e, $this); } } public function instantSave() { try { $this->settings->is_registration_enabled = $this->is_registration_enabled; $this->settings->do_not_track = $this->do_not_track; $this->settings->is_dns_validation_enabled = $this->is_dns_validation_enabled; $this->settings->custom_dns_servers = $this->custom_dns_servers; $this->settings->is_api_enabled = $this->is_api_enabled; $this->settings->allowed_ips = $this->allowed_ips; $this->settings->is_sponsorship_popup_enabled = $this->is_sponsorship_popup_enabled; $this->settings->disable_two_step_confirmation = $this->disable_two_step_confirmation; $this->settings->is_wire_navigate_enabled = $this->is_wire_navigate_enabled; $this->settings->save(); $this->dispatch('success', 'Settings updated!'); } catch (\Exception $e) { return handleError($e, $this); } } public function toggleTwoStepConfirmation($password): bool { if (! verifyPasswordConfirmation($password, $this)) { return false; } $this->settings->disable_two_step_confirmation = $this->disable_two_step_confirmation = true; $this->settings->save(); $this->dispatch('success', 'Two step confirmation has been disabled.'); return true; } public function render() { return view('livewire.settings.advanced'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Settings/Updates.php
app/Livewire/Settings/Updates.php
<?php namespace App\Livewire\Settings; use App\Jobs\CheckForUpdatesJob; use App\Models\InstanceSettings; use App\Models\Server; use Livewire\Attributes\Validate; use Livewire\Component; class Updates extends Component { public InstanceSettings $settings; public Server $server; #[Validate('string')] public string $auto_update_frequency; #[Validate('string|required')] public string $update_check_frequency; #[Validate('boolean')] public bool $is_auto_update_enabled; public function mount() { $this->server = Server::findOrFail(0); $this->settings = instanceSettings(); $this->auto_update_frequency = $this->settings->auto_update_frequency; $this->update_check_frequency = $this->settings->update_check_frequency; $this->is_auto_update_enabled = $this->settings->is_auto_update_enabled; } public function instantSave() { try { if ($this->settings->is_auto_update_enabled === true) { $this->validate([ 'auto_update_frequency' => ['required', 'string'], ]); } $this->settings->auto_update_frequency = $this->auto_update_frequency; $this->settings->update_check_frequency = $this->update_check_frequency; $this->settings->is_auto_update_enabled = $this->is_auto_update_enabled; $this->settings->save(); $this->dispatch('success', 'Settings updated!'); } catch (\Exception $e) { return handleError($e, $this); } } public function submit() { try { $this->resetErrorBag(); $this->validate(); if ($this->is_auto_update_enabled && ! validate_cron_expression($this->auto_update_frequency)) { $this->dispatch('error', 'Invalid Cron / Human expression for Auto Update Frequency.'); if (empty($this->auto_update_frequency)) { $this->auto_update_frequency = '0 0 * * *'; } return; } if (! validate_cron_expression($this->update_check_frequency)) { $this->dispatch('error', 'Invalid Cron / Human expression for Update Check Frequency.'); if (empty($this->update_check_frequency)) { $this->update_check_frequency = '0 * * * *'; } return; } $this->instantSave(); $this->server->setupDynamicProxyConfiguration(); } catch (\Exception $e) { return handleError($e, $this); } } public function checkManually() { CheckForUpdatesJob::dispatchSync(); $this->dispatch('updateAvailable'); $settings = instanceSettings(); if ($settings->new_version_available) { $this->dispatch('success', 'New version available!'); } else { $this->dispatch('success', 'No new version available.'); } } public function render() { return view('livewire.settings.updates'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Livewire/Settings/Index.php
app/Livewire/Settings/Index.php
<?php namespace App\Livewire\Settings; use App\Models\InstanceSettings; use App\Models\Server; use Livewire\Attributes\Computed; use Livewire\Attributes\Validate; use Livewire\Component; class Index extends Component { public InstanceSettings $settings; public Server $server; #[Validate('nullable|string|max:255')] public ?string $fqdn = null; #[Validate('required|integer|min:1025|max:65535')] public int $public_port_min; #[Validate('required|integer|min:1025|max:65535')] public int $public_port_max; #[Validate('nullable|string|max:255')] public ?string $instance_name = null; #[Validate('nullable|string')] public ?string $public_ipv4 = null; #[Validate('nullable|string')] public ?string $public_ipv6 = null; #[Validate('required|string|timezone')] public string $instance_timezone; #[Validate('nullable|string|max:50')] public ?string $dev_helper_version = null; public array $domainConflicts = []; public bool $showDomainConflictModal = false; public bool $forceSaveDomains = false; public $buildActivityId = null; public function render() { return view('livewire.settings.index'); } public function mount() { if (! isInstanceAdmin()) { return redirect()->route('dashboard'); } $this->settings = instanceSettings(); $this->server = Server::findOrFail(0); $this->fqdn = $this->settings->fqdn; $this->public_port_min = $this->settings->public_port_min; $this->public_port_max = $this->settings->public_port_max; $this->instance_name = $this->settings->instance_name; $this->public_ipv4 = $this->settings->public_ipv4; $this->public_ipv6 = $this->settings->public_ipv6; $this->instance_timezone = $this->settings->instance_timezone; $this->dev_helper_version = $this->settings->dev_helper_version; } #[Computed] public function timezones(): array { return collect(timezone_identifiers_list()) ->sort() ->values() ->toArray(); } public function instantSave($isSave = true) { $this->validate(); $this->settings->fqdn = $this->fqdn; $this->settings->public_port_min = $this->public_port_min; $this->settings->public_port_max = $this->public_port_max; $this->settings->instance_name = $this->instance_name; $this->settings->public_ipv4 = $this->public_ipv4; $this->settings->public_ipv6 = $this->public_ipv6; $this->settings->instance_timezone = $this->instance_timezone; $this->settings->dev_helper_version = $this->dev_helper_version; if ($isSave) { $this->settings->save(); $this->dispatch('success', 'Settings updated!'); } } public function confirmDomainUsage() { $this->forceSaveDomains = true; $this->showDomainConflictModal = false; $this->submit(); } public function submit() { try { $error_show = false; $this->resetErrorBag(); if (! validate_timezone($this->instance_timezone)) { $this->instance_timezone = config('app.timezone'); throw new \Exception('Invalid timezone.'); } else { $this->settings->instance_timezone = $this->instance_timezone; } if ($this->settings->public_port_min > $this->settings->public_port_max) { $this->addError('settings.public_port_min', 'The minimum port must be lower than the maximum port.'); return; } $this->validate(); if ($this->settings->is_dns_validation_enabled && $this->fqdn) { if (! validateDNSEntry($this->fqdn, $this->server)) { $this->dispatch('error', "Validating DNS failed.<br><br>Make sure you have added the DNS records correctly.<br><br>{$this->fqdn}->{$this->server->ip}<br><br>Check this <a target='_blank' class='underline dark:text-white' href='https://coolify.io/docs/knowledge-base/dns-configuration'>documentation</a> for further help."); $error_show = true; } } if ($this->fqdn) { if (! $this->forceSaveDomains) { $result = checkDomainUsage(domain: $this->fqdn); if ($result['hasConflicts']) { $this->domainConflicts = $result['conflicts']; $this->showDomainConflictModal = true; return; } } else { // Reset the force flag after using it $this->forceSaveDomains = false; } } $this->instantSave(isSave: false); $this->settings->save(); $this->server->setupDynamicProxyConfiguration(); if (! $error_show) { $this->dispatch('success', 'Instance settings updated successfully!'); } } catch (\Exception $e) { return handleError($e, $this); } } public function buildHelperImage() { try { if (! isDev()) { $this->dispatch('error', 'Building helper image is only available in development mode.'); return; } $version = $this->dev_helper_version ?: config('constants.coolify.helper_version'); if (empty($version)) { $this->dispatch('error', 'Please specify a version to build.'); return; } $buildCommand = "docker build -t ghcr.io/coollabsio/coolify-helper:{$version} -f docker/coolify-helper/Dockerfile ."; $activity = remote_process( command: [$buildCommand], server: $this->server, type: 'build-helper-image' ); $this->buildActivityId = $activity->id; $this->dispatch('activityMonitor', $activity->id); $this->dispatch('success', "Building coolify-helper:{$version}..."); } catch (\Exception $e) { return handleError($e, $this); } } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Exceptions/ProcessException.php
app/Exceptions/ProcessException.php
<?php namespace App\Exceptions; use Exception; class ProcessException extends Exception {}
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Exceptions/RateLimitException.php
app/Exceptions/RateLimitException.php
<?php namespace App\Exceptions; use Exception; class RateLimitException extends Exception { public function __construct( string $message = 'Rate limit exceeded.', public readonly ?int $retryAfter = null ) { parent::__construct($message); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Exceptions/Handler.php
app/Exceptions/Handler.php
<?php namespace App\Exceptions; use App\Models\InstanceSettings; use App\Models\User; use Illuminate\Auth\AuthenticationException; use Illuminate\Foundation\Exceptions\Handler as ExceptionHandler; use RuntimeException; use Sentry\Laravel\Integration; use Sentry\State\Scope; use Throwable; class Handler extends ExceptionHandler { /** * A list of exception types with their corresponding custom log levels. * * @var array<class-string<\Throwable>, \Psr\Log\LogLevel::*> */ protected $levels = [ // ]; /** * A list of the exception types that are not reported. * * @var array<int, class-string<\Throwable>> */ protected $dontReport = [ ProcessException::class, NonReportableException::class, DeploymentException::class, ]; /** * A list of the inputs that are never flashed to the session on validation exceptions. * * @var array<int, string> */ protected $dontFlash = [ 'current_password', 'password', 'password_confirmation', ]; private InstanceSettings $settings; protected function unauthenticated($request, AuthenticationException $exception) { if ($request->is('api/*') || $request->expectsJson() || $this->shouldReturnJson($request, $exception)) { return response()->json(['message' => $exception->getMessage()], 401); } return redirect()->guest($exception->redirectTo($request) ?? route('login')); } /** * Render an exception into an HTTP response. */ public function render($request, Throwable $e) { // Handle authorization exceptions for API routes if ($e instanceof \Illuminate\Auth\Access\AuthorizationException) { if ($request->is('api/*') || $request->expectsJson()) { // Get the custom message from the policy if available $message = $e->getMessage(); // Clean up the message for API responses (remove HTML tags if present) $message = strip_tags(str_replace('<br/>', ' ', $message)); // If no custom message, use a default one if (empty($message) || $message === 'This action is unauthorized.') { $message = 'You are not authorized to perform this action.'; } return response()->json([ 'message' => $message, 'error' => 'Unauthorized', ], 403); } } return parent::render($request, $e); } /** * Register the exception handling callbacks for the application. */ public function register(): void { $this->reportable(function (Throwable $e) { if (isDev()) { return; } if ($e instanceof RuntimeException) { return; } $this->settings = instanceSettings(); if ($this->settings->do_not_track) { return; } app('sentry')->configureScope( function (Scope $scope) { $email = auth()?->user() ? auth()->user()->email : 'guest'; $instanceAdmin = User::find(0)->email ?? 'admin@localhost'; $scope->setUser( [ 'email' => $email, 'instanceAdmin' => $instanceAdmin, ] ); } ); // Check for errors that should not be reported to Sentry if (str($e->getMessage())->contains('No space left on device')) { // Log locally but don't send to Sentry logger()->warning('Disk space error: '.$e->getMessage()); return; } Integration::captureUnhandledException($e); }); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Exceptions/DeploymentException.php
app/Exceptions/DeploymentException.php
<?php namespace App\Exceptions; use Exception; /** * Exception for expected deployment failures caused by user/application errors. * These are not Coolify bugs and should not be logged to laravel.log. * Examples: Nixpacks detection failures, missing Dockerfiles, invalid configs, etc. */ class DeploymentException extends Exception { /** * Create a new deployment exception instance. * * @param string $message * @param int $code */ public function __construct($message = '', $code = 0, ?\Throwable $previous = null) { parent::__construct($message, $code, $previous); } /** * Create from another exception, preserving its message and stack trace. */ public static function fromException(\Throwable $exception): static { return new static($exception->getMessage(), $exception->getCode(), $exception); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Exceptions/NonReportableException.php
app/Exceptions/NonReportableException.php
<?php namespace App\Exceptions; use Exception; /** * Exception that should not be reported to Sentry or other error tracking services. * Use this for known, expected errors that don't require external tracking. */ class NonReportableException extends Exception { /** * Create a new non-reportable exception instance. * * @param string $message * @param int $code */ public function __construct($message = '', $code = 0, ?\Throwable $previous = null) { parent::__construct($message, $code, $previous); } /** * Create from another exception, preserving its message and stack trace. */ public static function fromException(\Throwable $exception): static { return new static($exception->getMessage(), $exception->getCode(), $exception); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Helpers/SslHelper.php
app/Helpers/SslHelper.php
<?php namespace App\Helpers; use App\Models\Server; use App\Models\SslCertificate; use Carbon\CarbonImmutable; class SslHelper { private const DEFAULT_ORGANIZATION_NAME = 'Coolify'; private const DEFAULT_COUNTRY_NAME = 'XX'; private const DEFAULT_STATE_NAME = 'Default'; public static function generateSslCertificate( string $commonName, array $subjectAlternativeNames = [], ?string $resourceType = null, ?int $resourceId = null, ?int $serverId = null, int $validityDays = 365, ?string $caCert = null, ?string $caKey = null, bool $isCaCertificate = false, ?string $configurationDir = null, ?string $mountPath = null, bool $isPemKeyFileRequired = false, ): SslCertificate { $organizationName = self::DEFAULT_ORGANIZATION_NAME; $countryName = self::DEFAULT_COUNTRY_NAME; $stateName = self::DEFAULT_STATE_NAME; try { $privateKey = openssl_pkey_new([ 'private_key_type' => OPENSSL_KEYTYPE_EC, 'curve_name' => 'secp521r1', ]); if ($privateKey === false) { throw new \RuntimeException('Failed to generate private key: '.openssl_error_string()); } if (! openssl_pkey_export($privateKey, $privateKeyStr)) { throw new \RuntimeException('Failed to export private key: '.openssl_error_string()); } if (! is_null($serverId) && ! $isCaCertificate) { $server = Server::find($serverId); if ($server) { $ip = $server->getIp; if ($ip) { $type = filter_var($ip, FILTER_VALIDATE_IP, FILTER_FLAG_IPV4 | FILTER_FLAG_IPV6) ? 'IP' : 'DNS'; $subjectAlternativeNames = array_unique( array_merge($subjectAlternativeNames, ["$type:$ip"]) ); } } } $basicConstraints = $isCaCertificate ? 'critical, CA:TRUE, pathlen:0' : 'critical, CA:FALSE'; $keyUsage = $isCaCertificate ? 'critical, keyCertSign, cRLSign' : 'critical, digitalSignature, keyAgreement'; $subjectAltNameSection = ''; $extendedKeyUsageSection = ''; if (! $isCaCertificate) { $extendedKeyUsageSection = "\nextendedKeyUsage = serverAuth, clientAuth"; $subjectAlternativeNames = array_values( array_unique( array_merge(["DNS:$commonName"], $subjectAlternativeNames) ) ); $formattedSubjectAltNames = array_map( function ($index, $san) { [$type, $value] = explode(':', $san, 2); return "{$type}.".($index + 1)." = $value"; }, array_keys($subjectAlternativeNames), $subjectAlternativeNames ); $subjectAltNameSection = "subjectAltName = @subject_alt_names\n\n[ subject_alt_names ]\n" .implode("\n", $formattedSubjectAltNames); } $config = <<<CONF [ req ] prompt = no distinguished_name = distinguished_name req_extensions = req_ext [ distinguished_name ] CN = $commonName [ req_ext ] basicConstraints = $basicConstraints keyUsage = $keyUsage {$extendedKeyUsageSection} [ v3_req ] basicConstraints = $basicConstraints keyUsage = $keyUsage {$extendedKeyUsageSection} subjectKeyIdentifier = hash {$subjectAltNameSection} CONF; $tempConfig = tmpfile(); fwrite($tempConfig, $config); $tempConfigPath = stream_get_meta_data($tempConfig)['uri']; $csr = openssl_csr_new([ 'commonName' => $commonName, 'organizationName' => $organizationName, 'countryName' => $countryName, 'stateOrProvinceName' => $stateName, ], $privateKey, [ 'digest_alg' => 'sha512', 'config' => $tempConfigPath, 'req_extensions' => 'req_ext', ]); if ($csr === false) { throw new \RuntimeException('Failed to generate CSR: '.openssl_error_string()); } $certificate = openssl_csr_sign( $csr, $caCert ?? null, $caKey ?? $privateKey, $validityDays, [ 'digest_alg' => 'sha512', 'config' => $tempConfigPath, 'x509_extensions' => 'v3_req', ], random_int(1, PHP_INT_MAX) ); if ($certificate === false) { throw new \RuntimeException('Failed to sign certificate: '.openssl_error_string()); } if (! openssl_x509_export($certificate, $certificateStr)) { throw new \RuntimeException('Failed to export certificate: '.openssl_error_string()); } SslCertificate::query() ->where('resource_type', $resourceType) ->where('resource_id', $resourceId) ->where('server_id', $serverId) ->delete(); $sslCertificate = SslCertificate::create([ 'ssl_certificate' => $certificateStr, 'ssl_private_key' => $privateKeyStr, 'resource_type' => $resourceType, 'resource_id' => $resourceId, 'server_id' => $serverId, 'configuration_dir' => $configurationDir, 'mount_path' => $mountPath, 'valid_until' => CarbonImmutable::now()->addDays($validityDays), 'is_ca_certificate' => $isCaCertificate, 'common_name' => $commonName, 'subject_alternative_names' => $subjectAlternativeNames, ]); if ($configurationDir && $mountPath && $resourceType && $resourceId) { $model = app($resourceType)->find($resourceId); $model->fileStorages() ->where('resource_type', $model->getMorphClass()) ->where('resource_id', $model->id) ->get() ->filter(function ($storage) use ($mountPath) { return in_array($storage->mount_path, [ $mountPath.'/server.crt', $mountPath.'/server.key', $mountPath.'/server.pem', ]); }) ->each(function ($storage) { $storage->delete(); }); if ($isPemKeyFileRequired) { $model->fileStorages()->create([ 'fs_path' => $configurationDir.'/ssl/server.pem', 'mount_path' => $mountPath.'/server.pem', 'content' => $certificateStr."\n".$privateKeyStr, 'is_directory' => false, 'chmod' => '600', 'resource_type' => $resourceType, 'resource_id' => $resourceId, ]); } else { $model->fileStorages()->create([ 'fs_path' => $configurationDir.'/ssl/server.crt', 'mount_path' => $mountPath.'/server.crt', 'content' => $certificateStr, 'is_directory' => false, 'chmod' => '644', 'resource_type' => $resourceType, 'resource_id' => $resourceId, ]); $model->fileStorages()->create([ 'fs_path' => $configurationDir.'/ssl/server.key', 'mount_path' => $mountPath.'/server.key', 'content' => $privateKeyStr, 'is_directory' => false, 'chmod' => '600', 'resource_type' => $resourceType, 'resource_id' => $resourceId, ]); } } return $sslCertificate; } catch (\Throwable $e) { throw new \RuntimeException('SSL Certificate generation failed: '.$e->getMessage(), 0, $e); } finally { fclose($tempConfig); } } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Helpers/SshRetryHandler.php
app/Helpers/SshRetryHandler.php
<?php namespace App\Helpers; use App\Traits\SshRetryable; /** * Helper class to use SshRetryable trait in non-class contexts */ class SshRetryHandler { use SshRetryable; /** * Static method to get a singleton instance */ public static function instance(): self { static $instance = null; if ($instance === null) { $instance = new self; } return $instance; } /** * Convenience static method for retry execution */ public static function retry(callable $callback, array $context = [], bool $throwError = true) { return self::instance()->executeWithSshRetry($callback, $context, $throwError); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Helpers/SshMultiplexingHelper.php
app/Helpers/SshMultiplexingHelper.php
<?php namespace App\Helpers; use App\Models\PrivateKey; use App\Models\Server; use Illuminate\Support\Facades\Cache; use Illuminate\Support\Facades\Hash; use Illuminate\Support\Facades\Log; use Illuminate\Support\Facades\Process; class SshMultiplexingHelper { public static function serverSshConfiguration(Server $server) { $privateKey = PrivateKey::findOrFail($server->private_key_id); $sshKeyLocation = $privateKey->getKeyLocation(); $muxFilename = '/var/www/html/storage/app/ssh/mux/mux_'.$server->uuid; return [ 'sshKeyLocation' => $sshKeyLocation, 'muxFilename' => $muxFilename, ]; } public static function ensureMultiplexedConnection(Server $server): bool { if (! self::isMultiplexingEnabled()) { return false; } $sshConfig = self::serverSshConfiguration($server); $muxSocket = $sshConfig['muxFilename']; // Check if connection exists $checkCommand = "ssh -O check -o ControlPath=$muxSocket "; if (data_get($server, 'settings.is_cloudflare_tunnel')) { $checkCommand .= '-o ProxyCommand="cloudflared access ssh --hostname %h" '; } $checkCommand .= "{$server->user}@{$server->ip}"; $process = Process::run($checkCommand); if ($process->exitCode() !== 0) { return self::establishNewMultiplexedConnection($server); } // Connection exists, ensure we have metadata for age tracking if (self::getConnectionAge($server) === null) { // Existing connection but no metadata, store current time as fallback self::storeConnectionMetadata($server); } // Connection exists, check if it needs refresh due to age if (self::isConnectionExpired($server)) { return self::refreshMultiplexedConnection($server); } // Perform health check if enabled if (config('constants.ssh.mux_health_check_enabled')) { if (! self::isConnectionHealthy($server)) { return self::refreshMultiplexedConnection($server); } } return true; } public static function establishNewMultiplexedConnection(Server $server): bool { $sshConfig = self::serverSshConfiguration($server); $sshKeyLocation = $sshConfig['sshKeyLocation']; $muxSocket = $sshConfig['muxFilename']; $connectionTimeout = config('constants.ssh.connection_timeout'); $serverInterval = config('constants.ssh.server_interval'); $muxPersistTime = config('constants.ssh.mux_persist_time'); $establishCommand = "ssh -fNM -o ControlMaster=auto -o ControlPath=$muxSocket -o ControlPersist={$muxPersistTime} "; if (data_get($server, 'settings.is_cloudflare_tunnel')) { $establishCommand .= ' -o ProxyCommand="cloudflared access ssh --hostname %h" '; } $establishCommand .= self::getCommonSshOptions($server, $sshKeyLocation, $connectionTimeout, $serverInterval); $establishCommand .= "{$server->user}@{$server->ip}"; $establishProcess = Process::run($establishCommand); if ($establishProcess->exitCode() !== 0) { return false; } // Store connection metadata for tracking self::storeConnectionMetadata($server); return true; } public static function removeMuxFile(Server $server) { $sshConfig = self::serverSshConfiguration($server); $muxSocket = $sshConfig['muxFilename']; $closeCommand = "ssh -O exit -o ControlPath=$muxSocket "; if (data_get($server, 'settings.is_cloudflare_tunnel')) { $closeCommand .= '-o ProxyCommand="cloudflared access ssh --hostname %h" '; } $closeCommand .= "{$server->user}@{$server->ip}"; Process::run($closeCommand); // Clear connection metadata from cache self::clearConnectionMetadata($server); } public static function generateScpCommand(Server $server, string $source, string $dest) { $sshConfig = self::serverSshConfiguration($server); $sshKeyLocation = $sshConfig['sshKeyLocation']; $muxSocket = $sshConfig['muxFilename']; $timeout = config('constants.ssh.command_timeout'); $muxPersistTime = config('constants.ssh.mux_persist_time'); $scp_command = "timeout $timeout scp "; if ($server->isIpv6()) { $scp_command .= '-6 '; } if (self::isMultiplexingEnabled()) { try { if (self::ensureMultiplexedConnection($server)) { $scp_command .= "-o ControlMaster=auto -o ControlPath=$muxSocket -o ControlPersist={$muxPersistTime} "; } } catch (\Exception $e) { Log::warning('SSH multiplexing failed for SCP, falling back to non-multiplexed connection', [ 'server' => $server->name ?? $server->ip, 'error' => $e->getMessage(), ]); // Continue without multiplexing } } if (data_get($server, 'settings.is_cloudflare_tunnel')) { $scp_command .= '-o ProxyCommand="cloudflared access ssh --hostname %h" '; } $scp_command .= self::getCommonSshOptions($server, $sshKeyLocation, config('constants.ssh.connection_timeout'), config('constants.ssh.server_interval'), isScp: true); if ($server->isIpv6()) { $scp_command .= "{$source} {$server->user}@[{$server->ip}]:{$dest}"; } else { $scp_command .= "{$source} {$server->user}@{$server->ip}:{$dest}"; } return $scp_command; } public static function generateSshCommand(Server $server, string $command, bool $disableMultiplexing = false) { if ($server->settings->force_disabled) { throw new \RuntimeException('Server is disabled.'); } $sshConfig = self::serverSshConfiguration($server); $sshKeyLocation = $sshConfig['sshKeyLocation']; self::validateSshKey($server->privateKey); $muxSocket = $sshConfig['muxFilename']; $timeout = config('constants.ssh.command_timeout'); $muxPersistTime = config('constants.ssh.mux_persist_time'); $ssh_command = "timeout $timeout ssh "; $multiplexingSuccessful = false; if (! $disableMultiplexing && self::isMultiplexingEnabled()) { try { $multiplexingSuccessful = self::ensureMultiplexedConnection($server); if ($multiplexingSuccessful) { $ssh_command .= "-o ControlMaster=auto -o ControlPath=$muxSocket -o ControlPersist={$muxPersistTime} "; } } catch (\Exception $e) { // Continue without multiplexing } } if (data_get($server, 'settings.is_cloudflare_tunnel')) { $ssh_command .= "-o ProxyCommand='cloudflared access ssh --hostname %h' "; } $ssh_command .= self::getCommonSshOptions($server, $sshKeyLocation, config('constants.ssh.connection_timeout'), config('constants.ssh.server_interval')); $delimiter = Hash::make($command); $delimiter = base64_encode($delimiter); $command = str_replace($delimiter, '', $command); $ssh_command .= "{$server->user}@{$server->ip} 'bash -se' << \\$delimiter".PHP_EOL .$command.PHP_EOL .$delimiter; return $ssh_command; } private static function isMultiplexingEnabled(): bool { return config('constants.ssh.mux_enabled') && ! config('constants.coolify.is_windows_docker_desktop'); } private static function validateSshKey(PrivateKey $privateKey): void { $keyLocation = $privateKey->getKeyLocation(); $checkKeyCommand = "ls $keyLocation 2>/dev/null"; $keyCheckProcess = Process::run($checkKeyCommand); if ($keyCheckProcess->exitCode() !== 0) { $privateKey->storeInFileSystem(); } } private static function getCommonSshOptions(Server $server, string $sshKeyLocation, int $connectionTimeout, int $serverInterval, bool $isScp = false): string { $options = "-i {$sshKeyLocation} " .'-o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null ' .'-o PasswordAuthentication=no ' ."-o ConnectTimeout=$connectionTimeout " ."-o ServerAliveInterval=$serverInterval " .'-o RequestTTY=no ' .'-o LogLevel=ERROR '; // Bruh if ($isScp) { $options .= "-P {$server->port} "; } else { $options .= "-p {$server->port} "; } return $options; } /** * Check if the multiplexed connection is healthy by running a test command */ public static function isConnectionHealthy(Server $server): bool { $sshConfig = self::serverSshConfiguration($server); $muxSocket = $sshConfig['muxFilename']; $healthCheckTimeout = config('constants.ssh.mux_health_check_timeout'); $healthCommand = "timeout $healthCheckTimeout ssh -o ControlMaster=auto -o ControlPath=$muxSocket "; if (data_get($server, 'settings.is_cloudflare_tunnel')) { $healthCommand .= '-o ProxyCommand="cloudflared access ssh --hostname %h" '; } $healthCommand .= "{$server->user}@{$server->ip} 'echo \"health_check_ok\"'"; $process = Process::run($healthCommand); $isHealthy = $process->exitCode() === 0 && str_contains($process->output(), 'health_check_ok'); return $isHealthy; } /** * Check if the connection has exceeded its maximum age */ public static function isConnectionExpired(Server $server): bool { $connectionAge = self::getConnectionAge($server); $maxAge = config('constants.ssh.mux_max_age'); return $connectionAge !== null && $connectionAge > $maxAge; } /** * Get the age of the current connection in seconds */ public static function getConnectionAge(Server $server): ?int { $cacheKey = "ssh_mux_connection_time_{$server->uuid}"; $connectionTime = Cache::get($cacheKey); if ($connectionTime === null) { return null; } return time() - $connectionTime; } /** * Refresh a multiplexed connection by closing and re-establishing it */ public static function refreshMultiplexedConnection(Server $server): bool { // Close existing connection self::removeMuxFile($server); // Establish new connection return self::establishNewMultiplexedConnection($server); } /** * Store connection metadata when a new connection is established */ private static function storeConnectionMetadata(Server $server): void { $cacheKey = "ssh_mux_connection_time_{$server->uuid}"; Cache::put($cacheKey, time(), config('constants.ssh.mux_persist_time') + 300); // Cache slightly longer than persist time } /** * Clear connection metadata from cache */ private static function clearConnectionMetadata(Server $server): void { $cacheKey = "ssh_mux_connection_time_{$server->uuid}"; Cache::forget($cacheKey); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Http/Kernel.php
app/Http/Kernel.php
<?php namespace App\Http; use Illuminate\Foundation\Http\Kernel as HttpKernel; class Kernel extends HttpKernel { /** * The application's global HTTP middleware stack. * * These middleware are run during every request to your application. * * @var array<int, class-string|string> */ protected $middleware = [ \App\Http\Middleware\TrustHosts::class, \App\Http\Middleware\TrustProxies::class, \Illuminate\Http\Middleware\HandleCors::class, \App\Http\Middleware\PreventRequestsDuringMaintenance::class, \Illuminate\Foundation\Http\Middleware\ValidatePostSize::class, \App\Http\Middleware\TrimStrings::class, \Illuminate\Foundation\Http\Middleware\ConvertEmptyStringsToNull::class, ]; /** * The application's route middleware groups. * * @var array<string, array<int, class-string|string>> */ protected $middlewareGroups = [ 'web' => [ \App\Http\Middleware\EncryptCookies::class, \Illuminate\Cookie\Middleware\AddQueuedCookiesToResponse::class, \Illuminate\Session\Middleware\StartSession::class, \Illuminate\View\Middleware\ShareErrorsFromSession::class, \App\Http\Middleware\VerifyCsrfToken::class, \Illuminate\Routing\Middleware\SubstituteBindings::class, \App\Http\Middleware\CheckForcePasswordReset::class, \App\Http\Middleware\DecideWhatToDoWithUser::class, ], 'api' => [ // \Laravel\Sanctum\Http\Middleware\EnsureFrontendRequestsAreStateful::class, \Illuminate\Routing\Middleware\ThrottleRequests::class.':api', \Illuminate\Routing\Middleware\SubstituteBindings::class, ], ]; /** * The application's middleware aliases. * * Aliases may be used to conveniently assign middleware to routes and groups. * * @var array<string, class-string|string> */ protected $middlewareAliases = [ 'auth' => \App\Http\Middleware\Authenticate::class, 'auth.basic' => \Illuminate\Auth\Middleware\AuthenticateWithBasicAuth::class, 'auth.session' => \Illuminate\Session\Middleware\AuthenticateSession::class, 'cache.headers' => \Illuminate\Http\Middleware\SetCacheHeaders::class, 'can' => \Illuminate\Auth\Middleware\Authorize::class, 'guest' => \App\Http\Middleware\RedirectIfAuthenticated::class, 'password.confirm' => \Illuminate\Auth\Middleware\RequirePassword::class, 'signed' => \App\Http\Middleware\ValidateSignature::class, 'throttle' => \Illuminate\Routing\Middleware\ThrottleRequests::class, 'verified' => \Illuminate\Auth\Middleware\EnsureEmailIsVerified::class, 'abilities' => \Laravel\Sanctum\Http\Middleware\CheckAbilities::class, 'ability' => \Laravel\Sanctum\Http\Middleware\CheckForAnyAbility::class, 'api.ability' => \App\Http\Middleware\ApiAbility::class, 'api.sensitive' => \App\Http\Middleware\ApiSensitiveData::class, 'can.create.resources' => \App\Http\Middleware\CanCreateResources::class, 'can.update.resource' => \App\Http\Middleware\CanUpdateResource::class, 'can.access.terminal' => \App\Http\Middleware\CanAccessTerminal::class, ]; }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Http/Controllers/OauthController.php
app/Http/Controllers/OauthController.php
