diff --git a/CLAUDE.md b/CLAUDE.md
index 83b51d4a8..22e762182 100644
--- a/CLAUDE.md
+++ b/CLAUDE.md
@@ -651,4 +651,8 @@ it('has emails', function (string $email) {
- Every change must be programmatically tested. Write a new test or update an existing test, then run the affected tests to make sure they pass.
- Run the minimum number of tests needed to ensure code quality and speed. Use `php artisan test` with a specific filename or filter.
-
\ No newline at end of file
+
+
+
+Random other things you should remember:
+- App\Models\Application::team must return a relationship instance., always use team()
\ No newline at end of file
diff --git a/app/Actions/Docker/GetContainersStatus.php b/app/Actions/Docker/GetContainersStatus.php
index ad7c4a606..f5d5f82b6 100644
--- a/app/Actions/Docker/GetContainersStatus.php
+++ b/app/Actions/Docker/GetContainersStatus.php
@@ -96,7 +96,11 @@ class GetContainersStatus
}
$containerStatus = data_get($container, 'State.Status');
$containerHealth = data_get($container, 'State.Health.Status', 'unhealthy');
- $containerStatus = "$containerStatus ($containerHealth)";
+ if ($containerStatus === 'restarting') {
+ $containerStatus = "restarting ($containerHealth)";
+ } else {
+ $containerStatus = "$containerStatus ($containerHealth)";
+ }
$labels = Arr::undot(format_docker_labels_to_json($labels));
$applicationId = data_get($labels, 'coolify.applicationId');
if ($applicationId) {
@@ -386,19 +390,33 @@ class GetContainersStatus
return null;
}
- // Aggregate status: if any container is running, app is running
$hasRunning = false;
+ $hasRestarting = false;
$hasUnhealthy = false;
+ $hasExited = false;
foreach ($relevantStatuses as $status) {
- if (str($status)->contains('running')) {
+ if (str($status)->contains('restarting')) {
+ $hasRestarting = true;
+ } elseif (str($status)->contains('running')) {
$hasRunning = true;
if (str($status)->contains('unhealthy')) {
$hasUnhealthy = true;
}
+ } elseif (str($status)->contains('exited')) {
+ $hasExited = true;
+ $hasUnhealthy = true;
}
}
+ if ($hasRestarting) {
+ return 'degraded (unhealthy)';
+ }
+
+ if ($hasRunning && $hasExited) {
+ return 'degraded (unhealthy)';
+ }
+
if ($hasRunning) {
return $hasUnhealthy ? 'running (unhealthy)' : 'running (healthy)';
}
diff --git a/app/Actions/Shared/ComplexStatusCheck.php b/app/Actions/Shared/ComplexStatusCheck.php
index 5a7ba6637..e06136e3c 100644
--- a/app/Actions/Shared/ComplexStatusCheck.php
+++ b/app/Actions/Shared/ComplexStatusCheck.php
@@ -26,22 +26,22 @@ class ComplexStatusCheck
continue;
}
}
- $container = instant_remote_process(["docker container inspect $(docker container ls -q --filter 'label=coolify.applicationId={$application->id}' --filter 'label=coolify.pullRequestId=0') --format '{{json .}}'"], $server, false);
- $container = format_docker_command_output_to_json($container);
- if ($container->count() === 1) {
- $container = $container->first();
- $containerStatus = data_get($container, 'State.Status');
- $containerHealth = data_get($container, 'State.Health.Status', 'unhealthy');
+ $containers = instant_remote_process(["docker container inspect $(docker container ls -q --filter 'label=coolify.applicationId={$application->id}' --filter 'label=coolify.pullRequestId=0') --format '{{json .}}'"], $server, false);
+ $containers = format_docker_command_output_to_json($containers);
+
+ if ($containers->count() > 0) {
+ $statusToSet = $this->aggregateContainerStatuses($application, $containers);
+
if ($is_main_server) {
$statusFromDb = $application->status;
- if ($statusFromDb !== $containerStatus) {
- $application->update(['status' => "$containerStatus:$containerHealth"]);
+ if ($statusFromDb !== $statusToSet) {
+ $application->update(['status' => $statusToSet]);
}
} else {
$additional_server = $application->additional_servers()->wherePivot('server_id', $server->id);
$statusFromDb = $additional_server->first()->pivot->status;
- if ($statusFromDb !== $containerStatus) {
- $additional_server->updateExistingPivot($server->id, ['status' => "$containerStatus:$containerHealth"]);
+ if ($statusFromDb !== $statusToSet) {
+ $additional_server->updateExistingPivot($server->id, ['status' => $statusToSet]);
}
}
} else {
@@ -57,4 +57,78 @@ class ComplexStatusCheck
}
}
}
+
+ private function aggregateContainerStatuses($application, $containers)
+ {
+ $dockerComposeRaw = data_get($application, 'docker_compose_raw');
+ $excludedContainers = collect();
+
+ if ($dockerComposeRaw) {
+ try {
+ $dockerCompose = \Symfony\Component\Yaml\Yaml::parse($dockerComposeRaw);
+ $services = data_get($dockerCompose, 'services', []);
+
+ foreach ($services as $serviceName => $serviceConfig) {
+ $excludeFromHc = data_get($serviceConfig, 'exclude_from_hc', false);
+ $restartPolicy = data_get($serviceConfig, 'restart', 'always');
+
+ if ($excludeFromHc || $restartPolicy === 'no') {
+ $excludedContainers->push($serviceName);
+ }
+ }
+ } catch (\Exception $e) {
+ // If we can't parse, treat all containers as included
+ }
+ }
+
+ $hasRunning = false;
+ $hasRestarting = false;
+ $hasUnhealthy = false;
+ $hasExited = false;
+ $relevantContainerCount = 0;
+
+ foreach ($containers as $container) {
+ $labels = data_get($container, 'Config.Labels', []);
+ $serviceName = data_get($labels, 'com.docker.compose.service');
+
+ if ($serviceName && $excludedContainers->contains($serviceName)) {
+ continue;
+ }
+
+ $relevantContainerCount++;
+ $containerStatus = data_get($container, 'State.Status');
+ $containerHealth = data_get($container, 'State.Health.Status', 'unhealthy');
+
+ if ($containerStatus === 'restarting') {
+ $hasRestarting = true;
+ $hasUnhealthy = true;
+ } elseif ($containerStatus === 'running') {
+ $hasRunning = true;
+ if ($containerHealth === 'unhealthy') {
+ $hasUnhealthy = true;
+ }
+ } elseif ($containerStatus === 'exited') {
+ $hasExited = true;
+ $hasUnhealthy = true;
+ }
+ }
+
+ if ($relevantContainerCount === 0) {
+ return 'running:healthy';
+ }
+
+ if ($hasRestarting) {
+ return 'degraded:unhealthy';
+ }
+
+ if ($hasRunning && $hasExited) {
+ return 'degraded:unhealthy';
+ }
+
+ if ($hasRunning) {
+ return $hasUnhealthy ? 'running:unhealthy' : 'running:healthy';
+ }
+
+ return 'exited:unhealthy';
+ }
}
diff --git a/app/Console/Commands/CloudDeleteUser.php b/app/Console/Commands/Cloud/CloudDeleteUser.php
similarity index 99%
rename from app/Console/Commands/CloudDeleteUser.php
rename to app/Console/Commands/Cloud/CloudDeleteUser.php
index 6928eb97b..29580a95e 100644
--- a/app/Console/Commands/CloudDeleteUser.php
+++ b/app/Console/Commands/Cloud/CloudDeleteUser.php
@@ -1,6 +1,6 @@
option('verify-all')) {
+ return $this->verifyAllActiveSubscriptions($stripe);
+ }
+
+ if ($this->option('fix-canceled-subs') || $this->option('dry-run')) {
+ return $this->fixCanceledSubscriptions($stripe);
+ }
+
+ $activeSubscribers = Team::whereRelation('subscription', 'stripe_invoice_paid', true)->get();
+
+ $out = fopen('php://output', 'w');
+ // CSV header
+ fputcsv($out, [
+ 'team_id',
+ 'invoice_status',
+ 'stripe_customer_url',
+ 'stripe_subscription_id',
+ 'subscription_status',
+ 'subscription_url',
+ 'note',
+ ]);
+
+ foreach ($activeSubscribers as $team) {
+ $stripeSubscriptionId = $team->subscription->stripe_subscription_id;
+ $stripeInvoicePaid = $team->subscription->stripe_invoice_paid;
+ $stripeCustomerId = $team->subscription->stripe_customer_id;
+
+ if (! $stripeSubscriptionId && str($stripeInvoicePaid)->lower() != 'past_due') {
+ fputcsv($out, [
+ $team->id,
+ $stripeInvoicePaid,
+ $stripeCustomerId ? "https://dashboard.stripe.com/customers/{$stripeCustomerId}" : null,
+ null,
+ null,
+ null,
+ 'Missing subscription ID while invoice not past_due',
+ ]);
+
+ continue;
+ }
+
+ if (! $stripeSubscriptionId) {
+ // No subscription ID and invoice is past_due, still record for visibility
+ fputcsv($out, [
+ $team->id,
+ $stripeInvoicePaid,
+ $stripeCustomerId ? "https://dashboard.stripe.com/customers/{$stripeCustomerId}" : null,
+ null,
+ null,
+ null,
+ 'Missing subscription ID',
+ ]);
+
+ continue;
+ }
+
+ $subscription = $stripe->subscriptions->retrieve($stripeSubscriptionId);
+ if ($subscription->status === 'active') {
+ continue;
+ }
+
+ fputcsv($out, [
+ $team->id,
+ $stripeInvoicePaid,
+ $stripeCustomerId ? "https://dashboard.stripe.com/customers/{$stripeCustomerId}" : null,
+ $stripeSubscriptionId,
+ $subscription->status,
+ "https://dashboard.stripe.com/subscriptions/{$stripeSubscriptionId}",
+ 'Subscription not active',
+ ]);
+ }
+
+ fclose($out);
+ }
+
+ /**
+ * Fix canceled subscriptions in the database
+ */
+ private function fixCanceledSubscriptions(\Stripe\StripeClient $stripe)
+ {
+ $isDryRun = $this->option('dry-run');
+ $checkOne = $this->option('one');
+
+ if ($isDryRun) {
+ $this->info('DRY RUN MODE - No changes will be made');
+ if ($checkOne) {
+ $this->info('Checking only the first canceled subscription...');
+ } else {
+ $this->info('Checking for canceled subscriptions...');
+ }
+ } else {
+ if ($checkOne) {
+ $this->info('Checking and fixing only the first canceled subscription...');
+ } else {
+ $this->info('Checking and fixing canceled subscriptions...');
+ }
+ }
+
+ $teamsWithSubscriptions = Team::whereRelation('subscription', 'stripe_invoice_paid', true)->get();
+ $toFixCount = 0;
+ $fixedCount = 0;
+ $errors = [];
+ $canceledSubscriptions = [];
+
+ foreach ($teamsWithSubscriptions as $team) {
+ $subscription = $team->subscription;
+
+ if (! $subscription->stripe_subscription_id) {
+ continue;
+ }
+
+ try {
+ $stripeSubscription = $stripe->subscriptions->retrieve(
+ $subscription->stripe_subscription_id
+ );
+
+ if ($stripeSubscription->status === 'canceled') {
+ $toFixCount++;
+
+ // Get team members' emails
+ $memberEmails = $team->members->pluck('email')->toArray();
+
+ $canceledSubscriptions[] = [
+ 'team_id' => $team->id,
+ 'team_name' => $team->name,
+ 'customer_id' => $subscription->stripe_customer_id,
+ 'subscription_id' => $subscription->stripe_subscription_id,
+ 'status' => 'canceled',
+ 'member_emails' => $memberEmails,
+ 'subscription_model' => $subscription->toArray(),
+ ];
+
+ if ($isDryRun) {
+ $this->warn('Would fix canceled subscription:');
+ $this->line(" Team ID: {$team->id}");
+ $this->line(" Team Name: {$team->name}");
+ $this->line(' Team Members: '.implode(', ', $memberEmails));
+ $this->line(" Customer URL: https://dashboard.stripe.com/customers/{$subscription->stripe_customer_id}");
+ $this->line(" Subscription URL: https://dashboard.stripe.com/subscriptions/{$subscription->stripe_subscription_id}");
+ $this->line(' Current Subscription Data:');
+ foreach ($subscription->getAttributes() as $key => $value) {
+ if (is_null($value)) {
+ $this->line(" - {$key}: null");
+ } elseif (is_bool($value)) {
+ $this->line(" - {$key}: ".($value ? 'true' : 'false'));
+ } else {
+ $this->line(" - {$key}: {$value}");
+ }
+ }
+ $this->newLine();
+ } else {
+ $this->warn("Found canceled subscription for Team ID: {$team->id}");
+
+ // Send internal notification with all details before fixing
+ $notificationMessage = "Fixing canceled subscription:\n";
+ $notificationMessage .= "Team ID: {$team->id}\n";
+ $notificationMessage .= "Team Name: {$team->name}\n";
+ $notificationMessage .= 'Team Members: '.implode(', ', $memberEmails)."\n";
+ $notificationMessage .= "Customer URL: https://dashboard.stripe.com/customers/{$subscription->stripe_customer_id}\n";
+ $notificationMessage .= "Subscription URL: https://dashboard.stripe.com/subscriptions/{$subscription->stripe_subscription_id}\n";
+ $notificationMessage .= "Subscription Data:\n";
+ foreach ($subscription->getAttributes() as $key => $value) {
+ if (is_null($value)) {
+ $notificationMessage .= " - {$key}: null\n";
+ } elseif (is_bool($value)) {
+ $notificationMessage .= " - {$key}: ".($value ? 'true' : 'false')."\n";
+ } else {
+ $notificationMessage .= " - {$key}: {$value}\n";
+ }
+ }
+ send_internal_notification($notificationMessage);
+
+ // Apply the same logic as customer.subscription.deleted webhook
+ $team->subscriptionEnded();
+
+ $fixedCount++;
+ $this->info(" ✓ Fixed subscription for Team ID: {$team->id}");
+ $this->line(' Team Members: '.implode(', ', $memberEmails));
+ $this->line(" Customer URL: https://dashboard.stripe.com/customers/{$subscription->stripe_customer_id}");
+ $this->line(" Subscription URL: https://dashboard.stripe.com/subscriptions/{$subscription->stripe_subscription_id}");
+ }
+
+ // Break if --one flag is set
+ if ($checkOne) {
+ break;
+ }
+ }
+ } catch (\Stripe\Exception\InvalidRequestException $e) {
+ if ($e->getStripeCode() === 'resource_missing') {
+ $toFixCount++;
+
+ // Get team members' emails
+ $memberEmails = $team->members->pluck('email')->toArray();
+
+ $canceledSubscriptions[] = [
+ 'team_id' => $team->id,
+ 'team_name' => $team->name,
+ 'customer_id' => $subscription->stripe_customer_id,
+ 'subscription_id' => $subscription->stripe_subscription_id,
+ 'status' => 'missing',
+ 'member_emails' => $memberEmails,
+ 'subscription_model' => $subscription->toArray(),
+ ];
+
+ if ($isDryRun) {
+ $this->error('Would fix missing subscription (not found in Stripe):');
+ $this->line(" Team ID: {$team->id}");
+ $this->line(" Team Name: {$team->name}");
+ $this->line(' Team Members: '.implode(', ', $memberEmails));
+ $this->line(" Customer URL: https://dashboard.stripe.com/customers/{$subscription->stripe_customer_id}");
+ $this->line(" Subscription ID (missing): {$subscription->stripe_subscription_id}");
+ $this->line(' Current Subscription Data:');
+ foreach ($subscription->getAttributes() as $key => $value) {
+ if (is_null($value)) {
+ $this->line(" - {$key}: null");
+ } elseif (is_bool($value)) {
+ $this->line(" - {$key}: ".($value ? 'true' : 'false'));
+ } else {
+ $this->line(" - {$key}: {$value}");
+ }
+ }
+ $this->newLine();
+ } else {
+ $this->error("Subscription not found in Stripe for Team ID: {$team->id}");
+
+ // Send internal notification with all details before fixing
+ $notificationMessage = "Fixing missing subscription (not found in Stripe):\n";
+ $notificationMessage .= "Team ID: {$team->id}\n";
+ $notificationMessage .= "Team Name: {$team->name}\n";
+ $notificationMessage .= 'Team Members: '.implode(', ', $memberEmails)."\n";
+ $notificationMessage .= "Customer URL: https://dashboard.stripe.com/customers/{$subscription->stripe_customer_id}\n";
+ $notificationMessage .= "Subscription ID (missing): {$subscription->stripe_subscription_id}\n";
+ $notificationMessage .= "Subscription Data:\n";
+ foreach ($subscription->getAttributes() as $key => $value) {
+ if (is_null($value)) {
+ $notificationMessage .= " - {$key}: null\n";
+ } elseif (is_bool($value)) {
+ $notificationMessage .= " - {$key}: ".($value ? 'true' : 'false')."\n";
+ } else {
+ $notificationMessage .= " - {$key}: {$value}\n";
+ }
+ }
+ send_internal_notification($notificationMessage);
+
+ // Apply the same logic as customer.subscription.deleted webhook
+ $team->subscriptionEnded();
+
+ $fixedCount++;
+ $this->info(" ✓ Fixed missing subscription for Team ID: {$team->id}");
+ $this->line(' Team Members: '.implode(', ', $memberEmails));
+ $this->line(" Customer URL: https://dashboard.stripe.com/customers/{$subscription->stripe_customer_id}");
+ }
+
+ // Break if --one flag is set
+ if ($checkOne) {
+ break;
+ }
+ } else {
+ $errors[] = "Team ID {$team->id}: ".$e->getMessage();
+ }
+ } catch (\Exception $e) {
+ $errors[] = "Team ID {$team->id}: ".$e->getMessage();
+ }
+ }
+
+ $this->newLine();
+ $this->info('Summary:');
+
+ if ($isDryRun) {
+ $this->info(" - Found {$toFixCount} canceled/missing subscriptions that would be fixed");
+
+ if ($toFixCount > 0) {
+ $this->newLine();
+ $this->comment('Run with --fix-canceled-subs to apply these changes');
+ }
+ } else {
+ $this->info(" - Fixed {$fixedCount} canceled/missing subscriptions");
+ }
+
+ if (! empty($errors)) {
+ $this->newLine();
+ $this->error('Errors encountered:');
+ foreach ($errors as $error) {
+ $this->error(" - {$error}");
+ }
+ }
+
+ return 0;
+ }
+
+ /**
+ * Verify all active subscriptions against Stripe API
+ */
+ private function verifyAllActiveSubscriptions(\Stripe\StripeClient $stripe)
+ {
+ $isDryRun = $this->option('dry-run');
+ $shouldFix = $this->option('fix-verified');
+
+ $this->info('Verifying all active subscriptions against Stripe...');
+ if ($isDryRun) {
+ $this->info('DRY RUN MODE - No changes will be made');
+ }
+ if ($shouldFix && ! $isDryRun) {
+ $this->warn('FIX MODE - Discrepancies will be corrected');
+ }
+
+ // Get all teams with active subscriptions
+ $teamsWithActiveSubscriptions = Team::whereRelation('subscription', 'stripe_invoice_paid', true)->get();
+ $totalCount = $teamsWithActiveSubscriptions->count();
+
+ $this->info("Found {$totalCount} teams with active subscriptions in database");
+ $this->newLine();
+
+ $out = fopen('php://output', 'w');
+
+ // CSV header
+ fputcsv($out, [
+ 'team_id',
+ 'team_name',
+ 'customer_id',
+ 'subscription_id',
+ 'db_status',
+ 'stripe_status',
+ 'action',
+ 'member_emails',
+ 'customer_url',
+ 'subscription_url',
+ ]);
+
+ $stats = [
+ 'total' => $totalCount,
+ 'valid_active' => 0,
+ 'valid_past_due' => 0,
+ 'canceled' => 0,
+ 'missing' => 0,
+ 'invalid' => 0,
+ 'fixed' => 0,
+ 'errors' => 0,
+ ];
+
+ $processedCount = 0;
+
+ foreach ($teamsWithActiveSubscriptions as $team) {
+ $subscription = $team->subscription;
+ $memberEmails = $team->members->pluck('email')->toArray();
+
+ // Database state
+ $dbStatus = 'active';
+ if ($subscription->stripe_past_due) {
+ $dbStatus = 'past_due';
+ }
+
+ $stripeStatus = null;
+ $action = 'none';
+
+ if (! $subscription->stripe_subscription_id) {
+ $this->line("Team {$team->id}: Missing subscription ID, searching in Stripe...");
+
+ $foundResult = null;
+ $searchMethod = null;
+
+ // Search by customer ID
+ if ($subscription->stripe_customer_id) {
+ $this->line(" → Searching by customer ID: {$subscription->stripe_customer_id}");
+ $foundResult = $this->searchSubscriptionsByCustomer($stripe, $subscription->stripe_customer_id);
+ if ($foundResult) {
+ $searchMethod = $foundResult['method'];
+ }
+ } else {
+ $this->line(' → No customer ID available');
+ }
+
+ // Search by emails if not found
+ if (! $foundResult && count($memberEmails) > 0) {
+ $foundResult = $this->searchSubscriptionsByEmails($stripe, $memberEmails);
+ if ($foundResult) {
+ $searchMethod = $foundResult['method'];
+
+ // Update customer ID if different
+ if (isset($foundResult['customer_id']) && $subscription->stripe_customer_id !== $foundResult['customer_id']) {
+ if ($isDryRun) {
+ $this->warn(" ⚠ Would update customer ID from {$subscription->stripe_customer_id} to {$foundResult['customer_id']}");
+ } elseif ($shouldFix) {
+ $subscription->update(['stripe_customer_id' => $foundResult['customer_id']]);
+ $this->info(" ✓ Updated customer ID to {$foundResult['customer_id']}");
+ }
+ }
+ }
+ }
+
+ if ($foundResult && isset($foundResult['subscription'])) {
+ // Check if it's an active/past_due subscription
+ if (in_array($foundResult['status'], ['active', 'past_due'])) {
+ // Found an active subscription, handle update
+ $result = $this->handleFoundSubscription(
+ $team,
+ $subscription,
+ $foundResult['subscription'],
+ $searchMethod,
+ $isDryRun,
+ $shouldFix,
+ $stats
+ );
+
+ fputcsv($out, [
+ $team->id,
+ $team->name,
+ $subscription->stripe_customer_id,
+ $result['id'],
+ $dbStatus,
+ $result['status'],
+ $result['action'],
+ implode(', ', $memberEmails),
+ $subscription->stripe_customer_id ? "https://dashboard.stripe.com/customers/{$subscription->stripe_customer_id}" : 'N/A',