<?php namespace App\Http\Controllers; use App\Models\User; use Illuminate\Support\Facades\Auth; use Symfony\Component\HttpKernel\Exception\HttpException; class OauthController extends Controller { public function redirect(string $provider) { $socialite_provider = get_socialite_provider($provider); return $socialite_provider->redirect(); } public function callback(string $provider) { try { $oauthUser = get_socialite_provider($provider)->user(); $user = User::whereEmail($oauthUser->email)->first(); if (! $user) { $settings = instanceSettings(); if (! $settings->is_registration_enabled) { abort(403, 'Registration is disabled'); } $user = User::create([ 'name' => $oauthUser->name, 'email' => $oauthUser->email, ]); } Auth::login($user); return redirect('/'); } catch (\Exception $e) { $errorCode = $e instanceof HttpException ? 'auth.failed' : 'auth.failed.callback'; return redirect()->route('login')->withErrors([__($errorCode)]); } } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Http/Controllers/Controller.php
app/Http/Controllers/Controller.php
<?php namespace App\Http\Controllers; use App\Events\TestEvent; use App\Models\TeamInvitation; use App\Models\User; use App\Providers\RouteServiceProvider; use Illuminate\Foundation\Auth\Access\AuthorizesRequests; use Illuminate\Foundation\Auth\EmailVerificationRequest; use Illuminate\Foundation\Validation\ValidatesRequests; use Illuminate\Http\Request; use Illuminate\Routing\Controller as BaseController; use Illuminate\Support\Facades\Auth; use Illuminate\Support\Facades\Crypt; use Illuminate\Support\Facades\Hash; use Illuminate\Support\Facades\Password; use Illuminate\Support\Str; use Laravel\Fortify\Contracts\FailedPasswordResetLinkRequestResponse; use Laravel\Fortify\Contracts\SuccessfulPasswordResetLinkRequestResponse; use Laravel\Fortify\Fortify; class Controller extends BaseController { use AuthorizesRequests, ValidatesRequests; public function realtime_test() { if (auth()->user()?->currentTeam()->id !== 0) { return redirect(RouteServiceProvider::HOME); } TestEvent::dispatch(); return 'Look at your other tab.'; } public function verify() { return view('auth.verify-email'); } public function email_verify(EmailVerificationRequest $request) { $request->fulfill(); return redirect(RouteServiceProvider::HOME); } public function forgot_password(Request $request) { if (is_transactional_emails_enabled()) { $arrayOfRequest = $request->only(Fortify::email()); $request->merge([ 'email' => Str::lower($arrayOfRequest['email']), ]); $type = set_transanctional_email_settings(); if (blank($type)) { return response()->json(['message' => 'Transactional emails are not active'], 400); } $request->validate([Fortify::email() => 'required|email']); $status = Password::broker(config('fortify.passwords'))->sendResetLink( $request->only(Fortify::email()) ); if ($status == Password::RESET_LINK_SENT) { return app(SuccessfulPasswordResetLinkRequestResponse::class, ['status' => $status]); } if ($status == Password::RESET_THROTTLED) { return response('Already requested a password reset in the past minutes.', 400); } return app(FailedPasswordResetLinkRequestResponse::class, ['status' => $status]); } return response()->json(['message' => 'Transactional emails are not active'], 400); } public function link() { $token = request()->get('token'); if ($token) { $decrypted = Crypt::decryptString($token); $email = str($decrypted)->before('@@@'); $password = str($decrypted)->after('@@@'); $user = User::whereEmail($email)->first(); if (! $user) { return redirect()->route('login'); } if (Hash::check($password, $user->password)) { $invitation = TeamInvitation::whereEmail($email); if ($invitation->exists()) { $team = $invitation->first()->team; $user->teams()->attach($team->id, ['role' => $invitation->first()->role]); $invitation->delete(); } else { $team = $user->teams()->first(); } if (is_null(data_get($user, 'email_verified_at'))) { $user->email_verified_at = now(); $user->save(); } Auth::login($user); session(['currentTeam' => $team]); return redirect()->route('dashboard'); } } return redirect()->route('login')->with('error', 'Invalid credentials.'); } public function acceptInvitation() { $resetPassword = request()->query('reset-password'); $invitationUuid = request()->route('uuid'); $invitation = TeamInvitation::whereUuid($invitationUuid)->firstOrFail(); $user = User::whereEmail($invitation->email)->firstOrFail(); if (Auth::id() !== $user->id) { abort(400, 'You are not allowed to accept this invitation.'); } $invitationValid = $invitation->isValid(); if ($invitationValid) { if ($resetPassword) { $user->update([ 'password' => Hash::make($invitationUuid), 'force_password_reset' => true, ]); } if ($user->teams()->where('team_id', $invitation->team->id)->exists()) { $invitation->delete(); return redirect()->route('team.index'); } $user->teams()->attach($invitation->team->id, ['role' => $invitation->role]); $invitation->delete(); refreshSession($invitation->team); return redirect()->route('team.index'); } else { abort(400, 'Invitation expired.'); } } public function revokeInvitation() { $invitation = TeamInvitation::whereUuid(request()->route('uuid'))->firstOrFail(); $user = User::whereEmail($invitation->email)->firstOrFail(); if (is_null(Auth::user())) { return redirect()->route('login'); } if (Auth::id() !== $user->id) { abort(401); } $invitation->delete(); return redirect()->route('team.index'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Http/Controllers/UploadController.php
app/Http/Controllers/UploadController.php
<?php namespace App\Http\Controllers; use Illuminate\Http\Request; use Illuminate\Http\UploadedFile; use Illuminate\Routing\Controller as BaseController; use Pion\Laravel\ChunkUpload\Exceptions\UploadMissingFileException; use Pion\Laravel\ChunkUpload\Handler\HandlerFactory; use Pion\Laravel\ChunkUpload\Receiver\FileReceiver; class UploadController extends BaseController { public function upload(Request $request) { $resource = getResourceByUuid(request()->route('databaseUuid'), data_get(auth()->user()->currentTeam(), 'id')); if (is_null($resource)) { return response()->json(['error' => 'You do not have permission for this database'], 500); } $receiver = new FileReceiver('file', $request, HandlerFactory::classFromRequest($request)); if ($receiver->isUploaded() === false) { throw new UploadMissingFileException; } $save = $receiver->receive(); if ($save->isFinished()) { return $this->saveFile($save->getFile(), $resource); } $handler = $save->handler(); return response()->json([ 'done' => $handler->getPercentageDone(), 'status' => true, ]); } // protected function saveFileToS3($file) // { // $fileName = $this->createFilename($file); // $disk = Storage::disk('s3'); // // It's better to use streaming Streaming (laravel 5.4+) // $disk->putFileAs('photos', $file, $fileName); // // for older laravel // // $disk->put($fileName, file_get_contents($file), 'public'); // $mime = str_replace('/', '-', $file->getMimeType()); // // We need to delete the file when uploaded to s3 // unlink($file->getPathname()); // return response()->json([ // 'path' => $disk->url($fileName), // 'name' => $fileName, // 'mime_type' => $mime // ]); // } protected function saveFile(UploadedFile $file, $resource) { $mime = str_replace('/', '-', $file->getMimeType()); $filePath = "upload/{$resource->uuid}"; $finalPath = storage_path('app/'.$filePath); $file->move($finalPath, 'restore'); return response()->json([ 'mime_type' => $mime, ]); } protected function createFilename(UploadedFile $file) { $extension = $file->getClientOriginalExtension(); $filename = str_replace('.'.$extension, '', $file->getClientOriginalName()); // Filename without extension $filename .= '_'.md5(time()).'.'.$extension; return $filename; } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Http/Controllers/Webhook/Gitea.php
app/Http/Controllers/Webhook/Gitea.php
<?php namespace App\Http\Controllers\Webhook; use App\Actions\Application\CleanupPreviewDeployment; use App\Http\Controllers\Controller; use App\Models\Application; use App\Models\ApplicationPreview; use Exception; use Illuminate\Http\Request; use Illuminate\Support\Str; use Visus\Cuid2\Cuid2; class Gitea extends Controller { public function manual(Request $request) { try { $return_payloads = collect([]); $x_gitea_delivery = request()->header('X-Gitea-Delivery'); $x_gitea_event = Str::lower($request->header('X-Gitea-Event')); $x_hub_signature_256 = Str::after($request->header('X-Hub-Signature-256'), 'sha256='); $content_type = $request->header('Content-Type'); $payload = $request->collect(); if ($x_gitea_event === 'ping') { // Just pong return response('pong'); } if ($content_type !== 'application/json') { $payload = json_decode(data_get($payload, 'payload'), true); } if ($x_gitea_event === 'push') { $branch = data_get($payload, 'ref'); $full_name = data_get($payload, 'repository.full_name'); if (Str::isMatch('/refs\/heads\/*/', $branch)) { $branch = Str::after($branch, 'refs/heads/'); } $added_files = data_get($payload, 'commits.*.added'); $removed_files = data_get($payload, 'commits.*.removed'); $modified_files = data_get($payload, 'commits.*.modified'); $changed_files = collect($added_files)->concat($removed_files)->concat($modified_files)->unique()->flatten(); } if ($x_gitea_event === 'pull_request') { $action = data_get($payload, 'action'); $full_name = data_get($payload, 'repository.full_name'); $pull_request_id = data_get($payload, 'number'); $pull_request_html_url = data_get($payload, 'pull_request.html_url'); $branch = data_get($payload, 'pull_request.head.ref'); $base_branch = data_get($payload, 'pull_request.base.ref'); } if (! $branch) { return response('Nothing to do. No branch found in the request.'); } $applications = Application::where('git_repository', 'like', "%$full_name%"); if ($x_gitea_event === 'push') { $applications = $applications->where('git_branch', $branch)->get(); if ($applications->isEmpty()) { return response("Nothing to do. No applications found with deploy key set, branch is '$branch' and Git Repository name has $full_name."); } } if ($x_gitea_event === 'pull_request') { $applications = $applications->where('git_branch', $base_branch)->get(); if ($applications->isEmpty()) { return response("Nothing to do. No applications found with branch '$base_branch'."); } } foreach ($applications as $application) { $webhook_secret = data_get($application, 'manual_webhook_secret_gitea'); $hmac = hash_hmac('sha256', $request->getContent(), $webhook_secret); if (! hash_equals($x_hub_signature_256, $hmac) && ! isDev()) { $return_payloads->push([ 'application' => $application->name, 'status' => 'failed', 'message' => 'Invalid signature.', ]); continue; } $isFunctional = $application->destination->server->isFunctional(); if (! $isFunctional) { $return_payloads->push([ 'application' => $application->name, 'status' => 'failed', 'message' => 'Server is not functional.', ]); continue; } if ($x_gitea_event === 'push') { if ($application->isDeployable()) { $is_watch_path_triggered = $application->isWatchPathsTriggered($changed_files); if ($is_watch_path_triggered || is_null($application->watch_paths)) { $deployment_uuid = new Cuid2; $result = queue_application_deployment( application: $application, deployment_uuid: $deployment_uuid, force_rebuild: false, commit: data_get($payload, 'after', 'HEAD'), is_webhook: true, ); if ($result['status'] === 'queue_full') { return response($result['message'], 429)->header('Retry-After', 60); } elseif ($result['status'] === 'skipped') { $return_payloads->push([ 'application' => $application->name, 'status' => 'skipped', 'message' => $result['message'], ]); } else { $return_payloads->push([ 'status' => 'success', 'message' => 'Deployment queued.', 'application_uuid' => $application->uuid, 'application_name' => $application->name, ]); } } else { $paths = str($application->watch_paths)->explode("\n"); $return_payloads->push([ 'status' => 'failed', 'message' => 'Changed files do not match watch paths. Ignoring deployment.', 'application_uuid' => $application->uuid, 'application_name' => $application->name, 'details' => [ 'changed_files' => $changed_files, 'watch_paths' => $paths, ], ]); } } else { $return_payloads->push([ 'status' => 'failed', 'message' => 'Deployments disabled.', 'application_uuid' => $application->uuid, 'application_name' => $application->name, ]); } } if ($x_gitea_event === 'pull_request') { if ($action === 'opened' || $action === 'synchronized' || $action === 'reopened') { if ($application->isPRDeployable()) { $deployment_uuid = new Cuid2; $found = ApplicationPreview::where('application_id', $application->id)->where('pull_request_id', $pull_request_id)->first(); if (! $found) { if ($application->build_pack === 'dockercompose') { $pr_app = ApplicationPreview::create([ 'git_type' => 'gitea', 'application_id' => $application->id, 'pull_request_id' => $pull_request_id, 'pull_request_html_url' => $pull_request_html_url, 'docker_compose_domains' => $application->docker_compose_domains, ]); $pr_app->generate_preview_fqdn_compose(); } else { $pr_app = ApplicationPreview::create([ 'git_type' => 'gitea', 'application_id' => $application->id, 'pull_request_id' => $pull_request_id, 'pull_request_html_url' => $pull_request_html_url, ]); $pr_app->generate_preview_fqdn(); } } $result = queue_application_deployment( application: $application, pull_request_id: $pull_request_id, deployment_uuid: $deployment_uuid, force_rebuild: false, commit: data_get($payload, 'head.sha', 'HEAD'), is_webhook: true, git_type: 'gitea' ); if ($result['status'] === 'queue_full') { return response($result['message'], 429)->header('Retry-After', 60); } elseif ($result['status'] === 'skipped') { $return_payloads->push([ 'application' => $application->name, 'status' => 'skipped', 'message' => $result['message'], ]); } else { $return_payloads->push([ 'application' => $application->name, 'status' => 'success', 'message' => 'Preview deployment queued.', ]); } } else { $return_payloads->push([ 'application' => $application->name, 'status' => 'failed', 'message' => 'Preview deployments disabled.', ]); } } if ($action === 'closed') { $found = ApplicationPreview::where('application_id', $application->id)->where('pull_request_id', $pull_request_id)->first(); if ($found) { // Use comprehensive cleanup that cancels active deployments, // kills helper containers, and removes all PR containers CleanupPreviewDeployment::run($application, $pull_request_id, $found); $return_payloads->push([ 'application' => $application->name, 'status' => 'success', 'message' => 'Preview deployment closed.', ]); } else { $return_payloads->push([ 'application' => $application->name, 'status' => 'failed', 'message' => 'No preview deployment found.', ]); } } } } return response($return_payloads); } catch (Exception $e) { return handleError($e); } } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Http/Controllers/Webhook/Bitbucket.php
app/Http/Controllers/Webhook/Bitbucket.php
<?php namespace App\Http\Controllers\Webhook; use App\Actions\Application\CleanupPreviewDeployment; use App\Http\Controllers\Controller; use App\Models\Application; use App\Models\ApplicationPreview; use Exception; use Illuminate\Http\Request; use Visus\Cuid2\Cuid2; class Bitbucket extends Controller { public function manual(Request $request) { try { $return_payloads = collect([]); $payload = $request->collect(); $headers = $request->headers->all(); $x_bitbucket_token = data_get($headers, 'x-hub-signature.0', ''); $x_bitbucket_event = data_get($headers, 'x-event-key.0', ''); $handled_events = collect(['repo:push', 'pullrequest:updated', 'pullrequest:created', 'pullrequest:rejected', 'pullrequest:fulfilled']); if (! $handled_events->contains($x_bitbucket_event)) { return response([ 'status' => 'failed', 'message' => 'Nothing to do. Event not handled.', ]); } if ($x_bitbucket_event === 'repo:push') { $branch = data_get($payload, 'push.changes.0.new.name'); $full_name = data_get($payload, 'repository.full_name'); $commit = data_get($payload, 'push.changes.0.new.target.hash'); if (! $branch) { return response([ 'status' => 'failed', 'message' => 'Nothing to do. No branch found in the request.', ]); } } if ($x_bitbucket_event === 'pullrequest:updated' || $x_bitbucket_event === 'pullrequest:created' || $x_bitbucket_event === 'pullrequest:rejected' || $x_bitbucket_event === 'pullrequest:fulfilled') { $branch = data_get($payload, 'pullrequest.destination.branch.name'); $base_branch = data_get($payload, 'pullrequest.source.branch.name'); $full_name = data_get($payload, 'repository.full_name'); $pull_request_id = data_get($payload, 'pullrequest.id'); $pull_request_html_url = data_get($payload, 'pullrequest.links.html.href'); $commit = data_get($payload, 'pullrequest.source.commit.hash'); } $applications = Application::where('git_repository', 'like', "%$full_name%"); $applications = $applications->where('git_branch', $branch)->get(); if ($applications->isEmpty()) { return response([ 'status' => 'failed', 'message' => "Nothing to do. No applications found with deploy key set, branch is '$branch' and Git Repository name has $full_name.", ]); } foreach ($applications as $application) { $webhook_secret = data_get($application, 'manual_webhook_secret_bitbucket'); $payload = $request->getContent(); [$algo, $hash] = explode('=', $x_bitbucket_token, 2); $payloadHash = hash_hmac($algo, $payload, $webhook_secret); if (! hash_equals($hash, $payloadHash) && ! isDev()) { $return_payloads->push([ 'application' => $application->name, 'status' => 'failed', 'message' => 'Invalid signature.', ]); continue; } $isFunctional = $application->destination->server->isFunctional(); if (! $isFunctional) { $return_payloads->push([ 'application' => $application->name, 'status' => 'failed', 'message' => 'Server is not functional.', ]); continue; } if ($x_bitbucket_event === 'repo:push') { if ($application->isDeployable()) { $deployment_uuid = new Cuid2; $result = queue_application_deployment( application: $application, deployment_uuid: $deployment_uuid, commit: $commit, force_rebuild: false, is_webhook: true ); if ($result['status'] === 'queue_full') { return response($result['message'], 429)->header('Retry-After', 60); } elseif ($result['status'] === 'skipped') { $return_payloads->push([ 'application' => $application->name, 'status' => 'skipped', 'message' => $result['message'], ]); } else { $return_payloads->push([ 'application' => $application->name, 'status' => 'success', 'message' => 'Deployment queued.', ]); } } else { $return_payloads->push([ 'application' => $application->name, 'status' => 'failed', 'message' => 'Auto deployment disabled.', ]); } } if ($x_bitbucket_event === 'pullrequest:created' || $x_bitbucket_event === 'pullrequest:updated') { if ($application->isPRDeployable()) { $deployment_uuid = new Cuid2; $found = ApplicationPreview::where('application_id', $application->id)->where('pull_request_id', $pull_request_id)->first(); if (! $found) { if ($application->build_pack === 'dockercompose') { $pr_app = ApplicationPreview::create([ 'git_type' => 'bitbucket', 'application_id' => $application->id, 'pull_request_id' => $pull_request_id, 'pull_request_html_url' => $pull_request_html_url, 'docker_compose_domains' => $application->docker_compose_domains, ]); $pr_app->generate_preview_fqdn_compose(); } else { $pr_app = ApplicationPreview::create([ 'git_type' => 'bitbucket', 'application_id' => $application->id, 'pull_request_id' => $pull_request_id, 'pull_request_html_url' => $pull_request_html_url, ]); $pr_app->generate_preview_fqdn(); } } $result = queue_application_deployment( application: $application, pull_request_id: $pull_request_id, deployment_uuid: $deployment_uuid, force_rebuild: false, commit: $commit, is_webhook: true, git_type: 'bitbucket' ); if ($result['status'] === 'queue_full') { return response($result['message'], 429)->header('Retry-After', 60); } elseif ($result['status'] === 'skipped') { $return_payloads->push([ 'application' => $application->name, 'status' => 'skipped', 'message' => $result['message'], ]); } else { $return_payloads->push([ 'application' => $application->name, 'status' => 'success', 'message' => 'Preview deployment queued.', ]); } } else { $return_payloads->push([ 'application' => $application->name, 'status' => 'failed', 'message' => 'Preview deployments disabled.', ]); } } if ($x_bitbucket_event === 'pullrequest:rejected' || $x_bitbucket_event === 'pullrequest:fulfilled') { $found = ApplicationPreview::where('application_id', $application->id)->where('pull_request_id', $pull_request_id)->first(); if ($found) { // Use comprehensive cleanup that cancels active deployments, // kills helper containers, and removes all PR containers CleanupPreviewDeployment::run($application, $pull_request_id, $found); $return_payloads->push([ 'application' => $application->name, 'status' => 'success', 'message' => 'Preview deployment closed.', ]); } else { $return_payloads->push([ 'application' => $application->name, 'status' => 'failed', 'message' => 'No preview deployment found.', ]); } } } return response($return_payloads); } catch (Exception $e) { return handleError($e); } } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Http/Controllers/Webhook/Stripe.php
app/Http/Controllers/Webhook/Stripe.php
<?php namespace App\Http\Controllers\Webhook; use App\Http\Controllers\Controller; use App\Jobs\StripeProcessJob; use Exception; use Illuminate\Http\Request; class Stripe extends Controller { public function events(Request $request) { try { $webhookSecret = config('subscription.stripe_webhook_secret'); $signature = $request->header('Stripe-Signature'); $event = \Stripe\Webhook::constructEvent( $request->getContent(), $signature, $webhookSecret ); StripeProcessJob::dispatch($event); return response('Webhook received. Cool cool cool cool cool.', 200); } catch (Exception $e) { return response($e->getMessage(), 400); } } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Http/Controllers/Webhook/Gitlab.php
app/Http/Controllers/Webhook/Gitlab.php
<?php namespace App\Http\Controllers\Webhook; use App\Actions\Application\CleanupPreviewDeployment; use App\Http\Controllers\Controller; use App\Models\Application; use App\Models\ApplicationPreview; use Exception; use Illuminate\Http\Request; use Illuminate\Support\Str; use Visus\Cuid2\Cuid2; class Gitlab extends Controller { public function manual(Request $request) { try { $return_payloads = collect([]); $payload = $request->collect(); $headers = $request->headers->all(); $x_gitlab_token = data_get($headers, 'x-gitlab-token.0'); $x_gitlab_event = data_get($payload, 'object_kind'); $allowed_events = ['push', 'merge_request']; if (! in_array($x_gitlab_event, $allowed_events)) { $return_payloads->push([ 'status' => 'failed', 'message' => 'Event not allowed. Only push and merge_request events are allowed.', ]); return response($return_payloads); } if (empty($x_gitlab_token)) { $return_payloads->push([ 'status' => 'failed', 'message' => 'Invalid signature.', ]); return response($return_payloads); } if ($x_gitlab_event === 'push') { $branch = data_get($payload, 'ref'); $full_name = data_get($payload, 'project.path_with_namespace'); if (Str::isMatch('/refs\/heads\/*/', $branch)) { $branch = Str::after($branch, 'refs/heads/'); } if (! $branch) { $return_payloads->push([ 'status' => 'failed', 'message' => 'Nothing to do. No branch found in the request.', ]); return response($return_payloads); } $added_files = data_get($payload, 'commits.*.added'); $removed_files = data_get($payload, 'commits.*.removed'); $modified_files = data_get($payload, 'commits.*.modified'); $changed_files = collect($added_files)->concat($removed_files)->concat($modified_files)->unique()->flatten(); } if ($x_gitlab_event === 'merge_request') { $action = data_get($payload, 'object_attributes.action'); $branch = data_get($payload, 'object_attributes.source_branch'); $base_branch = data_get($payload, 'object_attributes.target_branch'); $full_name = data_get($payload, 'project.path_with_namespace'); $pull_request_id = data_get($payload, 'object_attributes.iid'); $pull_request_html_url = data_get($payload, 'object_attributes.url'); if (! $branch) { $return_payloads->push([ 'status' => 'failed', 'message' => 'Nothing to do. No branch found in the request.', ]); return response($return_payloads); } } $applications = Application::where('git_repository', 'like', "%$full_name%"); if ($x_gitlab_event === 'push') { $applications = $applications->where('git_branch', $branch)->get(); if ($applications->isEmpty()) { $return_payloads->push([ 'status' => 'failed', 'message' => "Nothing to do. No applications found with deploy key set, branch is '$branch' and Git Repository name has $full_name.", ]); return response($return_payloads); } } if ($x_gitlab_event === 'merge_request') { $applications = $applications->where('git_branch', $base_branch)->get(); if ($applications->isEmpty()) { $return_payloads->push([ 'status' => 'failed', 'message' => "Nothing to do. No applications found with branch '$base_branch'.", ]); return response($return_payloads); } } foreach ($applications as $application) { $webhook_secret = data_get($application, 'manual_webhook_secret_gitlab'); if ($webhook_secret !== $x_gitlab_token) { $return_payloads->push([ 'application' => $application->name, 'status' => 'failed', 'message' => 'Invalid signature.', ]); continue; } $isFunctional = $application->destination->server->isFunctional(); if (! $isFunctional) { $return_payloads->push([ 'application' => $application->name, 'status' => 'failed', 'message' => 'Server is not functional', ]); continue; } if ($x_gitlab_event === 'push') { if ($application->isDeployable()) { $is_watch_path_triggered = $application->isWatchPathsTriggered($changed_files); if ($is_watch_path_triggered || is_null($application->watch_paths)) { $deployment_uuid = new Cuid2; $result = queue_application_deployment( application: $application, deployment_uuid: $deployment_uuid, commit: data_get($payload, 'after', 'HEAD'), force_rebuild: false, is_webhook: true, ); if ($result['status'] === 'queue_full') { return response($result['message'], 429)->header('Retry-After', 60); } elseif ($result['status'] === 'skipped') { $return_payloads->push([ 'status' => $result['status'], 'message' => $result['message'], 'application_uuid' => $application->uuid, 'application_name' => $application->name, ]); } else { $return_payloads->push([ 'status' => 'success', 'message' => 'Deployment queued.', 'application_uuid' => $application->uuid, 'application_name' => $application->name, ]); } } else { $paths = str($application->watch_paths)->explode("\n"); $return_payloads->push([ 'status' => 'failed', 'message' => 'Changed files do not match watch paths. Ignoring deployment.', 'application_uuid' => $application->uuid, 'application_name' => $application->name, 'details' => [ 'changed_files' => $changed_files, 'watch_paths' => $paths, ], ]); } } else { $return_payloads->push([ 'status' => 'failed', 'message' => 'Deployments disabled', 'application_uuid' => $application->uuid, 'application_name' => $application->name, ]); } } if ($x_gitlab_event === 'merge_request') { if ($action === 'open' || $action === 'opened' || $action === 'synchronize' || $action === 'reopened' || $action === 'reopen' || $action === 'update') { if ($application->isPRDeployable()) { $deployment_uuid = new Cuid2; $found = ApplicationPreview::where('application_id', $application->id)->where('pull_request_id', $pull_request_id)->first(); if (! $found) { if ($application->build_pack === 'dockercompose') { $pr_app = ApplicationPreview::create([ 'git_type' => 'gitlab', 'application_id' => $application->id, 'pull_request_id' => $pull_request_id, 'pull_request_html_url' => $pull_request_html_url, 'docker_compose_domains' => $application->docker_compose_domains, ]); $pr_app->generate_preview_fqdn_compose(); } else { $pr_app = ApplicationPreview::create([ 'git_type' => 'gitlab', 'application_id' => $application->id, 'pull_request_id' => $pull_request_id, 'pull_request_html_url' => $pull_request_html_url, ]); $pr_app->generate_preview_fqdn(); } } $result = queue_application_deployment( application: $application, pull_request_id: $pull_request_id, deployment_uuid: $deployment_uuid, commit: data_get($payload, 'object_attributes.last_commit.id', 'HEAD'), force_rebuild: false, is_webhook: true, git_type: 'gitlab' ); if ($result['status'] === 'queue_full') { return response($result['message'], 429)->header('Retry-After', 60); } elseif ($result['status'] === 'skipped') { $return_payloads->push([ 'application' => $application->name, 'status' => 'skipped', 'message' => $result['message'], ]); } else { $return_payloads->push([ 'application' => $application->name, 'status' => 'success', 'message' => 'Preview Deployment queued', ]); } } else { $return_payloads->push([ 'application' => $application->name, 'status' => 'failed', 'message' => 'Preview deployments disabled', ]); } } elseif ($action === 'closed' || $action === 'close' || $action === 'merge') { $found = ApplicationPreview::where('application_id', $application->id)->where('pull_request_id', $pull_request_id)->first(); if ($found) { // Use comprehensive cleanup that cancels active deployments, // kills helper containers, and removes all PR containers CleanupPreviewDeployment::run($application, $pull_request_id, $found); $return_payloads->push([ 'application' => $application->name, 'status' => 'success', 'message' => 'Preview deployment closed.', ]); } else { $return_payloads->push([ 'application' => $application->name, 'status' => 'failed', 'message' => 'No preview deployment found.', ]); } } else { $return_payloads->push([ 'application' => $application->name, 'status' => 'failed', 'message' => 'No action found. Contact us for debugging.', ]); } } } return response($return_payloads); } catch (Exception $e) { return handleError($e); } } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Http/Controllers/Webhook/Github.php
app/Http/Controllers/Webhook/Github.php
<?php namespace App\Http\Controllers\Webhook; use App\Actions\Application\CleanupPreviewDeployment; use App\Enums\ProcessStatus; use App\Http\Controllers\Controller; use App\Jobs\ApplicationPullRequestUpdateJob; use App\Jobs\GithubAppPermissionJob; use App\Models\Application; use App\Models\ApplicationPreview; use App\Models\GithubApp; use App\Models\PrivateKey; use Exception; use Illuminate\Http\Request; use Illuminate\Support\Facades\Http; use Illuminate\Support\Str; use Visus\Cuid2\Cuid2; class Github extends Controller { public function manual(Request $request) { try { $return_payloads = collect([]); $x_github_delivery = request()->header('X-GitHub-Delivery'); $x_github_event = Str::lower($request->header('X-GitHub-Event')); $x_hub_signature_256 = Str::after($request->header('X-Hub-Signature-256'), 'sha256='); $content_type = $request->header('Content-Type'); $payload = $request->collect(); if ($x_github_event === 'ping') { // Just pong return response('pong'); } if ($content_type !== 'application/json') { $payload = json_decode(data_get($payload, 'payload'), true); } if ($x_github_event === 'push') { $branch = data_get($payload, 'ref'); $full_name = data_get($payload, 'repository.full_name'); if (Str::isMatch('/refs\/heads\/*/', $branch)) { $branch = Str::after($branch, 'refs/heads/'); } $added_files = data_get($payload, 'commits.*.added'); $removed_files = data_get($payload, 'commits.*.removed'); $modified_files = data_get($payload, 'commits.*.modified'); $changed_files = collect($added_files)->concat($removed_files)->concat($modified_files)->unique()->flatten(); } if ($x_github_event === 'pull_request') { $action = data_get($payload, 'action'); $full_name = data_get($payload, 'repository.full_name'); $pull_request_id = data_get($payload, 'number'); $pull_request_html_url = data_get($payload, 'pull_request.html_url'); $branch = data_get($payload, 'pull_request.head.ref'); $base_branch = data_get($payload, 'pull_request.base.ref'); $author_association = data_get($payload, 'pull_request.author_association'); } if (! $branch) { return response('Nothing to do. No branch found in the request.'); } $applications = Application::where('git_repository', 'like', "%$full_name%"); if ($x_github_event === 'push') { $applications = $applications->where('git_branch', $branch)->get(); if ($applications->isEmpty()) { return response("Nothing to do. No applications found with deploy key set, branch is '$branch' and Git Repository name has $full_name."); } } if ($x_github_event === 'pull_request') { $applications = $applications->where('git_branch', $base_branch)->get(); if ($applications->isEmpty()) { return response("Nothing to do. No applications found with branch '$base_branch'."); } } $applicationsByServer = $applications->groupBy(function ($app) { return $app->destination->server_id; }); foreach ($applicationsByServer as $serverId => $serverApplications) { foreach ($serverApplications as $application) { $webhook_secret = data_get($application, 'manual_webhook_secret_github'); $hmac = hash_hmac('sha256', $request->getContent(), $webhook_secret); if (! hash_equals($x_hub_signature_256, $hmac) && ! isDev()) { $return_payloads->push([ 'application' => $application->name, 'status' => 'failed', 'message' => 'Invalid signature.', ]); continue; } $isFunctional = $application->destination->server->isFunctional(); if (! $isFunctional) { $return_payloads->push([ 'application' => $application->name, 'status' => 'failed', 'message' => 'Server is not functional.', ]); continue; } if ($x_github_event === 'push') { if ($application->isDeployable()) { $is_watch_path_triggered = $application->isWatchPathsTriggered($changed_files); if ($is_watch_path_triggered || is_null($application->watch_paths)) { $deployment_uuid = new Cuid2; $result = queue_application_deployment( application: $application, deployment_uuid: $deployment_uuid, force_rebuild: false, commit: data_get($payload, 'after', 'HEAD'), is_webhook: true, ); if ($result['status'] === 'queue_full') { return response($result['message'], 429)->header('Retry-After', 60); } elseif ($result['status'] === 'skipped') { $return_payloads->push([ 'application' => $application->name, 'status' => 'skipped', 'message' => $result['message'], ]); } else { $return_payloads->push([ 'application' => $application->name, 'status' => 'success', 'message' => 'Deployment queued.', 'application_uuid' => $application->uuid, 'application_name' => $application->name, 'deployment_uuid' => $result['deployment_uuid'], ]); } } else { $paths = str($application->watch_paths)->explode("\n"); $return_payloads->push([ 'status' => 'failed', 'message' => 'Changed files do not match watch paths. Ignoring deployment.', 'application_uuid' => $application->uuid, 'application_name' => $application->name, 'details' => [ 'changed_files' => $changed_files, 'watch_paths' => $paths, ], ]); } } else { $return_payloads->push([ 'status' => 'failed', 'message' => 'Deployments disabled.', 'application_uuid' => $application->uuid, 'application_name' => $application->name, ]); } } if ($x_github_event === 'pull_request') { if ($action === 'opened' || $action === 'synchronize' || $action === 'reopened') { if ($application->isPRDeployable()) { // Check if PR deployments from public contributors are restricted if (! $application->settings->is_pr_deployments_public_enabled) { $trustedAssociations = ['OWNER', 'MEMBER', 'COLLABORATOR', 'CONTRIBUTOR']; if (! in_array($author_association, $trustedAssociations)) { $return_payloads->push([ 'application' => $application->name, 'status' => 'failed', 'message' => 'PR deployments are restricted to repository members and contributors. Author association: '.$author_association, ]); continue; } } $deployment_uuid = new Cuid2; $found = ApplicationPreview::where('application_id', $application->id)->where('pull_request_id', $pull_request_id)->first(); if (! $found) { if ($application->build_pack === 'dockercompose') { $pr_app = ApplicationPreview::create([ 'git_type' => 'github', 'application_id' => $application->id, 'pull_request_id' => $pull_request_id, 'pull_request_html_url' => $pull_request_html_url, 'docker_compose_domains' => $application->docker_compose_domains, ]); $pr_app->generate_preview_fqdn_compose(); } else { $pr_app = ApplicationPreview::create([ 'git_type' => 'github', 'application_id' => $application->id, 'pull_request_id' => $pull_request_id, 'pull_request_html_url' => $pull_request_html_url, ]); $pr_app->generate_preview_fqdn(); } } $result = queue_application_deployment( application: $application, pull_request_id: $pull_request_id, deployment_uuid: $deployment_uuid, force_rebuild: false, commit: data_get($payload, 'head.sha', 'HEAD'), is_webhook: true, git_type: 'github' ); if ($result['status'] === 'queue_full') { return response($result['message'], 429)->header('Retry-After', 60); } elseif ($result['status'] === 'skipped') { $return_payloads->push([ 'application' => $application->name, 'status' => 'skipped', 'message' => $result['message'], ]); } else { $return_payloads->push([ 'application' => $application->name, 'status' => 'success', 'message' => 'Preview deployment queued.', ]); } } else { $return_payloads->push([ 'application' => $application->name, 'status' => 'failed', 'message' => 'Preview deployments disabled.', ]); } } if ($action === 'closed') { $found = ApplicationPreview::where('application_id', $application->id)->where('pull_request_id', $pull_request_id)->first(); if ($found) { // Use comprehensive cleanup that cancels active deployments, // kills helper containers, and removes all PR containers CleanupPreviewDeployment::run($application, $pull_request_id, $found); $return_payloads->push([ 'application' => $application->name, 'status' => 'success', 'message' => 'Preview deployment closed.', ]); } else { $return_payloads->push([ 'application' => $application->name, 'status' => 'failed', 'message' => 'No preview deployment found.', ]); } } } } } return response($return_payloads); } catch (Exception $e) { return handleError($e); } } public function normal(Request $request) { try { $return_payloads = collect([]); $id = null; $x_github_delivery = $request->header('X-GitHub-Delivery'); $x_github_event = Str::lower($request->header('X-GitHub-Event')); $x_github_hook_installation_target_id = $request->header('X-GitHub-Hook-Installation-Target-Id'); $x_hub_signature_256 = Str::after($request->header('X-Hub-Signature-256'), 'sha256='); $payload = $request->collect(); if ($x_github_event === 'ping') { // Just pong return response('pong'); } $github_app = GithubApp::where('app_id', $x_github_hook_installation_target_id)->first(); if (is_null($github_app)) { return response('Nothing to do. No GitHub App found.'); } $webhook_secret = data_get($github_app, 'webhook_secret'); $hmac = hash_hmac('sha256', $request->getContent(), $webhook_secret); if (config('app.env') !== 'local') { if (! hash_equals($x_hub_signature_256, $hmac)) { return response('Invalid signature.'); } } if ($x_github_event === 'installation' || $x_github_event === 'installation_repositories') { // Installation handled by setup redirect url. Repositories queried on-demand. $action = data_get($payload, 'action'); if ($action === 'new_permissions_accepted') { GithubAppPermissionJob::dispatch($github_app); } return response('cool'); } if ($x_github_event === 'push') { $id = data_get($payload, 'repository.id'); $branch = data_get($payload, 'ref'); if (Str::isMatch('/refs\/heads\/*/', $branch)) { $branch = Str::after($branch, 'refs/heads/'); } $added_files = data_get($payload, 'commits.*.added'); $removed_files = data_get($payload, 'commits.*.removed'); $modified_files = data_get($payload, 'commits.*.modified'); $changed_files = collect($added_files)->concat($removed_files)->concat($modified_files)->unique()->flatten(); } if ($x_github_event === 'pull_request') { $action = data_get($payload, 'action'); $id = data_get($payload, 'repository.id'); $pull_request_id = data_get($payload, 'number'); $pull_request_html_url = data_get($payload, 'pull_request.html_url'); $branch = data_get($payload, 'pull_request.head.ref'); $base_branch = data_get($payload, 'pull_request.base.ref'); $author_association = data_get($payload, 'pull_request.author_association'); } if (! $id || ! $branch) { return response('Nothing to do. No id or branch found.'); } $applications = Application::where('repository_project_id', $id) ->where('source_id', $github_app->id) ->whereRelation('source', 'is_public', false); if ($x_github_event === 'push') { $applications = $applications->where('git_branch', $branch)->get(); if ($applications->isEmpty()) { return response("Nothing to do. No applications found with branch '$branch'."); } } if ($x_github_event === 'pull_request') { $applications = $applications->where('git_branch', $base_branch)->get(); if ($applications->isEmpty()) { return response("Nothing to do. No applications found with branch '$base_branch'."); } } $applicationsByServer = $applications->groupBy(function ($app) { return $app->destination->server_id; }); foreach ($applicationsByServer as $serverId => $serverApplications) { foreach ($serverApplications as $application) { $isFunctional = $application->destination->server->isFunctional(); if (! $isFunctional) { $return_payloads->push([ 'status' => 'failed', 'message' => 'Server is not functional.', 'application_uuid' => $application->uuid, 'application_name' => $application->name, ]); continue; } if ($x_github_event === 'push') { if ($application->isDeployable()) { $is_watch_path_triggered = $application->isWatchPathsTriggered($changed_files); if ($is_watch_path_triggered || is_null($application->watch_paths)) { $deployment_uuid = new Cuid2; $result = queue_application_deployment( application: $application, deployment_uuid: $deployment_uuid, commit: data_get($payload, 'after', 'HEAD'), force_rebuild: false, is_webhook: true, ); if ($result['status'] === 'queue_full') { return response($result['message'], 429)->header('Retry-After', 60); } $return_payloads->push([ 'status' => $result['status'], 'message' => $result['message'], 'application_uuid' => $application->uuid, 'application_name' => $application->name, 'deployment_uuid' => $result['deployment_uuid'] ?? null, ]); } else { $paths = str($application->watch_paths)->explode("\n"); $return_payloads->push([ 'status' => 'failed', 'message' => 'Changed files do not match watch paths. Ignoring deployment.', 'application_uuid' => $application->uuid, 'application_name' => $application->name, 'details' => [ 'changed_files' => $changed_files, 'watch_paths' => $paths, ], ]); } } else { $return_payloads->push([ 'status' => 'failed', 'message' => 'Deployments disabled.', 'application_uuid' => $application->uuid, 'application_name' => $application->name, ]); } } if ($x_github_event === 'pull_request') { if ($action === 'opened' || $action === 'synchronize' || $action === 'reopened') { if ($application->isPRDeployable()) { // Check if PR deployments from public contributors are restricted if (! $application->settings->is_pr_deployments_public_enabled) { $trustedAssociations = ['OWNER', 'MEMBER', 'COLLABORATOR', 'CONTRIBUTOR']; if (! in_array($author_association, $trustedAssociations)) { $return_payloads->push([ 'application' => $application->name, 'status' => 'failed', 'message' => 'PR deployments are restricted to repository members and contributors. Author association: '.$author_association, ]); continue; } } $deployment_uuid = new Cuid2; $found = ApplicationPreview::where('application_id', $application->id)->where('pull_request_id', $pull_request_id)->first(); if (! $found) { ApplicationPreview::create([ 'git_type' => 'github', 'application_id' => $application->id, 'pull_request_id' => $pull_request_id, 'pull_request_html_url' => $pull_request_html_url, ]); } $result = queue_application_deployment( application: $application, pull_request_id: $pull_request_id, deployment_uuid: $deployment_uuid, force_rebuild: false, commit: data_get($payload, 'head.sha', 'HEAD'), is_webhook: true, git_type: 'github' ); if ($result['status'] === 'queue_full') { return response($result['message'], 429)->header('Retry-After', 60); } elseif ($result['status'] === 'skipped') { $return_payloads->push([ 'application' => $application->name, 'status' => 'skipped', 'message' => $result['message'], ]); } else { $return_payloads->push([ 'application' => $application->name, 'status' => 'success', 'message' => 'Preview deployment queued.', ]); } } else { $return_payloads->push([ 'application' => $application->name, 'status' => 'failed', 'message' => 'Preview deployments disabled.', ]); } } if ($action === 'closed' || $action === 'close') { $found = ApplicationPreview::where('application_id', $application->id)->where('pull_request_id', $pull_request_id)->first(); if ($found) { // Delete the PR comment on GitHub (GitHub-specific feature) ApplicationPullRequestUpdateJob::dispatchSync(application: $application, preview: $found, status: ProcessStatus::CLOSED); // Use comprehensive cleanup that cancels active deployments, // kills helper containers, and removes all PR containers CleanupPreviewDeployment::run($application, $pull_request_id, $found); $return_payloads->push([ 'application' => $application->name, 'status' => 'success', 'message' => 'Preview deployment closed.', ]); } else { $return_payloads->push([ 'application' => $application->name, 'status' => 'failed', 'message' => 'No preview deployment found.', ]); } } } } } return response($return_payloads); } catch (Exception $e) { return handleError($e); } } public function redirect(Request $request) { try { $code = $request->get('code'); $state = $request->get('state'); $github_app = GithubApp::where('uuid', $state)->firstOrFail(); $api_url = data_get($github_app, 'api_url'); $data = Http::withBody(null)->accept('application/vnd.github+json')->post("$api_url/app-manifests/$code/conversions")->throw()->json(); $id = data_get($data, 'id'); $slug = data_get($data, 'slug'); $client_id = data_get($data, 'client_id'); $client_secret = data_get($data, 'client_secret'); $private_key = data_get($data, 'pem'); $webhook_secret = data_get($data, 'webhook_secret'); $private_key = PrivateKey::create([ 'name' => "github-app-{$slug}", 'private_key' => $private_key, 'team_id' => $github_app->team_id, 'is_git_related' => true, ]); $github_app->name = $slug; $github_app->app_id = $id; $github_app->client_id = $client_id; $github_app->client_secret = $client_secret; $github_app->webhook_secret = $webhook_secret; $github_app->private_key_id = $private_key->id; $github_app->save(); return redirect()->route('source.github.show', ['github_app_uuid' => $github_app->uuid]); } catch (Exception $e) { return handleError($e); } } public function install(Request $request) { try { $installation_id = $request->get('installation_id'); $source = $request->get('source'); $setup_action = $request->get('setup_action'); $github_app = GithubApp::where('uuid', $source)->firstOrFail(); if ($setup_action === 'install') { $github_app->installation_id = $installation_id; $github_app->save(); } return redirect()->route('source.github.show', ['github_app_uuid' => $github_app->uuid]); } catch (Exception $e) { return handleError($e); } } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Http/Controllers/Api/ResourcesController.php
app/Http/Controllers/Api/ResourcesController.php
<?php namespace App\Http\Controllers\Api; use App\Http\Controllers\Controller; use App\Models\Project; use Illuminate\Http\Request; use OpenApi\Attributes as OA; class ResourcesController extends Controller { #[OA\Get( summary: 'List', description: 'Get all resources.', path: '/resources', operationId: 'list-resources', security: [ ['bearerAuth' => []], ], tags: ['Resources'], responses: [ new OA\Response( response: 200, description: 'Get all resources', content: new OA\JsonContent( type: 'string', example: 'Content is very complex. Will be implemented later.', ), ), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), ] )] public function resources(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } // General authorization check for viewing resources - using Project as base resource type $this->authorize('viewAny', Project::class); $projects = Project::where('team_id', $teamId)->get(); $resources = collect(); $resources->push($projects->pluck('applications')->flatten()); $resources->push($projects->pluck('services')->flatten()); foreach (collect(DATABASE_TYPES) as $db) { $resources->push($projects->pluck(str($db)->plural(2))->flatten()); } $resources = $resources->flatten(); $resources = $resources->map(function ($resource) { $payload = $resource->toArray(); $payload['status'] = $resource->status; $payload['type'] = $resource->type(); return $payload; }); return response()->json(serializeApiResponse($resources)); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Http/Controllers/Api/HetznerController.php
app/Http/Controllers/Api/HetznerController.php
<?php namespace App\Http\Controllers\Api; use App\Enums\ProxyTypes; use App\Exceptions\RateLimitException; use App\Http\Controllers\Controller; use App\Models\CloudProviderToken; use App\Models\PrivateKey; use App\Models\Server; use App\Models\Team; use App\Rules\ValidCloudInitYaml; use App\Rules\ValidHostname; use App\Services\HetznerService; use Illuminate\Http\Request; use OpenApi\Attributes as OA; class HetznerController extends Controller { /** * Get cloud provider token UUID from request. * Prefers cloud_provider_token_uuid over deprecated cloud_provider_token_id. */ private function getCloudProviderTokenUuid(Request $request): ?string { return $request->cloud_provider_token_uuid ?? $request->cloud_provider_token_id; } #[OA\Get( summary: 'Get Hetzner Locations', description: 'Get all available Hetzner datacenter locations.', path: '/hetzner/locations', operationId: 'get-hetzner-locations', security: [ ['bearerAuth' => []], ], tags: ['Hetzner'], parameters: [ new OA\Parameter( name: 'cloud_provider_token_uuid', in: 'query', required: false, description: 'Cloud provider token UUID. Required if cloud_provider_token_id is not provided.', schema: new OA\Schema(type: 'string') ), new OA\Parameter( name: 'cloud_provider_token_id', in: 'query', required: false, deprecated: true, description: 'Deprecated: Use cloud_provider_token_uuid instead. Cloud provider token UUID.', schema: new OA\Schema(type: 'string') ), ], responses: [ new OA\Response( response: 200, description: 'List of Hetzner locations.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'array', items: new OA\Items( type: 'object', properties: [ 'id' => ['type' => 'integer'], 'name' => ['type' => 'string'], 'description' => ['type' => 'string'], 'country' => ['type' => 'string'], 'city' => ['type' => 'string'], 'latitude' => ['type' => 'number'], 'longitude' => ['type' => 'number'], ] ) ) ), ]), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 404, ref: '#/components/responses/404', ), ] )] public function locations(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $validator = customApiValidator($request->all(), [ 'cloud_provider_token_uuid' => 'required_without:cloud_provider_token_id|string', 'cloud_provider_token_id' => 'required_without:cloud_provider_token_uuid|string', ]); if ($validator->fails()) { return response()->json([ 'message' => 'Validation failed.', 'errors' => $validator->errors(), ], 422); } $tokenUuid = $this->getCloudProviderTokenUuid($request); $token = CloudProviderToken::whereTeamId($teamId) ->whereUuid($tokenUuid) ->where('provider', 'hetzner') ->first(); if (! $token) { return response()->json(['message' => 'Hetzner cloud provider token not found.'], 404); } try { $hetznerService = new HetznerService($token->token); $locations = $hetznerService->getLocations(); return response()->json($locations); } catch (\Throwable $e) { return response()->json(['message' => 'Failed to fetch locations: '.$e->getMessage()], 500); } } #[OA\Get( summary: 'Get Hetzner Server Types', description: 'Get all available Hetzner server types (instance sizes).', path: '/hetzner/server-types', operationId: 'get-hetzner-server-types', security: [ ['bearerAuth' => []], ], tags: ['Hetzner'], parameters: [ new OA\Parameter( name: 'cloud_provider_token_uuid', in: 'query', required: false, description: 'Cloud provider token UUID. Required if cloud_provider_token_id is not provided.', schema: new OA\Schema(type: 'string') ), new OA\Parameter( name: 'cloud_provider_token_id', in: 'query', required: false, deprecated: true, description: 'Deprecated: Use cloud_provider_token_uuid instead. Cloud provider token UUID.', schema: new OA\Schema(type: 'string') ), ], responses: [ new OA\Response( response: 200, description: 'List of Hetzner server types.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'array', items: new OA\Items( type: 'object', properties: [ 'id' => ['type' => 'integer'], 'name' => ['type' => 'string'], 'description' => ['type' => 'string'], 'cores' => ['type' => 'integer'], 'memory' => ['type' => 'number'], 'disk' => ['type' => 'integer'], 'prices' => [ 'type' => 'array', 'items' => [ 'type' => 'object', 'properties' => [ 'location' => ['type' => 'string', 'description' => 'Datacenter location name'], 'price_hourly' => [ 'type' => 'object', 'properties' => [ 'net' => ['type' => 'string'], 'gross' => ['type' => 'string'], ], ], 'price_monthly' => [ 'type' => 'object', 'properties' => [ 'net' => ['type' => 'string'], 'gross' => ['type' => 'string'], ], ], ], ], ], ] ) ) ), ]), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 404, ref: '#/components/responses/404', ), ] )] public function serverTypes(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $validator = customApiValidator($request->all(), [ 'cloud_provider_token_uuid' => 'required_without:cloud_provider_token_id|string', 'cloud_provider_token_id' => 'required_without:cloud_provider_token_uuid|string', ]); if ($validator->fails()) { return response()->json([ 'message' => 'Validation failed.', 'errors' => $validator->errors(), ], 422); } $tokenUuid = $this->getCloudProviderTokenUuid($request); $token = CloudProviderToken::whereTeamId($teamId) ->whereUuid($tokenUuid) ->where('provider', 'hetzner') ->first(); if (! $token) { return response()->json(['message' => 'Hetzner cloud provider token not found.'], 404); } try { $hetznerService = new HetznerService($token->token); $serverTypes = $hetznerService->getServerTypes(); return response()->json($serverTypes); } catch (\Throwable $e) { return response()->json(['message' => 'Failed to fetch server types: '.$e->getMessage()], 500); } } #[OA\Get( summary: 'Get Hetzner Images', description: 'Get all available Hetzner system images (operating systems).', path: '/hetzner/images', operationId: 'get-hetzner-images', security: [ ['bearerAuth' => []], ], tags: ['Hetzner'], parameters: [ new OA\Parameter( name: 'cloud_provider_token_uuid', in: 'query', required: false, description: 'Cloud provider token UUID. Required if cloud_provider_token_id is not provided.', schema: new OA\Schema(type: 'string') ), new OA\Parameter( name: 'cloud_provider_token_id', in: 'query', required: false, deprecated: true, description: 'Deprecated: Use cloud_provider_token_uuid instead. Cloud provider token UUID.', schema: new OA\Schema(type: 'string') ), ], responses: [ new OA\Response( response: 200, description: 'List of Hetzner images.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'array', items: new OA\Items( type: 'object', properties: [ 'id' => ['type' => 'integer'], 'name' => ['type' => 'string'], 'description' => ['type' => 'string'], 'type' => ['type' => 'string'], 'os_flavor' => ['type' => 'string'], 'os_version' => ['type' => 'string'], 'architecture' => ['type' => 'string'], ] ) ) ), ]), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 404, ref: '#/components/responses/404', ), ] )] public function images(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $validator = customApiValidator($request->all(), [ 'cloud_provider_token_uuid' => 'required_without:cloud_provider_token_id|string', 'cloud_provider_token_id' => 'required_without:cloud_provider_token_uuid|string', ]); if ($validator->fails()) { return response()->json([ 'message' => 'Validation failed.', 'errors' => $validator->errors(), ], 422); } $tokenUuid = $this->getCloudProviderTokenUuid($request); $token = CloudProviderToken::whereTeamId($teamId) ->whereUuid($tokenUuid) ->where('provider', 'hetzner') ->first(); if (! $token) { return response()->json(['message' => 'Hetzner cloud provider token not found.'], 404); } try { $hetznerService = new HetznerService($token->token); $images = $hetznerService->getImages(); // Filter out deprecated images (same as UI) $filtered = array_filter($images, function ($image) { if (isset($image['type']) && $image['type'] !== 'system') { return false; } if (isset($image['deprecated']) && $image['deprecated'] === true) { return false; } return true; }); return response()->json(array_values($filtered)); } catch (\Throwable $e) { return response()->json(['message' => 'Failed to fetch images: '.$e->getMessage()], 500); } } #[OA\Get( summary: 'Get Hetzner SSH Keys', description: 'Get all SSH keys stored in the Hetzner account.', path: '/hetzner/ssh-keys', operationId: 'get-hetzner-ssh-keys', security: [ ['bearerAuth' => []], ], tags: ['Hetzner'], parameters: [ new OA\Parameter( name: 'cloud_provider_token_uuid', in: 'query', required: false, description: 'Cloud provider token UUID. Required if cloud_provider_token_id is not provided.', schema: new OA\Schema(type: 'string') ), new OA\Parameter( name: 'cloud_provider_token_id', in: 'query', required: false, deprecated: true, description: 'Deprecated: Use cloud_provider_token_uuid instead. Cloud provider token UUID.', schema: new OA\Schema(type: 'string') ), ], responses: [ new OA\Response( response: 200, description: 'List of Hetzner SSH keys.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'array', items: new OA\Items( type: 'object', properties: [ 'id' => ['type' => 'integer'], 'name' => ['type' => 'string'], 'fingerprint' => ['type' => 'string'], 'public_key' => ['type' => 'string'], ] ) ) ), ]), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 404, ref: '#/components/responses/404', ), ] )] public function sshKeys(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $validator = customApiValidator($request->all(), [ 'cloud_provider_token_uuid' => 'required_without:cloud_provider_token_id|string', 'cloud_provider_token_id' => 'required_without:cloud_provider_token_uuid|string', ]); if ($validator->fails()) { return response()->json([ 'message' => 'Validation failed.', 'errors' => $validator->errors(), ], 422); } $tokenUuid = $this->getCloudProviderTokenUuid($request); $token = CloudProviderToken::whereTeamId($teamId) ->whereUuid($tokenUuid) ->where('provider', 'hetzner') ->first(); if (! $token) { return response()->json(['message' => 'Hetzner cloud provider token not found.'], 404); } try { $hetznerService = new HetznerService($token->token); $sshKeys = $hetznerService->getSshKeys(); return response()->json($sshKeys); } catch (\Throwable $e) { return response()->json(['message' => 'Failed to fetch SSH keys: '.$e->getMessage()], 500); } } #[OA\Post( summary: 'Create Hetzner Server', description: 'Create a new server on Hetzner and register it in Coolify.', path: '/servers/hetzner', operationId: 'create-hetzner-server', security: [ ['bearerAuth' => []], ], tags: ['Hetzner'], requestBody: new OA\RequestBody( required: true, description: 'Hetzner server creation parameters', content: new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', required: ['location', 'server_type', 'image', 'private_key_uuid'], properties: [ 'cloud_provider_token_uuid' => ['type' => 'string', 'example' => 'abc123', 'description' => 'Cloud provider token UUID. Required if cloud_provider_token_id is not provided.'], 'cloud_provider_token_id' => ['type' => 'string', 'example' => 'abc123', 'description' => 'Deprecated: Use cloud_provider_token_uuid instead. Cloud provider token UUID.', 'deprecated' => true], 'location' => ['type' => 'string', 'example' => 'nbg1', 'description' => 'Hetzner location name'], 'server_type' => ['type' => 'string', 'example' => 'cx11', 'description' => 'Hetzner server type name'], 'image' => ['type' => 'integer', 'example' => 15512617, 'description' => 'Hetzner image ID'], 'name' => ['type' => 'string', 'example' => 'my-server', 'description' => 'Server name (auto-generated if not provided)'], 'private_key_uuid' => ['type' => 'string', 'example' => 'xyz789', 'description' => 'Private key UUID'], 'enable_ipv4' => ['type' => 'boolean', 'example' => true, 'description' => 'Enable IPv4 (default: true)'], 'enable_ipv6' => ['type' => 'boolean', 'example' => true, 'description' => 'Enable IPv6 (default: true)'], 'hetzner_ssh_key_ids' => ['type' => 'array', 'items' => ['type' => 'integer'], 'description' => 'Additional Hetzner SSH key IDs'], 'cloud_init_script' => ['type' => 'string', 'description' => 'Cloud-init YAML script (optional)'], 'instant_validate' => ['type' => 'boolean', 'example' => false, 'description' => 'Validate server immediately after creation'], ], ), ), ), responses: [ new OA\Response( response: 201, description: 'Hetzner server created.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'uuid' => ['type' => 'string', 'example' => 'og888os', 'description' => 'The UUID of the server.'], 'hetzner_server_id' => ['type' => 'integer', 'description' => 'The Hetzner server ID.'], 'ip' => ['type' => 'string', 'description' => 'The server IP address.'], ] ) ), ]), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), new OA\Response( response: 404, ref: '#/components/responses/404', ), new OA\Response( response: 422, ref: '#/components/responses/422', ), new OA\Response( response: 429, ref: '#/components/responses/429', ), ] )] public function createServer(Request $request) { $allowedFields = [ 'cloud_provider_token_uuid', 'cloud_provider_token_id', 'location', 'server_type', 'image', 'name', 'private_key_uuid', 'enable_ipv4', 'enable_ipv6', 'hetzner_ssh_key_ids', 'cloud_init_script', 'instant_validate', ]; $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $return = validateIncomingRequest($request); if ($return instanceof \Illuminate\Http\JsonResponse) { return $return; } $validator = customApiValidator($request->all(), [ 'cloud_provider_token_uuid' => 'required_without:cloud_provider_token_id|string', 'cloud_provider_token_id' => 'required_without:cloud_provider_token_uuid|string', 'location' => 'required|string', 'server_type' => 'required|string', 'image' => 'required|integer', 'name' => ['nullable', 'string', 'max:253', new ValidHostname], 'private_key_uuid' => 'required|string', 'enable_ipv4' => 'nullable|boolean', 'enable_ipv6' => 'nullable|boolean', 'hetzner_ssh_key_ids' => 'nullable|array', 'hetzner_ssh_key_ids.*' => 'integer', 'cloud_init_script' => ['nullable', 'string', new ValidCloudInitYaml], 'instant_validate' => 'nullable|boolean', ]); $extraFields = array_diff(array_keys($request->all()), $allowedFields); if ($validator->fails() || ! empty($extraFields)) { $errors = $validator->errors(); if (! empty($extraFields)) { foreach ($extraFields as $field) { $errors->add($field, 'This field is not allowed.'); } } return response()->json([ 'message' => 'Validation failed.', 'errors' => $errors, ], 422); } // Check server limit if (Team::serverLimitReached()) { return response()->json(['message' => 'Server limit reached for your subscription.'], 400); } // Set defaults if (! $request->name) { $request->offsetSet('name', generate_random_name()); } if (is_null($request->enable_ipv4)) { $request->offsetSet('enable_ipv4', true); } if (is_null($request->enable_ipv6)) { $request->offsetSet('enable_ipv6', true); } if (is_null($request->hetzner_ssh_key_ids)) { $request->offsetSet('hetzner_ssh_key_ids', []); } if (is_null($request->instant_validate)) { $request->offsetSet('instant_validate', false); } // Validate cloud provider token $tokenUuid = $this->getCloudProviderTokenUuid($request); $token = CloudProviderToken::whereTeamId($teamId) ->whereUuid($tokenUuid) ->where('provider', 'hetzner') ->first(); if (! $token) { return response()->json(['message' => 'Hetzner cloud provider token not found.'], 404); } // Validate private key $privateKey = PrivateKey::whereTeamId($teamId)->whereUuid($request->private_key_uuid)->first(); if (! $privateKey) { return response()->json(['message' => 'Private key not found.'], 404); } try { $hetznerService = new HetznerService($token->token); // Get public key and MD5 fingerprint $publicKey = $privateKey->getPublicKey(); $md5Fingerprint = PrivateKey::generateMd5Fingerprint($privateKey->private_key); // Check if SSH key already exists on Hetzner $existingSshKeys = $hetznerService->getSshKeys(); $existingKey = null; foreach ($existingSshKeys as $key) { if ($key['fingerprint'] === $md5Fingerprint) { $existingKey = $key; break; } } // Upload SSH key if it doesn't exist if ($existingKey) { $sshKeyId = $existingKey['id']; } else { $sshKeyName = $privateKey->name; $uploadedKey = $hetznerService->uploadSshKey($sshKeyName, $publicKey); $sshKeyId = $uploadedKey['id']; } // Normalize server name to lowercase for RFC 1123 compliance $normalizedServerName = strtolower(trim($request->name)); // Prepare SSH keys array: Coolify key + user-selected Hetzner keys $sshKeys = array_merge( [$sshKeyId], $request->hetzner_ssh_key_ids ); // Remove duplicates $sshKeys = array_unique($sshKeys); $sshKeys = array_values($sshKeys); // Prepare server creation parameters $params = [ 'name' => $normalizedServerName, 'server_type' => $request->server_type, 'image' => $request->image, 'location' => $request->location, 'start_after_create' => true, 'ssh_keys' => $sshKeys, 'public_net' => [ 'enable_ipv4' => $request->enable_ipv4, 'enable_ipv6' => $request->enable_ipv6, ], ]; // Add cloud-init script if provided if (! empty($request->cloud_init_script)) { $params['user_data'] = $request->cloud_init_script; } // Create server on Hetzner $hetznerServer = $hetznerService->createServer($params); // Determine IP address to use (prefer IPv4, fallback to IPv6) $ipAddress = null; if ($request->enable_ipv4 && isset($hetznerServer['public_net']['ipv4']['ip'])) { $ipAddress = $hetznerServer['public_net']['ipv4']['ip']; } elseif ($request->enable_ipv6 && isset($hetznerServer['public_net']['ipv6']['ip'])) { $ipAddress = $hetznerServer['public_net']['ipv6']['ip']; } if (! $ipAddress) { throw new \Exception('No public IP address available. Enable at least one of IPv4 or IPv6.'); } // Create server in Coolify database $server = Server::create([ 'name' => $normalizedServerName, 'ip' => $ipAddress, 'user' => 'root', 'port' => 22, 'team_id' => $teamId, 'private_key_id' => $privateKey->id, 'cloud_provider_token_id' => $token->id, 'hetzner_server_id' => $hetznerServer['id'], ]); $server->proxy->set('status', 'exited'); $server->proxy->set('type', ProxyTypes::TRAEFIK->value); $server->save(); // Validate server if requested if ($request->instant_validate) { \App\Actions\Server\ValidateServer::dispatch($server); } return response()->json([ 'uuid' => $server->uuid, 'hetzner_server_id' => $hetznerServer['id'], 'ip' => $ipAddress, ])->setStatusCode(201); } catch (RateLimitException $e) { $response = response()->json(['message' => $e->getMessage()], 429); if ($e->retryAfter !== null) { $response->header('Retry-After', $e->retryAfter); } return $response; } catch (\Throwable $e) { return response()->json(['message' => 'Failed to create server: '.$e->getMessage()], 500); } } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Http/Controllers/Api/DeployController.php
app/Http/Controllers/Api/DeployController.php