+ $result['url'],
+ ]);
+ } else {
+ // Found subscription but it's canceled/expired - needs to be deactivated
+ $this->warn(" → Found {$foundResult['status']} subscription {$foundResult['subscription']->id} - needs deactivation");
+
+ $result = $this->handleMissingSubscription($team, $subscription, $foundResult['status'], $isDryRun, $shouldFix, $stats);
+
+ fputcsv($out, [
+ $team->id,
+ $team->name,
+ $subscription->stripe_customer_id,
+ $foundResult['subscription']->id,
+ $dbStatus,
+ $foundResult['status'],
+ 'needs_fix',
+ implode(', ', $memberEmails),
+ $subscription->stripe_customer_id ? "https://dashboard.stripe.com/customers/{$subscription->stripe_customer_id}" : 'N/A',
+ "https://dashboard.stripe.com/subscriptions/{$foundResult['subscription']->id}",
+ ]);
+ }
+ } else {
+ // No subscription found at all
+ $this->line(' → No subscription found');
+
+ $stripeStatus = 'not_found';
+ $result = $this->handleMissingSubscription($team, $subscription, $stripeStatus, $isDryRun, $shouldFix, $stats);
+
+ fputcsv($out, [
+ $team->id,
+ $team->name,
+ $subscription->stripe_customer_id,
+ 'N/A',
+ $dbStatus,
+ $result['status'],
+ $result['action'],
+ implode(', ', $memberEmails),
+ $subscription->stripe_customer_id ? "https://dashboard.stripe.com/customers/{$subscription->stripe_customer_id}" : 'N/A',
+ 'N/A',
+ ]);
+ }
+ } else {
+ // First validate the subscription ID format
+ if (! str_starts_with($subscription->stripe_subscription_id, 'sub_')) {
+ $this->warn(" ⚠ Invalid subscription ID format (doesn't start with 'sub_')");
+ }
+
+ try {
+ $stripeSubscription = $stripe->subscriptions->retrieve(
+ $subscription->stripe_subscription_id
+ );
+
+ $stripeStatus = $stripeSubscription->status;
+
+ // Determine if action is needed
+ switch ($stripeStatus) {
+ case 'active':
+ $stats['valid_active']++;
+ $action = 'valid';
+ break;
+
+ case 'past_due':
+ $stats['valid_past_due']++;
+ $action = 'valid';
+ // Ensure past_due flag is set
+ if (! $subscription->stripe_past_due) {
+ if ($isDryRun) {
+ $this->info("Would set stripe_past_due=true for Team {$team->id}");
+ } elseif ($shouldFix) {
+ $subscription->update(['stripe_past_due' => true]);
+ }
+ }
+ break;
+
+ case 'canceled':
+ case 'incomplete_expired':
+ case 'unpaid':
+ case 'incomplete':
+ $stats['canceled']++;
+ $action = 'needs_fix';
+
+ // Only output problematic subscriptions
+ fputcsv($out, [
+ $team->id,
+ $team->name,
+ $subscription->stripe_customer_id,
+ $subscription->stripe_subscription_id,
+ $dbStatus,
+ $stripeStatus,
+ $action,
+ implode(', ', $memberEmails),
+ "https://dashboard.stripe.com/customers/{$subscription->stripe_customer_id}",
+ "https://dashboard.stripe.com/subscriptions/{$subscription->stripe_subscription_id}",
+ ]);
+
+ if ($isDryRun) {
+ $this->info("Would deactivate subscription for Team {$team->id} - status: {$stripeStatus}");
+ } elseif ($shouldFix) {
+ $this->fixSubscription($team, $subscription, $stripeStatus);
+ $stats['fixed']++;
+ }
+ break;
+
+ default:
+ $stats['invalid']++;
+ $action = 'unknown';
+
+ // Only output problematic subscriptions
+ fputcsv($out, [
+ $team->id,
+ $team->name,
+ $subscription->stripe_customer_id,
+ $subscription->stripe_subscription_id,
+ $dbStatus,
+ $stripeStatus,
+ $action,
+ implode(', ', $memberEmails),
+ "https://dashboard.stripe.com/customers/{$subscription->stripe_customer_id}",
+ "https://dashboard.stripe.com/subscriptions/{$subscription->stripe_subscription_id}",
+ ]);
+ break;
+ }
+
+ } catch (\Stripe\Exception\InvalidRequestException $e) {
+ $this->error(' → Error: '.$e->getMessage());
+
+ if ($e->getStripeCode() === 'resource_missing' || $e->getHttpStatus() === 404) {
+ // Subscription doesn't exist, try to find by customer ID
+ $this->warn(" → Subscription not found, checking customer's subscriptions...");
+
+ $foundResult = null;
+ if ($subscription->stripe_customer_id) {
+ $foundResult = $this->searchSubscriptionsByCustomer($stripe, $subscription->stripe_customer_id);
+ }
+
+ if ($foundResult && isset($foundResult['subscription']) && in_array($foundResult['status'], ['active', 'past_due'])) {
+ // Found an active subscription with different ID
+ $this->warn(" → ID mismatch! DB: {$subscription->stripe_subscription_id}, Stripe: {$foundResult['subscription']->id}");
+
+ fputcsv($out, [
+ $team->id,
+ $team->name,
+ $subscription->stripe_customer_id,
+ "WRONG ID: {$subscription->stripe_subscription_id} → {$foundResult['subscription']->id}",
+ $dbStatus,
+ $foundResult['status'],
+ 'id_mismatch',
+ implode(', ', $memberEmails),
+ "https://dashboard.stripe.com/customers/{$subscription->stripe_customer_id}",
+ "https://dashboard.stripe.com/subscriptions/{$foundResult['subscription']->id}",
+ ]);
+
+ if ($isDryRun) {
+ $this->warn(" → Would update subscription ID to {$foundResult['subscription']->id}");
+ } elseif ($shouldFix) {
+ $subscription->update([
+ 'stripe_subscription_id' => $foundResult['subscription']->id,
+ 'stripe_invoice_paid' => true,
+ 'stripe_past_due' => $foundResult['status'] === 'past_due',
+ ]);
+ $stats['fixed']++;
+ $this->info(' → Updated subscription ID');
+ }
+
+ $stats[$foundResult['status'] === 'active' ? 'valid_active' : 'valid_past_due']++;
+ } else {
+ // No active subscription found
+ $stripeStatus = $foundResult ? $foundResult['status'] : 'not_found';
+ $result = $this->handleMissingSubscription($team, $subscription, $stripeStatus, $isDryRun, $shouldFix, $stats);
+
+ fputcsv($out, [
+ $team->id,
+ $team->name,
+ $subscription->stripe_customer_id,
+ $subscription->stripe_subscription_id,
+ $dbStatus,
+ $result['status'],
+ $result['action'],
+ implode(', ', $memberEmails),
+ $subscription->stripe_customer_id ? "https://dashboard.stripe.com/customers/{$subscription->stripe_customer_id}" : 'N/A',
+ $foundResult && isset($foundResult['subscription']) ? "https://dashboard.stripe.com/subscriptions/{$foundResult['subscription']->id}" : 'N/A',
+ ]);
+ }
+ } else {
+ // Other API error
+ $stats['errors']++;
+ $this->error(' → API Error - not marking as deleted');
+
+ fputcsv($out, [
+ $team->id,
+ $team->name,
+ $subscription->stripe_customer_id,
+ $subscription->stripe_subscription_id,
+ $dbStatus,
+ 'error: '.$e->getStripeCode(),
+ 'error',
+ implode(', ', $memberEmails),
+ $subscription->stripe_customer_id ? "https://dashboard.stripe.com/customers/{$subscription->stripe_customer_id}" : 'N/A',
+ $subscription->stripe_subscription_id ? "https://dashboard.stripe.com/subscriptions/{$subscription->stripe_subscription_id}" : 'N/A',
+ ]);
+ }
+ } catch (\Exception $e) {
+ $this->error(' → Unexpected error: '.$e->getMessage());
+ $stats['errors']++;
+
+ fputcsv($out, [
+ $team->id,
+ $team->name,
+ $subscription->stripe_customer_id,
+ $subscription->stripe_subscription_id,
+ $dbStatus,
+ 'error',
+ 'error',
+ implode(', ', $memberEmails),
+ $subscription->stripe_customer_id ? "https://dashboard.stripe.com/customers/{$subscription->stripe_customer_id}" : 'N/A',
+ $subscription->stripe_subscription_id ? "https://dashboard.stripe.com/subscriptions/{$subscription->stripe_subscription_id}" : 'N/A',
+ ]);
+ }
+ }
+
+ $processedCount++;
+ if ($processedCount % 100 === 0) {
+ $this->info("Processed {$processedCount}/{$totalCount} subscriptions...");
+ }
+ }
+
+ fclose($out);
+
+ // Print summary
+ $this->newLine(2);
+ $this->info('=== Verification Summary ===');
+ $this->info("Total subscriptions checked: {$stats['total']}");
+ $this->newLine();
+
+ $this->info('Valid subscriptions in Stripe:');
+ $this->line(" - Active: {$stats['valid_active']}");
+ $this->line(" - Past Due: {$stats['valid_past_due']}");
+ $validTotal = $stats['valid_active'] + $stats['valid_past_due'];
+ $this->info(" Total valid: {$validTotal}");
+
+ $this->newLine();
+ $this->warn('Invalid subscriptions:');
+ $this->line(" - Canceled/Expired: {$stats['canceled']}");
+ $this->line(" - Missing/Not Found: {$stats['missing']}");
+ $this->line(" - Unknown status: {$stats['invalid']}");
+ $invalidTotal = $stats['canceled'] + $stats['missing'] + $stats['invalid'];
+ $this->warn(" Total invalid: {$invalidTotal}");
+
+ if ($stats['errors'] > 0) {
+ $this->newLine();
+ $this->error("Errors encountered: {$stats['errors']}");
+ }
+
+ if ($shouldFix && ! $isDryRun) {
+ $this->newLine();
+ $this->info("Fixed subscriptions: {$stats['fixed']}");
+ } elseif ($invalidTotal > 0 && ! $shouldFix) {
+ $this->newLine();
+ $this->comment('Run with --fix-verified to fix the discrepancies');
+ }
+
+ return 0;
+ }
+
+ /**
+ * Fix a subscription based on its status
+ */
+ private function fixSubscription($team, $subscription, $status)
+ {
+ $message = "Fixing subscription for Team ID: {$team->id} (Status: {$status})\n";
+ $message .= "Team Name: {$team->name}\n";
+ $message .= "Customer ID: {$subscription->stripe_customer_id}\n";
+ $message .= "Subscription ID: {$subscription->stripe_subscription_id}\n";
+
+ send_internal_notification($message);
+
+ // Call the team's subscription ended method which properly cleans up
+ $team->subscriptionEnded();
+ }
+
+ /**
+ * Search for subscriptions by customer ID
+ */
+ private function searchSubscriptionsByCustomer(\Stripe\StripeClient $stripe, $customerId, $requireActive = false)
+ {
+ try {
+ $subscriptions = $stripe->subscriptions->all([
+ 'customer' => $customerId,
+ 'limit' => 10,
+ 'status' => 'all',
+ ]);
+
+ $this->line(' → Found '.count($subscriptions->data).' subscription(s) for customer');
+
+ // Look for active/past_due first
+ foreach ($subscriptions->data as $sub) {
+ $this->line(" - Subscription {$sub->id}: status={$sub->status}");
+ if (in_array($sub->status, ['active', 'past_due'])) {
+ $this->info(" ✓ Found active/past_due subscription: {$sub->id}");
+
+ return ['subscription' => $sub, 'status' => $sub->status, 'method' => 'customer_id'];
+ }
+ }
+
+ // If not requiring active and there are subscriptions, return first one
+ if (! $requireActive && count($subscriptions->data) > 0) {
+ $sub = $subscriptions->data[0];
+ $this->warn(" ⚠ Only found {$sub->status} subscription: {$sub->id}");
+
+ return ['subscription' => $sub, 'status' => $sub->status, 'method' => 'customer_id_first'];
+ }
+
+ return null;
+ } catch (\Exception $e) {
+ $this->error(' → Error searching by customer ID: '.$e->getMessage());
+
+ return null;
+ }
+ }
+
+ /**
+ * Search for subscriptions by team member emails
+ */
+ private function searchSubscriptionsByEmails(\Stripe\StripeClient $stripe, $emails)
+ {
+ $this->line(' → Searching by team member emails...');
+
+ foreach ($emails as $email) {
+ $this->line(" → Checking email: {$email}");
+
+ try {
+ $customers = $stripe->customers->all([
+ 'email' => $email,
+ 'limit' => 5,
+ ]);
+
+ if (count($customers->data) === 0) {
+ $this->line(' - No customers found');
+
+ continue;
+ }
+
+ $this->line(' - Found '.count($customers->data).' customer(s)');
+
+ foreach ($customers->data as $customer) {
+ $this->line(" - Checking customer {$customer->id}");
+
+ $result = $this->searchSubscriptionsByCustomer($stripe, $customer->id, true);
+ if ($result) {
+ $result['method'] = "email:{$email}";
+ $result['customer_id'] = $customer->id;
+
+ return $result;
+ }
+ }
+ } catch (\Exception $e) {
+ $this->error(" - Error searching for email {$email}: ".$e->getMessage());
+ }
+ }
+
+ return null;
+ }
+
+ /**
+ * Handle found subscription update (only for active/past_due subscriptions)
+ */
+ private function handleFoundSubscription($team, $subscription, $foundSub, $searchMethod, $isDryRun, $shouldFix, &$stats)
+ {
+ $stripeStatus = $foundSub->status;
+ $this->info(" ✓ FOUND active/past_due subscription {$foundSub->id} (status: {$stripeStatus})");
+
+ // Only update if it's active or past_due
+ if (! in_array($stripeStatus, ['active', 'past_due'])) {
+ $this->error(" ERROR: handleFoundSubscription called with {$stripeStatus} subscription!");
+
+ return [
+ 'id' => $foundSub->id,
+ 'status' => $stripeStatus,
+ 'action' => 'error',
+ 'url' => "https://dashboard.stripe.com/subscriptions/{$foundSub->id}",
+ ];
+ }
+
+ if ($isDryRun) {
+ $this->warn(" → Would update subscription ID to {$foundSub->id} (status: {$stripeStatus})");
+ } elseif ($shouldFix) {
+ $subscription->update([
+ 'stripe_subscription_id' => $foundSub->id,
+ 'stripe_invoice_paid' => true,
+ 'stripe_past_due' => $stripeStatus === 'past_due',
+ ]);
+ $stats['fixed']++;
+ $this->info(" → Updated subscription ID to {$foundSub->id}");
+ }
+
+ // Update stats
+ $stats[$stripeStatus === 'active' ? 'valid_active' : 'valid_past_due']++;
+
+ return [
+ 'id' => "FOUND: {$foundSub->id}",
+ 'status' => $stripeStatus,
+ 'action' => "will_update (via {$searchMethod})",
+ 'url' => "https://dashboard.stripe.com/subscriptions/{$foundSub->id}",
+ ];
+ }
+
+ /**
+ * Handle missing subscription
+ */
+ private function handleMissingSubscription($team, $subscription, $status, $isDryRun, $shouldFix, &$stats)
+ {
+ $stats['missing']++;
+
+ if ($isDryRun) {
+ $statusMsg = $status !== 'not_found' ? "status: {$status}" : 'no subscription found in Stripe';
+ $this->warn(" → Would deactivate subscription - {$statusMsg}");
+ } elseif ($shouldFix) {
+ $this->fixSubscription($team, $subscription, $status);
+ $stats['fixed']++;
+ $this->info(' → Deactivated subscription');
+ }
+
+ return [
+ 'id' => 'N/A',
+ 'status' => $status,
+ 'action' => 'needs_fix',
+ 'url' => 'N/A',
+ ];
+ }
+}
diff --git a/app/Console/Commands/CloudCheckSubscription.php b/app/Console/Commands/CloudCheckSubscription.php
deleted file mode 100644
index 6e237e84b..000000000
--- a/app/Console/Commands/CloudCheckSubscription.php
+++ /dev/null
@@ -1,49 +0,0 @@
-get();
- foreach ($activeSubscribers as $team) {
- $stripeSubscriptionId = $team->subscription->stripe_subscription_id;
- $stripeInvoicePaid = $team->subscription->stripe_invoice_paid;
- $stripeCustomerId = $team->subscription->stripe_customer_id;
- if (! $stripeSubscriptionId) {
- echo "Team {$team->id} has no subscription, but invoice status is: {$stripeInvoicePaid}\n";
- echo "Link on Stripe: https://dashboard.stripe.com/customers/{$stripeCustomerId}\n";
-
- continue;
- }
- $subscription = $stripe->subscriptions->retrieve($stripeSubscriptionId);
- if ($subscription->status === 'active') {
- continue;
- }
- echo "Subscription {$stripeSubscriptionId} is not active ({$subscription->status})\n";
- echo "Link on Stripe: https://dashboard.stripe.com/subscriptions/{$stripeSubscriptionId}\n";
- }
- }
-}
diff --git a/app/Console/Commands/CloudCleanupSubscriptions.php b/app/Console/Commands/CloudCleanupSubscriptions.php
deleted file mode 100644
index ab676c927..000000000
--- a/app/Console/Commands/CloudCleanupSubscriptions.php
+++ /dev/null
@@ -1,101 +0,0 @@
-error('This command can only be run on cloud');
-
- return;
- }
- $this->info('Cleaning up subcriptions teams');
- $stripe = new \Stripe\StripeClient(config('subscription.stripe_api_key'));
-
- $teams = Team::all()->filter(function ($team) {
- return $team->id !== 0;
- })->sortBy('id');
- foreach ($teams as $team) {
- if ($team) {
- $this->info("Checking team {$team->id}");
- }
- if (! data_get($team, 'subscription')) {
- $this->disableServers($team);
-
- continue;
- }
- // If the team has no subscription id and the invoice is paid, we need to reset the invoice paid status
- if (! (data_get($team, 'subscription.stripe_subscription_id'))) {
- $this->info("Resetting invoice paid status for team {$team->id}");
-
- $team->subscription->update([
- 'stripe_invoice_paid' => false,
- 'stripe_trial_already_ended' => false,
- 'stripe_subscription_id' => null,
- ]);
- $this->disableServers($team);
-
- continue;
- } else {
- $subscription = $stripe->subscriptions->retrieve(data_get($team, 'subscription.stripe_subscription_id'), []);
- $status = data_get($subscription, 'status');
- if ($status === 'active') {
- $team->subscription->update([
- 'stripe_invoice_paid' => true,
- 'stripe_trial_already_ended' => false,
- ]);
-
- continue;
- }
- $this->info('Subscription status: '.$status);
- $this->info('Subscription id: '.data_get($team, 'subscription.stripe_subscription_id'));
- $confirm = $this->confirm('Do you want to cancel the subscription?', true);
- if (! $confirm) {
- $this->info("Skipping team {$team->id}");
- } else {
- $this->info("Cancelling subscription for team {$team->id}");
- $team->subscription->update([
- 'stripe_invoice_paid' => false,
- 'stripe_trial_already_ended' => false,
- 'stripe_subscription_id' => null,
- ]);
- $this->disableServers($team);
- }
- }
- }
- } catch (\Exception $e) {
- $this->error($e->getMessage());
-
- return;
- }
- }
-
- private function disableServers(Team $team)
- {
- foreach ($team->servers as $server) {
- if ($server->settings->is_usable === true || $server->settings->is_reachable === true || $server->ip !== '1.2.3.4') {
- $this->info("Disabling server {$server->id} {$server->name}");
- $server->settings()->update([
- 'is_usable' => false,
- 'is_reachable' => false,
- ]);
- $server->update([
- 'ip' => '1.2.3.4',
- ]);
-
- ServerReachabilityChanged::dispatch($server);
- }
- }
- }
-}
diff --git a/app/Events/ApplicationConfigurationChanged.php b/app/Events/ApplicationConfigurationChanged.php
new file mode 100644
index 000000000..3dd532b19
--- /dev/null
+++ b/app/Events/ApplicationConfigurationChanged.php
@@ -0,0 +1,35 @@
+check() && auth()->user()->currentTeam()) {
+ $teamId = auth()->user()->currentTeam()->id;
+ }
+ $this->teamId = $teamId;
+ }
+
+ public function broadcastOn(): array
+ {
+ if (is_null($this->teamId)) {
+ return [];
+ }
+
+ return [
+ new PrivateChannel("team.{$this->teamId}"),
+ ];
+ }
+}
diff --git a/app/Http/Controllers/Api/ApplicationsController.php b/app/Http/Controllers/Api/ApplicationsController.php
index b9c854ea1..ce9e723d4 100644
--- a/app/Http/Controllers/Api/ApplicationsController.php
+++ b/app/Http/Controllers/Api/ApplicationsController.php
@@ -2532,8 +2532,11 @@ class ApplicationsController extends Controller
if ($env->is_shown_once != $request->is_shown_once) {
$env->is_shown_once = $request->is_shown_once;
}
- if ($request->has('is_buildtime_only') && $env->is_buildtime_only != $request->is_buildtime_only) {
- $env->is_buildtime_only = $request->is_buildtime_only;
+ if ($request->has('is_runtime') && $env->is_runtime != $request->is_runtime) {
+ $env->is_runtime = $request->is_runtime;
+ }
+ if ($request->has('is_buildtime') && $env->is_buildtime != $request->is_buildtime) {
+ $env->is_buildtime = $request->is_buildtime;
}
$env->save();
@@ -2559,8 +2562,11 @@ class ApplicationsController extends Controller
if ($env->is_shown_once != $request->is_shown_once) {
$env->is_shown_once = $request->is_shown_once;
}
- if ($request->has('is_buildtime_only') && $env->is_buildtime_only != $request->is_buildtime_only) {
- $env->is_buildtime_only = $request->is_buildtime_only;
+ if ($request->has('is_runtime') && $env->is_runtime != $request->is_runtime) {
+ $env->is_runtime = $request->is_runtime;
+ }
+ if ($request->has('is_buildtime') && $env->is_buildtime != $request->is_buildtime) {
+ $env->is_buildtime = $request->is_buildtime;
}
$env->save();
@@ -2723,8 +2729,11 @@ class ApplicationsController extends Controller
if ($env->is_shown_once != $item->get('is_shown_once')) {
$env->is_shown_once = $item->get('is_shown_once');
}
- if ($item->has('is_buildtime_only') && $env->is_buildtime_only != $item->get('is_buildtime_only')) {
- $env->is_buildtime_only = $item->get('is_buildtime_only');
+ if ($item->has('is_runtime') && $env->is_runtime != $item->get('is_runtime')) {