<?php namespace App\Http\Controllers\Api; use App\Actions\Database\StartDatabase; use App\Actions\Service\StartService; use App\Http\Controllers\Controller; use App\Models\Application; use App\Models\ApplicationDeploymentQueue; use App\Models\Server; use App\Models\Service; use App\Models\Tag; use Illuminate\Http\Request; use OpenApi\Attributes as OA; use Visus\Cuid2\Cuid2; class DeployController extends Controller { private function removeSensitiveData($deployment) { if (request()->attributes->get('can_read_sensitive', false) === false) { $deployment->makeHidden([ 'logs', ]); } return serializeApiResponse($deployment); } #[OA\Get( summary: 'List', description: 'List currently running deployments', path: '/deployments', operationId: 'list-deployments', security: [ ['bearerAuth' => []], ], tags: ['Deployments'], responses: [ new OA\Response( response: 200, description: 'Get all currently running deployments.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'array', items: new OA\Items(ref: '#/components/schemas/ApplicationDeploymentQueue'), ) ), ]), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), ] )] public function deployments(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $servers = Server::whereTeamId($teamId)->get(); $deployments_per_server = ApplicationDeploymentQueue::whereIn('status', ['in_progress', 'queued'])->whereIn('server_id', $servers->pluck('id'))->get()->sortBy('id'); $deployments_per_server = $deployments_per_server->map(function ($deployment) { return $this->removeSensitiveData($deployment); }); return response()->json($deployments_per_server); } #[OA\Get( summary: 'Get', description: 'Get deployment by UUID.', path: '/deployments/{uuid}', operationId: 'get-deployment-by-uuid', security: [ ['bearerAuth' => []], ], tags: ['Deployments'], parameters: [ new OA\Parameter(name: 'uuid', in: 'path', required: true, description: 'Deployment UUID', schema: new OA\Schema(type: 'string')), ], responses: [ new OA\Response( response: 200, description: 'Get deployment by UUID.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( ref: '#/components/schemas/ApplicationDeploymentQueue', ) ), ]), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), new OA\Response( response: 404, ref: '#/components/responses/404', ), ] )] public function deployment_by_uuid(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $uuid = $request->route('uuid'); if (! $uuid) { return response()->json(['message' => 'UUID is required.'], 400); } $deployment = ApplicationDeploymentQueue::where('deployment_uuid', $uuid)->first(); if (! $deployment) { return response()->json(['message' => 'Deployment not found.'], 404); } return response()->json($this->removeSensitiveData($deployment)); } #[OA\Post( summary: 'Cancel', description: 'Cancel a deployment by UUID.', path: '/deployments/{uuid}/cancel', operationId: 'cancel-deployment-by-uuid', security: [ ['bearerAuth' => []], ], tags: ['Deployments'], parameters: [ new OA\Parameter(name: 'uuid', in: 'path', required: true, description: 'Deployment UUID', schema: new OA\Schema(type: 'string')), ], responses: [ new OA\Response( response: 200, description: 'Deployment cancelled successfully.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'message' => ['type' => 'string', 'example' => 'Deployment cancelled successfully.'], 'deployment_uuid' => ['type' => 'string', 'example' => 'cm37r6cqj000008jm0veg5tkm'], 'status' => ['type' => 'string', 'example' => 'cancelled-by-user'], ] ) ), ]), new OA\Response( response: 400, description: 'Deployment cannot be cancelled (already finished/failed/cancelled).', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'message' => ['type' => 'string', 'example' => 'Deployment cannot be cancelled. Current status: finished'], ] ) ), ]), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 403, description: 'User doesn\'t have permission to cancel this deployment.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'message' => ['type' => 'string', 'example' => 'You do not have permission to cancel this deployment.'], ] ) ), ]), new OA\Response( response: 404, ref: '#/components/responses/404', ), ] )] public function cancel_deployment(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $uuid = $request->route('uuid'); if (! $uuid) { return response()->json(['message' => 'UUID is required.'], 400); } // Find the deployment by UUID $deployment = ApplicationDeploymentQueue::where('deployment_uuid', $uuid)->first(); if (! $deployment) { return response()->json(['message' => 'Deployment not found.'], 404); } // Check if the deployment belongs to the user's team $servers = Server::whereTeamId($teamId)->pluck('id'); if (! $servers->contains($deployment->server_id)) { return response()->json(['message' => 'You do not have permission to cancel this deployment.'], 403); } // Check if deployment can be cancelled (must be queued or in_progress) $cancellableStatuses = [ \App\Enums\ApplicationDeploymentStatus::QUEUED->value, \App\Enums\ApplicationDeploymentStatus::IN_PROGRESS->value, ]; if (! in_array($deployment->status, $cancellableStatuses)) { return response()->json([ 'message' => "Deployment cannot be cancelled. Current status: {$deployment->status}", ], 400); } // Perform the cancellation try { $deployment_uuid = $deployment->deployment_uuid; $kill_command = "docker rm -f {$deployment_uuid}"; $build_server_id = $deployment->build_server_id ?? $deployment->server_id; // Mark deployment as cancelled $deployment->update([ 'status' => \App\Enums\ApplicationDeploymentStatus::CANCELLED_BY_USER->value, ]); // Get the server $server = Server::find($build_server_id); if ($server) { // Add cancellation log entry $deployment->addLogEntry('Deployment cancelled by user via API.', 'stderr'); // Check if container exists and kill it $checkCommand = "docker ps -a --filter name={$deployment_uuid} --format '{{.Names}}'"; $containerExists = instant_remote_process([$checkCommand], $server); if ($containerExists && str($containerExists)->trim()->isNotEmpty()) { instant_remote_process([$kill_command], $server); $deployment->addLogEntry('Deployment container stopped.'); } else { $deployment->addLogEntry('Deployment container not yet started. Will be cancelled when job checks status.'); } // Kill running process if process ID exists if ($deployment->current_process_id) { try { $processKillCommand = "kill -9 {$deployment->current_process_id}"; instant_remote_process([$processKillCommand], $server); } catch (\Throwable $e) { // Process might already be gone } } } return response()->json([ 'message' => 'Deployment cancelled successfully.', 'deployment_uuid' => $deployment->deployment_uuid, 'status' => $deployment->status, ]); } catch (\Throwable $e) { return response()->json([ 'message' => 'Failed to cancel deployment: '.$e->getMessage(), ], 500); } } #[OA\Get( summary: 'Deploy', description: 'Deploy by tag or uuid. `Post` request also accepted with `uuid` and `tag` json body.', path: '/deploy', operationId: 'deploy-by-tag-or-uuid', security: [ ['bearerAuth' => []], ], tags: ['Deployments'], parameters: [ new OA\Parameter(name: 'tag', in: 'query', description: 'Tag name(s). Comma separated list is also accepted.', schema: new OA\Schema(type: 'string')), new OA\Parameter(name: 'uuid', in: 'query', description: 'Resource UUID(s). Comma separated list is also accepted.', schema: new OA\Schema(type: 'string')), new OA\Parameter(name: 'force', in: 'query', description: 'Force rebuild (without cache)', schema: new OA\Schema(type: 'boolean')), new OA\Parameter(name: 'pr', in: 'query', description: 'Pull Request Id for deploying specific PR builds. Cannot be used with tag parameter.', schema: new OA\Schema(type: 'integer')), ], responses: [ new OA\Response( response: 200, description: 'Get deployment(s) UUID\'s', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'deployments' => new OA\Property( property: 'deployments', type: 'array', items: new OA\Items( type: 'object', properties: [ 'message' => ['type' => 'string'], 'resource_uuid' => ['type' => 'string'], 'deployment_uuid' => ['type' => 'string'], ] ), ), ], ) ), ]), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), ] )] public function deploy(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $uuids = $request->input('uuid'); $tags = $request->input('tag'); $force = $request->input('force') ?? false; $pr = $request->input('pr') ? max((int) $request->input('pr'), 0) : 0; if ($uuids && $tags) { return response()->json(['message' => 'You can only use uuid or tag, not both.'], 400); } if ($tags && $pr) { return response()->json(['message' => 'You can only use tag or pr, not both.'], 400); } if ($tags) { return $this->by_tags($tags, $teamId, $force); } elseif ($uuids) { return $this->by_uuids($uuids, $teamId, $force, $pr); } return response()->json(['message' => 'You must provide uuid or tag.'], 400); } private function by_uuids(string $uuid, int $teamId, bool $force = false, int $pr = 0) { $uuids = explode(',', $uuid); $uuids = collect(array_filter($uuids)); if (count($uuids) === 0) { return response()->json(['message' => 'No UUIDs provided.'], 400); } $deployments = collect(); $payload = collect(); foreach ($uuids as $uuid) { $resource = getResourceByUuid($uuid, $teamId); if ($resource) { if ($pr !== 0) { $preview = $resource->previews()->where('pull_request_id', $pr)->first(); if (! $preview) { $deployments->push(['message' => "Pull request {$pr} not found for this resource.", 'resource_uuid' => $uuid]); continue; } } $result = $this->deploy_resource($resource, $force, $pr); if (isset($result['status']) && $result['status'] === 429) { return response()->json(['message' => $result['message']], 429)->header('Retry-After', 60); } ['message' => $return_message, 'deployment_uuid' => $deployment_uuid] = $result; if ($deployment_uuid) { $deployments->push(['message' => $return_message, 'resource_uuid' => $uuid, 'deployment_uuid' => $deployment_uuid->toString()]); } else { $deployments->push(['message' => $return_message, 'resource_uuid' => $uuid]); } } } if ($deployments->count() > 0) { $payload->put('deployments', $deployments->toArray()); return response()->json(serializeApiResponse($payload->toArray())); } return response()->json(['message' => 'No resources found.'], 404); } public function by_tags(string $tags, int $team_id, bool $force = false) { $tags = explode(',', $tags); $tags = collect(array_filter($tags)); if (count($tags) === 0) { return response()->json(['message' => 'No TAGs provided.'], 400); } $message = collect([]); $deployments = collect(); $payload = collect(); foreach ($tags as $tag) { $found_tag = Tag::where(['name' => $tag, 'team_id' => $team_id])->first(); if (! $found_tag) { // $message->push("Tag {$tag} not found."); continue; } $applications = $found_tag->applications()->get(); $services = $found_tag->services()->get(); if ($applications->count() === 0 && $services->count() === 0) { $message->push("No resources found for tag {$tag}."); continue; } foreach ($applications as $resource) { $result = $this->deploy_resource($resource, $force); if (isset($result['status']) && $result['status'] === 429) { return response()->json(['message' => $result['message']], 429)->header('Retry-After', 60); } ['message' => $return_message, 'deployment_uuid' => $deployment_uuid] = $result; if ($deployment_uuid) { $deployments->push(['resource_uuid' => $resource->uuid, 'deployment_uuid' => $deployment_uuid->toString()]); } $message = $message->merge($return_message); } foreach ($services as $resource) { ['message' => $return_message] = $this->deploy_resource($resource, $force); $message = $message->merge($return_message); } } if ($message->count() > 0) { $payload->put('message', $message->toArray()); if ($deployments->count() > 0) { $payload->put('details', $deployments->toArray()); } return response()->json(serializeApiResponse($payload->toArray())); } return response()->json(['message' => 'No resources found with this tag.'], 404); } public function deploy_resource($resource, bool $force = false, int $pr = 0): array { $message = null; $deployment_uuid = null; if (gettype($resource) !== 'object') { return ['message' => "Resource ($resource) not found.", 'deployment_uuid' => $deployment_uuid]; } switch ($resource?->getMorphClass()) { case Application::class: // Check authorization for application deployment try { $this->authorize('deploy', $resource); } catch (\Illuminate\Auth\Access\AuthorizationException $e) { return ['message' => 'Unauthorized to deploy this application.', 'deployment_uuid' => null]; } $deployment_uuid = new Cuid2; $result = queue_application_deployment( application: $resource, deployment_uuid: $deployment_uuid, force_rebuild: $force, pull_request_id: $pr, is_api: true, ); if ($result['status'] === 'queue_full') { return ['message' => $result['message'], 'deployment_uuid' => null, 'status' => 429]; } elseif ($result['status'] === 'skipped') { $message = $result['message']; } else { $message = "Application {$resource->name} deployment queued."; } break; case Service::class: // Check authorization for service deployment try { $this->authorize('deploy', $resource); } catch (\Illuminate\Auth\Access\AuthorizationException $e) { return ['message' => 'Unauthorized to deploy this service.', 'deployment_uuid' => null]; } StartService::run($resource); $message = "Service {$resource->name} started. It could take a while, be patient."; break; default: // Database resource - check authorization try { $this->authorize('manage', $resource); } catch (\Illuminate\Auth\Access\AuthorizationException $e) { return ['message' => 'Unauthorized to start this database.', 'deployment_uuid' => null]; } StartDatabase::dispatch($resource); $resource->started_at ??= now(); $resource->save(); $message = "Database {$resource->name} started."; break; } return ['message' => $message, 'deployment_uuid' => $deployment_uuid]; } #[OA\Get( summary: 'List application deployments', description: 'List application deployments by using the app uuid', path: '/deployments/applications/{uuid}', operationId: 'list-deployments-by-app-uuid', security: [ ['bearerAuth' => []], ], tags: ['Deployments'], parameters: [ new OA\Parameter( name: 'uuid', in: 'path', description: 'UUID of the application.', required: true, schema: new OA\Schema( type: 'string', format: 'uuid', ) ), new OA\Parameter( name: 'skip', in: 'query', description: 'Number of records to skip.', required: false, schema: new OA\Schema( type: 'integer', minimum: 0, default: 0, ) ), new OA\Parameter( name: 'take', in: 'query', description: 'Number of records to take.', required: false, schema: new OA\Schema( type: 'integer', minimum: 1, default: 10, ) ), ], responses: [ new OA\Response( response: 200, description: 'List application deployments by using the app uuid.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'array', items: new OA\Items(ref: '#/components/schemas/Application'), ) ), ]), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), ] )] public function get_application_deployments(Request $request) { $request->validate([ 'skip' => ['nullable', 'integer', 'min:0'], 'take' => ['nullable', 'integer', 'min:1'], ]); $app_uuid = $request->route('uuid', null); $skip = $request->get('skip', 0); $take = $request->get('take', 10); $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $servers = Server::whereTeamId($teamId)->get(); if (is_null($app_uuid)) { return response()->json(['message' => 'Application uuid is required'], 400); } $application = Application::ownedByCurrentTeamAPI($teamId)->where('uuid', $app_uuid)->first(); if (is_null($application)) { return response()->json(['message' => 'Application not found'], 404); } // Check authorization to view application deployments $this->authorize('view', $application); $deployments = $application->deployments($skip, $take); return response()->json($deployments); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Http/Controllers/Api/ApplicationsController.php
app/Http/Controllers/Api/ApplicationsController.php
<?php namespace App\Http\Controllers\Api; use App\Actions\Application\LoadComposeFile; use App\Actions\Application\StopApplication; use App\Actions\Service\StartService; use App\Enums\BuildPackTypes; use App\Http\Controllers\Controller; use App\Jobs\DeleteResourceJob; use App\Models\Application; use App\Models\EnvironmentVariable; use App\Models\GithubApp; use App\Models\PrivateKey; use App\Models\Project; use App\Models\Server; use App\Models\Service; use App\Rules\ValidGitBranch; use App\Rules\ValidGitRepositoryUrl; use App\Services\DockerImageParser; use Illuminate\Http\Request; use Illuminate\Validation\Rule; use OpenApi\Attributes as OA; use Spatie\Url\Url; use Symfony\Component\Yaml\Yaml; use Visus\Cuid2\Cuid2; class ApplicationsController extends Controller { private function removeSensitiveData($application) { $application->makeHidden([ 'id', 'resourceable', 'resourceable_id', 'resourceable_type', ]); if (request()->attributes->get('can_read_sensitive', false) === false) { $application->makeHidden([ 'custom_labels', 'dockerfile', 'docker_compose', 'docker_compose_raw', 'manual_webhook_secret_bitbucket', 'manual_webhook_secret_gitea', 'manual_webhook_secret_github', 'manual_webhook_secret_gitlab', 'private_key_id', 'value', 'real_value', 'http_basic_auth_password', ]); } return serializeApiResponse($application); } #[OA\Get( summary: 'List', description: 'List all applications.', path: '/applications', operationId: 'list-applications', security: [ ['bearerAuth' => []], ], tags: ['Applications'], responses: [ new OA\Response( response: 200, description: 'Get all applications.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'array', items: new OA\Items(ref: '#/components/schemas/Application') ) ), ] ), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), ] )] public function applications(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $projects = Project::where('team_id', $teamId)->get(); $applications = collect(); $applications->push($projects->pluck('applications')->flatten()); $applications = $applications->flatten(); $applications = $applications->map(function ($application) { return $this->removeSensitiveData($application); }); return response()->json($applications); } #[OA\Post( summary: 'Create (Public)', description: 'Create new application based on a public git repository.', path: '/applications/public', operationId: 'create-public-application', security: [ ['bearerAuth' => []], ], tags: ['Applications'], requestBody: new OA\RequestBody( description: 'Application object that needs to be created.', required: true, content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', required: ['project_uuid', 'server_uuid', 'environment_name', 'environment_uuid', 'git_repository', 'git_branch', 'build_pack', 'ports_exposes'], properties: [ 'project_uuid' => ['type' => 'string', 'description' => 'The project UUID.'], 'server_uuid' => ['type' => 'string', 'description' => 'The server UUID.'], 'environment_name' => ['type' => 'string', 'description' => 'The environment name. You need to provide at least one of environment_name or environment_uuid.'], 'environment_uuid' => ['type' => 'string', 'description' => 'The environment UUID. You need to provide at least one of environment_name or environment_uuid.'], 'git_repository' => ['type' => 'string', 'description' => 'The git repository URL.'], 'git_branch' => ['type' => 'string', 'description' => 'The git branch.'], 'build_pack' => ['type' => 'string', 'enum' => ['nixpacks', 'static', 'dockerfile', 'dockercompose'], 'description' => 'The build pack type.'], 'ports_exposes' => ['type' => 'string', 'description' => 'The ports to expose.'], 'destination_uuid' => ['type' => 'string', 'description' => 'The destination UUID.'], 'name' => ['type' => 'string', 'description' => 'The application name.'], 'description' => ['type' => 'string', 'description' => 'The application description.'], 'domains' => ['type' => 'string', 'description' => 'The application domains.'], 'git_commit_sha' => ['type' => 'string', 'description' => 'The git commit SHA.'], 'docker_registry_image_name' => ['type' => 'string', 'description' => 'The docker registry image name.'], 'docker_registry_image_tag' => ['type' => 'string', 'description' => 'The docker registry image tag.'], 'is_static' => ['type' => 'boolean', 'description' => 'The flag to indicate if the application is static.'], 'static_image' => ['type' => 'string', 'enum' => ['nginx:alpine'], 'description' => 'The static image.'], 'install_command' => ['type' => 'string', 'description' => 'The install command.'], 'build_command' => ['type' => 'string', 'description' => 'The build command.'], 'start_command' => ['type' => 'string', 'description' => 'The start command.'], 'ports_mappings' => ['type' => 'string', 'description' => 'The ports mappings.'], 'base_directory' => ['type' => 'string', 'description' => 'The base directory for all commands.'], 'publish_directory' => ['type' => 'string', 'description' => 'The publish directory.'], 'health_check_enabled' => ['type' => 'boolean', 'description' => 'Health check enabled.'], 'health_check_path' => ['type' => 'string', 'description' => 'Health check path.'], 'health_check_port' => ['type' => 'string', 'nullable' => true, 'description' => 'Health check port.'], 'health_check_host' => ['type' => 'string', 'nullable' => true, 'description' => 'Health check host.'], 'health_check_method' => ['type' => 'string', 'description' => 'Health check method.'], 'health_check_return_code' => ['type' => 'integer', 'description' => 'Health check return code.'], 'health_check_scheme' => ['type' => 'string', 'description' => 'Health check scheme.'], 'health_check_response_text' => ['type' => 'string', 'nullable' => true, 'description' => 'Health check response text.'], 'health_check_interval' => ['type' => 'integer', 'description' => 'Health check interval in seconds.'], 'health_check_timeout' => ['type' => 'integer', 'description' => 'Health check timeout in seconds.'], 'health_check_retries' => ['type' => 'integer', 'description' => 'Health check retries count.'], 'health_check_start_period' => ['type' => 'integer', 'description' => 'Health check start period in seconds.'], 'limits_memory' => ['type' => 'string', 'description' => 'Memory limit.'], 'limits_memory_swap' => ['type' => 'string', 'description' => 'Memory swap limit.'], 'limits_memory_swappiness' => ['type' => 'integer', 'description' => 'Memory swappiness.'], 'limits_memory_reservation' => ['type' => 'string', 'description' => 'Memory reservation.'], 'limits_cpus' => ['type' => 'string', 'description' => 'CPU limit.'], 'limits_cpuset' => ['type' => 'string', 'nullable' => true, 'description' => 'CPU set.'], 'limits_cpu_shares' => ['type' => 'integer', 'description' => 'CPU shares.'], 'custom_labels' => ['type' => 'string', 'description' => 'Custom labels.'], 'custom_docker_run_options' => ['type' => 'string', 'description' => 'Custom docker run options.'], 'post_deployment_command' => ['type' => 'string', 'description' => 'Post deployment command.'], 'post_deployment_command_container' => ['type' => 'string', 'description' => 'Post deployment command container.'], 'pre_deployment_command' => ['type' => 'string', 'description' => 'Pre deployment command.'], 'pre_deployment_command_container' => ['type' => 'string', 'description' => 'Pre deployment command container.'], 'manual_webhook_secret_github' => ['type' => 'string', 'description' => 'Manual webhook secret for Github.'], 'manual_webhook_secret_gitlab' => ['type' => 'string', 'description' => 'Manual webhook secret for Gitlab.'], 'manual_webhook_secret_bitbucket' => ['type' => 'string', 'description' => 'Manual webhook secret for Bitbucket.'], 'manual_webhook_secret_gitea' => ['type' => 'string', 'description' => 'Manual webhook secret for Gitea.'], 'redirect' => ['type' => 'string', 'nullable' => true, 'description' => 'How to set redirect with Traefik / Caddy. www<->non-www.', 'enum' => ['www', 'non-www', 'both']], // 'github_app_uuid' => ['type' => 'string', 'description' => 'The Github App UUID.'], 'instant_deploy' => ['type' => 'boolean', 'description' => 'The flag to indicate if the application should be deployed instantly.'], 'dockerfile' => ['type' => 'string', 'description' => 'The Dockerfile content.'], 'docker_compose_location' => ['type' => 'string', 'description' => 'The Docker Compose location.'], 'docker_compose_raw' => ['type' => 'string', 'description' => 'The Docker Compose raw content.'], 'docker_compose_custom_start_command' => ['type' => 'string', 'description' => 'The Docker Compose custom start command.'], 'docker_compose_custom_build_command' => ['type' => 'string', 'description' => 'The Docker Compose custom build command.'], 'docker_compose_domains' => ['type' => 'array', 'description' => 'The Docker Compose domains.'], 'watch_paths' => ['type' => 'string', 'description' => 'The watch paths.'], 'use_build_server' => ['type' => 'boolean', 'nullable' => true, 'description' => 'Use build server.'], 'is_http_basic_auth_enabled' => ['type' => 'boolean', 'description' => 'HTTP Basic Authentication enabled.'], 'http_basic_auth_username' => ['type' => 'string', 'nullable' => true, 'description' => 'Username for HTTP Basic Authentication'], 'http_basic_auth_password' => ['type' => 'string', 'nullable' => true, 'description' => 'Password for HTTP Basic Authentication'], 'connect_to_docker_network' => ['type' => 'boolean', 'description' => 'The flag to connect the service to the predefined Docker network.'], 'force_domain_override' => ['type' => 'boolean', 'description' => 'Force domain usage even if conflicts are detected. Default is false.'], 'autogenerate_domain' => ['type' => 'boolean', 'default' => true, 'description' => 'If true and domains is empty, auto-generate a domain using the server\'s wildcard domain or sslip.io fallback. Default: true.'], ], ) ), ] ), responses: [ new OA\Response( response: 201, description: 'Application created successfully.', content: new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'uuid' => ['type' => 'string'], ] ) ) ), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), new OA\Response( response: 409, description: 'Domain conflicts detected.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'message' => ['type' => 'string', 'example' => 'Domain conflicts detected. Use force_domain_override=true to proceed.'], 'warning' => ['type' => 'string', 'example' => 'Using the same domain for multiple resources can cause routing conflicts and unpredictable behavior.'], 'conflicts' => [ 'type' => 'array', 'items' => new OA\Schema( type: 'object', properties: [ 'domain' => ['type' => 'string', 'example' => 'example.com'], 'resource_name' => ['type' => 'string', 'example' => 'My Application'], 'resource_uuid' => ['type' => 'string', 'nullable' => true, 'example' => 'abc123-def456'], 'resource_type' => ['type' => 'string', 'enum' => ['application', 'service', 'instance'], 'example' => 'application'], 'message' => ['type' => 'string', 'example' => 'Domain example.com is already in use by application \'My Application\''], ] ), ], ] ) ), ] ), ] )] public function create_public_application(Request $request) { return $this->create_application($request, 'public'); } #[OA\Post( summary: 'Create (Private - GH App)', description: 'Create new application based on a private repository through a Github App.', path: '/applications/private-github-app', operationId: 'create-private-github-app-application', security: [ ['bearerAuth' => []], ], tags: ['Applications'], requestBody: new OA\RequestBody( description: 'Application object that needs to be created.', required: true, content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', required: ['project_uuid', 'server_uuid', 'environment_name', 'environment_uuid', 'github_app_uuid', 'git_repository', 'git_branch', 'build_pack', 'ports_exposes'], properties: [ 'project_uuid' => ['type' => 'string', 'description' => 'The project UUID.'], 'server_uuid' => ['type' => 'string', 'description' => 'The server UUID.'], 'environment_name' => ['type' => 'string', 'description' => 'The environment name. You need to provide at least one of environment_name or environment_uuid.'], 'environment_uuid' => ['type' => 'string', 'description' => 'The environment UUID. You need to provide at least one of environment_name or environment_uuid.'], 'github_app_uuid' => ['type' => 'string', 'description' => 'The Github App UUID.'], 'git_repository' => ['type' => 'string', 'description' => 'The git repository URL.'], 'git_branch' => ['type' => 'string', 'description' => 'The git branch.'], 'ports_exposes' => ['type' => 'string', 'description' => 'The ports to expose.'], 'destination_uuid' => ['type' => 'string', 'description' => 'The destination UUID.'], 'build_pack' => ['type' => 'string', 'enum' => ['nixpacks', 'static', 'dockerfile', 'dockercompose'], 'description' => 'The build pack type.'], 'name' => ['type' => 'string', 'description' => 'The application name.'], 'description' => ['type' => 'string', 'description' => 'The application description.'], 'domains' => ['type' => 'string', 'description' => 'The application domains.'], 'git_commit_sha' => ['type' => 'string', 'description' => 'The git commit SHA.'], 'docker_registry_image_name' => ['type' => 'string', 'description' => 'The docker registry image name.'], 'docker_registry_image_tag' => ['type' => 'string', 'description' => 'The docker registry image tag.'], 'is_static' => ['type' => 'boolean', 'description' => 'The flag to indicate if the application is static.'], 'static_image' => ['type' => 'string', 'enum' => ['nginx:alpine'], 'description' => 'The static image.'], 'install_command' => ['type' => 'string', 'description' => 'The install command.'], 'build_command' => ['type' => 'string', 'description' => 'The build command.'], 'start_command' => ['type' => 'string', 'description' => 'The start command.'], 'ports_mappings' => ['type' => 'string', 'description' => 'The ports mappings.'], 'base_directory' => ['type' => 'string', 'description' => 'The base directory for all commands.'], 'publish_directory' => ['type' => 'string', 'description' => 'The publish directory.'], 'health_check_enabled' => ['type' => 'boolean', 'description' => 'Health check enabled.'], 'health_check_path' => ['type' => 'string', 'description' => 'Health check path.'], 'health_check_port' => ['type' => 'string', 'nullable' => true, 'description' => 'Health check port.'], 'health_check_host' => ['type' => 'string', 'nullable' => true, 'description' => 'Health check host.'], 'health_check_method' => ['type' => 'string', 'description' => 'Health check method.'], 'health_check_return_code' => ['type' => 'integer', 'description' => 'Health check return code.'], 'health_check_scheme' => ['type' => 'string', 'description' => 'Health check scheme.'], 'health_check_response_text' => ['type' => 'string', 'nullable' => true, 'description' => 'Health check response text.'], 'health_check_interval' => ['type' => 'integer', 'description' => 'Health check interval in seconds.'], 'health_check_timeout' => ['type' => 'integer', 'description' => 'Health check timeout in seconds.'], 'health_check_retries' => ['type' => 'integer', 'description' => 'Health check retries count.'], 'health_check_start_period' => ['type' => 'integer', 'description' => 'Health check start period in seconds.'], 'limits_memory' => ['type' => 'string', 'description' => 'Memory limit.'], 'limits_memory_swap' => ['type' => 'string', 'description' => 'Memory swap limit.'], 'limits_memory_swappiness' => ['type' => 'integer', 'description' => 'Memory swappiness.'], 'limits_memory_reservation' => ['type' => 'string', 'description' => 'Memory reservation.'], 'limits_cpus' => ['type' => 'string', 'description' => 'CPU limit.'], 'limits_cpuset' => ['type' => 'string', 'nullable' => true, 'description' => 'CPU set.'], 'limits_cpu_shares' => ['type' => 'integer', 'description' => 'CPU shares.'], 'custom_labels' => ['type' => 'string', 'description' => 'Custom labels.'], 'custom_docker_run_options' => ['type' => 'string', 'description' => 'Custom docker run options.'], 'post_deployment_command' => ['type' => 'string', 'description' => 'Post deployment command.'], 'post_deployment_command_container' => ['type' => 'string', 'description' => 'Post deployment command container.'], 'pre_deployment_command' => ['type' => 'string', 'description' => 'Pre deployment command.'], 'pre_deployment_command_container' => ['type' => 'string', 'description' => 'Pre deployment command container.'], 'manual_webhook_secret_github' => ['type' => 'string', 'description' => 'Manual webhook secret for Github.'], 'manual_webhook_secret_gitlab' => ['type' => 'string', 'description' => 'Manual webhook secret for Gitlab.'], 'manual_webhook_secret_bitbucket' => ['type' => 'string', 'description' => 'Manual webhook secret for Bitbucket.'], 'manual_webhook_secret_gitea' => ['type' => 'string', 'description' => 'Manual webhook secret for Gitea.'], 'redirect' => ['type' => 'string', 'nullable' => true, 'description' => 'How to set redirect with Traefik / Caddy. www<->non-www.', 'enum' => ['www', 'non-www', 'both']], 'instant_deploy' => ['type' => 'boolean', 'description' => 'The flag to indicate if the application should be deployed instantly.'], 'dockerfile' => ['type' => 'string', 'description' => 'The Dockerfile content.'], 'docker_compose_location' => ['type' => 'string', 'description' => 'The Docker Compose location.'], 'docker_compose_raw' => ['type' => 'string', 'description' => 'The Docker Compose raw content.'], 'docker_compose_custom_start_command' => ['type' => 'string', 'description' => 'The Docker Compose custom start command.'], 'docker_compose_custom_build_command' => ['type' => 'string', 'description' => 'The Docker Compose custom build command.'], 'docker_compose_domains' => ['type' => 'array', 'description' => 'The Docker Compose domains.'], 'watch_paths' => ['type' => 'string', 'description' => 'The watch paths.'], 'use_build_server' => ['type' => 'boolean', 'nullable' => true, 'description' => 'Use build server.'], 'is_http_basic_auth_enabled' => ['type' => 'boolean', 'description' => 'HTTP Basic Authentication enabled.'], 'http_basic_auth_username' => ['type' => 'string', 'nullable' => true, 'description' => 'Username for HTTP Basic Authentication'], 'http_basic_auth_password' => ['type' => 'string', 'nullable' => true, 'description' => 'Password for HTTP Basic Authentication'], 'connect_to_docker_network' => ['type' => 'boolean', 'description' => 'The flag to connect the service to the predefined Docker network.'], 'force_domain_override' => ['type' => 'boolean', 'description' => 'Force domain usage even if conflicts are detected. Default is false.'], 'autogenerate_domain' => ['type' => 'boolean', 'default' => true, 'description' => 'If true and domains is empty, auto-generate a domain using the server\'s wildcard domain or sslip.io fallback. Default: true.'], ], ) ), ] ), responses: [ new OA\Response( response: 201, description: 'Application created successfully.', content: new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'uuid' => ['type' => 'string'], ] ) ) ), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), new OA\Response( response: 409, description: 'Domain conflicts detected.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'message' => ['type' => 'string', 'example' => 'Domain conflicts detected. Use force_domain_override=true to proceed.'], 'warning' => ['type' => 'string', 'example' => 'Using the same domain for multiple resources can cause routing conflicts and unpredictable behavior.'], 'conflicts' => [ 'type' => 'array', 'items' => new OA\Schema( type: 'object', properties: [ 'domain' => ['type' => 'string', 'example' => 'example.com'], 'resource_name' => ['type' => 'string', 'example' => 'My Application'], 'resource_uuid' => ['type' => 'string', 'nullable' => true, 'example' => 'abc123-def456'], 'resource_type' => ['type' => 'string', 'enum' => ['application', 'service', 'instance'], 'example' => 'application'], 'message' => ['type' => 'string', 'example' => 'Domain example.com is already in use by application \'My Application\''], ] ), ], ] ) ), ] ), ] )] public function create_private_gh_app_application(Request $request) { return $this->create_application($request, 'private-gh-app'); } #[OA\Post( summary: 'Create (Private - Deploy Key)', description: 'Create new application based on a private repository through a Deploy Key.', path: '/applications/private-deploy-key', operationId: 'create-private-deploy-key-application', security: [ ['bearerAuth' => []], ], tags: ['Applications'], requestBody: new OA\RequestBody( description: 'Application object that needs to be created.', required: true, content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', required: ['project_uuid', 'server_uuid', 'environment_name', 'environment_uuid', 'private_key_uuid', 'git_repository', 'git_branch', 'build_pack', 'ports_exposes'], properties: [ 'project_uuid' => ['type' => 'string', 'description' => 'The project UUID.'], 'server_uuid' => ['type' => 'string', 'description' => 'The server UUID.'], 'environment_name' => ['type' => 'string', 'description' => 'The environment name. You need to provide at least one of environment_name or environment_uuid.'], 'environment_uuid' => ['type' => 'string', 'description' => 'The environment UUID. You need to provide at least one of environment_name or environment_uuid.'], 'private_key_uuid' => ['type' => 'string', 'description' => 'The private key UUID.'], 'git_repository' => ['type' => 'string', 'description' => 'The git repository URL.'], 'git_branch' => ['type' => 'string', 'description' => 'The git branch.'], 'ports_exposes' => ['type' => 'string', 'description' => 'The ports to expose.'], 'destination_uuid' => ['type' => 'string', 'description' => 'The destination UUID.'], 'build_pack' => ['type' => 'string', 'enum' => ['nixpacks', 'static', 'dockerfile', 'dockercompose'], 'description' => 'The build pack type.'], 'name' => ['type' => 'string', 'description' => 'The application name.'], 'description' => ['type' => 'string', 'description' => 'The application description.'], 'domains' => ['type' => 'string', 'description' => 'The application domains.'], 'git_commit_sha' => ['type' => 'string', 'description' => 'The git commit SHA.'], 'docker_registry_image_name' => ['type' => 'string', 'description' => 'The docker registry image name.'], 'docker_registry_image_tag' => ['type' => 'string', 'description' => 'The docker registry image tag.'], 'is_static' => ['type' => 'boolean', 'description' => 'The flag to indicate if the application is static.'], 'static_image' => ['type' => 'string', 'enum' => ['nginx:alpine'], 'description' => 'The static image.'], 'install_command' => ['type' => 'string', 'description' => 'The install command.'], 'build_command' => ['type' => 'string', 'description' => 'The build command.'], 'start_command' => ['type' => 'string', 'description' => 'The start command.'], 'ports_mappings' => ['type' => 'string', 'description' => 'The ports mappings.'], 'base_directory' => ['type' => 'string', 'description' => 'The base directory for all commands.'],