+ $env->is_runtime = $item->get('is_runtime');
+ }
+ if ($item->has('is_buildtime') && $env->is_buildtime != $item->get('is_buildtime')) {
+ $env->is_buildtime = $item->get('is_buildtime');
}
$env->save();
} else {
@@ -2735,7 +2744,8 @@ class ApplicationsController extends Controller
'is_literal' => $is_literal,
'is_multiline' => $is_multi_line,
'is_shown_once' => $is_shown_once,
- 'is_buildtime_only' => $item->get('is_buildtime_only', false),
+ 'is_runtime' => $item->get('is_runtime', true),
+ 'is_buildtime' => $item->get('is_buildtime', true),
'resourceable_type' => get_class($application),
'resourceable_id' => $application->id,
]);
@@ -2753,8 +2763,11 @@ class ApplicationsController extends Controller
if ($env->is_shown_once != $item->get('is_shown_once')) {
$env->is_shown_once = $item->get('is_shown_once');
}
- if ($item->has('is_buildtime_only') && $env->is_buildtime_only != $item->get('is_buildtime_only')) {
- $env->is_buildtime_only = $item->get('is_buildtime_only');
+ if ($item->has('is_runtime') && $env->is_runtime != $item->get('is_runtime')) {
+ $env->is_runtime = $item->get('is_runtime');
+ }
+ if ($item->has('is_buildtime') && $env->is_buildtime != $item->get('is_buildtime')) {
+ $env->is_buildtime = $item->get('is_buildtime');
}
$env->save();
} else {
@@ -2765,7 +2778,8 @@ class ApplicationsController extends Controller
'is_literal' => $is_literal,
'is_multiline' => $is_multi_line,
'is_shown_once' => $is_shown_once,
- 'is_buildtime_only' => $item->get('is_buildtime_only', false),
+ 'is_runtime' => $item->get('is_runtime', true),
+ 'is_buildtime' => $item->get('is_buildtime', true),
'resourceable_type' => get_class($application),
'resourceable_id' => $application->id,
]);
@@ -2904,7 +2918,8 @@ class ApplicationsController extends Controller
'is_literal' => $request->is_literal ?? false,
'is_multiline' => $request->is_multiline ?? false,
'is_shown_once' => $request->is_shown_once ?? false,
- 'is_buildtime_only' => $request->is_buildtime_only ?? false,
+ 'is_runtime' => $request->is_runtime ?? true,
+ 'is_buildtime' => $request->is_buildtime ?? true,
'resourceable_type' => get_class($application),
'resourceable_id' => $application->id,
]);
@@ -2927,7 +2942,8 @@ class ApplicationsController extends Controller
'is_literal' => $request->is_literal ?? false,
'is_multiline' => $request->is_multiline ?? false,
'is_shown_once' => $request->is_shown_once ?? false,
- 'is_buildtime_only' => $request->is_buildtime_only ?? false,
+ 'is_runtime' => $request->is_runtime ?? true,
+ 'is_buildtime' => $request->is_buildtime ?? true,
'resourceable_type' => get_class($application),
'resourceable_id' => $application->id,
]);
@@ -3364,11 +3380,12 @@ class ApplicationsController extends Controller
$fqdn = str($fqdn)->replaceStart(',', '')->trim();
$errors = [];
$fqdn = str($fqdn)->trim()->explode(',')->map(function ($domain) use (&$errors) {
+ $domain = trim($domain);
if (filter_var($domain, FILTER_VALIDATE_URL) === false) {
$errors[] = 'Invalid domain: '.$domain;
}
- return str($domain)->trim()->lower();
+ return str($domain)->lower();
});
if (count($errors) > 0) {
return response()->json([
diff --git a/app/Http/Controllers/Api/DatabasesController.php b/app/Http/Controllers/Api/DatabasesController.php
index 389d119bd..0e282fccd 100644
--- a/app/Http/Controllers/Api/DatabasesController.php
+++ b/app/Http/Controllers/Api/DatabasesController.php
@@ -9,11 +9,15 @@ use App\Actions\Database\StopDatabase;
use App\Actions\Database\StopDatabaseProxy;
use App\Enums\NewDatabaseTypes;
use App\Http\Controllers\Controller;
+use App\Jobs\DatabaseBackupJob;
use App\Jobs\DeleteResourceJob;
use App\Models\Project;
+use App\Models\S3Storage;
+use App\Models\ScheduledDatabaseBackup;
use App\Models\Server;
use App\Models\StandalonePostgresql;
use Illuminate\Http\Request;
+use Illuminate\Support\Facades\DB;
use OpenApi\Attributes as OA;
class DatabasesController extends Controller
@@ -79,13 +83,88 @@ class DatabasesController extends Controller
foreach ($projects as $project) {
$databases = $databases->merge($project->databases());
}
- $databases = $databases->map(function ($database) {
+
+ $databaseIds = $databases->pluck('id')->toArray();
+
+ $backupConfigs = ScheduledDatabaseBackup::ownedByCurrentTeamAPI($teamId)->with('latest_log')
+ ->whereIn('database_id', $databaseIds)
+ ->get()
+ ->groupBy('database_id');
+
+ $databases = $databases->map(function ($database) use ($backupConfigs) {
+ $database->backup_configs = $backupConfigs->get($database->id, collect())->values();
+
return $this->removeSensitiveData($database);
});
return response()->json($databases);
}
+ #[OA\Get(
+ summary: 'Get',
+ description: 'Get backups details by database UUID.',
+ path: '/databases/{uuid}/backups',
+ operationId: 'get-database-backups-by-uuid',
+ security: [
+ ['bearerAuth' => []],
+ ],
+ tags: ['Databases'],
+ parameters: [
+ new OA\Parameter(
+ name: 'uuid',
+ in: 'path',
+ description: 'UUID of the database.',
+ required: true,
+ schema: new OA\Schema(
+ type: 'string',
+ format: 'uuid',
+ )
+ ),
+ ],
+ responses: [
+ new OA\Response(
+ response: 200,
+ description: 'Get all backups for a database',
+ content: new OA\JsonContent(
+ type: 'string',
+ example: 'Content is very complex. Will be implemented later.',
+ ),
+ ),
+ new OA\Response(
+ response: 401,
+ ref: '#/components/responses/401',
+ ),
+ new OA\Response(
+ response: 400,
+ ref: '#/components/responses/400',
+ ),
+ new OA\Response(
+ response: 404,
+ ref: '#/components/responses/404',
+ ),
+ ]
+ )]
+ public function database_backup_details_uuid(Request $request)
+ {
+ $teamId = getTeamIdFromToken();
+ if (is_null($teamId)) {
+ return invalidTokenResponse();
+ }
+ if (! $request->uuid) {
+ return response()->json(['message' => 'UUID is required.'], 404);
+ }
+ $database = queryDatabaseByUuidWithinTeam($request->uuid, $teamId);
+ if (! $database) {
+ return response()->json(['message' => 'Database not found.'], 404);
+ }
+
+ $this->authorize('view', $database);
+
+ $backupConfig = ScheduledDatabaseBackup::ownedByCurrentTeamAPI($teamId)->with('executions')->where('database_id', $database->id)->get();
+
+ return response()->json($backupConfig);
+ }
+
#[OA\Get(
summary: 'Get',
description: 'Get database by UUID.',
@@ -248,6 +327,7 @@ class DatabasesController extends Controller
return invalidTokenResponse();
}
+ // this check if the request is a valid json
$return = validateIncomingRequest($request);
if ($return instanceof \Illuminate\Http\JsonResponse) {
return $return;
@@ -499,7 +579,8 @@ class DatabasesController extends Controller
$whatToDoWithDatabaseProxy = 'start';
}
- $database->update($request->all());
+ // Only update database fields, not backup configuration
+ $database->update($request->only($allowedFields));
if ($whatToDoWithDatabaseProxy === 'start') {
StartDatabaseProxy::dispatch($database);
@@ -512,6 +593,197 @@ class DatabasesController extends Controller
]);
}
+ #[OA\Patch(
+ summary: 'Update',
+ description: 'Update a specific backup configuration for a given database, identified by its UUID and the backup ID',
+ path: '/databases/{uuid}/backups/{scheduled_backup_uuid}',
+ operationId: 'update-database-backup',
+ security: [
+ ['bearerAuth' => []],
+ ],
+ tags: ['Databases'],
+ parameters: [
+ new OA\Parameter(
+ name: 'uuid',
+ in: 'path',
+ description: 'UUID of the database.',
+ required: true,
+ schema: new OA\Schema(
+ type: 'string',
+ format: 'uuid',
+ )
+ ),
+ new OA\Parameter(
+ name: 'scheduled_backup_uuid',
+ in: 'path',
+ description: 'UUID of the backup configuration.',
+ required: true,
+ schema: new OA\Schema(
+ type: 'string',
+ format: 'uuid',
+ )
+ ),
+ ],
+ requestBody: new OA\RequestBody(
+ description: 'Database backup configuration data',
+ required: true,
+ content: new OA\MediaType(
+ mediaType: 'application/json',
+ schema: new OA\Schema(
+ type: 'object',
+ properties: [
+ 'save_s3' => ['type' => 'boolean', 'description' => 'Whether data is saved in s3 or not'],
+ 's3_storage_uuid' => ['type' => 'string', 'description' => 'S3 storage UUID'],
+ 'backup_now' => ['type' => 'boolean', 'description' => 'Whether to take a backup now or not'],
+ 'enabled' => ['type' => 'boolean', 'description' => 'Whether the backup is enabled or not'],
+ 'databases_to_backup' => ['type' => 'string', 'description' => 'Comma separated list of databases to backup'],
+ 'dump_all' => ['type' => 'boolean', 'description' => 'Whether all databases are dumped or not'],
+ 'frequency' => ['type' => 'string', 'description' => 'Frequency of the backup'],
+ 'database_backup_retention_amount_locally' => ['type' => 'integer', 'description' => 'Retention amount of the backup locally'],
+ 'database_backup_retention_days_locally' => ['type' => 'integer', 'description' => 'Retention days of the backup locally'],
+ 'database_backup_retention_max_storage_locally' => ['type' => 'integer', 'description' => 'Max storage of the backup locally'],
+ 'database_backup_retention_amount_s3' => ['type' => 'integer', 'description' => 'Retention amount of the backup in s3'],
+ 'database_backup_retention_days_s3' => ['type' => 'integer', 'description' => 'Retention days of the backup in s3'],
+ 'database_backup_retention_max_storage_s3' => ['type' => 'integer', 'description' => 'Max storage of the backup in S3'],
+ ],
+ ),
+ )
+ ),
+ responses: [
+ new OA\Response(
+ response: 200,
+ description: 'Database backup configuration updated',
+ ),
+ new OA\Response(
+ response: 401,
+ ref: '#/components/responses/401',
+ ),
+ new OA\Response(
+ response: 400,
+ ref: '#/components/responses/400',
+ ),
+ new OA\Response(
+ response: 404,
+ ref: '#/components/responses/404',
+ ),
+ ]
+ )]
+ public function update_backup(Request $request)
+ {
+ $backupConfigFields = ['save_s3', 'enabled', 'dump_all', 'frequency', 'databases_to_backup', 'database_backup_retention_amount_locally', 'database_backup_retention_days_locally', 'database_backup_retention_max_storage_locally', 'database_backup_retention_amount_s3', 'database_backup_retention_days_s3', 'database_backup_retention_max_storage_s3', 's3_storage_uuid'];
+
+ $teamId = getTeamIdFromToken();
+ if (is_null($teamId)) {
+ return invalidTokenResponse();
+ }
+ // this check if the request is a valid json
+ $return = validateIncomingRequest($request);
+ if ($return instanceof \Illuminate\Http\JsonResponse) {
+ return $return;
+ }
+ $validator = customApiValidator($request->all(), [
+ 'save_s3' => 'boolean',
+ 'backup_now' => 'boolean|nullable',
+ 'enabled' => 'boolean',
+ 'dump_all' => 'boolean',
+ 's3_storage_uuid' => 'string|exists:s3_storages,uuid|nullable',
+ 'databases_to_backup' => 'string|nullable',
+ 'frequency' => 'string|in:every_minute,hourly,daily,weekly,monthly,yearly',
+ 'database_backup_retention_amount_locally' => 'integer|min:0',
+ 'database_backup_retention_days_locally' => 'integer|min:0',
+ 'database_backup_retention_max_storage_locally' => 'integer|min:0',
+ 'database_backup_retention_amount_s3' => 'integer|min:0',
+ 'database_backup_retention_days_s3' => 'integer|min:0',
+ 'database_backup_retention_max_storage_s3' => 'integer|min:0',
+ ]);
+ if ($validator->fails()) {
+ return response()->json([
+ 'message' => 'Validation failed.',
+ 'errors' => $validator->errors(),
+ ], 422);
+ }
+
+ if (! $request->uuid) {
+ return response()->json(['message' => 'UUID is required.'], 404);
+ }
+
+ // Validate scheduled_backup_uuid is provided
+ if (! $request->scheduled_backup_uuid) {
+ return response()->json(['message' => 'Scheduled backup UUID is required.'], 400);
+ }
+
+ $uuid = $request->uuid;
+ removeUnnecessaryFieldsFromRequest($request);
+ $database = queryDatabaseByUuidWithinTeam($uuid, $teamId);
+ if (! $database) {
+ return response()->json(['message' => 'Database not found.'], 404);
+ }
+
+ $this->authorize('update', $database);
+
+ if ($request->boolean('save_s3') && ! $request->filled('s3_storage_uuid')) {
+ return response()->json([
+ 'message' => 'Validation failed.',
+ 'errors' => ['s3_storage_uuid' => ['The s3_storage_uuid field is required when save_s3 is true.']],
+ ], 422);
+ }
+ if ($request->filled('s3_storage_uuid')) {
+ $existsInTeam = S3Storage::ownedByCurrentTeam()->where('uuid', $request->s3_storage_uuid)->exists();
+ if (! $existsInTeam) {
+ return response()->json([
+ 'message' => 'Validation failed.',
+ 'errors' => ['s3_storage_uuid' => ['The selected S3 storage is invalid for this team.']],
+ ], 422);
+ }
+ }
+
+ $backupConfig = ScheduledDatabaseBackup::ownedByCurrentTeamAPI($teamId)->where('database_id', $database->id)
+ ->where('uuid', $request->scheduled_backup_uuid)
+ ->first();
+ if (! $backupConfig) {
+ return response()->json(['message' => 'Backup config not found.'], 404);
+ }
+
+ $extraFields = array_diff(array_keys($request->all()), $backupConfigFields, ['backup_now']);
+ if (! empty($extraFields)) {
+ $errors = $validator->errors();
+ foreach ($extraFields as $field) {
+ $errors->add($field, 'This field is not allowed.');
+ }
+
+ return response()->json([
+ 'message' => 'Validation failed.',
+ 'errors' => $errors,
+ ], 422);
+ }
+
+ $backupData = $request->only($backupConfigFields);
+
+ // Convert s3_storage_uuid to s3_storage_id
+ if (isset($backupData['s3_storage_uuid'])) {
+ $s3Storage = S3Storage::ownedByCurrentTeam()->where('uuid', $backupData['s3_storage_uuid'])->first();
+ if ($s3Storage) {
+ $backupData['s3_storage_id'] = $s3Storage->id;
+ } elseif ($request->boolean('save_s3')) {
+ return response()->json([
+ 'message' => 'Validation failed.',
+ 'errors' => ['s3_storage_uuid' => ['The selected S3 storage is invalid for this team.']],
+ ], 422);
+ }
+ unset($backupData['s3_storage_uuid']);
+ }
+
+ $backupConfig->update($backupData);
+
+ if ($request->backup_now) {
+ dispatch(new DatabaseBackupJob($backupConfig));
+ }
+
+ return response()->json([
+ 'message' => 'Database backup configuration updated',
+ ]);
+ }
+
#[OA\Post(
summary: 'Create (PostgreSQL)',
description: 'Create a new PostgreSQL database.',
@@ -1630,6 +1902,344 @@ class DatabasesController extends Controller
]);
}
+ #[OA\Delete(
+ summary: 'Delete backup configuration',
+ description: 'Deletes a backup configuration and all its executions.',
+ path: '/databases/{uuid}/backups/{scheduled_backup_uuid}',
+ operationId: 'delete-backup-configuration-by-uuid',
+ security: [
+ ['bearerAuth' => []],
+ ],
+ tags: ['Databases'],
+ parameters: [
+ new OA\Parameter(
+ name: 'uuid',
+ in: 'path',
+ required: true,
+ description: 'UUID of the database',
+ schema: new OA\Schema(type: 'string')
+ ),
+ new OA\Parameter(
+ name: 'scheduled_backup_uuid',
+ in: 'path',
+ required: true,
+ description: 'UUID of the backup configuration to delete',
+ schema: new OA\Schema(type: 'string', format: 'uuid')
+ ),
+ new OA\Parameter(
+ name: 'delete_s3',
+ in: 'query',
+ required: false,
+ description: 'Whether to delete all backup files from S3',
+ schema: new OA\Schema(type: 'boolean', default: false)
+ ),
+ ],
+ responses: [
+ new OA\Response(
+ response: 200,
+ description: 'Backup configuration deleted.',
+ content: new OA\JsonContent(
+ type: 'object',
+ properties: [
+ 'message' => new OA\Schema(type: 'string', example: 'Backup configuration and all executions deleted.'),
+ ]
+ )
+ ),
+ new OA\Response(
+ response: 404,
+ description: 'Backup configuration not found.',
+ content: new OA\JsonContent(
+ type: 'object',
+ properties: [
+ 'message' => new OA\Schema(type: 'string', example: 'Backup configuration not found.'),
+ ]
+ )
+ ),
+ ]
+ )]
+ public function delete_backup_by_uuid(Request $request)
+ {
+ $teamId = getTeamIdFromToken();
+ if (is_null($teamId)) {
+ return invalidTokenResponse();
+ }
+
+ // Validate scheduled_backup_uuid is provided
+ if (! $request->scheduled_backup_uuid) {
+ return response()->json(['message' => 'Scheduled backup UUID is required.'], 400);
+ }
+
+ $database = queryDatabaseByUuidWithinTeam($request->uuid, $teamId);
+ if (! $database) {
+ return response()->json(['message' => 'Database not found.'], 404);
+ }
+
+ $this->authorize('update', $database);
+
+ // Find the backup configuration by its UUID
+ $backup = ScheduledDatabaseBackup::ownedByCurrentTeamAPI($teamId)->where('database_id', $database->id)
+ ->where('uuid', $request->scheduled_backup_uuid)
+ ->first();
+
+ if (! $backup) {
+ return response()->json(['message' => 'Backup configuration not found.'], 404);
+ }
+
+ $deleteS3 = filter_var($request->query->get('delete_s3', false), FILTER_VALIDATE_BOOLEAN);
+
+ try {
+ DB::beginTransaction();
+ // Get all executions for this backup configuration
+ $executions = $backup->executions()->get();
+
+ // Delete all execution files (locally and optionally from S3)
+ foreach ($executions as $execution) {
+ if ($execution->filename) {
+ deleteBackupsLocally($execution->filename, $database->destination->server);
+
+ if ($deleteS3 && $backup->s3) {
+ deleteBackupsS3($execution->filename, $backup->s3);
+ }
+ }
+
+ $execution->delete();
+ }
+
+ // Delete the backup configuration itself
+ $backup->delete();
+ DB::commit();
+
+ return response()->json([
+ 'message' => 'Backup configuration and all executions deleted.',
+ ]);
+ } catch (\Exception $e) {
+ DB::rollBack();
+
+ return response()->json(['message' => 'Failed to delete backup: '.$e->getMessage()], 500);
+ }
+ }
+
+ #[OA\Delete(
+ summary: 'Delete backup execution',
+ description: 'Deletes a specific backup execution.',
+ path: '/databases/{uuid}/backups/{scheduled_backup_uuid}/executions/{execution_uuid}',
+ operationId: 'delete-backup-execution-by-uuid',
+ security: [
+ ['bearerAuth' => []],
+ ],
+ tags: ['Databases'],
+ parameters: [
+ new OA\Parameter(
+ name: 'uuid',
+ in: 'path',
+ required: true,
+ description: 'UUID of the database',
+ schema: new OA\Schema(type: 'string')
+ ),
+ new OA\Parameter(
+ name: 'scheduled_backup_uuid',
+ in: 'path',
+ required: true,
+ description: 'UUID of the backup configuration',
+ schema: new OA\Schema(type: 'string', format: 'uuid')
+ ),
+ new OA\Parameter(
+ name: 'execution_uuid',
+ in: 'path',
+ required: true,
+ description: 'UUID of the backup execution to delete',
+ schema: new OA\Schema(type: 'string', format: 'uuid')
+ ),
+ new OA\Parameter(
+ name: 'delete_s3',
+ in: 'query',
+ required: false,
+ description: 'Whether to delete the backup from S3',
+ schema: new OA\Schema(type: 'boolean', default: false)
+ ),
+ ],
+ responses: [
+ new OA\Response(
+ response: 200,
+ description: 'Backup execution deleted.',
+ content: new OA\JsonContent(
+ type: 'object',
+ properties: [
+ 'message' => new OA\Schema(type: 'string', example: 'Backup execution deleted.'),
+ ]
+ )
+ ),
+ new OA\Response(
+ response: 404,
+ description: 'Backup execution not found.',
+ content: new OA\JsonContent(
+ type: 'object',
+ properties: [
+ 'message' => new OA\Schema(type: 'string', example: 'Backup execution not found.'),
+ ]
+ )
+ ),
+ ]
+ )]
+ public function delete_execution_by_uuid(Request $request)
+ {
+ $teamId = getTeamIdFromToken();
+ if (is_null($teamId)) {
+ return invalidTokenResponse();
+ }
+
+ // Validate parameters
+ if (! $request->scheduled_backup_uuid) {
+ return response()->json(['message' => 'Scheduled backup UUID is required.'], 400);
+ }
+ if (! $request->execution_uuid) {
+ return response()->json(['message' => 'Execution UUID is required.'], 400);
+ }
+
+ $database = queryDatabaseByUuidWithinTeam($request->uuid, $teamId);
+ if (! $database) {
+ return response()->json(['message' => 'Database not found.'], 404);
+ }
+
+ $this->authorize('update', $database);