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
true
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Http/Controllers/Api/OtherController.php
app/Http/Controllers/Api/OtherController.php
<?php namespace App\Http\Controllers\Api; use App\Http\Controllers\Controller; use Illuminate\Http\Request; use Illuminate\Support\Facades\Http; use OpenApi\Attributes as OA; class OtherController extends Controller { #[OA\Get( summary: 'Version', description: 'Get Coolify version.', path: '/version', operationId: 'version', security: [ ['bearerAuth' => []], ], responses: [ new OA\Response( response: 200, description: 'Returns the version of the application', content: new OA\MediaType( mediaType: 'text/html', schema: new OA\Schema(type: 'string'), example: 'v4.0.0', )), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), ] )] public function version(Request $request) { return response(config('constants.coolify.version')); } #[OA\Get( summary: 'Enable API', description: 'Enable API (only with root permissions).', path: '/enable', operationId: 'enable-api', security: [ ['bearerAuth' => []], ], responses: [ new OA\Response( response: 200, description: 'Enable API.', content: new OA\JsonContent( type: 'object', properties: [ new OA\Property(property: 'message', type: 'string', example: 'API enabled.'), ] )), new OA\Response( response: 403, description: 'You are not allowed to enable the API.', content: new OA\JsonContent( type: 'object', properties: [ new OA\Property(property: 'message', type: 'string', example: 'You are not allowed to enable the API.'), ] )), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), ] )] public function enable_api(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } if ($teamId !== '0') { return response()->json(['message' => 'You are not allowed to enable the API.'], 403); } $settings = instanceSettings(); $settings->update(['is_api_enabled' => true]); return response()->json(['message' => 'API enabled.'], 200); } #[OA\Get( summary: 'Disable API', description: 'Disable API (only with root permissions).', path: '/disable', operationId: 'disable-api', security: [ ['bearerAuth' => []], ], responses: [ new OA\Response( response: 200, description: 'Disable API.', content: new OA\JsonContent( type: 'object', properties: [ new OA\Property(property: 'message', type: 'string', example: 'API disabled.'), ] )), new OA\Response( response: 403, description: 'You are not allowed to disable the API.', content: new OA\JsonContent( type: 'object', properties: [ new OA\Property(property: 'message', type: 'string', example: 'You are not allowed to disable the API.'), ] )), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), ] )] public function disable_api(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } if ($teamId !== '0') { return response()->json(['message' => 'You are not allowed to disable the API.'], 403); } $settings = instanceSettings(); $settings->update(['is_api_enabled' => false]); return response()->json(['message' => 'API disabled.'], 200); } public function feedback(Request $request) { $content = $request->input('content'); $webhook_url = config('constants.webhooks.feedback_discord_webhook'); if ($webhook_url) { Http::post($webhook_url, [ 'content' => $content, ]); } return response()->json(['message' => 'Feedback sent.'], 200); } #[OA\Get( summary: 'Healthcheck', description: 'Healthcheck endpoint.', path: '/health', operationId: 'healthcheck', responses: [ new OA\Response( response: 200, description: 'Healthcheck endpoint.', content: new OA\MediaType( mediaType: 'text/html', schema: new OA\Schema(type: 'string'), example: 'OK', )), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), ] )] public function healthcheck(Request $request) { return 'OK'; } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Http/Controllers/Api/DatabasesController.php
app/Http/Controllers/Api/DatabasesController.php
<?php namespace App\Http\Controllers\Api; use App\Actions\Database\RestartDatabase; use App\Actions\Database\StartDatabase; use App\Actions\Database\StartDatabaseProxy; use App\Actions\Database\StopDatabase; use App\Actions\Database\StopDatabaseProxy; use App\Enums\NewDatabaseTypes; use App\Http\Controllers\Controller; use App\Jobs\DatabaseBackupJob; use App\Jobs\DeleteResourceJob; use App\Models\Project; use App\Models\S3Storage; use App\Models\ScheduledDatabaseBackup; use App\Models\Server; use App\Models\StandalonePostgresql; use Illuminate\Http\Request; use Illuminate\Support\Facades\DB; use OpenApi\Attributes as OA; class DatabasesController extends Controller { private function removeSensitiveData($database) { $database->makeHidden([ 'id', 'laravel_through_key', ]); if (request()->attributes->get('can_read_sensitive', false) === false) { $database->makeHidden([ 'internal_db_url', 'external_db_url', 'postgres_password', 'dragonfly_password', 'redis_password', 'mongo_initdb_root_password', 'keydb_password', 'clickhouse_admin_password', ]); } return serializeApiResponse($database); } #[OA\Get( summary: 'List', description: 'List all databases.', path: '/databases', operationId: 'list-databases', security: [ ['bearerAuth' => []], ], tags: ['Databases'], responses: [ new OA\Response( response: 200, description: 'Get all databases', content: new OA\JsonContent( type: 'string', example: 'Content is very complex. Will be implemented later.', ), ), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), ] )] public function databases(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $projects = Project::where('team_id', $teamId)->get(); $databases = collect(); foreach ($projects as $project) { $databases = $databases->merge($project->databases()); } $databaseIds = $databases->pluck('id')->toArray(); $backupConfigs = ScheduledDatabaseBackup::ownedByCurrentTeamAPI($teamId)->with('latest_log') ->whereIn('database_id', $databaseIds) ->get() ->groupBy('database_id'); $databases = $databases->map(function ($database) use ($backupConfigs) { $database->backup_configs = $backupConfigs->get($database->id, collect())->values(); return $this->removeSensitiveData($database); }); return response()->json($databases); } #[OA\Get( summary: 'Get', description: 'Get backups details by database UUID.', path: '/databases/{uuid}/backups', operationId: 'get-database-backups-by-uuid', security: [ ['bearerAuth' => []], ], tags: ['Databases'], parameters: [ new OA\Parameter( name: 'uuid', in: 'path', description: 'UUID of the database.', required: true, schema: new OA\Schema( type: 'string', format: 'uuid', ) ), ], responses: [ new OA\Response( response: 200, description: 'Get all backups for a database', content: new OA\JsonContent( type: 'string', example: 'Content is very complex. Will be implemented later.', ), ), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), new OA\Response( response: 404, ref: '#/components/responses/404', ), ] )] public function database_backup_details_uuid(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } if (! $request->uuid) { return response()->json(['message' => 'UUID is required.'], 404); } $database = queryDatabaseByUuidWithinTeam($request->uuid, $teamId); if (! $database) { return response()->json(['message' => 'Database not found.'], 404); } $this->authorize('view', $database); $backupConfig = ScheduledDatabaseBackup::ownedByCurrentTeamAPI($teamId)->with('executions')->where('database_id', $database->id)->get(); return response()->json($backupConfig); } #[OA\Get( summary: 'Get', description: 'Get database by UUID.', path: '/databases/{uuid}', operationId: 'get-database-by-uuid', security: [ ['bearerAuth' => []], ], tags: ['Databases'], parameters: [ new OA\Parameter( name: 'uuid', in: 'path', description: 'UUID of the database.', required: true, schema: new OA\Schema( type: 'string', format: 'uuid', ) ), ], responses: [ new OA\Response( response: 200, description: 'Get all databases', content: new OA\JsonContent( type: 'string', example: 'Content is very complex. Will be implemented later.', ), ), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), new OA\Response( response: 404, ref: '#/components/responses/404', ), ] )] public function database_by_uuid(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } if (! $request->uuid) { return response()->json(['message' => 'UUID is required.'], 404); } $database = queryDatabaseByUuidWithinTeam($request->uuid, $teamId); if (! $database) { return response()->json(['message' => 'Database not found.'], 404); } $this->authorize('view', $database); return response()->json($this->removeSensitiveData($database)); } #[OA\Patch( summary: 'Update', description: 'Update database by UUID.', path: '/databases/{uuid}', operationId: 'update-database-by-uuid', security: [ ['bearerAuth' => []], ], tags: ['Databases'], parameters: [ new OA\Parameter( name: 'uuid', in: 'path', description: 'UUID of the database.', required: true, schema: new OA\Schema( type: 'string', format: 'uuid', ) ), ], requestBody: new OA\RequestBody( description: 'Database data', required: true, content: new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'name' => ['type' => 'string', 'description' => 'Name of the database'], 'description' => ['type' => 'string', 'description' => 'Description of the database'], 'image' => ['type' => 'string', 'description' => 'Docker Image of the database'], 'is_public' => ['type' => 'boolean', 'description' => 'Is the database public?'], 'public_port' => ['type' => 'integer', 'description' => 'Public port of the database'], 'limits_memory' => ['type' => 'string', 'description' => 'Memory limit of the database'], 'limits_memory_swap' => ['type' => 'string', 'description' => 'Memory swap limit of the database'], 'limits_memory_swappiness' => ['type' => 'integer', 'description' => 'Memory swappiness of the database'], 'limits_memory_reservation' => ['type' => 'string', 'description' => 'Memory reservation of the database'], 'limits_cpus' => ['type' => 'string', 'description' => 'CPU limit of the database'], 'limits_cpuset' => ['type' => 'string', 'description' => 'CPU set of the database'], 'limits_cpu_shares' => ['type' => 'integer', 'description' => 'CPU shares of the database'], 'postgres_user' => ['type' => 'string', 'description' => 'PostgreSQL user'], 'postgres_password' => ['type' => 'string', 'description' => 'PostgreSQL password'], 'postgres_db' => ['type' => 'string', 'description' => 'PostgreSQL database'], 'postgres_initdb_args' => ['type' => 'string', 'description' => 'PostgreSQL initdb args'], 'postgres_host_auth_method' => ['type' => 'string', 'description' => 'PostgreSQL host auth method'], 'postgres_conf' => ['type' => 'string', 'description' => 'PostgreSQL conf'], 'clickhouse_admin_user' => ['type' => 'string', 'description' => 'Clickhouse admin user'], 'clickhouse_admin_password' => ['type' => 'string', 'description' => 'Clickhouse admin password'], 'dragonfly_password' => ['type' => 'string', 'description' => 'DragonFly password'], 'redis_password' => ['type' => 'string', 'description' => 'Redis password'], 'redis_conf' => ['type' => 'string', 'description' => 'Redis conf'], 'keydb_password' => ['type' => 'string', 'description' => 'KeyDB password'], 'keydb_conf' => ['type' => 'string', 'description' => 'KeyDB conf'], 'mariadb_conf' => ['type' => 'string', 'description' => 'MariaDB conf'], 'mariadb_root_password' => ['type' => 'string', 'description' => 'MariaDB root password'], 'mariadb_user' => ['type' => 'string', 'description' => 'MariaDB user'], 'mariadb_password' => ['type' => 'string', 'description' => 'MariaDB password'], 'mariadb_database' => ['type' => 'string', 'description' => 'MariaDB database'], 'mongo_conf' => ['type' => 'string', 'description' => 'Mongo conf'], 'mongo_initdb_root_username' => ['type' => 'string', 'description' => 'Mongo initdb root username'], 'mongo_initdb_root_password' => ['type' => 'string', 'description' => 'Mongo initdb root password'], 'mongo_initdb_database' => ['type' => 'string', 'description' => 'Mongo initdb init database'], 'mysql_root_password' => ['type' => 'string', 'description' => 'MySQL root password'], 'mysql_password' => ['type' => 'string', 'description' => 'MySQL password'], 'mysql_user' => ['type' => 'string', 'description' => 'MySQL user'], 'mysql_database' => ['type' => 'string', 'description' => 'MySQL database'], 'mysql_conf' => ['type' => 'string', 'description' => 'MySQL conf'], ], ), ) ), responses: [ new OA\Response( response: 200, description: 'Database updated', ), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), new OA\Response( response: 404, ref: '#/components/responses/404', ), new OA\Response( response: 422, ref: '#/components/responses/422', ), ] )] public function update_by_uuid(Request $request) { $allowedFields = ['name', 'description', 'image', 'public_port', 'is_public', 'instant_deploy', 'limits_memory', 'limits_memory_swap', 'limits_memory_swappiness', 'limits_memory_reservation', 'limits_cpus', 'limits_cpuset', 'limits_cpu_shares', 'postgres_user', 'postgres_password', 'postgres_db', 'postgres_initdb_args', 'postgres_host_auth_method', 'postgres_conf', 'clickhouse_admin_user', 'clickhouse_admin_password', 'dragonfly_password', 'redis_password', 'redis_conf', 'keydb_password', 'keydb_conf', 'mariadb_conf', 'mariadb_root_password', 'mariadb_user', 'mariadb_password', 'mariadb_database', 'mongo_conf', 'mongo_initdb_root_username', 'mongo_initdb_root_password', 'mongo_initdb_database', 'mysql_root_password', 'mysql_password', 'mysql_user', 'mysql_database', 'mysql_conf']; $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } // this check if the request is a valid json $return = validateIncomingRequest($request); if ($return instanceof \Illuminate\Http\JsonResponse) { return $return; } $validator = customApiValidator($request->all(), [ 'name' => 'string|max:255', 'description' => 'string|nullable', 'image' => 'string', 'is_public' => 'boolean', 'public_port' => 'numeric|nullable', 'limits_memory' => 'string', 'limits_memory_swap' => 'string', 'limits_memory_swappiness' => 'numeric', 'limits_memory_reservation' => 'string', 'limits_cpus' => 'string', 'limits_cpuset' => 'string|nullable', 'limits_cpu_shares' => 'numeric', ]); if ($validator->fails()) { return response()->json([ 'message' => 'Validation failed.', 'errors' => $validator->errors(), ], 422); } $uuid = $request->uuid; removeUnnecessaryFieldsFromRequest($request); $database = queryDatabaseByUuidWithinTeam($uuid, $teamId); if (! $database) { return response()->json(['message' => 'Database not found.'], 404); } $this->authorize('update', $database); if ($request->is_public && $request->public_port) { if (isPublicPortAlreadyUsed($database->destination->server, $request->public_port, $database->id)) { return response()->json(['message' => 'Public port already used by another database.'], 400); } } switch ($database->type()) { case 'standalone-postgresql': $allowedFields = ['name', 'description', 'image', 'public_port', 'is_public', 'instant_deploy', 'limits_memory', 'limits_memory_swap', 'limits_memory_swappiness', 'limits_memory_reservation', 'limits_cpus', 'limits_cpuset', 'limits_cpu_shares', 'postgres_user', 'postgres_password', 'postgres_db', 'postgres_initdb_args', 'postgres_host_auth_method', 'postgres_conf']; $validator = customApiValidator($request->all(), [ 'postgres_user' => 'string', 'postgres_password' => 'string', 'postgres_db' => 'string', 'postgres_initdb_args' => 'string', 'postgres_host_auth_method' => 'string', 'postgres_conf' => 'string', ]); if ($request->has('postgres_conf')) { if (! isBase64Encoded($request->postgres_conf)) { return response()->json([ 'message' => 'Validation failed.', 'errors' => [ 'postgres_conf' => 'The postgres_conf should be base64 encoded.', ], ], 422); } $postgresConf = base64_decode($request->postgres_conf); if (mb_detect_encoding($postgresConf, 'ASCII', true) === false) { return response()->json([ 'message' => 'Validation failed.', 'errors' => [ 'postgres_conf' => 'The postgres_conf should be base64 encoded.', ], ], 422); } $request->offsetSet('postgres_conf', $postgresConf); } break; case 'standalone-clickhouse': $allowedFields = ['name', 'description', 'image', 'public_port', 'is_public', 'instant_deploy', 'limits_memory', 'limits_memory_swap', 'limits_memory_swappiness', 'limits_memory_reservation', 'limits_cpus', 'limits_cpuset', 'limits_cpu_shares', 'clickhouse_admin_user', 'clickhouse_admin_password']; $validator = customApiValidator($request->all(), [ 'clickhouse_admin_user' => 'string', 'clickhouse_admin_password' => 'string', ]); break; case 'standalone-dragonfly': $allowedFields = ['name', 'description', 'image', 'public_port', 'is_public', 'instant_deploy', 'limits_memory', 'limits_memory_swap', 'limits_memory_swappiness', 'limits_memory_reservation', 'limits_cpus', 'limits_cpuset', 'limits_cpu_shares', 'dragonfly_password']; $validator = customApiValidator($request->all(), [ 'dragonfly_password' => 'string', ]); break; case 'standalone-redis': $allowedFields = ['name', 'description', 'image', 'public_port', 'is_public', 'instant_deploy', 'limits_memory', 'limits_memory_swap', 'limits_memory_swappiness', 'limits_memory_reservation', 'limits_cpus', 'limits_cpuset', 'limits_cpu_shares', 'redis_password', 'redis_conf']; $validator = customApiValidator($request->all(), [ 'redis_password' => 'string', 'redis_conf' => 'string', ]); if ($request->has('redis_conf')) { if (! isBase64Encoded($request->redis_conf)) { return response()->json([ 'message' => 'Validation failed.', 'errors' => [ 'redis_conf' => 'The redis_conf should be base64 encoded.', ], ], 422); } $redisConf = base64_decode($request->redis_conf); if (mb_detect_encoding($redisConf, 'ASCII', true) === false) { return response()->json([ 'message' => 'Validation failed.', 'errors' => [ 'redis_conf' => 'The redis_conf should be base64 encoded.', ], ], 422); } $request->offsetSet('redis_conf', $redisConf); } break; case 'standalone-keydb': $allowedFields = ['name', 'description', 'image', 'public_port', 'is_public', 'instant_deploy', 'limits_memory', 'limits_memory_swap', 'limits_memory_swappiness', 'limits_memory_reservation', 'limits_cpus', 'limits_cpuset', 'limits_cpu_shares', 'keydb_password', 'keydb_conf']; $validator = customApiValidator($request->all(), [ 'keydb_password' => 'string', 'keydb_conf' => 'string', ]); if ($request->has('keydb_conf')) { if (! isBase64Encoded($request->keydb_conf)) { return response()->json([ 'message' => 'Validation failed.', 'errors' => [ 'keydb_conf' => 'The keydb_conf should be base64 encoded.', ], ], 422); } $keydbConf = base64_decode($request->keydb_conf); if (mb_detect_encoding($keydbConf, 'ASCII', true) === false) { return response()->json([ 'message' => 'Validation failed.', 'errors' => [ 'keydb_conf' => 'The keydb_conf should be base64 encoded.', ], ], 422); } $request->offsetSet('keydb_conf', $keydbConf); } break; case 'standalone-mariadb': $allowedFields = ['name', 'description', 'image', 'public_port', 'is_public', 'instant_deploy', 'limits_memory', 'limits_memory_swap', 'limits_memory_swappiness', 'limits_memory_reservation', 'limits_cpus', 'limits_cpuset', 'limits_cpu_shares', 'mariadb_conf', 'mariadb_root_password', 'mariadb_user', 'mariadb_password', 'mariadb_database']; $validator = customApiValidator($request->all(), [ 'mariadb_conf' => 'string', 'mariadb_root_password' => 'string', 'mariadb_user' => 'string', 'mariadb_password' => 'string', 'mariadb_database' => 'string', ]); if ($request->has('mariadb_conf')) { if (! isBase64Encoded($request->mariadb_conf)) { return response()->json([ 'message' => 'Validation failed.', 'errors' => [ 'mariadb_conf' => 'The mariadb_conf should be base64 encoded.', ], ], 422); } $mariadbConf = base64_decode($request->mariadb_conf); if (mb_detect_encoding($mariadbConf, 'ASCII', true) === false) { return response()->json([ 'message' => 'Validation failed.', 'errors' => [ 'mariadb_conf' => 'The mariadb_conf should be base64 encoded.', ], ], 422); } $request->offsetSet('mariadb_conf', $mariadbConf); } break; case 'standalone-mongodb': $allowedFields = ['name', 'description', 'image', 'public_port', 'is_public', 'instant_deploy', 'limits_memory', 'limits_memory_swap', 'limits_memory_swappiness', 'limits_memory_reservation', 'limits_cpus', 'limits_cpuset', 'limits_cpu_shares', 'mongo_conf', 'mongo_initdb_root_username', 'mongo_initdb_root_password', 'mongo_initdb_database']; $validator = customApiValidator($request->all(), [ 'mongo_conf' => 'string', 'mongo_initdb_root_username' => 'string', 'mongo_initdb_root_password' => 'string', 'mongo_initdb_database' => 'string', ]); if ($request->has('mongo_conf')) { if (! isBase64Encoded($request->mongo_conf)) { return response()->json([ 'message' => 'Validation failed.', 'errors' => [ 'mongo_conf' => 'The mongo_conf should be base64 encoded.', ], ], 422); } $mongoConf = base64_decode($request->mongo_conf); if (mb_detect_encoding($mongoConf, 'ASCII', true) === false) { return response()->json([ 'message' => 'Validation failed.', 'errors' => [ 'mongo_conf' => 'The mongo_conf should be base64 encoded.', ], ], 422); } $request->offsetSet('mongo_conf', $mongoConf); } break; case 'standalone-mysql': $allowedFields = ['name', 'description', 'image', 'public_port', 'is_public', 'instant_deploy', 'limits_memory', 'limits_memory_swap', 'limits_memory_swappiness', 'limits_memory_reservation', 'limits_cpus', 'limits_cpuset', 'limits_cpu_shares', 'mysql_root_password', 'mysql_password', 'mysql_user', 'mysql_database', 'mysql_conf']; $validator = customApiValidator($request->all(), [ 'mysql_root_password' => 'string', 'mysql_password' => 'string', 'mysql_user' => 'string', 'mysql_database' => 'string', 'mysql_conf' => 'string', ]); if ($request->has('mysql_conf')) { if (! isBase64Encoded($request->mysql_conf)) { return response()->json([ 'message' => 'Validation failed.', 'errors' => [ 'mysql_conf' => 'The mysql_conf should be base64 encoded.', ], ], 422); } $mysqlConf = base64_decode($request->mysql_conf); if (mb_detect_encoding($mysqlConf, 'ASCII', true) === false) { return response()->json([ 'message' => 'Validation failed.', 'errors' => [ 'mysql_conf' => 'The mysql_conf should be base64 encoded.', ], ], 422); } $request->offsetSet('mysql_conf', $mysqlConf); } break; } $extraFields = array_diff(array_keys($request->all()), $allowedFields); if ($validator->fails() || ! empty($extraFields)) { $errors = $validator->errors(); if (! empty($extraFields)) { foreach ($extraFields as $field) { $errors->add($field, 'This field is not allowed.'); } } return response()->json([ 'message' => 'Validation failed.', 'errors' => $errors, ], 422); } $whatToDoWithDatabaseProxy = null; if ($request->is_public === false && $database->is_public === true) { $whatToDoWithDatabaseProxy = 'stop'; } if ($request->is_public === true && $request->public_port && $database->is_public === false) { $whatToDoWithDatabaseProxy = 'start'; } // Only update database fields, not backup configuration $database->update($request->only($allowedFields)); if ($whatToDoWithDatabaseProxy === 'start') { StartDatabaseProxy::dispatch($database); } elseif ($whatToDoWithDatabaseProxy === 'stop') { StopDatabaseProxy::dispatch($database); } return response()->json([ 'message' => 'Database updated.', ]); } #[OA\Post( summary: 'Create Backup', description: 'Create a new scheduled backup configuration for a database', path: '/databases/{uuid}/backups', operationId: 'create-database-backup', security: [ ['bearerAuth' => []], ], tags: ['Databases'], parameters: [ new OA\Parameter( name: 'uuid', in: 'path', description: 'UUID of the database.', required: true, schema: new OA\Schema( type: 'string', format: 'uuid', ) ), ], requestBody: new OA\RequestBody( description: 'Backup configuration data', required: true, content: new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', required: ['frequency'], properties: [ 'frequency' => ['type' => 'string', 'description' => 'Backup frequency (cron expression or: every_minute, hourly, daily, weekly, monthly, yearly)'], 'enabled' => ['type' => 'boolean', 'description' => 'Whether the backup is enabled', 'default' => true], 'save_s3' => ['type' => 'boolean', 'description' => 'Whether to save backups to S3', 'default' => false], 's3_storage_uuid' => ['type' => 'string', 'description' => 'S3 storage UUID (required if save_s3 is true)'], 'databases_to_backup' => ['type' => 'string', 'description' => 'Comma separated list of databases to backup'], 'dump_all' => ['type' => 'boolean', 'description' => 'Whether to dump all databases', 'default' => false], 'backup_now' => ['type' => 'boolean', 'description' => 'Whether to trigger backup immediately after creation'], 'database_backup_retention_amount_locally' => ['type' => 'integer', 'description' => 'Number of backups to retain locally'], 'database_backup_retention_days_locally' => ['type' => 'integer', 'description' => 'Number of days to retain backups locally'], 'database_backup_retention_max_storage_locally' => ['type' => 'integer', 'description' => 'Max storage (MB) for local backups'], 'database_backup_retention_amount_s3' => ['type' => 'integer', 'description' => 'Number of backups to retain in S3'], 'database_backup_retention_days_s3' => ['type' => 'integer', 'description' => 'Number of days to retain backups in S3'], 'database_backup_retention_max_storage_s3' => ['type' => 'integer', 'description' => 'Max storage (MB) for S3 backups'], ], ), ) ), responses: [ new OA\Response( response: 201, description: 'Backup configuration created successfully', content: new OA\JsonContent( type: 'object', properties: [ 'uuid' => ['type' => 'string', 'format' => 'uuid', 'example' => '550e8400-e29b-41d4-a716-446655440000'], 'message' => ['type' => 'string', 'example' => 'Backup configuration created successfully.'], ] ) ), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), new OA\Response( response: 404, ref: '#/components/responses/404', ), new OA\Response( response: 422, ref: '#/components/responses/422', ), ] )] public function create_backup(Request $request) {
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
true
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Http/Controllers/Api/CloudProviderTokensController.php
app/Http/Controllers/Api/CloudProviderTokensController.php