+
+ // Find the backup configuration by its UUID
+ $backup = ScheduledDatabaseBackup::ownedByCurrentTeamAPI($teamId)->where('database_id', $database->id)
+ ->where('uuid', $request->scheduled_backup_uuid)
+ ->first();
+
+ if (! $backup) {
+ return response()->json(['message' => 'Backup configuration not found.'], 404);
+ }
+
+ // Find the specific execution
+ $execution = $backup->executions()->where('uuid', $request->execution_uuid)->first();
+ if (! $execution) {
+ return response()->json(['message' => 'Backup execution not found.'], 404);
+ }
+
+ $deleteS3 = filter_var($request->query->get('delete_s3', false), FILTER_VALIDATE_BOOLEAN);
+
+ try {
+ if ($execution->filename) {
+ deleteBackupsLocally($execution->filename, $database->destination->server);
+
+ if ($deleteS3 && $backup->s3) {
+ deleteBackupsS3($execution->filename, $backup->s3);
+ }
+ }
+
+ $execution->delete();
+
+ return response()->json([
+ 'message' => 'Backup execution deleted.',
+ ]);
+ } catch (\Exception $e) {
+ return response()->json(['message' => 'Failed to delete backup execution: '.$e->getMessage()], 500);
+ }
+ }
+
+ #[OA\Get(
+ summary: 'List backup executions',
+ description: 'Get all executions for a specific backup configuration.',
+ path: '/databases/{uuid}/backups/{scheduled_backup_uuid}/executions',
+ operationId: 'list-backup-executions',
+ security: [
+ ['bearerAuth' => []],
+ ],
+ tags: ['Databases'],
+ parameters: [
+ new OA\Parameter(
+ name: 'uuid',
+ in: 'path',
+ required: true,
+ description: 'UUID of the database',
+ schema: new OA\Schema(type: 'string')
+ ),
+ new OA\Parameter(
+ name: 'scheduled_backup_uuid',
+ in: 'path',
+ required: true,
+ description: 'UUID of the backup configuration',
+ schema: new OA\Schema(type: 'string', format: 'uuid')
+ ),
+ ],
+ responses: [
+ new OA\Response(
+ response: 200,
+ description: 'List of backup executions',
+ content: new OA\JsonContent(
+ type: 'object',
+ properties: [
+ 'executions' => new OA\Schema(
+ type: 'array',
+ items: new OA\Schema(
+ type: 'object',
+ properties: [
+ 'uuid' => ['type' => 'string'],
+ 'filename' => ['type' => 'string'],
+ 'size' => ['type' => 'integer'],
+ 'created_at' => ['type' => 'string'],
+ 'message' => ['type' => 'string'],
+ 'status' => ['type' => 'string'],
+ ]
+ )
+ ),
+ ]
+ )
+ ),
+ new OA\Response(
+ response: 404,
+ description: 'Backup configuration not found.',
+ ),
+ ]
+ )]
+ public function list_backup_executions(Request $request)
+ {
+ $teamId = getTeamIdFromToken();
+ if (is_null($teamId)) {
+ return invalidTokenResponse();
+ }
+
+ // Validate scheduled_backup_uuid is provided
+ if (! $request->scheduled_backup_uuid) {
+ return response()->json(['message' => 'Scheduled backup UUID is required.'], 400);
+ }
+
+ $database = queryDatabaseByUuidWithinTeam($request->uuid, $teamId);
+ if (! $database) {
+ return response()->json(['message' => 'Database not found.'], 404);
+ }
+
+ // Find the backup configuration by its UUID
+ $backup = ScheduledDatabaseBackup::ownedByCurrentTeamAPI($teamId)->where('database_id', $database->id)
+ ->where('uuid', $request->scheduled_backup_uuid)
+ ->first();
+
+ if (! $backup) {
+ return response()->json(['message' => 'Backup configuration not found.'], 404);
+ }
+
+ // Get all executions for this backup configuration
+ $executions = $backup->executions()
+ ->orderBy('created_at', 'desc')
+ ->get()
+ ->map(function ($execution) {
+ return [
+ 'uuid' => $execution->uuid,
+ 'filename' => $execution->filename,
+ 'size' => $execution->size,
+ 'created_at' => $execution->created_at->toIso8601String(),
+ 'message' => $execution->message,
+ 'status' => $execution->status,
+ ];
+ });
+
+ return response()->json([
+ 'executions' => $executions,
+ ]);
+ }
+
#[OA\Get(
summary: 'Start',
description: 'Start database. `Post` request is also accepted.',
diff --git a/app/Http/Controllers/Api/GithubController.php b/app/Http/Controllers/Api/GithubController.php
new file mode 100644
index 000000000..8c95a585f
--- /dev/null
+++ b/app/Http/Controllers/Api/GithubController.php
@@ -0,0 +1,661 @@
+ []],
+ ],
+ tags: ['GitHub Apps'],
+ requestBody: new OA\RequestBody(
+ description: 'GitHub app creation payload.',
+ required: true,
+ content: [
+ new OA\MediaType(
+ mediaType: 'application/json',
+ schema: new OA\Schema(
+ type: 'object',
+ properties: [
+ 'name' => ['type' => 'string', 'description' => 'Name of the GitHub app.'],
+ 'organization' => ['type' => 'string', 'nullable' => true, 'description' => 'Organization to associate the app with.'],
+ 'api_url' => ['type' => 'string', 'description' => 'API URL for the GitHub app (e.g., https://api.github.com).'],
+ 'html_url' => ['type' => 'string', 'description' => 'HTML URL for the GitHub app (e.g., https://github.com).'],
+ 'custom_user' => ['type' => 'string', 'description' => 'Custom user for SSH access (default: git).'],
+ 'custom_port' => ['type' => 'integer', 'description' => 'Custom port for SSH access (default: 22).'],
+ 'app_id' => ['type' => 'integer', 'description' => 'GitHub App ID from GitHub.'],
+ 'installation_id' => ['type' => 'integer', 'description' => 'GitHub Installation ID.'],
+ 'client_id' => ['type' => 'string', 'description' => 'GitHub OAuth App Client ID.'],
+ 'client_secret' => ['type' => 'string', 'description' => 'GitHub OAuth App Client Secret.'],
+ 'webhook_secret' => ['type' => 'string', 'description' => 'Webhook secret for GitHub webhooks.'],
+ 'private_key_uuid' => ['type' => 'string', 'description' => 'UUID of an existing private key for GitHub App authentication.'],
+ 'is_system_wide' => ['type' => 'boolean', 'description' => 'Is this app system-wide (cloud only).'],
+ ],
+ required: ['name', 'api_url', 'html_url', 'app_id', 'installation_id', 'client_id', 'client_secret', 'private_key_uuid'],
+ ),
+ ),
+ ],
+ ),
+ responses: [
+ new OA\Response(
+ response: 201,
+ description: 'GitHub app created successfully.',
+ content: [
+ new OA\MediaType(
+ mediaType: 'application/json',
+ schema: new OA\Schema(
+ type: 'object',
+ properties: [
+ 'id' => ['type' => 'integer'],
+ 'uuid' => ['type' => 'string'],
+ 'name' => ['type' => 'string'],
+ 'organization' => ['type' => 'string', 'nullable' => true],
+ 'api_url' => ['type' => 'string'],
+ 'html_url' => ['type' => 'string'],
+ 'custom_user' => ['type' => 'string'],
+ 'custom_port' => ['type' => 'integer'],
+ 'app_id' => ['type' => 'integer'],
+ 'installation_id' => ['type' => 'integer'],
+ 'client_id' => ['type' => 'string'],
+ 'private_key_id' => ['type' => 'integer'],
+ 'is_system_wide' => ['type' => 'boolean'],
+ 'team_id' => ['type' => 'integer'],
+ ]
+ )
+ ),
+ ]
+ ),
+ new OA\Response(
+ response: 400,
+ ref: '#/components/responses/400',
+ ),
+ new OA\Response(
+ response: 401,
+ ref: '#/components/responses/401',
+ ),
+ new OA\Response(
+ response: 422,
+ ref: '#/components/responses/422',
+ ),
+ ]
+ )]
+ public function create_github_app(Request $request)
+ {
+ $teamId = getTeamIdFromToken();
+ if (is_null($teamId)) {
+ return invalidTokenResponse();
+ }
+ $return = validateIncomingRequest($request);
+ if ($return instanceof \Illuminate\Http\JsonResponse) {
+ return $return;
+ }
+
+ $allowedFields = [
+ 'name',
+ 'organization',
+ 'api_url',
+ 'html_url',
+ 'custom_user',
+ 'custom_port',
+ 'app_id',
+ 'installation_id',
+ 'client_id',
+ 'client_secret',
+ 'webhook_secret',
+ 'private_key_uuid',
+ 'is_system_wide',
+ ];
+
+ $validator = customApiValidator($request->all(), [
+ 'name' => 'required|string|max:255',
+ 'organization' => 'nullable|string|max:255',
+ 'api_url' => 'required|string|url',
+ 'html_url' => 'required|string|url',
+ 'custom_user' => 'nullable|string|max:255',
+ 'custom_port' => 'nullable|integer|min:1|max:65535',
+ 'app_id' => 'required|integer',
+ 'installation_id' => 'required|integer',
+ 'client_id' => 'required|string|max:255',
+ 'client_secret' => 'required|string',
+ 'webhook_secret' => 'required|string',
+ 'private_key_uuid' => 'required|string',
+ 'is_system_wide' => 'boolean',
+ ]);
+
+ $extraFields = array_diff(array_keys($request->all()), $allowedFields);
+ if ($validator->fails() || ! empty($extraFields)) {
+ $errors = $validator->errors();
+ if (! empty($extraFields)) {
+ foreach ($extraFields as $field) {
+ $errors->add($field, 'This field is not allowed.');
+ }
+ }
+
+ return response()->json([
+ 'message' => 'Validation failed.',
+ 'errors' => $errors,
+ ], 422);
+ }
+
+ try {
+ // Verify the private key belongs to the team
+ $privateKey = PrivateKey::where('uuid', $request->input('private_key_uuid'))
+ ->where('team_id', $teamId)
+ ->first();
+
+ if (! $privateKey) {
+ return response()->json([
+ 'message' => 'Private key not found or does not belong to your team.',
+ ], 404);
+ }
+
+ $payload = [
+ 'uuid' => Str::uuid(),
+ 'name' => $request->input('name'),
+ 'organization' => $request->input('organization'),
+ 'api_url' => $request->input('api_url'),
+ 'html_url' => $request->input('html_url'),
+ 'custom_user' => $request->input('custom_user', 'git'),
+ 'custom_port' => $request->input('custom_port', 22),
+ 'app_id' => $request->input('app_id'),
+ 'installation_id' => $request->input('installation_id'),
+ 'client_id' => $request->input('client_id'),
+ 'client_secret' => $request->input('client_secret'),
+ 'webhook_secret' => $request->input('webhook_secret'),
+ 'private_key_id' => $privateKey->id,
+ 'is_public' => false,
+ 'team_id' => $teamId,
+ ];
+
+ if (! isCloud()) {
+ $payload['is_system_wide'] = $request->input('is_system_wide', false);
+ }
+
+ $githubApp = GithubApp::create($payload);
+
+ return response()->json($githubApp, 201);
+ } catch (\Throwable $e) {
+ return handleError($e);
+ }
+ }
+
+ #[OA\Get(
+ path: '/github-apps/{github_app_id}/repositories',
+ summary: 'Load Repositories for a GitHub App',
+ description: 'Fetch repositories from GitHub for a given GitHub app.',
+ operationId: 'load-repositories',
+ tags: ['GitHub Apps'],
+ security: [
+ ['bearerAuth' => []],
+ ],
+ parameters: [
+ new OA\Parameter(
+ name: 'github_app_id',
+ in: 'path',
+ required: true,
+ schema: new OA\Schema(type: 'integer'),
+ description: 'GitHub App ID'
+ ),
+ ],
+ responses: [
+ new OA\Response(
+ response: 200,
+ description: 'Repositories loaded successfully.',
+ content: new OA\MediaType(
+ mediaType: 'application/json',
+ schema: new OA\Schema(
+ type: 'object',
+ properties: [
+ 'repositories' => new OA\Items(
+ type: 'array',
+ items: new OA\Schema(type: 'object')
+ ),
+ ]
+ )
+ )
+ ),
+ new OA\Response(
+ response: 400,
+ ref: '#/components/responses/400',
+ ),
+ new OA\Response(
+ response: 401,
+ ref: '#/components/responses/401',
+ ),
+ new OA\Response(
+ response: 404,
+ ref: '#/components/responses/404',
+ ),
+ ]
+ )]
+ public function load_repositories($github_app_id)
+ {
+ $teamId = getTeamIdFromToken();
+ if (is_null($teamId)) {
+ return invalidTokenResponse();
+ }
+
+ try {
+ $githubApp = GithubApp::where('id', $github_app_id)
+ ->where('team_id', $teamId)
+ ->firstOrFail();
+
+ $token = generateGithubInstallationToken($githubApp);
+ $repositories = collect();
+ $page = 1;
+ $maxPages = 100; // Safety limit: max 10,000 repositories
+
+ while ($page <= $maxPages) {
+ $response = Http::GitHub($githubApp->api_url, $token)
+ ->timeout(20)
+ ->retry(3, 200, throw: false)
+ ->get('/installation/repositories', [
+ 'per_page' => 100,
+ 'page' => $page,
+ ]);
+
+ if ($response->status() !== 200) {
+ return response()->json([
+ 'message' => $response->json()['message'] ?? 'Failed to load repositories',
+ ], $response->status());
+ }
+
+ $json = $response->json();
+ $repos = $json['repositories'] ?? [];
+
+ if (empty($repos)) {
+ break; // No more repositories to load
+ }
+
+ $repositories = $repositories->concat($repos);
+ $page++;
+ }
+
+ return response()->json([
+ 'repositories' => $repositories->sortBy('name')->values(),
+ ]);
+ } catch (\Illuminate\Database\Eloquent\ModelNotFoundException $e) {
+ return response()->json(['message' => 'GitHub app not found'], 404);
+ } catch (\Throwable $e) {
+ return handleError($e);
+ }
+ }
+
+ #[OA\Get(
+ path: '/github-apps/{github_app_id}/repositories/{owner}/{repo}/branches',
+ summary: 'Load Branches for a GitHub Repository',
+ description: 'Fetch branches from GitHub for a given repository.',
+ operationId: 'load-branches',
+ tags: ['GitHub Apps'],
+ security: [
+ ['bearerAuth' => []],
+ ],
+ parameters: [
+ new OA\Parameter(
+ name: 'github_app_id',
+ in: 'path',
+ required: true,
+ schema: new OA\Schema(type: 'integer'),
+ description: 'GitHub App ID'
+ ),
+ new OA\Parameter(
+ name: 'owner',
+ in: 'path',
+ required: true,
+ schema: new OA\Schema(type: 'string'),
+ description: 'Repository owner'
+ ),
+ new OA\Parameter(
+ name: 'repo',
+ in: 'path',
+ required: true,
+ schema: new OA\Schema(type: 'string'),
+ description: 'Repository name'
+ ),
+ ],
+ responses: [
+ new OA\Response(
+ response: 200,
+ description: 'Branches loaded successfully.',
+ content: new OA\MediaType(
+ mediaType: 'application/json',
+ schema: new OA\Schema(
+ type: 'object',
+ properties: [
+ 'branches' => new OA\Items(
+ type: 'array',
+ items: new OA\Schema(type: 'object')
+ ),
+ ]
+ )
+ )
+ ),
+ new OA\Response(
+ response: 400,
+ ref: '#/components/responses/400',
+ ),
+ new OA\Response(
+ response: 401,
+ ref: '#/components/responses/401',
+ ),
+ new OA\Response(
+ response: 404,
+ ref: '#/components/responses/404',
+ ),
+ ]
+ )]
+ public function load_branches($github_app_id, $owner, $repo)
+ {
+ $teamId = getTeamIdFromToken();
+ if (is_null($teamId)) {
+ return invalidTokenResponse();
+ }
+
+ try {
+ $githubApp = GithubApp::where('id', $github_app_id)
+ ->where('team_id', $teamId)
+ ->firstOrFail();
+
+ $token = generateGithubInstallationToken($githubApp);
+
+ $response = Http::GitHub($githubApp->api_url, $token)
+ ->timeout(20)
+ ->retry(3, 200, throw: false)
+ ->get("/repos/{$owner}/{$repo}/branches");
+
+ if ($response->status() !== 200) {
+ return response()->json([
+ 'message' => 'Error loading branches from GitHub.',
+ 'error' => $response->json('message'),
+ ], $response->status());
+ }
+
+ $branches = $response->json();
+
+ return response()->json([
+ 'branches' => $branches,
+ ]);
+ } catch (\Illuminate\Database\Eloquent\ModelNotFoundException $e) {
+ return response()->json(['message' => 'GitHub app not found'], 404);
+ } catch (\Throwable $e) {
+ return handleError($e);
+ }
+ }
+
+ /**
+ * Update a GitHub app.
+ */
+ #[OA\Patch(
+ path: '/github-apps/{github_app_id}',
+ operationId: 'updateGithubApp',
+ security: [
+ ['bearerAuth' => []],
+ ],
+ tags: ['GitHub Apps'],
+ summary: 'Update GitHub App',
+ description: 'Update an existing GitHub app.',
+ parameters: [
+ new OA\Parameter(
+ name: 'github_app_id',
+ in: 'path',
+ required: true,
+ schema: new OA\Schema(type: 'integer'),
+ description: 'GitHub App ID'
+ ),
+ ],
+ requestBody: new OA\RequestBody(
+ required: true,
+ content: new OA\MediaType(
+ mediaType: 'application/json',
+ schema: new OA\Schema(
+ type: 'object',
+ properties: [
+ 'name' => ['type' => 'string', 'description' => 'GitHub App name'],
+ 'organization' => ['type' => 'string', 'nullable' => true, 'description' => 'GitHub organization'],
+ 'api_url' => ['type' => 'string', 'description' => 'GitHub API URL'],
+ 'html_url' => ['type' => 'string', 'description' => 'GitHub HTML URL'],
+ 'custom_user' => ['type' => 'string', 'description' => 'Custom user for SSH'],
+ 'custom_port' => ['type' => 'integer', 'description' => 'Custom port for SSH'],
+ 'app_id' => ['type' => 'integer', 'description' => 'GitHub App ID'],
+ 'installation_id' => ['type' => 'integer', 'description' => 'GitHub Installation ID'],
+ 'client_id' => ['type' => 'string', 'description' => 'GitHub Client ID'],
+ 'client_secret' => ['type' => 'string', 'description' => 'GitHub Client Secret'],
+ 'webhook_secret' => ['type' => 'string', 'description' => 'GitHub Webhook Secret'],
+ 'private_key_uuid' => ['type' => 'string', 'description' => 'Private key UUID'],
+ 'is_system_wide' => ['type' => 'boolean', 'description' => 'Is system wide (non-cloud instances only)'],
+ ]
+ )
+ )
+ ),
+ responses: [
+ new OA\Response(
+ response: 200,
+ description: 'GitHub app updated successfully',
+ content: new OA\MediaType(
+ mediaType: 'application/json',
+ schema: new OA\Schema(
+ type: 'object',
+ properties: [
+ 'message' => ['type' => 'string', 'example' => 'GitHub app updated successfully'],
+ 'data' => ['type' => 'object', 'description' => 'Updated GitHub app data'],
+ ]
+ )
+ )
+ ),
+ new OA\Response(response: 401, description: 'Unauthorized'),
+ new OA\Response(response: 404, description: 'GitHub app not found'),
+ new OA\Response(response: 422, description: 'Validation error'),
+ ]
+ )]
+ public function update_github_app(Request $request, $github_app_id)
+ {
+ $teamId = getTeamIdFromToken();
+ if (is_null($teamId)) {
+ return invalidTokenResponse();
+ }
+
+ try {
+ $githubApp = GithubApp::where('id', $github_app_id)
+ ->where('team_id', $teamId)
+ ->firstOrFail();
+
+ // Define allowed fields for update
+ $allowedFields = [
+ 'name',
+ 'organization',
+ 'api_url',
+ 'html_url',
+ 'custom_user',
+ 'custom_port',
+ 'app_id',
+ 'installation_id',
+ 'client_id',
+ 'client_secret',
+ 'webhook_secret',
+ 'private_key_uuid',
+ ];
+
+ if (! isCloud()) {
+ $allowedFields[] = 'is_system_wide';
+ }
+
+ $payload = $request->only($allowedFields);
+
+ // Validate the request
+ $rules = [];
+ if (isset($payload['name'])) {
+ $rules['name'] = 'string';
+ }
+ if (isset($payload['organization'])) {
+ $rules['organization'] = 'nullable|string';
+ }
+ if (isset($payload['api_url'])) {
+ $rules['api_url'] = 'url';
+ }
+ if (isset($payload['html_url'])) {
+ $rules['html_url'] = 'url';
+ }
+ if (isset($payload['custom_user'])) {
+ $rules['custom_user'] = 'string';
+ }
+ if (isset($payload['custom_port'])) {
+ $rules['custom_port'] = 'integer|min:1|max:65535';
+ }
+ if (isset($payload['app_id'])) {
+ $rules['app_id'] = 'integer';
+ }
+ if (isset($payload['installation_id'])) {
+ $rules['installation_id'] = 'integer';
+ }
+ if (isset($payload['client_id'])) {
+ $rules['client_id'] = 'string';
+ }
+ if (isset($payload['client_secret'])) {
+ $rules['client_secret'] = 'string';
+ }
+ if (isset($payload['webhook_secret'])) {
+ $rules['webhook_secret'] = 'string';
+ }
+ if (isset($payload['private_key_uuid'])) {
+ $rules['private_key_uuid'] = 'string|uuid';
+ }
+ if (! isCloud() && isset($payload['is_system_wide'])) {
+ $rules['is_system_wide'] = 'boolean';
+ }
+
+ $validator = customApiValidator($payload, $rules);
+ if ($validator->fails()) {
+ return response()->json([
+ 'message' => 'Validation error',
+ 'errors' => $validator->errors(),
+ ], 422);
+ }
+
+ // Handle private_key_uuid -> private_key_id conversion
+ if (isset($payload['private_key_uuid'])) {
+ $privateKey = PrivateKey::where('team_id', $teamId)
+ ->where('uuid', $payload['private_key_uuid'])
+ ->first();
+
+ if (! $privateKey) {
+ return response()->json([
+ 'message' => 'Private key not found or does not belong to your team',
+ ], 404);
+ }
+
+ unset($payload['private_key_uuid']);
+ $payload['private_key_id'] = $privateKey->id;
+ }
+
+ // Update the GitHub app
+ $githubApp->update($payload);
+
+ return response()->json([
+ 'message' => 'GitHub app updated successfully',
+ 'data' => $githubApp,
+ ]);
+ } catch (\Illuminate\Database\Eloquent\ModelNotFoundException $e) {
+ return response()->json([
+ 'message' => 'GitHub app not found',
+ ], 404);
+ }
+ }
+
+ /**
+ * Delete a GitHub app.