<?php namespace App\Http\Controllers\Api; use App\Http\Controllers\Controller; use App\Models\CloudProviderToken; use Illuminate\Http\Request; use Illuminate\Support\Facades\Http; use Illuminate\Support\Facades\Log; use OpenApi\Attributes as OA; class CloudProviderTokensController extends Controller { private function removeSensitiveData($token) { $token->makeHidden([ 'id', 'token', ]); return serializeApiResponse($token); } /** * Validate a provider token against the provider's API. * * @return array{valid: bool, error: string|null} */ private function validateProviderToken(string $provider, string $token): array { try { $response = match ($provider) { 'hetzner' => Http::withHeaders([ 'Authorization' => 'Bearer '.$token, ])->timeout(10)->get('https://api.hetzner.cloud/v1/servers'), 'digitalocean' => Http::withHeaders([ 'Authorization' => 'Bearer '.$token, ])->timeout(10)->get('https://api.digitalocean.com/v2/account'), default => null, }; if ($response === null) { return ['valid' => false, 'error' => 'Unsupported provider.']; } if ($response->successful()) { return ['valid' => true, 'error' => null]; } return ['valid' => false, 'error' => "Invalid {$provider} token. Please check your API token."]; } catch (\Throwable $e) { Log::error('Failed to validate cloud provider token', [ 'provider' => $provider, 'exception' => $e->getMessage(), ]); return ['valid' => false, 'error' => 'Failed to validate token with provider API.']; } } #[OA\Get( summary: 'List Cloud Provider Tokens', description: 'List all cloud provider tokens for the authenticated team.', path: '/cloud-tokens', operationId: 'list-cloud-tokens', security: [ ['bearerAuth' => []], ], tags: ['Cloud Tokens'], responses: [ new OA\Response( response: 200, description: 'Get all cloud provider tokens.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'array', items: new OA\Items( type: 'object', properties: [ 'uuid' => ['type' => 'string'], 'name' => ['type' => 'string'], 'provider' => ['type' => 'string', 'enum' => ['hetzner', 'digitalocean']], 'team_id' => ['type' => 'integer'], 'servers_count' => ['type' => 'integer'], 'created_at' => ['type' => 'string'], 'updated_at' => ['type' => 'string'], ] ) ) ), ]), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), ] )] public function index(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $tokens = CloudProviderToken::whereTeamId($teamId) ->withCount('servers') ->get() ->map(function ($token) { return $this->removeSensitiveData($token); }); return response()->json($tokens); } #[OA\Get( summary: 'Get Cloud Provider Token', description: 'Get cloud provider token by UUID.', path: '/cloud-tokens/{uuid}', operationId: 'get-cloud-token-by-uuid', security: [ ['bearerAuth' => []], ], tags: ['Cloud Tokens'], parameters: [ new OA\Parameter(name: 'uuid', in: 'path', required: true, description: 'Token UUID', schema: new OA\Schema(type: 'string')), ], responses: [ new OA\Response( response: 200, description: 'Get cloud provider token by UUID', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'uuid' => ['type' => 'string'], 'name' => ['type' => 'string'], 'provider' => ['type' => 'string'], 'team_id' => ['type' => 'integer'], 'servers_count' => ['type' => 'integer'], 'created_at' => ['type' => 'string'], 'updated_at' => ['type' => 'string'], ] ) ), ]), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 404, ref: '#/components/responses/404', ), ] )] public function show(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $token = CloudProviderToken::whereTeamId($teamId) ->whereUuid($request->uuid) ->withCount('servers') ->first(); if (is_null($token)) { return response()->json(['message' => 'Cloud provider token not found.'], 404); } return response()->json($this->removeSensitiveData($token)); } #[OA\Post( summary: 'Create Cloud Provider Token', description: 'Create a new cloud provider token. The token will be validated before being stored.', path: '/cloud-tokens', operationId: 'create-cloud-token', security: [ ['bearerAuth' => []], ], tags: ['Cloud Tokens'], requestBody: new OA\RequestBody( required: true, description: 'Cloud provider token details', content: new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', required: ['provider', 'token', 'name'], properties: [ 'provider' => ['type' => 'string', 'enum' => ['hetzner', 'digitalocean'], 'example' => 'hetzner', 'description' => 'The cloud provider.'], 'token' => ['type' => 'string', 'example' => 'your-api-token-here', 'description' => 'The API token for the cloud provider.'], 'name' => ['type' => 'string', 'example' => 'My Hetzner Token', 'description' => 'A friendly name for the token.'], ], ), ), ), responses: [ new OA\Response( response: 201, description: 'Cloud provider token created.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'uuid' => ['type' => 'string', 'example' => 'og888os', 'description' => 'The UUID of the token.'], ] ) ), ]), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), new OA\Response( response: 422, ref: '#/components/responses/422', ), ] )] public function store(Request $request) { $allowedFields = ['provider', 'token', 'name']; $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $return = validateIncomingRequest($request); if ($return instanceof \Illuminate\Http\JsonResponse) { return $return; } // Use request body only (excludes any route parameters) $body = $request->json()->all(); $validator = customApiValidator($body, [ 'provider' => 'required|string|in:hetzner,digitalocean', 'token' => 'required|string', 'name' => 'required|string|max:255', ]); $extraFields = array_diff(array_keys($body), $allowedFields); if ($validator->fails() || ! empty($extraFields)) { $errors = $validator->errors(); if (! empty($extraFields)) { foreach ($extraFields as $field) { $errors->add($field, 'This field is not allowed.'); } } return response()->json([ 'message' => 'Validation failed.', 'errors' => $errors, ], 422); } // Validate token with the provider's API $validation = $this->validateProviderToken($body['provider'], $body['token']); if (! $validation['valid']) { return response()->json(['message' => $validation['error']], 400); } $cloudProviderToken = CloudProviderToken::create([ 'team_id' => $teamId, 'provider' => $body['provider'], 'token' => $body['token'], 'name' => $body['name'], ]); return response()->json([ 'uuid' => $cloudProviderToken->uuid, ])->setStatusCode(201); } #[OA\Patch( summary: 'Update Cloud Provider Token', description: 'Update cloud provider token name.', path: '/cloud-tokens/{uuid}', operationId: 'update-cloud-token-by-uuid', security: [ ['bearerAuth' => []], ], tags: ['Cloud Tokens'], parameters: [ new OA\Parameter(name: 'uuid', in: 'path', required: true, description: 'Token UUID', schema: new OA\Schema(type: 'string')), ], requestBody: new OA\RequestBody( required: true, description: 'Cloud provider token updated.', content: new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'name' => ['type' => 'string', 'description' => 'The friendly name for the token.'], ], ), ), ), responses: [ new OA\Response( response: 200, description: 'Cloud provider token updated.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'uuid' => ['type' => 'string'], ] ) ), ]), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 404, ref: '#/components/responses/404', ), new OA\Response( response: 422, ref: '#/components/responses/422', ), ] )] public function update(Request $request) { $allowedFields = ['name']; $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $return = validateIncomingRequest($request); if ($return instanceof \Illuminate\Http\JsonResponse) { return $return; } // Use request body only (excludes route parameters like uuid) $body = $request->json()->all(); $validator = customApiValidator($body, [ 'name' => 'required|string|max:255', ]); $extraFields = array_diff(array_keys($body), $allowedFields); if ($validator->fails() || ! empty($extraFields)) { $errors = $validator->errors(); if (! empty($extraFields)) { foreach ($extraFields as $field) { $errors->add($field, 'This field is not allowed.'); } } return response()->json([ 'message' => 'Validation failed.', 'errors' => $errors, ], 422); } // Use route parameter for UUID lookup $token = CloudProviderToken::whereTeamId($teamId)->whereUuid($request->route('uuid'))->first(); if (! $token) { return response()->json(['message' => 'Cloud provider token not found.'], 404); } $token->update(array_intersect_key($body, array_flip($allowedFields))); return response()->json([ 'uuid' => $token->uuid, ]); } #[OA\Delete( summary: 'Delete Cloud Provider Token', description: 'Delete cloud provider token by UUID. Cannot delete if token is used by any servers.', path: '/cloud-tokens/{uuid}', operationId: 'delete-cloud-token-by-uuid', security: [ ['bearerAuth' => []], ], tags: ['Cloud Tokens'], parameters: [ new OA\Parameter( name: 'uuid', in: 'path', description: 'UUID of the cloud provider token.', required: true, schema: new OA\Schema( type: 'string', format: 'uuid', ) ), ], responses: [ new OA\Response( response: 200, description: 'Cloud provider token deleted.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'message' => ['type' => 'string', 'example' => 'Cloud provider token deleted.'], ] ) ), ]), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), new OA\Response( response: 404, ref: '#/components/responses/404', ), ] )] public function destroy(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } if (! $request->uuid) { return response()->json(['message' => 'UUID is required.'], 422); } $token = CloudProviderToken::whereTeamId($teamId)->whereUuid($request->uuid)->first(); if (! $token) { return response()->json(['message' => 'Cloud provider token not found.'], 404); } if ($token->hasServers()) { return response()->json(['message' => 'Cannot delete token that is used by servers.'], 400); } $token->delete(); return response()->json(['message' => 'Cloud provider token deleted.']); } #[OA\Post( summary: 'Validate Cloud Provider Token', description: 'Validate a cloud provider token against the provider API.', path: '/cloud-tokens/{uuid}/validate', operationId: 'validate-cloud-token-by-uuid', security: [ ['bearerAuth' => []], ], tags: ['Cloud Tokens'], parameters: [ new OA\Parameter(name: 'uuid', in: 'path', required: true, description: 'Token UUID', schema: new OA\Schema(type: 'string')), ], responses: [ new OA\Response( response: 200, description: 'Token validation result.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'valid' => ['type' => 'boolean', 'example' => true], 'message' => ['type' => 'string', 'example' => 'Token is valid.'], ] ) ), ]), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 404, ref: '#/components/responses/404', ), ] )] public function validateToken(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $cloudToken = CloudProviderToken::whereTeamId($teamId)->whereUuid($request->uuid)->first(); if (! $cloudToken) { return response()->json(['message' => 'Cloud provider token not found.'], 404); } $validation = $this->validateProviderToken($cloudToken->provider, $cloudToken->token); return response()->json([ 'valid' => $validation['valid'], 'message' => $validation['valid'] ? 'Token is valid.' : $validation['error'], ]); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Http/Controllers/Api/TeamController.php
app/Http/Controllers/Api/TeamController.php
<?php namespace App\Http\Controllers\Api; use App\Http\Controllers\Controller; use Illuminate\Http\Request; use OpenApi\Attributes as OA; class TeamController extends Controller { private function removeSensitiveData($team) { $team->makeHidden([ 'custom_server_limit', 'pivot', ]); if (request()->attributes->get('can_read_sensitive', false) === false) { $team->makeHidden([ 'smtp_username', 'smtp_password', 'resend_api_key', 'telegram_token', ]); } return serializeApiResponse($team); } #[OA\Get( summary: 'List', description: 'Get all teams.', path: '/teams', operationId: 'list-teams', security: [ ['bearerAuth' => []], ], tags: ['Teams'], responses: [ new OA\Response( response: 200, description: 'List of teams.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'array', items: new OA\Items(ref: '#/components/schemas/Team') ) ), ]), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), ] )] public function teams(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $teams = auth()->user()->teams->sortBy('id'); $teams = $teams->map(function ($team) { return $this->removeSensitiveData($team); }); return response()->json( $teams, ); } #[OA\Get( summary: 'Get', description: 'Get team by TeamId.', path: '/teams/{id}', operationId: 'get-team-by-id', security: [ ['bearerAuth' => []], ], tags: ['Teams'], parameters: [ new OA\Parameter(name: 'id', in: 'path', required: true, description: 'Team ID', schema: new OA\Schema(type: 'integer')), ], responses: [ new OA\Response( response: 200, description: 'List of teams.', content: new OA\JsonContent(ref: '#/components/schemas/Team') ), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), new OA\Response( response: 404, ref: '#/components/responses/404', ), ] )] public function team_by_id(Request $request) { $id = $request->id; $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $teams = auth()->user()->teams; $team = $teams->where('id', $id)->first(); if (is_null($team)) { return response()->json(['message' => 'Team not found.'], 404); } $team = $this->removeSensitiveData($team); return response()->json( serializeApiResponse($team), ); } #[OA\Get( summary: 'Members', description: 'Get members by TeamId.', path: '/teams/{id}/members', operationId: 'get-members-by-team-id', security: [ ['bearerAuth' => []], ], tags: ['Teams'], parameters: [ new OA\Parameter(name: 'id', in: 'path', required: true, description: 'Team ID', schema: new OA\Schema(type: 'integer')), ], responses: [ new OA\Response( response: 200, description: 'List of members.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'array', items: new OA\Items(ref: '#/components/schemas/User') ) ), ]), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), new OA\Response( response: 404, ref: '#/components/responses/404', ), ] )] public function members_by_id(Request $request) { $id = $request->id; $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $teams = auth()->user()->teams; $team = $teams->where('id', $id)->first(); if (is_null($team)) { return response()->json(['message' => 'Team not found.'], 404); } $members = $team->members; $members->makeHidden([ 'pivot', 'email_change_code', 'email_change_code_expires_at', ]); return response()->json( serializeApiResponse($members), ); } #[OA\Get( summary: 'Authenticated Team', description: 'Get currently authenticated team.', path: '/teams/current', operationId: 'get-current-team', security: [ ['bearerAuth' => []], ], tags: ['Teams'], responses: [ new OA\Response( response: 200, description: 'Current Team.', content: new OA\JsonContent(ref: '#/components/schemas/Team')), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), ] )] public function current_team(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $team = auth()->user()->currentTeam(); return response()->json( $this->removeSensitiveData($team), ); } #[OA\Get( summary: 'Authenticated Team Members', description: 'Get currently authenticated team members.', path: '/teams/current/members', operationId: 'get-current-team-members', security: [ ['bearerAuth' => []], ], tags: ['Teams'], responses: [ new OA\Response( response: 200, description: 'Currently authenticated team members.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'array', items: new OA\Items(ref: '#/components/schemas/User') ) ), ]), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), ] )] public function current_team_members(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $team = auth()->user()->currentTeam(); $team->members->makeHidden([ 'pivot', 'email_change_code', 'email_change_code_expires_at', ]); return response()->json( serializeApiResponse($team->members), ); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Http/Controllers/Api/ProjectController.php
app/Http/Controllers/Api/ProjectController.php
<?php namespace App\Http\Controllers\Api; use App\Http\Controllers\Controller; use App\Models\Project; use App\Support\ValidationPatterns; use Illuminate\Http\Request; use Illuminate\Support\Facades\Validator; use OpenApi\Attributes as OA; class ProjectController extends Controller { #[OA\Get( summary: 'List', description: 'List projects.', path: '/projects', operationId: 'list-projects', security: [ ['bearerAuth' => []], ], tags: ['Projects'], responses: [ new OA\Response( response: 200, description: 'Get all projects.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'array', items: new OA\Items(ref: '#/components/schemas/Project') ) ), ]), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), ] )] public function projects(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $projects = Project::whereTeamId($teamId)->select('id', 'name', 'description', 'uuid')->get(); return response()->json(serializeApiResponse($projects), ); } #[OA\Get( summary: 'Get', description: 'Get project by UUID.', path: '/projects/{uuid}', operationId: 'get-project-by-uuid', security: [ ['bearerAuth' => []], ], tags: ['Projects'], parameters: [ new OA\Parameter(name: 'uuid', in: 'path', required: true, description: 'Project UUID', schema: new OA\Schema(type: 'string')), ], responses: [ new OA\Response( response: 200, description: 'Project details', content: new OA\JsonContent(ref: '#/components/schemas/Project')), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), new OA\Response( response: 404, description: 'Project not found.', ), ] )] public function project_by_uuid(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $project = Project::whereTeamId($teamId)->whereUuid(request()->uuid)->first(); if (! $project) { return response()->json(['message' => 'Project not found.'], 404); } $project->load(['environments']); return response()->json( serializeApiResponse($project), ); } #[OA\Get( summary: 'Environment', description: 'Get environment by name or UUID.', path: '/projects/{uuid}/{environment_name_or_uuid}', operationId: 'get-environment-by-name-or-uuid', security: [ ['bearerAuth' => []], ], tags: ['Projects'], parameters: [ new OA\Parameter(name: 'uuid', in: 'path', required: true, description: 'Project UUID', schema: new OA\Schema(type: 'string')), new OA\Parameter(name: 'environment_name_or_uuid', in: 'path', required: true, description: 'Environment name or UUID', schema: new OA\Schema(type: 'string')), ], responses: [ new OA\Response( response: 200, description: 'Environment details', content: new OA\JsonContent(ref: '#/components/schemas/Environment')), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), new OA\Response( response: 404, ref: '#/components/responses/404', ), new OA\Response( response: 422, ref: '#/components/responses/422', ), ] )] public function environment_details(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } if (! $request->uuid) { return response()->json(['message' => 'UUID is required.'], 422); } if (! $request->environment_name_or_uuid) { return response()->json(['message' => 'Environment name or UUID is required.'], 422); } $project = Project::whereTeamId($teamId)->whereUuid($request->uuid)->first(); if (! $project) { return response()->json(['message' => 'Project not found.'], 404); } $environment = $project->environments()->whereName($request->environment_name_or_uuid)->first(); if (! $environment) { $environment = $project->environments()->whereUuid($request->environment_name_or_uuid)->first(); } if (! $environment) { return response()->json(['message' => 'Environment not found.'], 404); } $environment = $environment->load(['applications', 'postgresqls', 'redis', 'mongodbs', 'mysqls', 'mariadbs', 'services']); return response()->json(serializeApiResponse($environment)); } #[OA\Post( summary: 'Create', description: 'Create Project.', path: '/projects', operationId: 'create-project', security: [ ['bearerAuth' => []], ], tags: ['Projects'], requestBody: new OA\RequestBody( required: true, description: 'Project created.', content: new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'name' => ['type' => 'string', 'description' => 'The name of the project.'], 'description' => ['type' => 'string', 'description' => 'The description of the project.'], ], ), ), ), responses: [ new OA\Response( response: 201, description: 'Project created.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'uuid' => ['type' => 'string', 'example' => 'og888os', 'description' => 'The UUID of the project.'], ] ) ), ]), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), new OA\Response( response: 404, ref: '#/components/responses/404', ), new OA\Response( response: 422, ref: '#/components/responses/422', ), ] )] public function create_project(Request $request) { $allowedFields = ['name', 'description']; $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $return = validateIncomingRequest($request); if ($return instanceof \Illuminate\Http\JsonResponse) { return $return; } $validator = Validator::make($request->all(), [ 'name' => ValidationPatterns::nameRules(), 'description' => ValidationPatterns::descriptionRules(), ], ValidationPatterns::combinedMessages()); $extraFields = array_diff(array_keys($request->all()), $allowedFields); if ($validator->fails() || ! empty($extraFields)) { $errors = $validator->errors(); if (! empty($extraFields)) { foreach ($extraFields as $field) { $errors->add($field, 'This field is not allowed.'); } } return response()->json([ 'message' => 'Validation failed.', 'errors' => $errors, ], 422); } $project = Project::create([ 'name' => $request->name, 'description' => $request->description, 'team_id' => $teamId, ]); return response()->json([ 'uuid' => $project->uuid, ])->setStatusCode(201); } #[OA\Patch( summary: 'Update', description: 'Update Project.', path: '/projects/{uuid}', operationId: 'update-project-by-uuid', security: [ ['bearerAuth' => []], ], tags: ['Projects'], parameters: [ new OA\Parameter( name: 'uuid', in: 'path', description: 'UUID of the project.', required: true, schema: new OA\Schema( type: 'string', format: 'uuid', ) ), ], requestBody: new OA\RequestBody( required: true, description: 'Project updated.', content: new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'name' => ['type' => 'string', 'description' => 'The name of the project.'], 'description' => ['type' => 'string', 'description' => 'The description of the project.'], ], ), ), ), responses: [ new OA\Response( response: 201, description: 'Project updated.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'uuid' => ['type' => 'string', 'example' => 'og888os'], 'name' => ['type' => 'string', 'example' => 'Project Name'], 'description' => ['type' => 'string', 'example' => 'Project Description'], ] ) ), ]), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), new OA\Response( response: 404, ref: '#/components/responses/404', ), new OA\Response( response: 422, ref: '#/components/responses/422', ), ] )] public function update_project(Request $request) { $allowedFields = ['name', 'description']; $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $return = validateIncomingRequest($request); if ($return instanceof \Illuminate\Http\JsonResponse) { return $return; } $validator = Validator::make($request->all(), [ 'name' => ValidationPatterns::nameRules(required: false), 'description' => ValidationPatterns::descriptionRules(), ], ValidationPatterns::combinedMessages()); $extraFields = array_diff(array_keys($request->all()), $allowedFields); if ($validator->fails() || ! empty($extraFields)) { $errors = $validator->errors(); if (! empty($extraFields)) { foreach ($extraFields as $field) { $errors->add($field, 'This field is not allowed.'); } } return response()->json([ 'message' => 'Validation failed.', 'errors' => $errors, ], 422); } $uuid = $request->uuid; if (! $uuid) { return response()->json(['message' => 'UUID is required.'], 422); } $project = Project::whereTeamId($teamId)->whereUuid($uuid)->first(); if (! $project) { return response()->json(['message' => 'Project not found.'], 404); } $project->update($request->only($allowedFields)); return response()->json([ 'uuid' => $project->uuid, 'name' => $project->name, 'description' => $project->description, ])->setStatusCode(201); } #[OA\Delete( summary: 'Delete', description: 'Delete project by UUID.', path: '/projects/{uuid}', operationId: 'delete-project-by-uuid', security: [ ['bearerAuth' => []], ], tags: ['Projects'], parameters: [ new OA\Parameter( name: 'uuid', in: 'path', description: 'UUID of the application.', required: true, schema: new OA\Schema( type: 'string', format: 'uuid', ) ), ], responses: [ new OA\Response( response: 200, description: 'Project deleted.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'message' => ['type' => 'string', 'example' => 'Project deleted.'], ] ) ), ]), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), new OA\Response( response: 404, ref: '#/components/responses/404', ), new OA\Response( response: 422, ref: '#/components/responses/422', ), ] )] public function delete_project(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } if (! $request->uuid) { return response()->json(['message' => 'UUID is required.'], 422); } $project = Project::whereTeamId($teamId)->whereUuid($request->uuid)->first(); if (! $project) { return response()->json(['message' => 'Project not found.'], 404); } if (! $project->isEmpty()) { return response()->json(['message' => 'Project has resources, so it cannot be deleted.'], 400); } $project->delete(); return response()->json(['message' => 'Project deleted.']); } #[OA\Get( summary: 'List Environments', description: 'List all environments in a project.', path: '/projects/{uuid}/environments', operationId: 'get-environments', security: [ ['bearerAuth' => []], ], tags: ['Projects'], parameters: [ new OA\Parameter(name: 'uuid', in: 'path', required: true, description: 'Project UUID', schema: new OA\Schema(type: 'string')), ], responses: [ new OA\Response( response: 200, description: 'List of environments', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'array', items: new OA\Items(ref: '#/components/schemas/Environment') ) ), ]), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), new OA\Response( response: 404, description: 'Project not found.', ), new OA\Response( response: 422, ref: '#/components/responses/422', ), ] )] public function get_environments(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } if (! $request->uuid) { return response()->json(['message' => 'Project UUID is required.'], 422); } $project = Project::whereTeamId($teamId)->whereUuid($request->uuid)->first(); if (! $project) { return response()->json(['message' => 'Project not found.'], 404); } $environments = $project->environments()->select('id', 'name', 'uuid')->get(); return response()->json(serializeApiResponse($environments)); } #[OA\Post( summary: 'Create Environment', description: 'Create environment in project.', path: '/projects/{uuid}/environments', operationId: 'create-environment', security: [ ['bearerAuth' => []], ], tags: ['Projects'], parameters: [ new OA\Parameter(name: 'uuid', in: 'path', required: true, description: 'Project UUID', schema: new OA\Schema(type: 'string')), ], requestBody: new OA\RequestBody( required: true, description: 'Environment created.', content: new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'name' => ['type' => 'string', 'description' => 'The name of the environment.'], ], ), ), ), responses: [ new OA\Response( response: 201, description: 'Environment created.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'uuid' => ['type' => 'string', 'example' => 'env123', 'description' => 'The UUID of the environment.'], ] ) ), ]), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), new OA\Response( response: 404, description: 'Project not found.', ), new OA\Response( response: 409, description: 'Environment with this name already exists.', ), new OA\Response( response: 422, ref: '#/components/responses/422', ), ] )] public function create_environment(Request $request) { $allowedFields = ['name']; $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $return = validateIncomingRequest($request); if ($return instanceof \Illuminate\Http\JsonResponse) { return $return; } $validator = Validator::make($request->all(), [ 'name' => ValidationPatterns::nameRules(), ], ValidationPatterns::nameMessages()); $extraFields = array_diff(array_keys($request->all()), $allowedFields); if ($validator->fails() || ! empty($extraFields)) { $errors = $validator->errors(); if (! empty($extraFields)) { foreach ($extraFields as $field) { $errors->add($field, 'This field is not allowed.'); } } return response()->json([ 'message' => 'Validation failed.', 'errors' => $errors, ], 422); } if (! $request->uuid) { return response()->json(['message' => 'Project UUID is required.'], 422); } $project = Project::whereTeamId($teamId)->whereUuid($request->uuid)->first(); if (! $project) { return response()->json(['message' => 'Project not found.'], 404); } $existingEnvironment = $project->environments()->where('name', $request->name)->first(); if ($existingEnvironment) { return response()->json(['message' => 'Environment with this name already exists.'], 409); } $environment = $project->environments()->create([ 'name' => $request->name, ]); return response()->json([ 'uuid' => $environment->uuid, ])->setStatusCode(201); } #[OA\Delete( summary: 'Delete Environment', description: 'Delete environment by name or UUID. Environment must be empty.', path: '/projects/{uuid}/environments/{environment_name_or_uuid}', operationId: 'delete-environment', security: [ ['bearerAuth' => []], ], tags: ['Projects'], parameters: [ new OA\Parameter(name: 'uuid', in: 'path', required: true, description: 'Project UUID', schema: new OA\Schema(type: 'string')), new OA\Parameter(name: 'environment_name_or_uuid', in: 'path', required: true, description: 'Environment name or UUID', schema: new OA\Schema(type: 'string')), ], responses: [ new OA\Response( response: 200, description: 'Environment deleted.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'message' => ['type' => 'string', 'example' => 'Environment deleted.'], ] ) ), ]), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, description: 'Environment has resources, so it cannot be deleted.', ), new OA\Response( response: 404, description: 'Project or environment not found.', ), new OA\Response( response: 422, ref: '#/components/responses/422', ), ] )] public function delete_environment(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } if (! $request->uuid) { return response()->json(['message' => 'Project UUID is required.'], 422); } if (! $request->environment_name_or_uuid) { return response()->json(['message' => 'Environment name or UUID is required.'], 422); } $project = Project::whereTeamId($teamId)->whereUuid($request->uuid)->first(); if (! $project) { return response()->json(['message' => 'Project not found.'], 404); } $environment = $project->environments()->whereName($request->environment_name_or_uuid)->first(); if (! $environment) { $environment = $project->environments()->whereUuid($request->environment_name_or_uuid)->first(); } if (! $environment) { return response()->json(['message' => 'Environment not found.'], 404); } if (! $environment->isEmpty()) { return response()->json(['message' => 'Environment has resources, so it cannot be deleted.'], 400); } $environment->delete(); return response()->json(['message' => 'Environment deleted.']); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Http/Controllers/Api/GithubController.php
app/Http/Controllers/Api/GithubController.php
<?php namespace App\Http\Controllers\Api; use App\Http\Controllers\Controller; use App\Models\GithubApp; use App\Models\PrivateKey; use Illuminate\Http\Request; use Illuminate\Support\Facades\Http; use Illuminate\Support\Str; use OpenApi\Attributes as OA; class GithubController extends Controller { private function removeSensitiveData($githubApp) { $githubApp->makeHidden([ 'client_secret', 'webhook_secret', ]); return serializeApiResponse($githubApp); } #[OA\Get( summary: 'List', description: 'List all GitHub apps.', path: '/github-apps', operationId: 'list-github-apps', security: [ ['bearerAuth' => []], ], tags: ['GitHub Apps'], responses: [ new OA\Response( response: 200, description: 'List of GitHub apps.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'array', items: new OA\Items( type: 'object', properties: [ 'id' => ['type' => 'integer'], 'uuid' => ['type' => 'string'], 'name' => ['type' => 'string'], 'organization' => ['type' => 'string', 'nullable' => true], 'api_url' => ['type' => 'string'], 'html_url' => ['type' => 'string'], 'custom_user' => ['type' => 'string'], 'custom_port' => ['type' => 'integer'], 'app_id' => ['type' => 'integer'], 'installation_id' => ['type' => 'integer'], 'client_id' => ['type' => 'string'], 'private_key_id' => ['type' => 'integer'], 'is_system_wide' => ['type' => 'boolean'], 'is_public' => ['type' => 'boolean'], 'team_id' => ['type' => 'integer'], 'type' => ['type' => 'string'], ] ) ) ), ] ), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), ] )] public function list_github_apps(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $githubApps = GithubApp::where(function ($query) use ($teamId) { $query->where('team_id', $teamId) ->orWhere('is_system_wide', true); })->get(); $githubApps = $githubApps->map(function ($app) { return $this->removeSensitiveData($app); }); return response()->json($githubApps); } #[OA\Post( summary: 'Create GitHub App', description: 'Create a new GitHub app.', path: '/github-apps', operationId: 'create-github-app', security: [ ['bearerAuth' => []], ], tags: ['GitHub Apps'], requestBody: new OA\RequestBody( description: 'GitHub app creation payload.', required: true, content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'name' => ['type' => 'string', 'description' => 'Name of the GitHub app.'], 'organization' => ['type' => 'string', 'nullable' => true, 'description' => 'Organization to associate the app with.'], 'api_url' => ['type' => 'string', 'description' => 'API URL for the GitHub app (e.g., https://api.github.com).'], 'html_url' => ['type' => 'string', 'description' => 'HTML URL for the GitHub app (e.g., https://github.com).'], 'custom_user' => ['type' => 'string', 'description' => 'Custom user for SSH access (default: git).'], 'custom_port' => ['type' => 'integer', 'description' => 'Custom port for SSH access (default: 22).'], 'app_id' => ['type' => 'integer', 'description' => 'GitHub App ID from GitHub.'], 'installation_id' => ['type' => 'integer', 'description' => 'GitHub Installation ID.'], 'client_id' => ['type' => 'string', 'description' => 'GitHub OAuth App Client ID.'], 'client_secret' => ['type' => 'string', 'description' => 'GitHub OAuth App Client Secret.'], 'webhook_secret' => ['type' => 'string', 'description' => 'Webhook secret for GitHub webhooks.'], 'private_key_uuid' => ['type' => 'string', 'description' => 'UUID of an existing private key for GitHub App authentication.'], 'is_system_wide' => ['type' => 'boolean', 'description' => 'Is this app system-wide (cloud only).'], ], required: ['name', 'api_url', 'html_url', 'app_id', 'installation_id', 'client_id', 'client_secret', 'private_key_uuid'], ), ), ], ), responses: [ new OA\Response( response: 201, description: 'GitHub app created successfully.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'id' => ['type' => 'integer'], 'uuid' => ['type' => 'string'], 'name' => ['type' => 'string'], 'organization' => ['type' => 'string', 'nullable' => true], 'api_url' => ['type' => 'string'], 'html_url' => ['type' => 'string'], 'custom_user' => ['type' => 'string'], 'custom_port' => ['type' => 'integer'], 'app_id' => ['type' => 'integer'], 'installation_id' => ['type' => 'integer'], 'client_id' => ['type' => 'string'], 'private_key_id' => ['type' => 'integer'], 'is_system_wide' => ['type' => 'boolean'], 'team_id' => ['type' => 'integer'], ] ) ), ] ), new OA\Response( response: 400, ref: '#/components/responses/400', ), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 422, ref: '#/components/responses/422', ), ] )] public function create_github_app(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $return = validateIncomingRequest($request); if ($return instanceof \Illuminate\Http\JsonResponse) { return $return; } $allowedFields = [ 'name', 'organization', 'api_url', 'html_url', 'custom_user', 'custom_port', 'app_id', 'installation_id', 'client_id', 'client_secret', 'webhook_secret', 'private_key_uuid', 'is_system_wide', ]; $validator = customApiValidator($request->all(), [ 'name' => 'required|string|max:255', 'organization' => 'nullable|string|max:255', 'api_url' => 'required|string|url', 'html_url' => 'required|string|url', 'custom_user' => 'nullable|string|max:255', 'custom_port' => 'nullable|integer|min:1|max:65535', 'app_id' => 'required|integer', 'installation_id' => 'required|integer', 'client_id' => 'required|string|max:255', 'client_secret' => 'required|string', 'webhook_secret' => 'required|string', 'private_key_uuid' => 'required|string', 'is_system_wide' => 'boolean', ]); $extraFields = array_diff(array_keys($request->all()), $allowedFields); if ($validator->fails() || ! empty($extraFields)) { $errors = $validator->errors(); if (! empty($extraFields)) { foreach ($extraFields as $field) { $errors->add($field, 'This field is not allowed.'); } } return response()->json([ 'message' => 'Validation failed.', 'errors' => $errors, ], 422); } try { // Verify the private key belongs to the team $privateKey = PrivateKey::where('uuid', $request->input('private_key_uuid')) ->where('team_id', $teamId) ->first(); if (! $privateKey) { return response()->json([ 'message' => 'Private key not found or does not belong to your team.', ], 404); } $payload = [ 'uuid' => Str::uuid(), 'name' => $request->input('name'), 'organization' => $request->input('organization'), 'api_url' => $request->input('api_url'), 'html_url' => $request->input('html_url'), 'custom_user' => $request->input('custom_user', 'git'), 'custom_port' => $request->input('custom_port', 22), 'app_id' => $request->input('app_id'), 'installation_id' => $request->input('installation_id'), 'client_id' => $request->input('client_id'), 'client_secret' => $request->input('client_secret'), 'webhook_secret' => $request->input('webhook_secret'), 'private_key_id' => $privateKey->id, 'is_public' => false, 'team_id' => $teamId, ]; if (! isCloud()) { $payload['is_system_wide'] = $request->input('is_system_wide', false); } $githubApp = GithubApp::create($payload); return response()->json($githubApp, 201); } catch (\Throwable $e) { return handleError($e); } } #[OA\Get( path: '/github-apps/{github_app_id}/repositories', summary: 'Load Repositories for a GitHub App', description: 'Fetch repositories from GitHub for a given GitHub app.', operationId: 'load-repositories', tags: ['GitHub Apps'], security: [ ['bearerAuth' => []], ], parameters: [ new OA\Parameter( name: 'github_app_id', in: 'path', required: true, schema: new OA\Schema(type: 'integer'), description: 'GitHub App ID' ), ], responses: [ new OA\Response( response: 200, description: 'Repositories loaded successfully.', content: new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ new OA\Property( property: 'repositories', type: 'array', items: new OA\Items(type: 'object') ), ] ) ) ), new OA\Response( response: 400, ref: '#/components/responses/400', ), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 404, ref: '#/components/responses/404', ), ] )] public function load_repositories($github_app_id) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } try { $githubApp = GithubApp::where('id', $github_app_id) ->where('team_id', $teamId) ->firstOrFail(); $token = generateGithubInstallationToken($githubApp); $repositories = collect(); $page = 1; $maxPages = 100; // Safety limit: max 10,000 repositories while ($page <= $maxPages) { $response = Http::GitHub($githubApp->api_url, $token) ->timeout(20) ->retry(3, 200, throw: false) ->get('/installation/repositories', [ 'per_page' => 100, 'page' => $page, ]); if ($response->status() !== 200) { return response()->json([ 'message' => $response->json()['message'] ?? 'Failed to load repositories', ], $response->status()); } $json = $response->json(); $repos = $json['repositories'] ?? []; if (empty($repos)) { break; // No more repositories to load } $repositories = $repositories->concat($repos); $page++; } return response()->json([ 'repositories' => $repositories->sortBy('name')->values(), ]); } catch (\Illuminate\Database\Eloquent\ModelNotFoundException $e) { return response()->json(['message' => 'GitHub app not found'], 404); } catch (\Throwable $e) { return handleError($e); } } #[OA\Get( path: '/github-apps/{github_app_id}/repositories/{owner}/{repo}/branches', summary: 'Load Branches for a GitHub Repository', description: 'Fetch branches from GitHub for a given repository.', operationId: 'load-branches', tags: ['GitHub Apps'], security: [ ['bearerAuth' => []], ], parameters: [ new OA\Parameter( name: 'github_app_id', in: 'path', required: true, schema: new OA\Schema(type: 'integer'), description: 'GitHub App ID' ), new OA\Parameter( name: 'owner', in: 'path', required: true, schema: new OA\Schema(type: 'string'), description: 'Repository owner' ), new OA\Parameter( name: 'repo', in: 'path', required: true, schema: new OA\Schema(type: 'string'), description: 'Repository name' ), ], responses: [ new OA\Response( response: 200, description: 'Branches loaded successfully.', content: new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ new OA\Property( property: 'branches', type: 'array', items: new OA\Items(type: 'object') ), ] ) ) ), new OA\Response( response: 400, ref: '#/components/responses/400', ), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 404, ref: '#/components/responses/404', ), ] )] public function load_branches($github_app_id, $owner, $repo) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } try { $githubApp = GithubApp::where('id', $github_app_id) ->where('team_id', $teamId) ->firstOrFail(); $token = generateGithubInstallationToken($githubApp); $response = Http::GitHub($githubApp->api_url, $token) ->timeout(20) ->retry(3, 200, throw: false) ->get("/repos/{$owner}/{$repo}/branches"); if ($response->status() !== 200) { return response()->json([ 'message' => 'Error loading branches from GitHub.', 'error' => $response->json('message'), ], $response->status()); } $branches = $response->json(); return response()->json([ 'branches' => $branches, ]); } catch (\Illuminate\Database\Eloquent\ModelNotFoundException $e) { return response()->json(['message' => 'GitHub app not found'], 404); } catch (\Throwable $e) { return handleError($e); } } /** * Update a GitHub app. */ #[OA\Patch( path: '/github-apps/{github_app_id}', operationId: 'updateGithubApp', security: [ ['bearerAuth' => []], ], tags: ['GitHub Apps'], summary: 'Update GitHub App', description: 'Update an existing GitHub app.', parameters: [ new OA\Parameter( name: 'github_app_id', in: 'path', required: true, schema: new OA\Schema(type: 'integer'), description: 'GitHub App ID' ), ], requestBody: new OA\RequestBody( required: true, content: new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'name' => ['type' => 'string', 'description' => 'GitHub App name'], 'organization' => ['type' => 'string', 'nullable' => true, 'description' => 'GitHub organization'], 'api_url' => ['type' => 'string', 'description' => 'GitHub API URL'], 'html_url' => ['type' => 'string', 'description' => 'GitHub HTML URL'], 'custom_user' => ['type' => 'string', 'description' => 'Custom user for SSH'], 'custom_port' => ['type' => 'integer', 'description' => 'Custom port for SSH'], 'app_id' => ['type' => 'integer', 'description' => 'GitHub App ID'], 'installation_id' => ['type' => 'integer', 'description' => 'GitHub Installation ID'], 'client_id' => ['type' => 'string', 'description' => 'GitHub Client ID'], 'client_secret' => ['type' => 'string', 'description' => 'GitHub Client Secret'], 'webhook_secret' => ['type' => 'string', 'description' => 'GitHub Webhook Secret'], 'private_key_uuid' => ['type' => 'string', 'description' => 'Private key UUID'], 'is_system_wide' => ['type' => 'boolean', 'description' => 'Is system wide (non-cloud instances only)'], ] ) ) ), responses: [ new OA\Response( response: 200, description: 'GitHub app updated successfully', content: new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'message' => ['type' => 'string', 'example' => 'GitHub app updated successfully'], 'data' => ['type' => 'object', 'description' => 'Updated GitHub app data'], ] ) ) ), new OA\Response(response: 401, description: 'Unauthorized'), new OA\Response(response: 404, description: 'GitHub app not found'), new OA\Response(response: 422, ref: '#/components/responses/422'), ] )] public function update_github_app(Request $request, $github_app_id) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } try { $githubApp = GithubApp::where('id', $github_app_id) ->where('team_id', $teamId) ->firstOrFail(); // Define allowed fields for update $allowedFields = [ 'name', 'organization', 'api_url', 'html_url', 'custom_user', 'custom_port', 'app_id', 'installation_id', 'client_id', 'client_secret', 'webhook_secret', 'private_key_uuid', ]; if (! isCloud()) { $allowedFields[] = 'is_system_wide'; } $payload = $request->only($allowedFields); // Validate the request $rules = []; if (isset($payload['name'])) { $rules['name'] = 'string'; } if (isset($payload['organization'])) { $rules['organization'] = 'nullable|string'; } if (isset($payload['api_url'])) { $rules['api_url'] = 'url'; } if (isset($payload['html_url'])) { $rules['html_url'] = 'url'; } if (isset($payload['custom_user'])) { $rules['custom_user'] = 'string'; } if (isset($payload['custom_port'])) { $rules['custom_port'] = 'integer|min:1|max:65535'; } if (isset($payload['app_id'])) { $rules['app_id'] = 'integer'; } if (isset($payload['installation_id'])) { $rules['installation_id'] = 'integer'; } if (isset($payload['client_id'])) { $rules['client_id'] = 'string'; } if (isset($payload['client_secret'])) { $rules['client_secret'] = 'string'; } if (isset($payload['webhook_secret'])) { $rules['webhook_secret'] = 'string'; } if (isset($payload['private_key_uuid'])) { $rules['private_key_uuid'] = 'string|uuid'; } if (! isCloud() && isset($payload['is_system_wide'])) { $rules['is_system_wide'] = 'boolean'; } $validator = customApiValidator($payload, $rules); if ($validator->fails()) { return response()->json([ 'message' => 'Validation error', 'errors' => $validator->errors(), ], 422); } // Handle private_key_uuid -> private_key_id conversion if (isset($payload['private_key_uuid'])) { $privateKey = PrivateKey::where('team_id', $teamId) ->where('uuid', $payload['private_key_uuid']) ->first(); if (! $privateKey) { return response()->json([ 'message' => 'Private key not found or does not belong to your team', ], 404); } unset($payload['private_key_uuid']); $payload['private_key_id'] = $privateKey->id; } // Update the GitHub app $githubApp->update($payload); return response()->json([ 'message' => 'GitHub app updated successfully', 'data' => $githubApp, ]); } catch (\Illuminate\Database\Eloquent\ModelNotFoundException $e) { return response()->json([ 'message' => 'GitHub app not found', ], 404); } } /** * Delete a GitHub app. */ #[OA\Delete( path: '/github-apps/{github_app_id}', operationId: 'deleteGithubApp', security: [ ['bearerAuth' => []], ], tags: ['GitHub Apps'], summary: 'Delete GitHub App', description: 'Delete a GitHub app if it\'s not being used by any applications.', parameters: [ new OA\Parameter( name: 'github_app_id', in: 'path', required: true, schema: new OA\Schema(type: 'integer'), description: 'GitHub App ID' ), ], responses: [ new OA\Response( response: 200, description: 'GitHub app deleted successfully', content: new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'message' => ['type' => 'string', 'example' => 'GitHub app deleted successfully'], ] ) ) ), new OA\Response(response: 401, description: 'Unauthorized'), new OA\Response(response: 404, description: 'GitHub app not found'), new OA\Response( response: 409, description: 'Conflict - GitHub app is in use', content: new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'message' => ['type' => 'string', 'example' => 'This GitHub app is being used by 5 application(s). Please delete all applications first.'], ] ) ) ), ] )] public function delete_github_app($github_app_id) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } try { $githubApp = GithubApp::where('id', $github_app_id) ->where('team_id', $teamId) ->firstOrFail(); // Check if the GitHub app is being used by any applications if ($githubApp->applications->isNotEmpty()) { $count = $githubApp->applications->count(); return response()->json([ 'message' => "This GitHub app is being used by {$count} application(s). Please delete all applications first.", ], 409); } $githubApp->delete(); return response()->json([ 'message' => 'GitHub app deleted successfully', ]); } catch (\Illuminate\Database\Eloquent\ModelNotFoundException $e) { return response()->json([ 'message' => 'GitHub app not found', ], 404); } } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Http/Controllers/Api/SecurityController.php
app/Http/Controllers/Api/SecurityController.php
<?php namespace App\Http\Controllers\Api; use App\Http\Controllers\Controller; use App\Models\PrivateKey; use Illuminate\Http\Request; use OpenApi\Attributes as OA; class SecurityController extends Controller { private function removeSensitiveData($team) { if (request()->attributes->get('can_read_sensitive', false) === false) { $team->makeHidden([ 'private_key', ]); } return serializeApiResponse($team); } #[OA\Get( summary: 'List', description: 'List all private keys.', path: '/security/keys', operationId: 'list-private-keys', security: [ ['bearerAuth' => []], ], tags: ['Private Keys'], responses: [ new OA\Response( response: 200, description: 'Get all private keys.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'array', items: new OA\Items(ref: '#/components/schemas/PrivateKey') ) ), ]), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), ] )] public function keys(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $keys = PrivateKey::where('team_id', $teamId)->get(); return response()->json($this->removeSensitiveData($keys)); } #[OA\Get( summary: 'Get', description: 'Get key by UUID.', path: '/security/keys/{uuid}', operationId: 'get-private-key-by-uuid', security: [ ['bearerAuth' => []], ], tags: ['Private Keys'], parameters: [ new OA\Parameter(name: 'uuid', in: 'path', required: true, description: 'Private Key UUID', schema: new OA\Schema(type: 'string')), ], responses: [ new OA\Response( response: 200, description: 'Get all private keys.', content: new OA\JsonContent(ref: '#/components/schemas/PrivateKey') ), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), new OA\Response( response: 404, description: 'Private Key not found.', ), ] )] public function key_by_uuid(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $key = PrivateKey::where('team_id', $teamId)->where('uuid', $request->uuid)->first(); if (is_null($key)) { return response()->json([ 'message' => 'Private Key not found.', ], 404); } return response()->json($this->removeSensitiveData($key)); } #[OA\Post( summary: 'Create', description: 'Create a new private key.', path: '/security/keys', operationId: 'create-private-key', security: [ ['bearerAuth' => []], ], tags: ['Private Keys'], requestBody: new OA\RequestBody( required: true, content: [ 'application/json' => new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', required: ['private_key'], properties: [ 'name' => ['type' => 'string'], 'description' => ['type' => 'string'], 'private_key' => ['type' => 'string'], ], additionalProperties: false, ) ), ] ), responses: [ new OA\Response( response: 201, description: 'The created private key\'s UUID.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'uuid' => ['type' => 'string'], ] ) ), ]), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), new OA\Response( response: 422, ref: '#/components/responses/422', ), ] )] public function create_key(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $return = validateIncomingRequest($request); if ($return instanceof \Illuminate\Http\JsonResponse) { return $return; } $validator = customApiValidator($request->all(), [ 'name' => 'string|max:255', 'description' => 'string|max:255', 'private_key' => 'required|string', ]); if ($validator->fails()) { $errors = $validator->errors(); return response()->json([ 'message' => 'Validation failed.', 'errors' => $errors, ], 422); } if (! $request->name) { $request->offsetSet('name', generate_random_name()); } if (! $request->description) { $request->offsetSet('description', 'Created by Coolify via API'); } $isPrivateKeyString = str_starts_with($request->private_key, '-----BEGIN'); if (! $isPrivateKeyString) { try { $base64PrivateKey = base64_decode($request->private_key); $request->offsetSet('private_key', $base64PrivateKey); } catch (\Exception $e) { return response()->json([ 'message' => 'Invalid private key.', ], 422); } } $isPrivateKeyValid = PrivateKey::validatePrivateKey($request->private_key); if (! $isPrivateKeyValid) { return response()->json([ 'message' => 'Invalid private key.', ], 422); } $fingerPrint = PrivateKey::generateFingerprint($request->private_key); $isFingerPrintExists = PrivateKey::fingerprintExists($fingerPrint); if ($isFingerPrintExists) { return response()->json([ 'message' => 'Private key already exists.', ], 422); } $key = PrivateKey::create([ 'team_id' => $teamId, 'name' => $request->name, 'description' => $request->description, 'private_key' => $request->private_key, ]); return response()->json(serializeApiResponse([ 'uuid' => $key->uuid, ]))->setStatusCode(201); } #[OA\Patch( summary: 'Update', description: 'Update a private key.', path: '/security/keys', operationId: 'update-private-key', security: [ ['bearerAuth' => []], ], tags: ['Private Keys'], requestBody: new OA\RequestBody( required: true, content: [ 'application/json' => new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', required: ['private_key'], properties: [ 'name' => ['type' => 'string'], 'description' => ['type' => 'string'], 'private_key' => ['type' => 'string'], ], additionalProperties: false, ) ), ] ), responses: [ new OA\Response( response: 201, description: 'The updated private key\'s UUID.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'uuid' => ['type' => 'string'], ] ) ), ]), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), new OA\Response( response: 422, ref: '#/components/responses/422', ), ] )] public function update_key(Request $request) { $allowedFields = ['name', 'description', 'private_key']; $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $return = validateIncomingRequest($request); if ($return instanceof \Illuminate\Http\JsonResponse) { return $return; } $validator = customApiValidator($request->all(), [ 'name' => 'string|max:255', 'description' => 'string|max:255', 'private_key' => 'required|string', ]); $extraFields = array_diff(array_keys($request->all()), $allowedFields); if ($validator->fails() || ! empty($extraFields)) { $errors = $validator->errors(); if (! empty($extraFields)) { foreach ($extraFields as $field) { $errors->add($field, 'This field is not allowed.'); } } return response()->json([ 'message' => 'Validation failed.', 'errors' => $errors, ], 422); } $foundKey = PrivateKey::where('team_id', $teamId)->where('uuid', $request->uuid)->first(); if (is_null($foundKey)) { return response()->json([ 'message' => 'Private Key not found.', ], 404); } $foundKey->update($request->all()); return response()->json(serializeApiResponse([ 'uuid' => $foundKey->uuid, ]))->setStatusCode(201); } #[OA\Delete( summary: 'Delete', description: 'Delete a private key.', path: '/security/keys/{uuid}', operationId: 'delete-private-key-by-uuid', security: [ ['bearerAuth' => []], ], tags: ['Private Keys'], parameters: [ new OA\Parameter(name: 'uuid', in: 'path', required: true, description: 'Private Key UUID', schema: new OA\Schema(type: 'string')), ], responses: [ new OA\Response( response: 200, description: 'Private Key deleted.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'message' => ['type' => 'string', 'example' => 'Private Key deleted.'], ] ) ), ]), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), new OA\Response( response: 404, description: 'Private Key not found.', ), new OA\Response( response: 422, description: 'Private Key is in use and cannot be deleted.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'message' => ['type' => 'string', 'example' => 'Private Key is in use and cannot be deleted.'], ] ) ), ]), ] )] public function delete_key(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } if (! $request->uuid) { return response()->json(['message' => 'UUID is required.'], 422); } $key = PrivateKey::where('team_id', $teamId)->where('uuid', $request->uuid)->first(); if (is_null($key)) { return response()->json(['message' => 'Private Key not found.'], 404); } if ($key->isInUse()) { return response()->json([ 'message' => 'Private Key is in use and cannot be deleted.', 'details' => 'This private key is currently being used by servers, applications, or Git integrations.', ], 422); } $key->forceDelete(); return response()->json([ 'message' => 'Private Key deleted.', ]); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Http/Controllers/Api/OpenApi.php
app/Http/Controllers/Api/OpenApi.php
<?php namespace App\Http\Controllers\Api; use OpenApi\Attributes as OA; #[OA\Info(title: 'Coolify', version: '0.1')] #[OA\Server(url: 'https://app.coolify.io/api/v1', description: 'Coolify Cloud API. Change the host to your own instance if you are self-hosting.')] #[OA\SecurityScheme( type: 'http', scheme: 'bearer', securityScheme: 'bearerAuth', description: 'Go to `Keys & Tokens` / `API tokens` and create a new token. Use the token as the bearer token.')] #[OA\Components( responses: [ new OA\Response( response: 400, description: 'Invalid token.', content: new OA\JsonContent( type: 'object', properties: [ new OA\Property(property: 'message', type: 'string', example: 'Invalid token.'), ] )), new OA\Response( response: 401, description: 'Unauthenticated.', content: new OA\JsonContent( type: 'object', properties: [ new OA\Property(property: 'message', type: 'string', example: 'Unauthenticated.'), ] )), new OA\Response( response: 404, description: 'Resource not found.', content: new OA\JsonContent( type: 'object', properties: [ new OA\Property(property: 'message', type: 'string', example: 'Resource not found.'), ] )), new OA\Response( response: 422, description: 'Validation error.', content: new OA\JsonContent( type: 'object', properties: [ new OA\Property(property: 'message', type: 'string', example: 'Validation error.'), new OA\Property( property: 'errors', type: 'object', additionalProperties: new OA\AdditionalProperties( type: 'array', items: new OA\Items(type: 'string') ), example: [ 'name' => ['The name field is required.'], 'api_url' => ['The api url field is required.', 'The api url format is invalid.'], ] ), ] )), new OA\Response( response: 429, description: 'Rate limit exceeded.', headers: [ new OA\Header( header: 'Retry-After', description: 'Number of seconds to wait before retrying.', schema: new OA\Schema(type: 'integer', example: 60) ), ], content: new OA\JsonContent( type: 'object', properties: [ new OA\Property(property: 'message', type: 'string', example: 'Rate limit exceeded. Please try again later.'), ] )), ], )] class OpenApi { // This class is used to generate OpenAPI documentation // for the Coolify API. It is not a controller and does // not contain any routes. It is used to define the // OpenAPI metadata and security scheme for the API. }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Http/Controllers/Api/ServersController.php
app/Http/Controllers/Api/ServersController.php
<?php namespace App\Http\Controllers\Api; use App\Actions\Server\DeleteServer; use App\Actions\Server\ValidateServer; use App\Enums\ProxyStatus; use App\Enums\ProxyTypes; use App\Http\Controllers\Controller; use App\Models\Application; use App\Models\PrivateKey; use App\Models\Project; use App\Models\Server as ModelsServer; use Illuminate\Http\Request; use OpenApi\Attributes as OA; use Stringable; class ServersController extends Controller { private function removeSensitiveDataFromSettings($settings) { if (request()->attributes->get('can_read_sensitive', false) === false) { $settings = $settings->makeHidden([ 'sentinel_token', ]); } return serializeApiResponse($settings); } private function removeSensitiveData($server) { $server->makeHidden([ 'id', ]); if (request()->attributes->get('can_read_sensitive', false) === false) { // Do nothing } return serializeApiResponse($server); } #[OA\Get( summary: 'List', description: 'List all servers.', path: '/servers', operationId: 'list-servers', security: [ ['bearerAuth' => []], ], tags: ['Servers'], responses: [ new OA\Response( response: 200, description: 'Get all servers.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'array', items: new OA\Items(ref: '#/components/schemas/Server') ) ), ]), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), ] )] public function servers(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $servers = ModelsServer::whereTeamId($teamId)->select('id', 'name', 'uuid', 'ip', 'user', 'port', 'description')->get()->load(['settings'])->map(function ($server) { $server['is_reachable'] = $server->settings->is_reachable; $server['is_usable'] = $server->settings->is_usable; return $server; }); $servers = $servers->map(function ($server) { $settings = $this->removeSensitiveDataFromSettings($server->settings); $server = $this->removeSensitiveData($server); data_set($server, 'settings', $settings); return $server; }); return response()->json($servers); } #[OA\Get( summary: 'Get', description: 'Get server by UUID.', path: '/servers/{uuid}', operationId: 'get-server-by-uuid', security: [ ['bearerAuth' => []], ], tags: ['Servers'], parameters: [ new OA\Parameter(name: 'uuid', in: 'path', required: true, description: 'Server\'s UUID', schema: new OA\Schema(type: 'string')), ], responses: [ new OA\Response( response: 200, description: 'Get server by UUID', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( ref: '#/components/schemas/Server' ) ), ]), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), new OA\Response( response: 404, ref: '#/components/responses/404', ), ] )] public function server_by_uuid(Request $request) { $with_resources = $request->query('resources'); $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $server = ModelsServer::whereTeamId($teamId)->whereUuid(request()->uuid)->first(); if (is_null($server)) { return response()->json(['message' => 'Server not found.'], 404); } if ($with_resources) { $server['resources'] = $server->definedResources()->map(function ($resource) { $payload = [ 'id' => $resource->id, 'uuid' => $resource->uuid, 'name' => $resource->name, 'type' => $resource->type(), 'created_at' => $resource->created_at, 'updated_at' => $resource->updated_at, ]; $payload['status'] = $resource->status; return $payload; }); } else { $server->load(['settings']); } $settings = $this->removeSensitiveDataFromSettings($server->settings); $server = $this->removeSensitiveData($server); data_set($server, 'settings', $settings); return response()->json(serializeApiResponse($server)); } #[OA\Get( summary: 'Resources', description: 'Get resources by server.', path: '/servers/{uuid}/resources', operationId: 'get-resources-by-server-uuid', security: [ ['bearerAuth' => []], ], tags: ['Servers'], parameters: [ new OA\Parameter(name: 'uuid', in: 'path', required: true, description: 'Server\'s UUID', schema: new OA\Schema(type: 'string')), ], responses: [ new OA\Response( response: 200, description: 'Get resources by server', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'array', items: new OA\Items( type: 'object', properties: [ 'id' => ['type' => 'integer'], 'uuid' => ['type' => 'string'], 'name' => ['type' => 'string'], 'type' => ['type' => 'string'], 'created_at' => ['type' => 'string'], 'updated_at' => ['type' => 'string'], 'status' => ['type' => 'string'], ] ) )), ]), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), ] )] public function resources_by_server(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $server = ModelsServer::whereTeamId($teamId)->whereUuid(request()->uuid)->first(); if (is_null($server)) { return response()->json(['message' => 'Server not found.'], 404); } $server['resources'] = $server->definedResources()->map(function ($resource) { $payload = [ 'id' => $resource->id, 'uuid' => $resource->uuid, 'name' => $resource->name, 'type' => $resource->type(), 'created_at' => $resource->created_at, 'updated_at' => $resource->updated_at, ]; $payload['status'] = $resource->status; return $payload; }); $server = $this->removeSensitiveData($server); return response()->json(serializeApiResponse(data_get($server, 'resources'))); } #[OA\Get( summary: 'Domains', description: 'Get domains by server.', path: '/servers/{uuid}/domains', operationId: 'get-domains-by-server-uuid', security: [ ['bearerAuth' => []], ], tags: ['Servers'], parameters: [ new OA\Parameter(name: 'uuid', in: 'path', required: true, description: 'Server\'s UUID', schema: new OA\Schema(type: 'string')), ], responses: [ new OA\Response( response: 200, description: 'Get domains by server', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'array', items: new OA\Items( type: 'object', properties: [ 'ip' => ['type' => 'string'], 'domains' => ['type' => 'array', 'items' => ['type' => 'string']], ] ) )), ]), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), ] )] public function domains_by_server(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $uuid = $request->get('uuid'); if ($uuid) { $domains = Application::getDomainsByUuid($uuid); return response()->json(serializeApiResponse($domains)); } $projects = Project::where('team_id', $teamId)->get(); $domains = collect(); $applications = $projects->pluck('applications')->flatten(); $settings = instanceSettings(); if ($applications->count() > 0) { foreach ($applications as $application) { $ip = $application->destination->server->ip; $fqdn = str($application->fqdn)->explode(',')->map(function ($fqdn) { $f = str($fqdn)->replace('http://', '')->replace('https://', '')->explode('/'); return str(str($f[0])->explode(':')[0]); })->filter(function (Stringable $fqdn) { return $fqdn->isNotEmpty(); }); if ($ip === 'host.docker.internal') { if ($settings->public_ipv4) { $domains->push([ 'domain' => $fqdn, 'ip' => $settings->public_ipv4, ]); } if ($settings->public_ipv6) { $domains->push([ 'domain' => $fqdn, 'ip' => $settings->public_ipv6, ]); } if (! $settings->public_ipv4 && ! $settings->public_ipv6) { $domains->push([ 'domain' => $fqdn, 'ip' => $ip, ]); } } else { $domains->push([ 'domain' => $fqdn, 'ip' => $ip, ]); } } } $services = $projects->pluck('services')->flatten(); if ($services->count() > 0) { foreach ($services as $service) { $service_applications = $service->applications; if ($service_applications->count() > 0) { foreach ($service_applications as $application) { $fqdn = str($application->fqdn)->explode(',')->map(function ($fqdn) { $f = str($fqdn)->replace('http://', '')->replace('https://', '')->explode('/'); return str(str($f[0])->explode(':')[0]); })->filter(function (Stringable $fqdn) { return $fqdn->isNotEmpty(); }); if ($ip === 'host.docker.internal') { if ($settings->public_ipv4) { $domains->push([ 'domain' => $fqdn, 'ip' => $settings->public_ipv4, ]); } if ($settings->public_ipv6) { $domains->push([ 'domain' => $fqdn, 'ip' => $settings->public_ipv6, ]); } if (! $settings->public_ipv4 && ! $settings->public_ipv6) { $domains->push([ 'domain' => $fqdn, 'ip' => $ip, ]); } } else { $domains->push([ 'domain' => $fqdn, 'ip' => $ip, ]); } } } } } $domains = $domains->groupBy('ip')->map(function ($domain) { return $domain->pluck('domain')->flatten(); })->map(function ($domain, $ip) { return [ 'ip' => $ip, 'domains' => $domain, ]; })->values(); return response()->json(serializeApiResponse($domains)); } #[OA\Post( summary: 'Create', description: 'Create Server.', path: '/servers', operationId: 'create-server', security: [ ['bearerAuth' => []], ], tags: ['Servers'], requestBody: new OA\RequestBody( required: true, description: 'Server created.', content: new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'name' => ['type' => 'string', 'example' => 'My Server', 'description' => 'The name of the server.'], 'description' => ['type' => 'string', 'example' => 'My Server Description', 'description' => 'The description of the server.'], 'ip' => ['type' => 'string', 'example' => '127.0.0.1', 'description' => 'The IP of the server.'], 'port' => ['type' => 'integer', 'example' => 22, 'description' => 'The port of the server.'], 'user' => ['type' => 'string', 'example' => 'root', 'description' => 'The user of the server.'], 'private_key_uuid' => ['type' => 'string', 'example' => 'og888os', 'description' => 'The UUID of the private key.'], 'is_build_server' => ['type' => 'boolean', 'example' => false, 'description' => 'Is build server.'], 'instant_validate' => ['type' => 'boolean', 'example' => false, 'description' => 'Instant validate.'], 'proxy_type' => ['type' => 'string', 'enum' => ['traefik', 'caddy', 'none'], 'example' => 'traefik', 'description' => 'The proxy type.'], ], ), ), ), responses: [ new OA\Response( response: 201, description: 'Server created.