+ */
+ #[OA\Delete(
+ path: '/github-apps/{github_app_id}',
+ operationId: 'deleteGithubApp',
+ security: [
+ ['bearerAuth' => []],
+ ],
+ tags: ['GitHub Apps'],
+ summary: 'Delete GitHub App',
+ description: 'Delete a GitHub app if it\'s not being used by any applications.',
+ parameters: [
+ new OA\Parameter(
+ name: 'github_app_id',
+ in: 'path',
+ required: true,
+ schema: new OA\Schema(type: 'integer'),
+ description: 'GitHub App ID'
+ ),
+ ],
+ responses: [
+ new OA\Response(
+ response: 200,
+ description: 'GitHub app deleted successfully',
+ content: new OA\MediaType(
+ mediaType: 'application/json',
+ schema: new OA\Schema(
+ type: 'object',
+ properties: [
+ 'message' => ['type' => 'string', 'example' => 'GitHub app deleted successfully'],
+ ]
+ )
+ )
+ ),
+ new OA\Response(response: 401, description: 'Unauthorized'),
+ new OA\Response(response: 404, description: 'GitHub app not found'),
+ new OA\Response(
+ response: 409,
+ description: 'Conflict - GitHub app is in use',
+ content: new OA\MediaType(
+ mediaType: 'application/json',
+ schema: new OA\Schema(
+ type: 'object',
+ properties: [
+ 'message' => ['type' => 'string', 'example' => 'This GitHub app is being used by 5 application(s). Please delete all applications first.'],
+ ]
+ )
+ )
+ ),
+ ]
+ )]
+ public function delete_github_app($github_app_id)
+ {
+ $teamId = getTeamIdFromToken();
+ if (is_null($teamId)) {
+ return invalidTokenResponse();
+ }
+
+ try {
+ $githubApp = GithubApp::where('id', $github_app_id)
+ ->where('team_id', $teamId)
+ ->firstOrFail();
+
+ // Check if the GitHub app is being used by any applications
+ if ($githubApp->applications->isNotEmpty()) {
+ $count = $githubApp->applications->count();
+
+ return response()->json([
+ 'message' => "This GitHub app is being used by {$count} application(s). Please delete all applications first.",
+ ], 409);
+ }
+
+ $githubApp->delete();
+
+ return response()->json([
+ 'message' => 'GitHub app deleted successfully',
+ ]);
+ } catch (\Illuminate\Database\Eloquent\ModelNotFoundException $e) {
+ return response()->json([
+ 'message' => 'GitHub app not found',
+ ], 404);
+ }
+ }
+}
diff --git a/app/Http/Controllers/Api/TeamController.php b/app/Http/Controllers/Api/TeamController.php
index d4b24d8ab..e12d83542 100644
--- a/app/Http/Controllers/Api/TeamController.php
+++ b/app/Http/Controllers/Api/TeamController.php
@@ -179,6 +179,8 @@ class TeamController extends Controller
$members = $team->members;
$members->makeHidden([
'pivot',
+ 'email_change_code',
+ 'email_change_code_expires_at',
]);
return response()->json(
@@ -264,6 +266,8 @@ class TeamController extends Controller
$team = auth()->user()->currentTeam();
$team->members->makeHidden([
'pivot',
+ 'email_change_code',
+ 'email_change_code_expires_at',
]);
return response()->json(
diff --git a/app/Jobs/ApplicationDeploymentJob.php b/app/Jobs/ApplicationDeploymentJob.php
index e0e0f519e..bd45c09c6 100644
--- a/app/Jobs/ApplicationDeploymentJob.php
+++ b/app/Jobs/ApplicationDeploymentJob.php
@@ -5,6 +5,7 @@ namespace App\Jobs;
use App\Actions\Docker\GetContainersStatus;
use App\Enums\ApplicationDeploymentStatus;
use App\Enums\ProcessStatus;
+use App\Events\ApplicationConfigurationChanged;
use App\Events\ServiceStatusChanged;
use App\Models\Application;
use App\Models\ApplicationDeploymentQueue;
@@ -17,6 +18,7 @@ use App\Models\StandaloneDocker;
use App\Models\SwarmDocker;
use App\Notifications\Application\DeploymentFailed;
use App\Notifications\Application\DeploymentSuccess;
+use App\Traits\EnvironmentVariableAnalyzer;
use App\Traits\ExecuteRemoteCommand;
use Carbon\Carbon;
use Exception;
@@ -38,7 +40,7 @@ use Yosymfony\Toml\Toml;
class ApplicationDeploymentJob implements ShouldBeEncrypted, ShouldQueue
{
- use Dispatchable, ExecuteRemoteCommand, InteractsWithQueue, Queueable, SerializesModels;
+ use Dispatchable, EnvironmentVariableAnalyzer, ExecuteRemoteCommand, InteractsWithQueue, Queueable, SerializesModels;
public $tries = 1;
@@ -147,6 +149,8 @@ class ApplicationDeploymentJob implements ShouldBeEncrypted, ShouldQueue
private Collection $saved_outputs;
+ private ?string $secrets_hash_key = null;
+
private ?string $full_healthcheck_url = null;
private string $serverUser = 'root';
@@ -167,6 +171,12 @@ class ApplicationDeploymentJob implements ShouldBeEncrypted, ShouldQueue
private bool $preserveRepository = false;
+ private bool $dockerBuildkitSupported = false;
+
+ private bool $skip_build = false;
+
+ private Collection|string $build_secrets;
+
public function tags()
{
// Do not remove this one, it needs to properly identify which worker is running the job
@@ -183,6 +193,7 @@ class ApplicationDeploymentJob implements ShouldBeEncrypted, ShouldQueue
$this->application = Application::find($this->application_deployment_queue->application_id);
$this->build_pack = data_get($this->application, 'build_pack');
$this->build_args = collect([]);
+ $this->build_secrets = '';
$this->deployment_uuid = $this->application_deployment_queue->deployment_uuid;
$this->pull_request_id = $this->application_deployment_queue->pull_request_id;
@@ -250,6 +261,14 @@ class ApplicationDeploymentJob implements ShouldBeEncrypted, ShouldQueue
public function handle(): void
{
+ // Check if deployment was cancelled before we even started
+ $this->application_deployment_queue->refresh();
+ if ($this->application_deployment_queue->status === ApplicationDeploymentStatus::CANCELLED_BY_USER->value) {
+ $this->application_deployment_queue->addLogEntry('Deployment was cancelled before starting.');
+
+ return;
+ }
+
$this->application_deployment_queue->update([
'status' => ApplicationDeploymentStatus::IN_PROGRESS->value,
'horizon_job_worker' => gethostname(),
@@ -263,7 +282,6 @@ class ApplicationDeploymentJob implements ShouldBeEncrypted, ShouldQueue
try {
// Make sure the private key is stored in the filesystem
$this->server->privateKey->storeInFileSystem();
-
// Generate custom host<->ip mapping
$allContainers = instant_remote_process(["docker network inspect {$this->destination->network} -f '{{json .Containers}}' "], $this->server);
@@ -319,6 +337,7 @@ class ApplicationDeploymentJob implements ShouldBeEncrypted, ShouldQueue
$this->build_server = $this->server;
$this->original_server = $this->server;
}
+ $this->detectBuildKitCapabilities();
$this->decide_what_to_do();
} catch (Exception $e) {
if ($this->pull_request_id !== 0 && $this->application->is_github_based()) {
@@ -336,6 +355,7 @@ class ApplicationDeploymentJob implements ShouldBeEncrypted, ShouldQueue
} else {
$this->write_deployment_configurations();
}
+
$this->application_deployment_queue->addLogEntry("Gracefully shutting down build container: {$this->deployment_uuid}");
$this->graceful_shutdown_container($this->deployment_uuid);
@@ -343,6 +363,80 @@ class ApplicationDeploymentJob implements ShouldBeEncrypted, ShouldQueue
}
}
+ private function detectBuildKitCapabilities(): void
+ {
+ // If build secrets are not enabled, skip detection and use traditional args
+ if (! $this->application->settings->use_build_secrets) {
+ $this->dockerBuildkitSupported = false;
+
+ return;
+ }
+
+ $serverToCheck = $this->use_build_server ? $this->build_server : $this->server;
+ $serverName = $this->use_build_server ? "build server ({$serverToCheck->name})" : "deployment server ({$serverToCheck->name})";
+
+ try {
+ $dockerVersion = instant_remote_process(
+ ["docker version --format '{{.Server.Version}}'"],
+ $serverToCheck
+ );
+
+ $versionParts = explode('.', $dockerVersion);
+ $majorVersion = (int) $versionParts[0];
+ $minorVersion = (int) ($versionParts[1] ?? 0);
+
+ if ($majorVersion < 18 || ($majorVersion == 18 && $minorVersion < 9)) {
+ $this->dockerBuildkitSupported = false;
+ $this->application_deployment_queue->addLogEntry("Docker {$dockerVersion} on {$serverName} does not support BuildKit (requires 18.09+). Build secrets feature disabled.");
+
+ return;
+ }
+
+ $buildkitEnabled = instant_remote_process(
+ ["docker buildx version >/dev/null 2>&1 && echo 'available' || echo 'not-available'"],
+ $serverToCheck
+ );
+
+ if (trim($buildkitEnabled) !== 'available') {
+ $buildkitTest = instant_remote_process(
+ ["DOCKER_BUILDKIT=1 docker build --help 2>&1 | grep -q 'secret' && echo 'supported' || echo 'not-supported'"],
+ $serverToCheck
+ );
+
+ if (trim($buildkitTest) === 'supported') {
+ $this->dockerBuildkitSupported = true;
+ $this->application_deployment_queue->addLogEntry("Docker {$dockerVersion} with BuildKit secrets support detected on {$serverName}.");
+ $this->application_deployment_queue->addLogEntry('Build secrets are enabled and will be used for enhanced security.');
+ } else {
+ $this->dockerBuildkitSupported = false;
+ $this->application_deployment_queue->addLogEntry("Docker {$dockerVersion} on {$serverName} does not have BuildKit secrets support.");
+ $this->application_deployment_queue->addLogEntry('Build secrets feature is enabled but not supported. Using traditional build arguments.');
+ }
+ } else {
+ // Buildx is available, which means BuildKit is available
+ // Now specifically test for secrets support
+ $secretsTest = instant_remote_process(
+ ["docker build --help 2>&1 | grep -q 'secret' && echo 'supported' || echo 'not-supported'"],
+ $serverToCheck
+ );
+
+ if (trim($secretsTest) === 'supported') {
+ $this->dockerBuildkitSupported = true;
+ $this->application_deployment_queue->addLogEntry("Docker {$dockerVersion} with BuildKit and Buildx detected on {$serverName}.");
+ $this->application_deployment_queue->addLogEntry('Build secrets are enabled and will be used for enhanced security.');
+ } else {
+ $this->dockerBuildkitSupported = false;
+ $this->application_deployment_queue->addLogEntry("Docker {$dockerVersion} with Buildx on {$serverName}, but secrets not supported.");
+ $this->application_deployment_queue->addLogEntry('Build secrets feature is enabled but not supported. Using traditional build arguments.');
+ }
+ }
+ } catch (\Exception $e) {
+ $this->dockerBuildkitSupported = false;
+ $this->application_deployment_queue->addLogEntry("Could not detect BuildKit capabilities on {$serverName}: {$e->getMessage()}");
+ $this->application_deployment_queue->addLogEntry('Build secrets feature is enabled but detection failed. Using traditional build arguments.');
+ }
+ }
+
private function decide_what_to_do()
{
if ($this->restart_only) {
@@ -471,14 +565,23 @@ class ApplicationDeploymentJob implements ShouldBeEncrypted, ShouldQueue
}
$this->generate_image_names();
$this->cleanup_git();
+
+ $this->generate_build_env_variables();
+
$this->application->loadComposeFile(isInit: false);
if ($this->application->settings->is_raw_compose_deployment_enabled) {
$this->application->oldRawParser();
$yaml = $composeFile = $this->application->docker_compose_raw;
- $this->save_environment_variables();
+ $this->generate_runtime_environment_variables();
+
+ // For raw compose, we cannot automatically add secrets configuration
+ // User must define it manually in their docker-compose file
+ if ($this->application->settings->use_build_secrets && $this->dockerBuildkitSupported && ! empty($this->build_secrets)) {
+ $this->application_deployment_queue->addLogEntry('Build secrets are configured. Ensure your docker-compose file includes build.secrets configuration for services that need them.');
+ }
} else {
$composeFile = $this->application->parse(pull_request_id: $this->pull_request_id, preview_id: data_get($this->preview, 'id'));
- $this->save_environment_variables();
+ $this->generate_runtime_environment_variables();
if (filled($this->env_filename)) {
$services = collect(data_get($composeFile, 'services', []));
$services = $services->map(function ($service, $name) {
@@ -494,6 +597,12 @@ class ApplicationDeploymentJob implements ShouldBeEncrypted, ShouldQueue
return;
}
+
+ // Add build secrets to compose file if enabled and BuildKit is supported
+ if ($this->application->settings->use_build_secrets && $this->dockerBuildkitSupported && ! empty($this->build_secrets)) {
+ $composeFile = $this->add_build_secrets_to_compose($composeFile);
+ }
+
$yaml = Yaml::dump(convertToArray($composeFile), 10);
}
$this->docker_compose_base64 = base64_encode($yaml);
@@ -501,15 +610,27 @@ class ApplicationDeploymentJob implements ShouldBeEncrypted, ShouldQueue
executeInDocker($this->deployment_uuid, "echo '{$this->docker_compose_base64}' | base64 -d | tee {$this->workdir}{$this->docker_compose_location} > /dev/null"),
'hidden' => true,
]);
+
+ // Modify Dockerfiles for ARGs and build secrets
+ $this->modify_dockerfiles_for_compose($composeFile);
// Build new container to limit downtime.
$this->application_deployment_queue->addLogEntry('Pulling & building required images.');
if ($this->docker_compose_custom_build_command) {
+ // Prepend DOCKER_BUILDKIT=1 if BuildKit is supported
+ $build_command = $this->docker_compose_custom_build_command;
+ if ($this->dockerBuildkitSupported) {
+ $build_command = "DOCKER_BUILDKIT=1 {$build_command}";
+ }
$this->execute_remote_command(
- [executeInDocker($this->deployment_uuid, "cd {$this->basedir} && {$this->docker_compose_custom_build_command}"), 'hidden' => true],
+ [executeInDocker($this->deployment_uuid, "cd {$this->basedir} && {$build_command}"), 'hidden' => true],
);
} else {
$command = "{$this->coolify_variables} docker compose";
+ // Prepend DOCKER_BUILDKIT=1 if BuildKit is supported
+ if ($this->dockerBuildkitSupported) {
+ $command = "DOCKER_BUILDKIT=1 {$command}";
+ }
if (filled($this->env_filename)) {
$command .= " --env-file {$this->workdir}/{$this->env_filename}";
}
@@ -518,6 +639,13 @@ class ApplicationDeploymentJob implements ShouldBeEncrypted, ShouldQueue
} else {
$command .= " --project-name {$this->application->uuid} --project-directory {$this->workdir} -f {$this->workdir}{$this->docker_compose_location} build --pull";
}
+
+ if (! $this->application->settings->use_build_secrets && $this->build_args instanceof \Illuminate\Support\Collection && $this->build_args->isNotEmpty()) {
+ $build_args_string = $this->build_args->implode(' ');
+ $command .= " {$build_args_string}";
+ $this->application_deployment_queue->addLogEntry('Adding build arguments to Docker Compose build command.');
+ }
+
$this->execute_remote_command(
[executeInDocker($this->deployment_uuid, $command), 'hidden' => true],
);
@@ -647,6 +775,10 @@ class ApplicationDeploymentJob implements ShouldBeEncrypted, ShouldQueue
$this->generate_compose_file();
$this->generate_build_env_variables();
$this->build_image();
+
+ // For Nixpacks, save runtime environment variables AFTER the build
+ // to prevent them from being accessible during the build process
+ $this->save_runtime_environment_variables();
$this->push_to_docker_registry();
$this->rolling_update();
}
@@ -669,7 +801,7 @@ class ApplicationDeploymentJob implements ShouldBeEncrypted, ShouldQueue
$this->clone_repository();
$this->cleanup_git();
$this->generate_compose_file();
- $this->build_image();
+ $this->build_static_image();
$this->push_to_docker_registry();
$this->rolling_update();
}
@@ -840,18 +972,17 @@ class ApplicationDeploymentJob implements ShouldBeEncrypted, ShouldQueue
{
if (str($this->saved_outputs->get('local_image_found'))->isNotEmpty()) {
if ($this->is_this_additional_server) {
+ $this->skip_build = true;
$this->application_deployment_queue->addLogEntry("Image found ({$this->production_image_name}) with the same Git Commit SHA. Build step skipped.");
$this->generate_compose_file();
$this->push_to_docker_registry();
$this->rolling_update();
- if ($this->restart_only) {
- $this->post_deployment();
- }
return true;
}
if (! $this->application->isConfigurationChanged()) {
$this->application_deployment_queue->addLogEntry("No configuration changed & image found ({$this->production_image_name}) with the same Git Commit SHA. Build step skipped.");
+ $this->skip_build = true;
$this->generate_compose_file();
$this->push_to_docker_registry();
$this->rolling_update();
@@ -892,7 +1023,7 @@ class ApplicationDeploymentJob implements ShouldBeEncrypted, ShouldQueue
}
}
- private function save_environment_variables()
+ private function generate_runtime_environment_variables()
{
$envs = collect([]);
$sort = $this->application->settings->is_env_sorting_enabled;
@@ -949,9 +1080,9 @@ class ApplicationDeploymentJob implements ShouldBeEncrypted, ShouldQueue
}
}
- // Filter out buildtime-only variables from runtime environment
+ // Filter runtime variables (only include variables that are available at runtime)
$runtime_environment_variables = $sorted_environment_variables->filter(function ($env) {
- return ! $env->is_buildtime_only;
+ return $env->is_runtime;
});
// Sort runtime environment variables: those referencing SERVICE_ variables come after others
@@ -1005,9 +1136,9 @@ class ApplicationDeploymentJob implements ShouldBeEncrypted, ShouldQueue
}
}
- // Filter out buildtime-only variables from runtime environment for preview
+ // Filter runtime variables for preview (only include variables that are available at runtime)
$runtime_environment_variables_preview = $sorted_environment_variables_preview->filter(function ($env) {
- return ! $env->is_buildtime_only;
+ return $env->is_runtime;
});
// Sort runtime environment variables: those referencing SERVICE_ variables come after others
@@ -1064,13 +1195,53 @@ class ApplicationDeploymentJob implements ShouldBeEncrypted, ShouldQueue
}
$this->env_filename = null;
} else {
- $envs_base64 = base64_encode($envs->implode("\n"));
+ // For Nixpacks builds, we save the .env file AFTER the build to prevent
+ // runtime-only variables from being accessible during the build process
+ if ($this->application->build_pack !== 'nixpacks' || $this->skip_build) {
+ $envs_base64 = base64_encode($envs->implode("\n"));
+ $this->execute_remote_command(
+ [
+ executeInDocker($this->deployment_uuid, "echo '$envs_base64' | base64 -d | tee $this->workdir/{$this->env_filename} > /dev/null"),
+ ],
+
+ );
+ if ($this->use_build_server) {
+ $this->server = $this->original_server;
+ $this->execute_remote_command(
+ [
+ "echo '$envs_base64' | base64 -d | tee $this->configuration_dir/{$this->env_filename} > /dev/null",
+ ]
+ );
+ $this->server = $this->build_server;
+ } else {
+ $this->execute_remote_command(
+ [
+ "echo '$envs_base64' | base64 -d | tee $this->configuration_dir/{$this->env_filename} > /dev/null",
+ ]
+ );
+ }
+ }
+ }
+ $this->environment_variables = $envs;
+ }
+
+ private function save_runtime_environment_variables()
+ {
+ // This method saves the .env file with runtime variables
+ // It should be called AFTER the build for Nixpacks to prevent runtime-only variables
+ // from being accessible during the build process
+
+ if ($this->environment_variables && $this->environment_variables->isNotEmpty() && $this->env_filename) {
+ $envs_base64 = base64_encode($this->environment_variables->implode("\n"));
+
+ // Write .env file to workdir (for container runtime)
$this->execute_remote_command(
[
executeInDocker($this->deployment_uuid, "echo '$envs_base64' | base64 -d | tee $this->workdir/{$this->env_filename} > /dev/null"),
],
-
);
+
+ // Write .env file to configuration directory
if ($this->use_build_server) {
$this->server = $this->original_server;
$this->execute_remote_command(