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'uuid' => ['type' => 'string', 'example' => 'og888os', 'description' => 'The UUID of the server.'], ] ) ), ]), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), new OA\Response( response: 404, ref: '#/components/responses/404', ), new OA\Response( response: 422, ref: '#/components/responses/422', ), ] )] public function create_server(Request $request) { $allowedFields = ['name', 'description', 'ip', 'port', 'user', 'private_key_uuid', 'is_build_server', 'instant_validate', 'proxy_type']; $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $return = validateIncomingRequest($request); if ($return instanceof \Illuminate\Http\JsonResponse) { return $return; } $validator = customApiValidator($request->all(), [ 'name' => 'string|max:255', 'description' => 'string|nullable', 'ip' => 'string|required', 'port' => 'integer|nullable', 'private_key_uuid' => 'string|required', 'user' => 'string|nullable', 'is_build_server' => 'boolean|nullable', 'instant_validate' => 'boolean|nullable', 'proxy_type' => 'string|nullable', ]); $extraFields = array_diff(array_keys($request->all()), $allowedFields); if ($validator->fails() || ! empty($extraFields)) { $errors = $validator->errors(); if (! empty($extraFields)) { foreach ($extraFields as $field) { $errors->add($field, 'This field is not allowed.'); } } return response()->json([ 'message' => 'Validation failed.', 'errors' => $errors, ], 422); } if (! $request->name) { $request->offsetSet('name', generate_random_name()); } if (! $request->user) { $request->offsetSet('user', 'root'); } if (is_null($request->port)) { $request->offsetSet('port', 22); } if (is_null($request->is_build_server)) { $request->offsetSet('is_build_server', false); } if (is_null($request->instant_validate)) { $request->offsetSet('instant_validate', false); } if ($request->proxy_type) { $validProxyTypes = collect(ProxyTypes::cases())->map(function ($proxyType) { return str($proxyType->value)->lower(); }); if (! $validProxyTypes->contains(str($request->proxy_type)->lower())) { return response()->json(['message' => 'Invalid proxy type.'], 422); } } $privateKey = PrivateKey::whereTeamId($teamId)->whereUuid($request->private_key_uuid)->first(); if (! $privateKey) { return response()->json(['message' => 'Private key not found.'], 404); } $allServers = ModelsServer::whereIp($request->ip)->get(); if ($allServers->count() > 0) { return response()->json(['message' => 'Server with this IP already exists.'], 400); } $proxyType = $request->proxy_type ? str($request->proxy_type)->upper() : ProxyTypes::TRAEFIK->value; $server = ModelsServer::create([ 'name' => $request->name, 'description' => $request->description, 'ip' => $request->ip, 'port' => $request->port, 'user' => $request->user, 'private_key_id' => $privateKey->id, 'team_id' => $teamId, ]); $server->proxy->set('type', $proxyType); $server->proxy->set('status', ProxyStatus::EXITED->value); $server->save(); $server->settings()->update([ 'is_build_server' => $request->is_build_server, ]); if ($request->instant_validate) { ValidateServer::dispatch($server); } return response()->json([ 'uuid' => $server->uuid, ])->setStatusCode(201); } #[OA\Patch( summary: 'Update', description: 'Update Server.', path: '/servers/{uuid}', operationId: 'update-server-by-uuid', security: [ ['bearerAuth' => []], ], tags: ['Servers'], parameters: [ new OA\Parameter(name: 'uuid', in: 'path', required: true, description: 'Server UUID', schema: new OA\Schema(type: 'string')), ], requestBody: new OA\RequestBody( required: true, description: 'Server updated.', content: new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'name' => ['type' => 'string', 'description' => 'The name of the server.'], 'description' => ['type' => 'string', 'description' => 'The description of the server.'], 'ip' => ['type' => 'string', 'description' => 'The IP of the server.'], 'port' => ['type' => 'integer', 'description' => 'The port of the server.'], 'user' => ['type' => 'string', 'description' => 'The user of the server.'], 'private_key_uuid' => ['type' => 'string', 'description' => 'The UUID of the private key.'], 'is_build_server' => ['type' => 'boolean', 'description' => 'Is build server.'], 'instant_validate' => ['type' => 'boolean', 'description' => 'Instant validate.'], 'proxy_type' => ['type' => 'string', 'enum' => ['traefik', 'caddy', 'none'], 'description' => 'The proxy type.'], ], ), ), ), responses: [ new OA\Response( response: 201, description: 'Server updated.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( ref: '#/components/schemas/Server' ) ), ]), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), new OA\Response( response: 404, ref: '#/components/responses/404', ), new OA\Response( response: 422, ref: '#/components/responses/422', ), ] )] public function update_server(Request $request) { $allowedFields = ['name', 'description', 'ip', 'port', 'user', 'private_key_uuid', 'is_build_server', 'instant_validate', 'proxy_type']; $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $return = validateIncomingRequest($request); if ($return instanceof \Illuminate\Http\JsonResponse) { return $return; } $validator = customApiValidator($request->all(), [ 'name' => 'string|max:255|nullable', 'description' => 'string|nullable', 'ip' => 'string|nullable', 'port' => 'integer|nullable', 'private_key_uuid' => 'string|nullable', 'user' => 'string|nullable', 'is_build_server' => 'boolean|nullable', 'instant_validate' => 'boolean|nullable', 'proxy_type' => 'string|nullable', ]); $extraFields = array_diff(array_keys($request->all()), $allowedFields); if ($validator->fails() || ! empty($extraFields)) { $errors = $validator->errors(); if (! empty($extraFields)) { foreach ($extraFields as $field) { $errors->add($field, 'This field is not allowed.'); } } return response()->json([ 'message' => 'Validation failed.', 'errors' => $errors, ], 422); } $server = ModelsServer::whereTeamId($teamId)->whereUuid($request->uuid)->first(); if (! $server) { return response()->json(['message' => 'Server not found.'], 404); } if ($request->proxy_type) { $validProxyTypes = collect(ProxyTypes::cases())->map(function ($proxyType) { return str($proxyType->value)->lower(); }); if ($validProxyTypes->contains(str($request->proxy_type)->lower())) { $server->changeProxy($request->proxy_type, async: true); } else { return response()->json(['message' => 'Invalid proxy type.'], 422); } } $server->update($request->only(['name', 'description', 'ip', 'port', 'user'])); if ($request->is_build_server) { $server->settings()->update([ 'is_build_server' => $request->is_build_server, ]); } if ($request->instant_validate) { ValidateServer::dispatch($server); } return response()->json([ 'uuid' => $server->uuid, ])->setStatusCode(201); } #[OA\Delete( summary: 'Delete', description: 'Delete server by UUID.', path: '/servers/{uuid}', operationId: 'delete-server-by-uuid', security: [ ['bearerAuth' => []], ], tags: ['Servers'], parameters: [ new OA\Parameter( name: 'uuid', in: 'path', description: 'UUID of the server.', required: true, schema: new OA\Schema( type: 'string', format: 'uuid', ) ), ], responses: [ new OA\Response( response: 200, description: 'Server deleted.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'message' => ['type' => 'string', 'example' => 'Server deleted.'], ] ) ), ]), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), new OA\Response( response: 404, ref: '#/components/responses/404', ), new OA\Response( response: 422, ref: '#/components/responses/422', ), ] )] public function delete_server(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } if (! $request->uuid) { return response()->json(['message' => 'Uuid is required.'], 422); } $server = ModelsServer::whereTeamId($teamId)->whereUuid($request->uuid)->first(); if (! $server) { return response()->json(['message' => 'Server not found.'], 404); } if ($server->definedResources()->count() > 0) { return response()->json(['message' => 'Server has resources, so you need to delete them before.'], 400); } if ($server->isLocalhost()) { return response()->json(['message' => 'Local server cannot be deleted.'], 400); } $server->delete(); DeleteServer::dispatch( $server->id, false, // Don't delete from Hetzner via API $server->hetzner_server_id, $server->cloud_provider_token_id, $server->team_id ); return response()->json(['message' => 'Server deleted.']); } #[OA\Get( summary: 'Validate', description: 'Validate server by UUID.', path: '/servers/{uuid}/validate', operationId: 'validate-server-by-uuid', security: [ ['bearerAuth' => []], ], tags: ['Servers'], parameters: [ new OA\Parameter(name: 'uuid', in: 'path', required: true, description: 'Server UUID', schema: new OA\Schema(type: 'string')), ], responses: [ new OA\Response( response: 201, description: 'Server validation started.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'message' => ['type' => 'string', 'example' => 'Validation started.'], ] ) ), ]), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), new OA\Response( response: 404, ref: '#/components/responses/404', ), new OA\Response( response: 422, ref: '#/components/responses/422', ), ] )] public function validate_server(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } if (! $request->uuid) { return response()->json(['message' => 'Uuid is required.'], 422); } $server = ModelsServer::whereTeamId($teamId)->whereUuid($request->uuid)->first(); if (! $server) { return response()->json(['message' => 'Server not found.'], 404); } ValidateServer::dispatch($server); return response()->json(['message' => 'Validation started.'], 201); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Http/Controllers/Api/ServicesController.php
app/Http/Controllers/Api/ServicesController.php
<?php namespace App\Http\Controllers\Api; use App\Actions\Service\RestartService; use App\Actions\Service\StartService; use App\Actions\Service\StopService; use App\Http\Controllers\Controller; use App\Jobs\DeleteResourceJob; use App\Models\EnvironmentVariable; use App\Models\Project; use App\Models\Server; use App\Models\Service; use Illuminate\Http\Request; use OpenApi\Attributes as OA; use Symfony\Component\Yaml\Yaml; class ServicesController extends Controller { private function removeSensitiveData($service) { $service->makeHidden([ 'id', 'resourceable', 'resourceable_id', 'resourceable_type', ]); if (request()->attributes->get('can_read_sensitive', false) === false) { $service->makeHidden([ 'docker_compose_raw', 'docker_compose', 'value', 'real_value', ]); } return serializeApiResponse($service); } #[OA\Get( summary: 'List', description: 'List all services.', path: '/services', operationId: 'list-services', security: [ ['bearerAuth' => []], ], tags: ['Services'], responses: [ new OA\Response( response: 200, description: 'Get all services', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'array', items: new OA\Items(ref: '#/components/schemas/Service') ) ), ] ), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), ] )] public function services(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $projects = Project::where('team_id', $teamId)->get(); $services = collect(); foreach ($projects as $project) { $services->push($project->services()->get()); } foreach ($services as $service) { $service = $this->removeSensitiveData($service); } return response()->json($services->flatten()); } #[OA\Post( summary: 'Create service', description: 'Create a one-click / custom service', path: '/services', operationId: 'create-service', security: [ ['bearerAuth' => []], ], tags: ['Services'], requestBody: new OA\RequestBody( required: true, content: new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', required: ['server_uuid', 'project_uuid', 'environment_name', 'environment_uuid'], properties: [ 'type' => [ 'description' => 'The one-click service type', 'type' => 'string', 'enum' => [ 'activepieces', 'appsmith', 'appwrite', 'authentik', 'babybuddy', 'budge', 'changedetection', 'chatwoot', 'classicpress-with-mariadb', 'classicpress-with-mysql', 'classicpress-without-database', 'cloudflared', 'code-server', 'dashboard', 'directus', 'directus-with-postgresql', 'docker-registry', 'docuseal', 'docuseal-with-postgres', 'dokuwiki', 'duplicati', 'emby', 'embystat', 'fider', 'filebrowser', 'firefly', 'formbricks', 'ghost', 'gitea', 'gitea-with-mariadb', 'gitea-with-mysql', 'gitea-with-postgresql', 'glance', 'glances', 'glitchtip', 'grafana', 'grafana-with-postgresql', 'grocy', 'heimdall', 'homepage', 'jellyfin', 'kuzzle', 'listmonk', 'logto', 'mediawiki', 'meilisearch', 'metabase', 'metube', 'minio', 'moodle', 'n8n', 'n8n-with-postgresql', 'next-image-transformation', 'nextcloud', 'nocodb', 'odoo', 'openblocks', 'pairdrop', 'penpot', 'phpmyadmin', 'pocketbase', 'posthog', 'reactive-resume', 'rocketchat', 'shlink', 'slash', 'snapdrop', 'statusnook', 'stirling-pdf', 'supabase', 'syncthing', 'tolgee', 'trigger', 'trigger-with-external-database', 'twenty', 'umami', 'unleash-with-postgresql', 'unleash-without-database', 'uptime-kuma', 'vaultwarden', 'vikunja', 'weblate', 'whoogle', 'wordpress-with-mariadb', 'wordpress-with-mysql', 'wordpress-without-database', ], ], 'name' => ['type' => 'string', 'maxLength' => 255, 'description' => 'Name of the service.'], 'description' => ['type' => 'string', 'nullable' => true, 'description' => 'Description of the service.'], 'project_uuid' => ['type' => 'string', 'description' => 'Project UUID.'], 'environment_name' => ['type' => 'string', 'description' => 'Environment name. You need to provide at least one of environment_name or environment_uuid.'], 'environment_uuid' => ['type' => 'string', 'description' => 'Environment UUID. You need to provide at least one of environment_name or environment_uuid.'], 'server_uuid' => ['type' => 'string', 'description' => 'Server UUID.'], 'destination_uuid' => ['type' => 'string', 'description' => 'Destination UUID. Required if server has multiple destinations.'], 'instant_deploy' => ['type' => 'boolean', 'default' => false, 'description' => 'Start the service immediately after creation.'], 'docker_compose_raw' => ['type' => 'string', 'description' => 'The Docker Compose raw content.'], ], ), ), ), responses: [ new OA\Response( response: 201, description: 'Service created successfully.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'uuid' => ['type' => 'string', 'description' => 'Service UUID.'], 'domains' => ['type' => 'array', 'items' => ['type' => 'string'], 'description' => 'Service domains.'], ] ) ), ] ), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), new OA\Response( response: 422, ref: '#/components/responses/422', ), ] )] public function create_service(Request $request) { $allowedFields = ['type', 'name', 'description', 'project_uuid', 'environment_name', 'environment_uuid', 'server_uuid', 'destination_uuid', 'instant_deploy', 'docker_compose_raw']; $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $this->authorize('create', Service::class); $return = validateIncomingRequest($request); if ($return instanceof \Illuminate\Http\JsonResponse) { return $return; } $validator = customApiValidator($request->all(), [ 'type' => 'string|required_without:docker_compose_raw', 'docker_compose_raw' => 'string|required_without:type', 'project_uuid' => 'string|required', 'environment_name' => 'string|nullable', 'environment_uuid' => 'string|nullable', 'server_uuid' => 'string|required', 'destination_uuid' => 'string|nullable', 'name' => 'string|max:255', 'description' => 'string|nullable', 'instant_deploy' => 'boolean', ]); $extraFields = array_diff(array_keys($request->all()), $allowedFields); if ($validator->fails() || ! empty($extraFields)) { $errors = $validator->errors(); if (! empty($extraFields)) { foreach ($extraFields as $field) { $errors->add($field, 'This field is not allowed.'); } } return response()->json([ 'message' => 'Validation failed.', 'errors' => $errors, ], 422); } $environmentUuid = $request->environment_uuid; $environmentName = $request->environment_name; if (blank($environmentUuid) && blank($environmentName)) { return response()->json(['message' => 'You need to provide at least one of environment_name or environment_uuid.'], 422); } $serverUuid = $request->server_uuid; $instantDeploy = $request->instant_deploy ?? false; if ($request->is_public && ! $request->public_port) { $request->offsetSet('is_public', false); } $project = Project::whereTeamId($teamId)->whereUuid($request->project_uuid)->first(); if (! $project) { return response()->json(['message' => 'Project not found.'], 404); } $environment = $project->environments()->where('name', $environmentName)->first(); if (! $environment) { $environment = $project->environments()->where('uuid', $environmentUuid)->first(); } if (! $environment) { return response()->json(['message' => 'Environment not found.'], 404); } $server = Server::whereTeamId($teamId)->whereUuid($serverUuid)->first(); if (! $server) { return response()->json(['message' => 'Server not found.'], 404); } $destinations = $server->destinations(); if ($destinations->count() == 0) { return response()->json(['message' => 'Server has no destinations.'], 400); } if ($destinations->count() > 1 && ! $request->has('destination_uuid')) { return response()->json(['message' => 'Server has multiple destinations and you do not set destination_uuid.'], 400); } $destination = $destinations->first(); $services = get_service_templates(); $serviceKeys = $services->keys(); if ($serviceKeys->contains($request->type)) { $oneClickServiceName = $request->type; $oneClickService = data_get($services, "$oneClickServiceName.compose"); $oneClickDotEnvs = data_get($services, "$oneClickServiceName.envs", null); if ($oneClickDotEnvs) { $oneClickDotEnvs = str(base64_decode($oneClickDotEnvs))->split('/\r\n|\r|\n/')->filter(function ($value) { return ! empty($value); }); } if ($oneClickService) { $dockerComposeRaw = base64_decode($oneClickService); // Validate for command injection BEFORE creating service try { validateDockerComposeForInjection($dockerComposeRaw); } catch (\Exception $e) { return response()->json([ 'message' => 'Validation failed.', 'errors' => [ 'docker_compose_raw' => $e->getMessage(), ], ], 422); } $servicePayload = [ 'name' => "$oneClickServiceName-".str()->random(10), 'docker_compose_raw' => $dockerComposeRaw, 'environment_id' => $environment->id, 'service_type' => $oneClickServiceName, 'server_id' => $server->id, 'destination_id' => $destination->id, 'destination_type' => $destination->getMorphClass(), ]; if (in_array($oneClickServiceName, NEEDS_TO_CONNECT_TO_PREDEFINED_NETWORK)) { data_set($servicePayload, 'connect_to_docker_network', true); } $service = Service::create($servicePayload); $service->name = "$oneClickServiceName-".$service->uuid; $service->save(); if ($oneClickDotEnvs?->count() > 0) { $oneClickDotEnvs->each(function ($value) use ($service) { $key = str()->before($value, '='); $value = str(str()->after($value, '=')); $generatedValue = $value; if ($value->contains('SERVICE_')) { $command = $value->after('SERVICE_')->beforeLast('_'); $generatedValue = generateEnvValue($command->value(), $service); } EnvironmentVariable::create([ 'key' => $key, 'value' => $generatedValue, 'resourceable_id' => $service->id, 'resourceable_type' => $service->getMorphClass(), 'is_preview' => false, ]); }); } $service->parse(isNew: true); // Apply service-specific application prerequisites applyServiceApplicationPrerequisites($service); if ($instantDeploy) { StartService::dispatch($service); } $domains = $service->applications()->get()->pluck('fqdn')->sort(); $domains = $domains->map(function ($domain) { if (count(explode(':', $domain)) > 2) { return str($domain)->beforeLast(':')->value(); } return $domain; }); return response()->json([ 'uuid' => $service->uuid, 'domains' => $domains, ]); } return response()->json(['message' => 'Service not found.', 'valid_service_types' => $serviceKeys], 404); } elseif (filled($request->docker_compose_raw)) { $allowedFields = ['name', 'description', 'project_uuid', 'environment_name', 'environment_uuid', 'server_uuid', 'destination_uuid', 'instant_deploy', 'docker_compose_raw', 'connect_to_docker_network']; $validator = customApiValidator($request->all(), [ 'project_uuid' => 'string|required', 'environment_name' => 'string|nullable', 'environment_uuid' => 'string|nullable', 'server_uuid' => 'string|required', 'destination_uuid' => 'string', 'name' => 'string|max:255', 'description' => 'string|nullable', 'instant_deploy' => 'boolean', 'connect_to_docker_network' => 'boolean', 'docker_compose_raw' => 'string|required', ]); $extraFields = array_diff(array_keys($request->all()), $allowedFields); if ($validator->fails() || ! empty($extraFields)) { $errors = $validator->errors(); if (! empty($extraFields)) { foreach ($extraFields as $field) { $errors->add($field, 'This field is not allowed.'); } } return response()->json([ 'message' => 'Validation failed.', 'errors' => $errors, ], 422); } $environmentUuid = $request->environment_uuid; $environmentName = $request->environment_name; if (blank($environmentUuid) && blank($environmentName)) { return response()->json(['message' => 'You need to provide at least one of environment_name or environment_uuid.'], 422); } $serverUuid = $request->server_uuid; $projectUuid = $request->project_uuid; $project = Project::whereTeamId($teamId)->whereUuid($projectUuid)->first(); if (! $project) { return response()->json(['message' => 'Project not found.'], 404); } $environment = $project->environments()->where('name', $environmentName)->first(); if (! $environment) { $environment = $project->environments()->where('uuid', $environmentUuid)->first(); } if (! $environment) { return response()->json(['message' => 'Environment not found.'], 404); } $server = Server::whereTeamId($teamId)->whereUuid($serverUuid)->first(); if (! $server) { return response()->json(['message' => 'Server not found.'], 404); } $destinations = $server->destinations(); if ($destinations->count() == 0) { return response()->json(['message' => 'Server has no destinations.'], 400); } if ($destinations->count() > 1 && ! $request->has('destination_uuid')) { return response()->json(['message' => 'Server has multiple destinations and you do not set destination_uuid.'], 400); } $destination = $destinations->first(); if (! isBase64Encoded($request->docker_compose_raw)) { return response()->json([ 'message' => 'Validation failed.', 'errors' => [ 'docker_compose_raw' => 'The docker_compose_raw should be base64 encoded.', ], ], 422); } $dockerComposeRaw = base64_decode($request->docker_compose_raw); if (mb_detect_encoding($dockerComposeRaw, 'ASCII', true) === false) { return response()->json([ 'message' => 'Validation failed.', 'errors' => [ 'docker_compose_raw' => 'The docker_compose_raw should be base64 encoded.', ], ], 422); } $dockerCompose = base64_decode($request->docker_compose_raw); $dockerComposeRaw = Yaml::dump(Yaml::parse($dockerCompose), 10, 2, Yaml::DUMP_MULTI_LINE_LITERAL_BLOCK); // Validate for command injection BEFORE saving to database try { validateDockerComposeForInjection($dockerComposeRaw); } catch (\Exception $e) { return response()->json([ 'message' => 'Validation failed.', 'errors' => [ 'docker_compose_raw' => $e->getMessage(), ], ], 422); } $connectToDockerNetwork = $request->connect_to_docker_network ?? false; $instantDeploy = $request->instant_deploy ?? false; $service = new Service; $service->name = $request->name ?? 'service-'.str()->random(10); $service->description = $request->description; $service->docker_compose_raw = $dockerComposeRaw; $service->environment_id = $environment->id; $service->server_id = $server->id; $service->destination_id = $destination->id; $service->destination_type = $destination->getMorphClass(); $service->connect_to_docker_network = $connectToDockerNetwork; $service->save(); $service->parse(isNew: true); if ($instantDeploy) { StartService::dispatch($service); } $domains = $service->applications()->get()->pluck('fqdn')->sort(); $domains = $domains->map(function ($domain) { if (count(explode(':', $domain)) > 2) { return str($domain)->beforeLast(':')->value(); } return $domain; })->values(); return response()->json([ 'uuid' => $service->uuid, 'domains' => $domains, ])->setStatusCode(201); } else { return response()->json(['message' => 'No service type or docker_compose_raw provided.'], 400); } } #[OA\Get( summary: 'Get', description: 'Get service by UUID.', path: '/services/{uuid}', operationId: 'get-service-by-uuid', security: [ ['bearerAuth' => []], ], tags: ['Services'], parameters: [ new OA\Parameter(name: 'uuid', in: 'path', required: true, description: 'Service UUID', schema: new OA\Schema(type: 'string')), ], responses: [ new OA\Response( response: 200, description: 'Get a service by UUID.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( ref: '#/components/schemas/Service' ) ), ] ), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), new OA\Response( response: 404, ref: '#/components/responses/404', ), ] )] public function service_by_uuid(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } if (! $request->uuid) { return response()->json(['message' => 'UUID is required.'], 404); } $service = Service::whereRelation('environment.project.team', 'id', $teamId)->whereUuid($request->uuid)->first(); if (! $service) { return response()->json(['message' => 'Service not found.'], 404); } $this->authorize('view', $service); $service = $service->load(['applications', 'databases']); return response()->json($this->removeSensitiveData($service)); } #[OA\Delete( summary: 'Delete', description: 'Delete service by UUID.', path: '/services/{uuid}', operationId: 'delete-service-by-uuid', security: [ ['bearerAuth' => []], ], tags: ['Services'], parameters: [ new OA\Parameter(name: 'uuid', in: 'path', required: true, description: 'Service UUID', schema: new OA\Schema(type: 'string')), new OA\Parameter(name: 'delete_configurations', in: 'query', required: false, description: 'Delete configurations.', schema: new OA\Schema(type: 'boolean', default: true)), new OA\Parameter(name: 'delete_volumes', in: 'query', required: false, description: 'Delete volumes.', schema: new OA\Schema(type: 'boolean', default: true)), new OA\Parameter(name: 'docker_cleanup', in: 'query', required: false, description: 'Run docker cleanup.', schema: new OA\Schema(type: 'boolean', default: true)), new OA\Parameter(name: 'delete_connected_networks', in: 'query', required: false, description: 'Delete connected networks.', schema: new OA\Schema(type: 'boolean', default: true)), ], responses: [ new OA\Response( response: 200, description: 'Delete a service by UUID', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'message' => ['type' => 'string', 'example' => 'Service deletion request queued.'], ], ) ), ] ), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), new OA\Response( response: 404, ref: '#/components/responses/404', ), ] )] public function delete_by_uuid(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } if (! $request->uuid) { return response()->json(['message' => 'UUID is required.'], 404); } $service = Service::whereRelation('environment.project.team', 'id', $teamId)->whereUuid($request->uuid)->first(); if (! $service) { return response()->json(['message' => 'Service not found.'], 404); } $this->authorize('delete', $service); DeleteResourceJob::dispatch( resource: $service, deleteVolumes: $request->boolean('delete_volumes', true), deleteConnectedNetworks: $request->boolean('delete_connected_networks', true), deleteConfigurations: $request->boolean('delete_configurations', true), dockerCleanup: $request->boolean('docker_cleanup', true) ); return response()->json([ 'message' => 'Service deletion request queued.', ]); } #[OA\Patch( summary: 'Update', description: 'Update service by UUID.', path: '/services/{uuid}', operationId: 'update-service-by-uuid', security: [ ['bearerAuth' => []], ], tags: ['Services'], parameters: [ new OA\Parameter( name: 'uuid', in: 'path', description: 'UUID of the service.', required: true, schema: new OA\Schema( type: 'string', format: 'uuid', ) ), ], requestBody: new OA\RequestBody( description: 'Service updated.', required: true, content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'name' => ['type' => 'string', 'description' => 'The service name.'], 'description' => ['type' => 'string', 'description' => 'The service description.'], 'project_uuid' => ['type' => 'string', 'description' => 'The project UUID.'], 'environment_name' => ['type' => 'string', 'description' => 'The environment name.'], 'environment_uuid' => ['type' => 'string', 'description' => 'The environment UUID.'], 'server_uuid' => ['type' => 'string', 'description' => 'The server UUID.'], 'destination_uuid' => ['type' => 'string', 'description' => 'The destination UUID.'], 'instant_deploy' => ['type' => 'boolean', 'description' => 'The flag to indicate if the service should be deployed instantly.'], 'connect_to_docker_network' => ['type' => 'boolean', 'default' => false, 'description' => 'Connect the service to the predefined docker network.'], 'docker_compose_raw' => ['type' => 'string', 'description' => 'The Docker Compose raw content.'], ], ) ), ] ), responses: [ new OA\Response( response: 200, description: 'Service updated.', content: [ new OA\MediaType( mediaType: 'application/json', schema: new OA\Schema( type: 'object', properties: [ 'uuid' => ['type' => 'string', 'description' => 'Service UUID.'], 'domains' => ['type' => 'array', 'items' => ['type' => 'string'], 'description' => 'Service domains.'], ] ) ), ] ), new OA\Response( response: 401, ref: '#/components/responses/401', ), new OA\Response( response: 400, ref: '#/components/responses/400', ), new OA\Response( response: 404, ref: '#/components/responses/404', ), new OA\Response( response: 422, ref: '#/components/responses/422', ), ] )] public function update_by_uuid(Request $request) { $teamId = getTeamIdFromToken(); if (is_null($teamId)) { return invalidTokenResponse(); } $return = validateIncomingRequest($request); if ($return instanceof \Illuminate\Http\JsonResponse) { return $return; }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
true
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Http/Middleware/ApiAllowed.php
app/Http/Middleware/ApiAllowed.php
<?php namespace App\Http\Middleware; use Closure; use Illuminate\Http\Request; use Symfony\Component\HttpFoundation\Response; class ApiAllowed { public function handle(Request $request, Closure $next): Response { if (isCloud()) { return $next($request); } $settings = instanceSettings(); if ($settings->is_api_enabled === false) { return response()->json(['success' => true, 'message' => 'API is disabled.'], 403); } if ($settings->allowed_ips) { // Check for special case: 0.0.0.0 means allow all if (trim($settings->allowed_ips) === '0.0.0.0') { return $next($request); } $allowedIps = explode(',', $settings->allowed_ips); $allowedIps = array_map('trim', $allowedIps); $allowedIps = array_filter($allowedIps); // Remove empty entries if (! empty($allowedIps) && ! checkIPAgainstAllowlist($request->ip(), $allowedIps)) { return response()->json(['success' => true, 'message' => 'You are not allowed to access the API.'], 403); } } return $next($request); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Http/Middleware/ApiSensitiveData.php
app/Http/Middleware/ApiSensitiveData.php
<?php namespace App\Http\Middleware; use Closure; use Illuminate\Http\Request; class ApiSensitiveData { public function handle(Request $request, Closure $next) { $token = $request->user()->currentAccessToken(); // Allow access to sensitive data if token has root or read:sensitive permission $request->attributes->add([ 'can_read_sensitive' => $token->can('root') || $token->can('read:sensitive'), ]); return $next($request); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Http/Middleware/DecideWhatToDoWithUser.php
app/Http/Middleware/DecideWhatToDoWithUser.php
<?php namespace App\Http\Middleware; use App\Providers\RouteServiceProvider; use Closure; use Illuminate\Http\Request; use Illuminate\Support\Str; use Symfony\Component\HttpFoundation\Response; class DecideWhatToDoWithUser { public function handle(Request $request, Closure $next): Response { if (auth()?->user()?->teams?->count() === 0) { $currentTeam = auth()->user()?->recreate_personal_team(); refreshSession($currentTeam); } if (auth()?->user()?->currentTeam()) { refreshSession(auth()->user()->currentTeam()); } if (! auth()->user() || ! isCloud() || isInstanceAdmin()) { if (! isCloud() && showBoarding() && ! in_array($request->path(), allowedPathsForBoardingAccounts())) { return redirect()->route('onboarding'); } return $next($request); } if (! auth()->user()->hasVerifiedEmail()) { if ($request->path() === 'verify' || in_array($request->path(), allowedPathsForInvalidAccounts()) || $request->routeIs('verify.verify')) { return $next($request); } return redirect()->route('verify.email'); } if (! isSubscriptionActive() && ! isSubscriptionOnGracePeriod()) { if (! in_array($request->path(), allowedPathsForUnsubscribedAccounts())) { if (Str::startsWith($request->path(), 'invitations')) { return $next($request); } return redirect()->route('subscription.index'); } } if (showBoarding() && ! in_array($request->path(), allowedPathsForBoardingAccounts())) { if (Str::startsWith($request->path(), 'invitations')) { return $next($request); } return redirect()->route('onboarding'); } if (auth()->user()->hasVerifiedEmail() && $request->path() === 'verify') { return redirect(RouteServiceProvider::HOME); } if (isSubscriptionActive() && $request->routeIs('subscription.index')) { return redirect(RouteServiceProvider::HOME); } return $next($request); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false
coollabsio/coolify
https://github.com/coollabsio/coolify/blob/f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53/app/Http/Middleware/Authenticate.php
app/Http/Middleware/Authenticate.php
<?php namespace App\Http\Middleware; use Illuminate\Auth\Middleware\Authenticate as Middleware; use Illuminate\Http\Request; class Authenticate extends Middleware { /** * Get the path the user should be redirected to when they are not authenticated. */ protected function redirectTo(Request $request): ?string { return $request->expectsJson() ? null : route('login'); } }
php
Apache-2.0
f6a59fa2dce9a7cf92b59dbb9fc575c8612aaa53
2026-01-04T15:02:34.115123Z
false