@@ -1087,7 +1258,6 @@ class ApplicationDeploymentJob implements ShouldBeEncrypted, ShouldQueue
);
}
}
- $this->environment_variables = $envs;
}
private function elixir_finetunes()
@@ -1146,6 +1316,7 @@ class ApplicationDeploymentJob implements ShouldBeEncrypted, ShouldQueue
private function rolling_update()
{
+ $this->checkForCancellation();
if ($this->server->isSwarm()) {
$this->application_deployment_queue->addLogEntry('Rolling update started.');
$this->execute_remote_command(
@@ -1305,8 +1476,11 @@ class ApplicationDeploymentJob implements ShouldBeEncrypted, ShouldQueue
$this->add_build_env_variables_to_dockerfile();
}
$this->build_image();
+ // For Nixpacks, save runtime environment variables AFTER the build
+ if ($this->application->build_pack === 'nixpacks') {
+ $this->save_runtime_environment_variables();
+ }
$this->push_to_docker_registry();
- // $this->stop_running_container();
$this->rolling_update();
}
@@ -1342,22 +1516,26 @@ class ApplicationDeploymentJob implements ShouldBeEncrypted, ShouldQueue
private function prepare_builder_image()
{
+ $this->checkForCancellation();
$settings = instanceSettings();
$helperImage = config('constants.coolify.helper_image');
$helperImage = "{$helperImage}:{$settings->helper_version}";
// Get user home directory
$this->serverUserHomeDir = instant_remote_process(['echo $HOME'], $this->server);
$this->dockerConfigFileExists = instant_remote_process(["test -f {$this->serverUserHomeDir}/.docker/config.json && echo 'OK' || echo 'NOK'"], $this->server);
+
+ $env_flags = $this->generate_docker_env_flags_for_secrets();
+
if ($this->use_build_server) {
if ($this->dockerConfigFileExists === 'NOK') {
throw new RuntimeException('Docker config file (~/.docker/config.json) not found on the build server. Please run "docker login" to login to the docker registry on the server.');
}
- $runCommand = "docker run -d --name {$this->deployment_uuid} --rm -v {$this->serverUserHomeDir}/.docker/config.json:/root/.docker/config.json:ro -v /var/run/docker.sock:/var/run/docker.sock {$helperImage}";
+ $runCommand = "docker run -d --name {$this->deployment_uuid} {$env_flags} --rm -v {$this->serverUserHomeDir}/.docker/config.json:/root/.docker/config.json:ro -v /var/run/docker.sock:/var/run/docker.sock {$helperImage}";
} else {
if ($this->dockerConfigFileExists === 'OK') {
- $runCommand = "docker run -d --network {$this->destination->network} --name {$this->deployment_uuid} --rm -v {$this->serverUserHomeDir}/.docker/config.json:/root/.docker/config.json:ro -v /var/run/docker.sock:/var/run/docker.sock {$helperImage}";
+ $runCommand = "docker run -d --network {$this->destination->network} --name {$this->deployment_uuid} {$env_flags} --rm -v {$this->serverUserHomeDir}/.docker/config.json:/root/.docker/config.json:ro -v /var/run/docker.sock:/var/run/docker.sock {$helperImage}";
} else {
- $runCommand = "docker run -d --network {$this->destination->network} --name {$this->deployment_uuid} --rm -v /var/run/docker.sock:/var/run/docker.sock {$helperImage}";
+ $runCommand = "docker run -d --network {$this->destination->network} --name {$this->deployment_uuid} {$env_flags} --rm -v /var/run/docker.sock:/var/run/docker.sock {$helperImage}";
}
}
$this->application_deployment_queue->addLogEntry("Preparing container with helper image: $helperImage.");
@@ -1565,6 +1743,7 @@ class ApplicationDeploymentJob implements ShouldBeEncrypted, ShouldQueue
{
$nixpacks_command = $this->nixpacks_build_cmd();
$this->application_deployment_queue->addLogEntry("Generating nixpacks configuration with: $nixpacks_command");
+
$this->execute_remote_command(
[executeInDocker($this->deployment_uuid, $nixpacks_command), 'save' => 'nixpacks_plan', 'hidden' => true],
[executeInDocker($this->deployment_uuid, "nixpacks detect {$this->workdir}"), 'save' => 'nixpacks_type', 'hidden' => true],
@@ -1584,6 +1763,7 @@ class ApplicationDeploymentJob implements ShouldBeEncrypted, ShouldQueue
$parsed = Toml::Parse($this->nixpacks_plan);
// Do any modifications here
+ // We need to generate envs here because nixpacks need to know to generate a proper Dockerfile
$this->generate_env_variables();
$merged_envs = collect(data_get($parsed, 'variables', []))->merge($this->env_args);
$aptPkgs = data_get($parsed, 'phases.setup.aptPkgs', []);
@@ -1756,13 +1936,13 @@ class ApplicationDeploymentJob implements ShouldBeEncrypted, ShouldQueue
$this->env_args->put('SOURCE_COMMIT', $this->commit);
$coolify_envs = $this->generate_coolify_env_variables();
- // Include ALL environment variables (both build-time and runtime) for all build packs
- // This deprecates the need for is_build_time flag
+ // For build process, include only environment variables where is_buildtime = true
if ($this->pull_request_id === 0) {
- // Get all environment variables except NIXPACKS_ prefixed ones for non-nixpacks builds
- $envs = $this->application->build_pack === 'nixpacks'
- ? $this->application->runtime_environment_variables
- : $this->application->environment_variables()->where('key', 'not like', 'NIXPACKS_%')->get();
+ // Get environment variables that are marked as available during build
+ $envs = $this->application->environment_variables()
+ ->where('key', 'not like', 'NIXPACKS_%')
+ ->where('is_buildtime', true)
+ ->get();
foreach ($envs as $env) {
if (! is_null($env->real_value)) {
@@ -1784,10 +1964,11 @@ class ApplicationDeploymentJob implements ShouldBeEncrypted, ShouldQueue
}
}
} else {
- // Get all preview environment variables except NIXPACKS_ prefixed ones for non-nixpacks builds
- $envs = $this->application->build_pack === 'nixpacks'
- ? $this->application->runtime_environment_variables_preview
- : $this->application->environment_variables_preview()->where('key', 'not like', 'NIXPACKS_%')->get();
+ // Get preview environment variables that are marked as available during build
+ $envs = $this->application->environment_variables_preview()
+ ->where('key', 'not like', 'NIXPACKS_%')
+ ->where('is_buildtime', true)
+ ->get();
foreach ($envs as $env) {
if (! is_null($env->real_value)) {
@@ -1813,13 +1994,13 @@ class ApplicationDeploymentJob implements ShouldBeEncrypted, ShouldQueue
private function generate_compose_file()
{
+ $this->checkForCancellation();
$this->create_workdir();
$ports = $this->application->main_port();
$persistent_storages = $this->generate_local_persistent_volumes();
$persistent_file_volumes = $this->application->fileStorages()->get();
$volume_names = $this->generate_local_persistent_volumes_only_volume_names();
- // $environment_variables = $this->generate_environment_variables($ports);
- $this->save_environment_variables();
+ $this->generate_runtime_environment_variables();
if (data_get($this->application, 'custom_labels')) {
$this->application->parseContainerLabels();
$labels = collect(preg_split("/\r\n|\n|\r/", base64_decode($this->application->custom_labels)));
@@ -2125,16 +2306,74 @@ class ApplicationDeploymentJob implements ShouldBeEncrypted, ShouldQueue
);
}
+ private function build_static_image()
+ {
+ $this->application_deployment_queue->addLogEntry('----------------------------------------');
+ $this->application_deployment_queue->addLogEntry('Static deployment. Copying static assets to the image.');
+ if ($this->application->static_image) {
+ $this->pull_latest_image($this->application->static_image);
+ }
+ $dockerfile = base64_encode("FROM {$this->application->static_image}
+ WORKDIR /usr/share/nginx/html/
+ LABEL coolify.deploymentId={$this->deployment_uuid}
+ COPY . .
+ RUN rm -f /usr/share/nginx/html/nginx.conf
+ RUN rm -f /usr/share/nginx/html/Dockerfile
+ RUN rm -f /usr/share/nginx/html/docker-compose.yaml
+ RUN rm -f /usr/share/nginx/html/.env
+ COPY ./nginx.conf /etc/nginx/conf.d/default.conf");
+ if (str($this->application->custom_nginx_configuration)->isNotEmpty()) {
+ $nginx_config = base64_encode($this->application->custom_nginx_configuration);
+ } else {
+ if ($this->application->settings->is_spa) {
+ $nginx_config = base64_encode(defaultNginxConfiguration('spa'));
+ } else {
+ $nginx_config = base64_encode(defaultNginxConfiguration());
+ }
+ }
+ $build_command = "docker build {$this->addHosts} --network host -f {$this->workdir}/Dockerfile --progress plain -t {$this->production_image_name} {$this->workdir}";
+ $base64_build_command = base64_encode($build_command);
+ $this->execute_remote_command(
+ [
+ executeInDocker($this->deployment_uuid, "echo '{$dockerfile}' | base64 -d | tee {$this->workdir}/Dockerfile > /dev/null"),
+ ],
+ [
+ executeInDocker($this->deployment_uuid, "echo '{$nginx_config}' | base64 -d | tee {$this->workdir}/nginx.conf > /dev/null"),
+ ],
+ [
+ executeInDocker($this->deployment_uuid, "echo '{$base64_build_command}' | base64 -d | tee /artifacts/build.sh > /dev/null"),
+ 'hidden' => true,
+ ],
+ [
+ executeInDocker($this->deployment_uuid, 'cat /artifacts/build.sh'),
+ 'hidden' => true,
+ ],
+ [
+ executeInDocker($this->deployment_uuid, 'bash /artifacts/build.sh'),
+ 'hidden' => true,
+ ]
+ );
+ $this->application_deployment_queue->addLogEntry('Building docker image completed.');
+ }
+
private function build_image()
{
- // Add Coolify related variables to the build args
- $this->environment_variables->filter(function ($key, $value) {
- return str($key)->startsWith('COOLIFY_');
- })->each(function ($key, $value) {
- $this->build_args->push("--build-arg '{$key}'");
- });
+ // Add Coolify related variables to the build args/secrets
+ if ($this->dockerBuildkitSupported) {
+ // Coolify variables are already included in the secrets from generate_build_env_variables
+ // build_secrets is already a string at this point
+ } else {
+ // Traditional build args approach
+ $this->environment_variables->filter(function ($key, $value) {
+ return str($key)->startsWith('COOLIFY_');
+ })->each(function ($key, $value) {
+ $this->build_args->push("--build-arg '{$key}'");
+ });
- $this->build_args = $this->build_args->implode(' ');
+ $this->build_args = $this->build_args instanceof \Illuminate\Support\Collection
+ ? $this->build_args->implode(' ')
+ : (string) $this->build_args;
+ }
$this->application_deployment_queue->addLogEntry('----------------------------------------');
if ($this->disableBuildCache) {
@@ -2147,106 +2386,114 @@ class ApplicationDeploymentJob implements ShouldBeEncrypted, ShouldQueue
$this->application_deployment_queue->addLogEntry('To check the current progress, click on Show Debug Logs.');
}
- if ($this->application->settings->is_static || $this->application->build_pack === 'static') {
+ if ($this->application->settings->is_static) {
if ($this->application->static_image) {
$this->pull_latest_image($this->application->static_image);
$this->application_deployment_queue->addLogEntry('Continuing with the building process.');
}
- if ($this->application->build_pack === 'static') {
- $dockerfile = base64_encode("FROM {$this->application->static_image}
-WORKDIR /usr/share/nginx/html/
-LABEL coolify.deploymentId={$this->deployment_uuid}
-COPY . .
-RUN rm -f /usr/share/nginx/html/nginx.conf
-RUN rm -f /usr/share/nginx/html/Dockerfile
-RUN rm -f /usr/share/nginx/html/docker-compose.yaml
-RUN rm -f /usr/share/nginx/html/.env
-COPY ./nginx.conf /etc/nginx/conf.d/default.conf");
- if (str($this->application->custom_nginx_configuration)->isNotEmpty()) {
- $nginx_config = base64_encode($this->application->custom_nginx_configuration);
- } else {
- if ($this->application->settings->is_spa) {
- $nginx_config = base64_encode(defaultNginxConfiguration('spa'));
+ if ($this->application->build_pack === 'nixpacks') {
+ $this->nixpacks_plan = base64_encode($this->nixpacks_plan);
+ $this->execute_remote_command([executeInDocker($this->deployment_uuid, "echo '{$this->nixpacks_plan}' | base64 -d | tee /artifacts/thegameplan.json > /dev/null"), 'hidden' => true]);
+ if ($this->force_rebuild) {
+ $this->execute_remote_command([
+ executeInDocker($this->deployment_uuid, "nixpacks build -c /artifacts/thegameplan.json --no-cache --no-error-without-start -n {$this->build_image_name} {$this->workdir} -o {$this->workdir}"),
+ 'hidden' => true,
+ ], [
+ executeInDocker($this->deployment_uuid, "cat {$this->workdir}/.nixpacks/Dockerfile"),
+ 'hidden' => true,
+ ]);
+ if ($this->dockerBuildkitSupported && $this->application->settings->use_build_secrets) {
+ // Modify the nixpacks Dockerfile to use build secrets
+ $this->modify_dockerfile_for_secrets("{$this->workdir}/.nixpacks/Dockerfile");
+ $secrets_flags = $this->build_secrets ? " {$this->build_secrets}" : '';
+ $build_command = "DOCKER_BUILDKIT=1 docker build --no-cache {$this->addHosts} --network host -f {$this->workdir}/.nixpacks/Dockerfile{$secrets_flags} --progress plain -t {$this->build_image_name} {$this->workdir}";
+ } elseif ($this->dockerBuildkitSupported) {
+ // BuildKit without secrets
+ $build_command = "DOCKER_BUILDKIT=1 docker build --no-cache {$this->addHosts} --network host -f {$this->workdir}/.nixpacks/Dockerfile --progress plain -t {$this->build_image_name} {$this->build_args} {$this->workdir}";
} else {
- $nginx_config = base64_encode(defaultNginxConfiguration());
- }
- }
- } else {
- if ($this->application->build_pack === 'nixpacks') {
- $this->nixpacks_plan = base64_encode($this->nixpacks_plan);
- $this->execute_remote_command([executeInDocker($this->deployment_uuid, "echo '{$this->nixpacks_plan}' | base64 -d | tee /artifacts/thegameplan.json > /dev/null"), 'hidden' => true]);
- if ($this->force_rebuild) {
- $this->execute_remote_command([
- executeInDocker($this->deployment_uuid, "nixpacks build -c /artifacts/thegameplan.json --no-cache --no-error-without-start -n {$this->build_image_name} {$this->workdir} -o {$this->workdir}"),
- 'hidden' => true,
- ], [
- executeInDocker($this->deployment_uuid, "cat {$this->workdir}/.nixpacks/Dockerfile"),
- 'hidden' => true,
- ]);
$build_command = "docker build --no-cache {$this->addHosts} --network host -f {$this->workdir}/.nixpacks/Dockerfile --progress plain -t {$this->build_image_name} {$this->build_args} {$this->workdir}";
+ }
+ } else {
+ $this->execute_remote_command([
+ executeInDocker($this->deployment_uuid, "nixpacks build -c /artifacts/thegameplan.json --cache-key '{$this->application->uuid}' --no-error-without-start -n {$this->build_image_name} {$this->workdir} -o {$this->workdir}"),
+ 'hidden' => true,
+ ], [
+ executeInDocker($this->deployment_uuid, "cat {$this->workdir}/.nixpacks/Dockerfile"),
+ 'hidden' => true,
+ ]);
+ if ($this->dockerBuildkitSupported) {
+ // Modify the nixpacks Dockerfile to use build secrets
+ $this->modify_dockerfile_for_secrets("{$this->workdir}/.nixpacks/Dockerfile");
+ $secrets_flags = $this->build_secrets ? " {$this->build_secrets}" : '';
+ $build_command = "DOCKER_BUILDKIT=1 docker build {$this->addHosts} --network host -f {$this->workdir}/.nixpacks/Dockerfile{$secrets_flags} --progress plain -t {$this->build_image_name} {$this->workdir}";
} else {
- $this->execute_remote_command([
- executeInDocker($this->deployment_uuid, "nixpacks build -c /artifacts/thegameplan.json --cache-key '{$this->application->uuid}' --no-error-without-start -n {$this->build_image_name} {$this->workdir} -o {$this->workdir}"),
- 'hidden' => true,
- ], [
- executeInDocker($this->deployment_uuid, "cat {$this->workdir}/.nixpacks/Dockerfile"),
- 'hidden' => true,
- ]);
$build_command = "docker build {$this->addHosts} --network host -f {$this->workdir}/.nixpacks/Dockerfile --progress plain -t {$this->build_image_name} {$this->build_args} {$this->workdir}";
}
+ }
- $base64_build_command = base64_encode($build_command);
- $this->execute_remote_command(
- [
- executeInDocker($this->deployment_uuid, "echo '{$base64_build_command}' | base64 -d | tee /artifacts/build.sh > /dev/null"),
- 'hidden' => true,
- ],
- [
- executeInDocker($this->deployment_uuid, 'cat /artifacts/build.sh'),
- 'hidden' => true,
- ],
- [
- executeInDocker($this->deployment_uuid, 'bash /artifacts/build.sh'),
- 'hidden' => true,
- ]
- );
- $this->execute_remote_command([executeInDocker($this->deployment_uuid, 'rm /artifacts/thegameplan.json'), 'hidden' => true]);
+ $base64_build_command = base64_encode($build_command);
+ $this->execute_remote_command(
+ [
+ executeInDocker($this->deployment_uuid, "echo '{$base64_build_command}' | base64 -d | tee /artifacts/build.sh > /dev/null"),
+ 'hidden' => true,
+ ],
+ [
+ executeInDocker($this->deployment_uuid, 'cat /artifacts/build.sh'),
+ 'hidden' => true,
+ ],
+ [
+ executeInDocker($this->deployment_uuid, 'bash /artifacts/build.sh'),
+ 'hidden' => true,
+ ]
+ );
+ $this->execute_remote_command([executeInDocker($this->deployment_uuid, 'rm /artifacts/thegameplan.json'), 'hidden' => true]);
+ } else {
+ // Dockerfile buildpack
+ if ($this->dockerBuildkitSupported && $this->application->settings->use_build_secrets) {
+ // Modify the Dockerfile to use build secrets
+ $this->modify_dockerfile_for_secrets("{$this->workdir}{$this->dockerfile_location}");
+ $secrets_flags = $this->build_secrets ? " {$this->build_secrets}" : '';
+ if ($this->force_rebuild) {
+ $build_command = "DOCKER_BUILDKIT=1 docker build --no-cache {$this->buildTarget} --network {$this->destination->network} -f {$this->workdir}{$this->dockerfile_location}{$secrets_flags} --progress plain -t $this->build_image_name {$this->workdir}";
+ } else {
+ $build_command = "DOCKER_BUILDKIT=1 docker build {$this->buildTarget} --network {$this->destination->network} -f {$this->workdir}{$this->dockerfile_location}{$secrets_flags} --progress plain -t $this->build_image_name {$this->workdir}";
+ }
} else {
+ // Traditional build with args
if ($this->force_rebuild) {
$build_command = "docker build --no-cache {$this->buildTarget} --network {$this->destination->network} -f {$this->workdir}{$this->dockerfile_location} {$this->build_args} --progress plain -t $this->build_image_name {$this->workdir}";
- $base64_build_command = base64_encode($build_command);
} else {
$build_command = "docker build {$this->buildTarget} --network {$this->destination->network} -f {$this->workdir}{$this->dockerfile_location} {$this->build_args} --progress plain -t $this->build_image_name {$this->workdir}";
- $base64_build_command = base64_encode($build_command);
}
- $this->execute_remote_command(
- [
- executeInDocker($this->deployment_uuid, "echo '{$base64_build_command}' | base64 -d | tee /artifacts/build.sh > /dev/null"),
- 'hidden' => true,
- ],
- [
- executeInDocker($this->deployment_uuid, 'cat /artifacts/build.sh'),
- 'hidden' => true,
- ],
- [
- executeInDocker($this->deployment_uuid, 'bash /artifacts/build.sh'),
- 'hidden' => true,
- ]
- );
}
- $dockerfile = base64_encode("FROM {$this->application->static_image}
+ $base64_build_command = base64_encode($build_command);
+ $this->execute_remote_command(
+ [
+ executeInDocker($this->deployment_uuid, "echo '{$base64_build_command}' | base64 -d | tee /artifacts/build.sh > /dev/null"),
+ 'hidden' => true,
+ ],
+ [
+ executeInDocker($this->deployment_uuid, 'cat /artifacts/build.sh'),
+ 'hidden' => true,
+ ],
+ [
+ executeInDocker($this->deployment_uuid, 'bash /artifacts/build.sh'),
+ 'hidden' => true,
+ ]
+ );
+ }
+ $dockerfile = base64_encode("FROM {$this->application->static_image}
WORKDIR /usr/share/nginx/html/
LABEL coolify.deploymentId={$this->deployment_uuid}
COPY --from=$this->build_image_name /app/{$this->application->publish_directory} .
COPY ./nginx.conf /etc/nginx/conf.d/default.conf");
- if (str($this->application->custom_nginx_configuration)->isNotEmpty()) {
- $nginx_config = base64_encode($this->application->custom_nginx_configuration);
+ if (str($this->application->custom_nginx_configuration)->isNotEmpty()) {
+ $nginx_config = base64_encode($this->application->custom_nginx_configuration);
+ } else {
+ if ($this->application->settings->is_spa) {
+ $nginx_config = base64_encode(defaultNginxConfiguration('spa'));
} else {
- if ($this->application->settings->is_spa) {
- $nginx_config = base64_encode(defaultNginxConfiguration('spa'));
- } else {
- $nginx_config = base64_encode(defaultNginxConfiguration());
- }
+ $nginx_config = base64_encode(defaultNginxConfiguration());
}
}
$build_command = "docker build {$this->addHosts} --network host -f {$this->workdir}/Dockerfile {$this->build_args} --progress plain -t {$this->production_image_name} {$this->workdir}";
@@ -2274,10 +2521,22 @@ COPY ./nginx.conf /etc/nginx/conf.d/default.conf");
} else {
// Pure Dockerfile based deployment
if ($this->application->dockerfile) {
- if ($this->force_rebuild) {
- $build_command = "docker build --no-cache --pull {$this->buildTarget} {$this->addHosts} --network host -f {$this->workdir}{$this->dockerfile_location} {$this->build_args} --progress plain -t {$this->production_image_name} {$this->workdir}";
+ if ($this->dockerBuildkitSupported && $this->application->settings->use_build_secrets) {
+ // Modify the Dockerfile to use build secrets
+ $this->modify_dockerfile_for_secrets("{$this->workdir}{$this->dockerfile_location}");
+ $secrets_flags = $this->build_secrets ? " {$this->build_secrets}" : '';
+ if ($this->force_rebuild) {
+ $build_command = "DOCKER_BUILDKIT=1 docker build --no-cache --pull {$this->buildTarget} {$this->addHosts} --network host -f {$this->workdir}{$this->dockerfile_location}{$secrets_flags} --progress plain -t {$this->production_image_name} {$this->workdir}";
+ } else {
+ $build_command = "DOCKER_BUILDKIT=1 docker build --pull {$this->buildTarget} {$this->addHosts} --network host -f {$this->workdir}{$this->dockerfile_location}{$secrets_flags} --progress plain -t {$this->production_image_name} {$this->workdir}";
+ }
} else {
- $build_command = "docker build --pull {$this->buildTarget} {$this->addHosts} --network host -f {$this->workdir}{$this->dockerfile_location} {$this->build_args} --progress plain -t {$this->production_image_name} {$this->workdir}";
+ // Traditional build with args
+ if ($this->force_rebuild) {
+ $build_command = "docker build --no-cache --pull {$this->buildTarget} {$this->addHosts} --network host -f {$this->workdir}{$this->dockerfile_location} {$this->build_args} --progress plain -t {$this->production_image_name} {$this->workdir}";
+ } else {
+ $build_command = "docker build --pull {$this->buildTarget} {$this->addHosts} --network host -f {$this->workdir}{$this->dockerfile_location} {$this->build_args} --progress plain -t {$this->production_image_name} {$this->workdir}";
+ }
}
$base64_build_command = base64_encode($build_command);
$this->execute_remote_command(
@@ -2306,7 +2565,14 @@ COPY ./nginx.conf /etc/nginx/conf.d/default.conf");
executeInDocker($this->deployment_uuid, "cat {$this->workdir}/.nixpacks/Dockerfile"),
'hidden' => true,
]);
- $build_command = "docker build --no-cache {$this->addHosts} --network host -f {$this->workdir}/.nixpacks/Dockerfile --progress plain -t {$this->production_image_name} {$this->build_args} {$this->workdir}";
+ if ($this->dockerBuildkitSupported) {
+ // Modify the nixpacks Dockerfile to use build secrets
+ $this->modify_dockerfile_for_secrets("{$this->workdir}/.nixpacks/Dockerfile");
+ $secrets_flags = $this->build_secrets ? " {$this->build_secrets}" : '';
+ $build_command = "DOCKER_BUILDKIT=1 docker build --no-cache {$this->addHosts} --network host -f {$this->workdir}/.nixpacks/Dockerfile{$secrets_flags} --progress plain -t {$this->production_image_name} {$this->workdir}";
+ } else {
+ $build_command = "docker build --no-cache {$this->addHosts} --network host -f {$this->workdir}/.nixpacks/Dockerfile --progress plain -t {$this->production_image_name} {$this->build_args} {$this->workdir}";
+ }
} else {
$this->execute_remote_command([
executeInDocker($this->deployment_uuid, "nixpacks build -c /artifacts/thegameplan.json --cache-key '{$this->application->uuid}' --no-error-without-start -n {$this->production_image_name} {$this->workdir} -o {$this->workdir}"),
@@ -2315,7 +2581,14 @@ COPY ./nginx.conf /etc/nginx/conf.d/default.conf");
executeInDocker($this->deployment_uuid, "cat {$this->workdir}/.nixpacks/Dockerfile"),
'hidden' => true,
]);
- $build_command = "docker build {$this->addHosts} --network host -f {$this->workdir}/.nixpacks/Dockerfile --progress plain -t {$this->production_image_name} {$this->build_args} {$this->workdir}";
+ if ($this->dockerBuildkitSupported) {
+ // Modify the nixpacks Dockerfile to use build secrets
+ $this->modify_dockerfile_for_secrets("{$this->workdir}/.nixpacks/Dockerfile");
+ $secrets_flags = $this->build_secrets ? " {$this->build_secrets}" : '';
+ $build_command = "DOCKER_BUILDKIT=1 docker build {$this->addHosts} --network host -f {$this->workdir}/.nixpacks/Dockerfile{$secrets_flags} --progress plain -t {$this->production_image_name} {$this->workdir}";
+ } else {
+ $build_command = "docker build {$this->addHosts} --network host -f {$this->workdir}/.nixpacks/Dockerfile --progress plain -t {$this->production_image_name} {$this->build_args} {$this->workdir}";
+ }
}
$base64_build_command = base64_encode($build_command);
$this->execute_remote_command(
@@ -2334,13 +2607,24 @@ COPY ./nginx.conf /etc/nginx/conf.d/default.conf");
);
$this->execute_remote_command([executeInDocker($this->deployment_uuid, 'rm /artifacts/thegameplan.json'), 'hidden' => true]);
} else {
- if ($this->force_rebuild) {
- $build_command = "docker build --no-cache {$this->buildTarget} {$this->addHosts} --network host -f {$this->workdir}{$this->dockerfile_location} {$this->build_args} --progress plain -t {$this->production_image_name} {$this->workdir}";
- $base64_build_command = base64_encode($build_command);
+ // Dockerfile buildpack
+ if ($this->dockerBuildkitSupported) {
+ // Use BuildKit with secrets
+ $secrets_flags = $this->build_secrets ? " {$this->build_secrets}" : '';
+ if ($this->force_rebuild) {
+ $build_command = "DOCKER_BUILDKIT=1 docker build --no-cache {$this->buildTarget} {$this->addHosts} --network host -f {$this->workdir}{$this->dockerfile_location}{$secrets_flags} --progress plain -t {$this->production_image_name} {$this->workdir}";
+ } else {
+ $build_command = "DOCKER_BUILDKIT=1 docker build {$this->buildTarget} {$this->addHosts} --network host -f {$this->workdir}{$this->dockerfile_location}{$secrets_flags} --progress plain -t {$this->production_image_name} {$this->workdir}";
+ }
} else {
- $build_command = "docker build {$this->buildTarget} {$this->addHosts} --network host -f {$this->workdir}{$this->dockerfile_location} {$this->build_args} --progress plain -t {$this->production_image_name} {$this->workdir}";
- $base64_build_command = base64_encode($build_command);
+ // Traditional build with args
+ if ($this->force_rebuild) {
+ $build_command = "docker build --no-cache {$this->buildTarget} {$this->addHosts} --network host -f {$this->workdir}{$this->dockerfile_location} {$this->build_args} --progress plain -t {$this->production_image_name} {$this->workdir}";
+ } else {
+ $build_command = "docker build {$this->buildTarget} {$this->addHosts} --network host -f {$this->workdir}{$this->dockerfile_location} {$this->build_args} --progress plain -t {$this->production_image_name} {$this->workdir}";
+ }
}
+ $base64_build_command = base64_encode($build_command);
$this->execute_remote_command(
[
executeInDocker($this->deployment_uuid, "echo '{$base64_build_command}' | base64 -d | tee /artifacts/build.sh > /dev/null"),
@@ -2427,6 +2711,30 @@ COPY ./nginx.conf /etc/nginx/conf.d/default.conf");
$this->application_deployment_queue->addLogEntry('New container started.');
}
+ private function analyzeBuildTimeVariables($variables)
+ {
+ $variablesArray = $variables->toArray();
+ $warnings = self::analyzeBuildVariables($variablesArray);
+
+ if (empty($warnings)) {
+ return;
+ }
+ $this->application_deployment_queue->addLogEntry('----------------------------------------');
+ foreach ($warnings as $warning) {
+ $messages = self::formatBuildWarning($warning);
+ foreach ($messages as $message) {
+ $this->application_deployment_queue->addLogEntry($message, type: 'warning');
+ }
+ $this->application_deployment_queue->addLogEntry('');
+ }
+
+ // Add general advice
+ $this->application_deployment_queue->addLogEntry('💡 Tips to resolve build issues:', type: 'info');
+ $this->application_deployment_queue->addLogEntry(' 1. Set these variables as "Runtime only" in the environment variables settings', type: 'info');
+ $this->application_deployment_queue->addLogEntry(' 2. Use different values for build-time (e.g., NODE_ENV=development for build)', type: 'info');
+ $this->application_deployment_queue->addLogEntry(' 3. Consider using multi-stage Docker builds to separate build and runtime environments', type: 'info');
+ }
+
private function generate_build_env_variables()
{
if ($this->application->build_pack === 'nixpacks') {
@@ -2436,49 +2744,428 @@ COPY ./nginx.conf /etc/nginx/conf.d/default.conf");
$variables = collect([])->merge($this->env_args);
}
- $this->build_args = $variables->map(function ($value, $key) {
- $value = escapeshellarg($value);
+ // Analyze build variables for potential issues
+ if ($variables->isNotEmpty()) {
+ $this->analyzeBuildTimeVariables($variables);
+ }
- return "--build-arg {$key}={$value}";
- });
+ if ($this->dockerBuildkitSupported && $this->application->settings->use_build_secrets) {
+ $this->generate_build_secrets($variables);
+ $this->build_args = '';
+ } else {
+ $secrets_hash = '';
+ if ($variables->isNotEmpty()) {
+ $secrets_hash = $this->generate_secrets_hash($variables);
+ }
+
+ $this->build_args = $variables->map(function ($value, $key) {
+ $value = escapeshellarg($value);
+
+ return "--build-arg {$key}={$value}";
+ });
+
+ if ($secrets_hash) {
+ $this->build_args->push("--build-arg COOLIFY_BUILD_SECRETS_HASH={$secrets_hash}");
+ }
+ }
+ }
+
+ private function generate_docker_env_flags_for_secrets()
+ {
+ // Only generate env flags if build secrets are enabled
+ if (! $this->application->settings->use_build_secrets) {
+ return '';
+ }
+
+ $variables = $this->pull_request_id === 0
+ ? $this->application->environment_variables()->where('key', 'not like', 'NIXPACKS_%')->where('is_buildtime', true)->get()
+ : $this->application->environment_variables_preview()->where('key', 'not like', 'NIXPACKS_%')->where('is_buildtime', true)->get();
+
+ if ($variables->isEmpty()) {
+ return '';
+ }
+
+ $secrets_hash = $this->generate_secrets_hash($variables);
+ $env_flags = $variables
+ ->map(function ($env) {
+ $escaped_value = escapeshellarg($env->real_value);
+
+ return "-e {$env->key}={$escaped_value}";
+ })
+ ->implode(' ');
+
+ $env_flags .= " -e COOLIFY_BUILD_SECRETS_HASH={$secrets_hash}";
+
+ return $env_flags;
+ }
+
+ private function generate_build_secrets(Collection $variables)
+ {
+ if ($variables->isEmpty()) {
+ $this->build_secrets = '';
+
+ return;
+ }
+
+ $this->build_secrets = $variables
+ ->map(function ($value, $key) {
+ return "--secret id={$key},env={$key}";
+ })
+ ->implode(' ');
+
+ $this->build_secrets .= ' --secret id=COOLIFY_BUILD_SECRETS_HASH,env=COOLIFY_BUILD_SECRETS_HASH';
+ }
+
+ private function generate_secrets_hash($variables)
+ {
+ if (! $this->secrets_hash_key) {
+ $this->secrets_hash_key = bin2hex(random_bytes(32));
+ }
+
+ if ($variables instanceof Collection) {
+ $secrets_string = $variables
+ ->mapWithKeys(function ($value, $key) {
+ return [$key => $value];
+ })
+ ->sortKeys()
+ ->map(function ($value, $key) {
+ return "{$key}={$value}";
+ })
+ ->implode('|');
+ } else {
+ $secrets_string = $variables
+ ->map(function ($env) {
+ return "{$env->key}={$env->real_value}";
+ })
+ ->sort()
+ ->implode('|');
+ }
+
+ return hash_hmac('sha256', $secrets_string, $this->secrets_hash_key);
}
private function add_build_env_variables_to_dockerfile()
{
- $this->execute_remote_command([
- executeInDocker($this->deployment_uuid, "cat {$this->workdir}{$this->dockerfile_location}"),
- 'hidden' => true,
- 'save' => 'dockerfile',
- ]);
- $dockerfile = collect(str($this->saved_outputs->get('dockerfile'))->trim()->explode("\n"));
+ if ($this->dockerBuildkitSupported) {
+ // We dont need to add build secrets to dockerfile for buildkit, as we already added them with --secret flag in function generate_docker_env_flags_for_secrets
+ } else {
+ $this->execute_remote_command([
+ executeInDocker($this->deployment_uuid, "cat {$this->workdir}{$this->dockerfile_location}"),
+ 'hidden' => true,
+ 'save' => 'dockerfile',
+ ]);
+ $dockerfile = collect(str($this->saved_outputs->get('dockerfile'))->trim()->explode("\n"));
- // Include ALL environment variables as build args (deprecating is_build_time flag)
- if ($this->pull_request_id === 0) {
- // Get all environment variables except NIXPACKS_ prefixed ones
- $envs = $this->application->environment_variables()->where('key', 'not like', 'NIXPACKS_%')->get();
- foreach ($envs as $env) {
- if (data_get($env, 'is_multiline') === true) {
- $dockerfile->splice(1, 0, ["ARG {$env->key}"]);
- } else {
- $dockerfile->splice(1, 0, ["ARG {$env->key}={$env->real_value}"]);
+ if ($this->pull_request_id === 0) {
+ // Only add environment variables that are available during build
+ $envs = $this->application->environment_variables()
+ ->where('key', 'not like', 'NIXPACKS_%')
+ ->where('is_buildtime', true)
+ ->get();
+ foreach ($envs as $env) {
+ if (data_get($env, 'is_multiline') === true) {
+ $dockerfile->splice(1, 0, ["ARG {$env->key}"]);
+ } else {
+ $dockerfile->splice(1, 0, ["ARG {$env->key}={$env->real_value}"]);
+ }
+ }
+ } else {
+ // Only add preview environment variables that are available during build
+ $envs = $this->application->environment_variables_preview()
+ ->where('key', 'not like', 'NIXPACKS_%')
+ ->where('is_buildtime', true)
+ ->get();
+ foreach ($envs as $env) {
+ if (data_get($env, 'is_multiline') === true) {
+ $dockerfile->splice(1, 0, ["ARG {$env->key}"]);
+ } else {
+ $dockerfile->splice(1, 0, ["ARG {$env->key}={$env->real_value}"]);
+ }
}
}
- } else {
- // Get all preview environment variables except NIXPACKS_ prefixed ones
- $envs = $this->application->environment_variables_preview()->where('key', 'not like', 'NIXPACKS_%')->get();
- foreach ($envs as $env) {
- if (data_get($env, 'is_multiline') === true) {
- $dockerfile->splice(1, 0, ["ARG {$env->key}"]);
- } else {
- $dockerfile->splice(1, 0, ["ARG {$env->key}={$env->real_value}"]);
+
+ if ($envs->isNotEmpty()) {
+ $secrets_hash = $this->generate_secrets_hash($envs);
+ $dockerfile->splice(1, 0, ["ARG COOLIFY_BUILD_SECRETS_HASH={$secrets_hash}"]);
+ }
+
+ $dockerfile_base64 = base64_encode($dockerfile->implode("\n"));
+ $this->execute_remote_command([
+ executeInDocker($this->deployment_uuid, "echo '{$dockerfile_base64}' | base64 -d | tee {$this->workdir}{$this->dockerfile_location} > /dev/null"),
+ 'hidden' => true,
+ ]);
+ }
+ }
+
+ private function modify_dockerfile_for_secrets($dockerfile_path)
+ {
+ // Only process if build secrets are enabled and we have secrets to mount
+ if (! $this->application->settings->use_build_secrets || empty($this->build_secrets)) {
+ return;
+ }
+
+ // Read the Dockerfile
+ $this->execute_remote_command([
+ executeInDocker($this->deployment_uuid, "cat {$dockerfile_path}"),
+ 'hidden' => true,
+ 'save' => 'dockerfile_content',
+ ]);
+
+ $dockerfile = str($this->saved_outputs->get('dockerfile_content'))->trim()->explode("\n");
+
+ // Add BuildKit syntax directive if not present
+ if (! str_starts_with($dockerfile->first(), '# syntax=')) {
+ $dockerfile->prepend('# syntax=docker/dockerfile:1');
+ }
+
+ // Get environment variables for secrets
+ $variables = $this->pull_request_id === 0
+ ? $this->application->environment_variables()->where('key', 'not like', 'NIXPACKS_%')->where('is_buildtime', true)->get()
+ : $this->application->environment_variables_preview()->where('key', 'not like', 'NIXPACKS_%')->where('is_buildtime', true)->get();
+
+ if ($variables->isEmpty()) {
+ return;
+ }
+
+ // Generate mount strings for all secrets
+ $mountStrings = $variables->map(fn ($env) => "--mount=type=secret,id={$env->key},env={$env->key}")->implode(' ');
+
+ // Add mount for the secrets hash to ensure cache invalidation
+ $mountStrings .= ' --mount=type=secret,id=COOLIFY_BUILD_SECRETS_HASH,env=COOLIFY_BUILD_SECRETS_HASH';
+
+ $modified = false;
+ $dockerfile = $dockerfile->map(function ($line) use ($mountStrings, &$modified) {
+ $trimmed = ltrim($line);
+
+ // Skip lines that already have secret mounts or are not RUN commands
+ if (str_contains($line, '--mount=type=secret') || ! str_starts_with($trimmed, 'RUN')) {
+ return $line;
+ }
+
+ // Add mount strings to RUN command
+ $originalCommand = trim(substr($trimmed, 3));
+ $modified = true;
+
+ return "RUN {$mountStrings} {$originalCommand}";
+ });
+
+ if ($modified) {
+ // Write the modified Dockerfile back
+ $dockerfile_base64 = base64_encode($dockerfile->implode("\n"));
+ $this->execute_remote_command([
+ executeInDocker($this->deployment_uuid, "echo '{$dockerfile_base64}' | base64 -d | tee {$dockerfile_path} > /dev/null"),
+ 'hidden' => true,
+ ]);
+
+ $this->application_deployment_queue->addLogEntry('Modified Dockerfile to use build secrets.');
+ }
+ }
+
+ private function modify_dockerfiles_for_compose($composeFile)
+ {
+ if ($this->application->build_pack !== 'dockercompose') {
+ return;
+ }
+
+ $variables = $this->pull_request_id === 0
+ ? $this->application->environment_variables()
+ ->where('key', 'not like', 'NIXPACKS_%')
+ ->where('is_buildtime', true)
+ ->get()
+ : $this->application->environment_variables_preview()
+ ->where('key', 'not like', 'NIXPACKS_%')
+ ->where('is_buildtime', true)
+ ->get();
+
+ if ($variables->isEmpty()) {
+ $this->application_deployment_queue->addLogEntry('No build-time variables to add to Dockerfiles.');
+
+ return;
+ }
+
+ $services = data_get($composeFile, 'services', []);
+
+ foreach ($services as $serviceName => $service) {
+ if (! isset($service['build'])) {
+ continue;
+ }
+
+ $context = '.';
+ $dockerfile = 'Dockerfile';
+
+ if (is_string($service['build'])) {
+ $context = $service['build'];
+ } elseif (is_array($service['build'])) {
+ $context = data_get($service['build'], 'context', '.');
+ $dockerfile = data_get($service['build'], 'dockerfile', 'Dockerfile');
+ }
+
+ $dockerfilePath = rtrim($context, '/').'/'.ltrim($dockerfile, '/');
+ if (str_starts_with($dockerfilePath, './')) {
+ $dockerfilePath = substr($dockerfilePath, 2);
+ }
+ if (str_starts_with($dockerfilePath, '/')) {
+ $dockerfilePath = substr($dockerfilePath, 1);
+ }
+
+ $this->execute_remote_command([
+ executeInDocker($this->deployment_uuid, "test -f {$this->workdir}/{$dockerfilePath} && echo 'exists' || echo 'not found'"),
+ 'hidden' => true,
+ 'save' => 'dockerfile_check_'.$serviceName,
+ ]);
+
+ if (str($this->saved_outputs->get('dockerfile_check_'.$serviceName))->trim()->toString() !== 'exists') {
+ $this->application_deployment_queue->addLogEntry("Dockerfile not found for service {$serviceName} at {$dockerfilePath}, skipping ARG injection.");
+
+ continue;
+ }
+
+ $this->execute_remote_command([
+ executeInDocker($this->deployment_uuid, "cat {$this->workdir}/{$dockerfilePath}"),
+ 'hidden' => true,
+ 'save' => 'dockerfile_content_'.$serviceName,
+ ]);
+
+ $dockerfileContent = $this->saved_outputs->get('dockerfile_content_'.$serviceName);
+ if (! $dockerfileContent) {
+ continue;
+ }
+
+ $dockerfile_lines = collect(str($dockerfileContent)->trim()->explode("\n"));
+
+ $fromIndices = [];
+ $dockerfile_lines->each(function ($line, $index) use (&$fromIndices) {
+ if (str($line)->trim()->startsWith('FROM')) {
+ $fromIndices[] = $index;
+ }
+ });
+
+ if (empty($fromIndices)) {
+ $this->application_deployment_queue->addLogEntry("No FROM instruction found in Dockerfile for service {$serviceName}, skipping.");
+
+ continue;
+ }
+
+ $isMultiStage = count($fromIndices) > 1;
+
+ $argsToAdd = collect([]);
+ foreach ($variables as $env) {
+ $argsToAdd->push("ARG {$env->key}");
+ }
+
+ ray($argsToAdd);
+ if ($argsToAdd->isEmpty()) {
+ $this->application_deployment_queue->addLogEntry("Service {$serviceName}: No build-time variables to add.");
+
+ continue;
+ }
+
+ $totalAdded = 0;
+ $offset = 0;
+
+ foreach ($fromIndices as $stageIndex => $fromIndex) {
+ $adjustedIndex = $fromIndex + $offset;
+
+ $stageStart = $adjustedIndex + 1;
+ $stageEnd = isset($fromIndices[$stageIndex + 1])
+ ? $fromIndices[$stageIndex + 1] + $offset
+ : $dockerfile_lines->count();
+
+ $existingStageArgs = collect([]);
+ for ($i = $stageStart; $i < $stageEnd; $i++) {
+ $line = $dockerfile_lines->get($i);
+ if (! $line || ! str($line)->trim()->startsWith('ARG')) {
+ break;
+ }
+ $parts = explode(' ', trim($line), 2);
+ if (count($parts) >= 2) {
+ $argPart = $parts[1];
+ $keyValue = explode('=', $argPart, 2);
+ $existingStageArgs->push($keyValue[0]);
+ }
+ }
+
+ $stageArgsToAdd = $argsToAdd->filter(function ($arg) use ($existingStageArgs) {
+ $key = str($arg)->after('ARG ')->trim()->toString();
+
+ return ! $existingStageArgs->contains($key);
+ });
+
+ if ($stageArgsToAdd->isNotEmpty()) {
+ $dockerfile_lines->splice($adjustedIndex + 1, 0, $stageArgsToAdd->toArray());
+ $totalAdded += $stageArgsToAdd->count();
+ $offset += $stageArgsToAdd->count();
+ }
+ }
+
+ if ($totalAdded > 0) {
+ $dockerfile_base64 = base64_encode($dockerfile_lines->implode("\n"));
+ $this->execute_remote_command([
+ executeInDocker($this->deployment_uuid, "echo '{$dockerfile_base64}' | base64 -d | tee {$this->workdir}/{$dockerfilePath} > /dev/null"),
+ 'hidden' => true,
+ ]);
+
+ $stageInfo = $isMultiStage ? ' (multi-stage build, added to '.count($fromIndices).' stages)' : '';
+ $this->application_deployment_queue->addLogEntry("Added {$totalAdded} ARG declarations to Dockerfile for service {$serviceName}{$stageInfo}.");
+ } else {
+ $this->application_deployment_queue->addLogEntry("Service {$serviceName}: All required ARG declarations already exist.");
+ }
+
+ if ($this->application->settings->use_build_secrets && $this->dockerBuildkitSupported && ! empty($this->build_secrets)) {
+ $fullDockerfilePath = "{$this->workdir}/{$dockerfilePath}";
+ $this->modify_dockerfile_for_secrets($fullDockerfilePath);
+ $this->application_deployment_queue->addLogEntry("Modified Dockerfile for service {$serviceName} to use build secrets.");
+ }
+ }
+ }
+
+ private function add_build_secrets_to_compose($composeFile)
+ {
+ // Get environment variables for secrets
+ $variables = $this->pull_request_id === 0
+ ? $this->application->environment_variables()->where('key', 'not like', 'NIXPACKS_%')->get()
+ : $this->application->environment_variables_preview()->where('key', 'not like', 'NIXPACKS_%')->get();
+
+ if ($variables->isEmpty()) {
+ return $composeFile;
+ }
+
+ $secrets = [];
+ foreach ($variables as $env) {
+ $secrets[$env->key] = [
+ 'environment' => $env->key,
+ ];
+ }
+
+ $services = data_get($composeFile, 'services', []);
+ foreach ($services as $serviceName => &$service) {
+ if (isset($service['build'])) {
+ if (is_string($service['build'])) {
+ $service['build'] = [
+ 'context' => $service['build'],
+ ];
+ }
+ if (! isset($service['build']['secrets'])) {
+ $service['build']['secrets'] = [];
+ }
+ foreach ($variables as $env) {
+ if (! in_array($env->key, $service['build']['secrets'])) {
+ $service['build']['secrets'][] = $env->key;
+ }
}
}
}
- $dockerfile_base64 = base64_encode($dockerfile->implode("\n"));
- $this->execute_remote_command([
- executeInDocker($this->deployment_uuid, "echo '{$dockerfile_base64}' | base64 -d | tee {$this->workdir}{$this->dockerfile_location} > /dev/null"),
- 'hidden' => true,
- ]);
+
+ $composeFile['services'] = $services;
+ $existingSecrets = data_get($composeFile, 'secrets', []);
+ if ($existingSecrets instanceof \Illuminate\Support\Collection) {
+ $existingSecrets = $existingSecrets->toArray();
+ }
+ $composeFile['secrets'] = array_replace($existingSecrets, $secrets);
+
+ $this->application_deployment_queue->addLogEntry('Added build secrets configuration to docker-compose file (using environment variables).');
+
+ return $composeFile;
}
private function run_pre_deployment_command()
@@ -2546,8 +3233,23 @@ COPY ./nginx.conf /etc/nginx/conf.d/default.conf");
throw new RuntimeException('Post-deployment command: Could not find a valid container. Is the container name correct?');
}
+ /**
+ * Check if the deployment was cancelled and abort if it was
+ */
+ private function checkForCancellation(): void
+ {
+ $this->application_deployment_queue->refresh();
+ if ($this->application_deployment_queue->status === ApplicationDeploymentStatus::CANCELLED_BY_USER->value) {
+ $this->application_deployment_queue->addLogEntry('Deployment cancelled by user, stopping execution.');
+ throw new \RuntimeException('Deployment cancelled by user', 69420);
+ }
+ }
+
private function next(string $status)
{
+ // Refresh to get latest status
+ $this->application_deployment_queue->refresh();
+
// Never allow changing status from FAILED or CANCELLED_BY_USER to anything else
if ($this->application_deployment_queue->status === ApplicationDeploymentStatus::FAILED->value) {
$this->application->environment->project->team?->notify(new DeploymentFailed($this->application, $this->deployment_uuid, $this->preview));
@@ -2555,7 +3257,9 @@ COPY ./nginx.conf /etc/nginx/conf.d/default.conf");
return;
}
if ($this->application_deployment_queue->status === ApplicationDeploymentStatus::CANCELLED_BY_USER->value) {
- return;
+ // Job was cancelled, stop execution
+ $this->application_deployment_queue->addLogEntry('Deployment cancelled by user, stopping execution.');
+ throw new \RuntimeException('Deployment cancelled by user', 69420);
}
$this->application_deployment_queue->update([
@@ -2565,6 +3269,9 @@ COPY ./nginx.conf /etc/nginx/conf.d/default.conf");
queue_next_deployment($this->application);
if ($status === ApplicationDeploymentStatus::FINISHED->value) {
+ ray($this->application->team()->id);
+ event(new ApplicationConfigurationChanged($this->application->team()->id));
+
if (! $this->only_this_server) {
$this->deploy_to_additional_destinations();
}
@@ -2584,8 +3291,8 @@ COPY ./nginx.conf /etc/nginx/conf.d/default.conf");
$code = $exception->getCode();
if ($code !== 69420) {
// 69420 means failed to push the image to the registry, so we don't need to remove the new version as it is the currently running one
- if ($this->application->settings->is_consistent_container_name_enabled || str($this->application->settings->custom_internal_name)->isNotEmpty()) {
- // do not remove already running container
+ if ($this->application->settings->is_consistent_container_name_enabled || str($this->application->settings->custom_internal_name)->isNotEmpty() || $this->pull_request_id !== 0) {
+ // do not remove already running container for PR deployments
} else {
$this->application_deployment_queue->addLogEntry('Deployment failed. Removing the new version of your application.', 'stderr');
$this->execute_remote_command(
diff --git a/app/Jobs/DatabaseBackupJob.php b/app/Jobs/DatabaseBackupJob.php
index 6ac9ae1e6..92db14a61 100644
--- a/app/Jobs/DatabaseBackupJob.php
+++ b/app/Jobs/DatabaseBackupJob.php
@@ -74,8 +74,6 @@ class DatabaseBackupJob implements ShouldBeEncrypted, ShouldQueue
{
$this->onQueue('high');
$this->timeout = $backup->timeout;
-
- $this->backup_log_uuid = (string) new Cuid2;
}
public function handle(): void
@@ -288,6 +286,17 @@ class DatabaseBackupJob implements ShouldBeEncrypted, ShouldQueue
$this->backup_dir = backup_dir().'/coolify'."/coolify-db-$ip";
}
foreach ($databasesToBackup as $database) {
+ // Generate unique UUID for each database backup execution
+ $attempts = 0;
+ do {
+ $this->backup_log_uuid = (string) new Cuid2;
+ $exists = ScheduledDatabaseBackupExecution::where('uuid', $this->backup_log_uuid)->exists();
+ $attempts++;
+ if ($attempts >= 3 && $exists) {
+ throw new \Exception('Unable to generate unique UUID for backup execution after 3 attempts');
+ }
+ } while ($exists);
+
$size = 0;
try {
if (str($databaseType)->contains('postgres')) {
diff --git a/app/Jobs/ServerConnectionCheckJob.php b/app/Jobs/ServerConnectionCheckJob.php
index 167bcea38..8b55434f6 100644
--- a/app/Jobs/ServerConnectionCheckJob.php
+++ b/app/Jobs/ServerConnectionCheckJob.php
@@ -78,11 +78,11 @@ class ServerConnectionCheckJob implements ShouldBeEncrypted, ShouldQueue
}
// Server is reachable, check if Docker is available
- // $isUsable = $this->checkDockerAvailability();
+ $isUsable = $this->checkDockerAvailability();
$this->server->settings->update([
'is_reachable' => true,
- 'is_usable' => true,
+ 'is_usable' => $isUsable,
]);
} catch (\Throwable $e) {
diff --git a/app/Jobs/StripeProcessJob.php b/app/Jobs/StripeProcessJob.php
index 088b6c67d..aebceaa6d 100644
--- a/app/Jobs/StripeProcessJob.php
+++ b/app/Jobs/StripeProcessJob.php
@@ -93,20 +93,66 @@ class StripeProcessJob implements ShouldQueue
break;
case 'invoice.paid':
$customerId = data_get($data, 'customer');
+ $invoiceAmount = data_get($data, 'amount_paid', 0);
+ $subscriptionId = data_get($data, 'subscription');
$planId = data_get($data, 'lines.data.0.plan.id');
if (Str::contains($excludedPlans, $planId)) {
// send_internal_notification('Subscription excluded.');
break;
}
$subscription = Subscription::where('stripe_customer_id', $customerId)->first();
- if ($subscription) {
- $subscription->update([
- 'stripe_invoice_paid' => true,
- 'stripe_past_due' => false,
- ]);
- } else {
+ if (! $subscription) {
throw new \RuntimeException("No subscription found for customer: {$customerId}");
}
+
+ if ($subscription->stripe_subscription_id) {
+ try {
+ $stripe = new \Stripe\StripeClient(config('subscription.stripe_api_key'));
+ $stripeSubscription = $stripe->subscriptions->retrieve(
+ $subscription->stripe_subscription_id
+ );
+
+ switch ($stripeSubscription->status) {
+ case 'active':
+ $subscription->update([
+ 'stripe_invoice_paid' => true,
+ 'stripe_past_due' => false,
+ ]);
+ break;
+
+ case 'past_due':
+ $subscription->update([
+ 'stripe_invoice_paid' => true,
+ 'stripe_past_due' => true,
+ ]);
+ break;
+
+ case 'canceled':
+ case 'incomplete_expired':
+ case 'unpaid':
+ send_internal_notification(
+ "Invoice paid for {$stripeSubscription->status} subscription. ".
+ "Customer: {$customerId}, Amount: \${$invoiceAmount}"
+ );
+ break;
+
+ default:
+ VerifyStripeSubscriptionStatusJob::dispatch($subscription)
+ ->delay(now()->addSeconds(20));
+ break;
+ }
+ } catch (\Exception $e) {
+ VerifyStripeSubscriptionStatusJob::dispatch($subscription)
+ ->delay(now()->addSeconds(20));
+
+ send_internal_notification(
+ 'Failed to verify subscription status in invoice.paid: '.$e->getMessage()
+ );
+ }
+ } else {
+ VerifyStripeSubscriptionStatusJob::dispatch($subscription)
+ ->delay(now()->addSeconds(20));
+ }
break;
case 'invoice.payment_failed':
$customerId = data_get($data, 'customer');
diff --git a/app/Jobs/VerifyStripeSubscriptionStatusJob.php b/app/Jobs/VerifyStripeSubscriptionStatusJob.php
new file mode 100644
index 000000000..58b6944a2
--- /dev/null
+++ b/app/Jobs/VerifyStripeSubscriptionStatusJob.php
@@ -0,0 +1,106 @@
+onQueue('high');
+ }
+
+ public function handle(): void
+ {
+ // If no subscription ID yet, try to find it via customer
+ if (! $this->subscription->stripe_subscription_id &&
+ $this->subscription->stripe_customer_id) {
+ try {
+ $stripe = new \Stripe\StripeClient(config('subscription.stripe_api_key'));
+ $subscriptions = $stripe->subscriptions->all([
+ 'customer' => $this->subscription->stripe_customer_id,
+ 'limit' => 1,
+ ]);
+
+ if ($subscriptions->data) {
+ $this->subscription->update([
+ 'stripe_subscription_id' => $subscriptions->data[0]->id,
+ ]);
+ }
+ } catch (\Exception $e) {
+ // Continue without subscription ID
+ }
+ }
+
+ if (! $this->subscription->stripe_subscription_id) {
+ return;
+ }
+
+ try {
+ $stripe = new \Stripe\StripeClient(config('subscription.stripe_api_key'));
+ $stripeSubscription = $stripe->subscriptions->retrieve(
+ $this->subscription->stripe_subscription_id
+ );
+
+ switch ($stripeSubscription->status) {
+ case 'active':
+ $this->subscription->update([
+ 'stripe_invoice_paid' => true,
+ 'stripe_past_due' => false,
+ 'stripe_cancel_at_period_end' => $stripeSubscription->cancel_at_period_end,
+ ]);
+ break;
+
+ case 'past_due':
+ // Keep subscription active but mark as past_due
+ $this->subscription->update([
+ 'stripe_invoice_paid' => true,
+ 'stripe_past_due' => true,
+ 'stripe_cancel_at_period_end' => $stripeSubscription->cancel_at_period_end,
+ ]);
+ break;
+
+ case 'canceled':
+ case 'incomplete_expired':
+ case 'unpaid':
+ // Ensure subscription is marked as inactive
+ $this->subscription->update([
+ 'stripe_invoice_paid' => false,
+ 'stripe_past_due' => false,
+ ]);
+
+ // Trigger subscription ended logic if canceled
+ if ($stripeSubscription->status === 'canceled') {
+ $team = $this->subscription->team;
+ if ($team) {
+ $team->subscriptionEnded();
+ }
+ }
+ break;
+
+ default:
+ send_internal_notification(
+ 'Unknown subscription status in VerifyStripeSubscriptionStatusJob: '.$stripeSubscription->status.
+ ' for customer: '.$this->subscription->stripe_customer_id
+ );
+ break;
+ }
+ } catch (\Exception $e) {
+ send_internal_notification(
+ 'VerifyStripeSubscriptionStatusJob failed for subscription ID '.$this->subscription->id.': '.$e->getMessage()
+ );
+ }
+ }
+}
diff --git a/app/Livewire/GlobalSearch.php b/app/Livewire/GlobalSearch.php
new file mode 100644
index 000000000..dacc0d4db
--- /dev/null
+++ b/app/Livewire/GlobalSearch.php
@@ -0,0 +1,372 @@
+searchQuery = '';
+ $this->isModalOpen = false;
+ $this->searchResults = [];
+ $this->allSearchableItems = [];
+ }
+
+ public function openSearchModal()
+ {
+ $this->isModalOpen = true;
+ $this->loadSearchableItems();
+ $this->dispatch('search-modal-opened');
+ }
+
+ public function closeSearchModal()
+ {
+ $this->isModalOpen = false;
+ $this->searchQuery = '';
+ $this->searchResults = [];
+ }
+
+ public static function getCacheKey($teamId)
+ {
+ return 'global_search_items_'.$teamId;
+ }
+
+ public static function clearTeamCache($teamId)
+ {
+ Cache::forget(self::getCacheKey($teamId));
+ }
+
+ public function updatedSearchQuery()
+ {
+ $this->search();
+ }
+
+ private function loadSearchableItems()
+ {
+ // Try to get from Redis cache first
+ $cacheKey = self::getCacheKey(auth()->user()->currentTeam()->id);
+
+ $this->allSearchableItems = Cache::remember($cacheKey, 300, function () {
+ ray()->showQueries();
+ $items = collect();
+ $team = auth()->user()->currentTeam();
+
+ // Get all applications
+ $applications = Application::ownedByCurrentTeam()
+ ->with(['environment.project'])
+ ->get()
+ ->map(function ($app) {
+ // Collect all FQDNs from the application
+ $fqdns = collect([]);
+
+ // For regular applications
+ if ($app->fqdn) {
+ $fqdns = collect(explode(',', $app->fqdn))->map(fn ($fqdn) => trim($fqdn));
+ }
+
+ // For docker compose based applications
+ if ($app->build_pack === 'dockercompose' && $app->docker_compose_domains) {
+ try {
+ $composeDomains = json_decode($app->docker_compose_domains, true);
+ if (is_array($composeDomains)) {
+ foreach ($composeDomains as $serviceName => $domains) {
+ if (is_array($domains)) {
+ $fqdns = $fqdns->merge($domains);
+ }
+ }
+ }
+ } catch (\Exception $e) {
+ // Ignore JSON parsing errors
+ }
+ }
+
+ $fqdnsString = $fqdns->implode(' ');
+
+ return [
+ 'id' => $app->id,
+ 'name' => $app->name,
+ 'type' => 'application',
+ 'uuid' => $app->uuid,
+ 'description' => $app->description,
+ 'link' => $app->link(),
+ 'project' => $app->environment->project->name ?? null,
+ 'environment' => $app->environment->name ?? null,
+ 'fqdns' => $fqdns->take(2)->implode(', '), // Show first 2 FQDNs in UI
+ 'search_text' => strtolower($app->name.' '.$app->description.' '.$fqdnsString),
+ ];
+ });
+
+ // Get all services
+ $services = Service::ownedByCurrentTeam()
+ ->with(['environment.project', 'applications'])
+ ->get()
+ ->map(function ($service) {
+ // Collect all FQDNs from service applications
+ $fqdns = collect([]);
+ foreach ($service->applications as $app) {
+ if ($app->fqdn) {
+ $appFqdns = collect(explode(',', $app->fqdn))->map(fn ($fqdn) => trim($fqdn));
+ $fqdns = $fqdns->merge($appFqdns);
+ }
+ }
+ $fqdnsString = $fqdns->implode(' ');
+
+ return [
+ 'id' => $service->id,
+ 'name' => $service->name,
+ 'type' => 'service',
+ 'uuid' => $service->uuid,
+ 'description' => $service->description,
+ 'link' => $service->link(),
+ 'project' => $service->environment->project->name ?? null,
+ 'environment' => $service->environment->name ?? null,
+ 'fqdns' => $fqdns->take(2)->implode(', '), // Show first 2 FQDNs in UI
+ 'search_text' => strtolower($service->name.' '.$service->description.' '.$fqdnsString),
+ ];
+ });
+
+ // Get all standalone databases
+ $databases = collect();
+
+ // PostgreSQL
+ $databases = $databases->merge(
+ StandalonePostgresql::ownedByCurrentTeam()
+ ->with(['environment.project'])
+ ->get()
+ ->map(function ($db) {
+ return [
+ 'id' => $db->id,
+ 'name' => $db->name,
+ 'type' => 'database',
+ 'subtype' => 'postgresql',
+ 'uuid' => $db->uuid,
+ 'description' => $db->description,
+ 'link' => $db->link(),
+ 'project' => $db->environment->project->name ?? null,
+ 'environment' => $db->environment->name ?? null,
+ 'search_text' => strtolower($db->name.' postgresql '.$db->description),
+ ];
+ })
+ );
+
+ // MySQL
+ $databases = $databases->merge(
+ StandaloneMysql::ownedByCurrentTeam()
+ ->with(['environment.project'])
+ ->get()
+ ->map(function ($db) {
+ return [
+ 'id' => $db->id,
+ 'name' => $db->name,
+ 'type' => 'database',
+ 'subtype' => 'mysql',
+ 'uuid' => $db->uuid,
+ 'description' => $db->description,
+ 'link' => $db->link(),
+ 'project' => $db->environment->project->name ?? null,
+ 'environment' => $db->environment->name ?? null,
+ 'search_text' => strtolower($db->name.' mysql '.$db->description),
+ ];
+ })
+ );
+
+ // MariaDB
+ $databases = $databases->merge(
+ StandaloneMariadb::ownedByCurrentTeam()
+ ->with(['environment.project'])
+ ->get()
+ ->map(function ($db) {
+ return [
+ 'id' => $db->id,
+ 'name' => $db->name,
+ 'type' => 'database',
+ 'subtype' => 'mariadb',
+ 'uuid' => $db->uuid,
+ 'description' => $db->description,
+ 'link' => $db->link(),
+ 'project' => $db->environment->project->name ?? null,
+ 'environment' => $db->environment->name ?? null,
+ 'search_text' => strtolower($db->name.' mariadb '.$db->description),
+ ];
+ })
+ );
+
+ // MongoDB
+ $databases = $databases->merge(
+ StandaloneMongodb::ownedByCurrentTeam()
+ ->with(['environment.project'])
+ ->get()
+ ->map(function ($db) {
+ return [
+ 'id' => $db->id,
+ 'name' => $db->name,
+ 'type' => 'database',
+ 'subtype' => 'mongodb',
+ 'uuid' => $db->uuid,
+ 'description' => $db->description,
+ 'link' => $db->link(),
+ 'project' => $db->environment->project->name ?? null,
+ 'environment' => $db->environment->name ?? null,
+ 'search_text' => strtolower($db->name.' mongodb '.$db->description),
+ ];
+ })
+ );
+
+ // Redis
+ $databases = $databases->merge(
+ StandaloneRedis::ownedByCurrentTeam()
+ ->with(['environment.project'])
+ ->get()
+ ->map(function ($db) {
+ return [
+ 'id' => $db->id,
+ 'name' => $db->name,
+ 'type' => 'database',
+ 'subtype' => 'redis',
+ 'uuid' => $db->uuid,
+ 'description' => $db->description,
+ 'link' => $db->link(),
+ 'project' => $db->environment->project->name ?? null,
+ 'environment' => $db->environment->name ?? null,
+ 'search_text' => strtolower($db->name.' redis '.$db->description),
+ ];
+ })
+ );
+
+ // KeyDB
+ $databases = $databases->merge(
+ StandaloneKeydb::ownedByCurrentTeam()
+ ->with(['environment.project'])
+ ->get()
+ ->map(function ($db) {
+ return [
+ 'id' => $db->id,
+ 'name' => $db->name,
+ 'type' => 'database',
+ 'subtype' => 'keydb',
+ 'uuid' => $db->uuid,
+ 'description' => $db->description,
+ 'link' => $db->link(),
+ 'project' => $db->environment->project->name ?? null,
+ 'environment' => $db->environment->name ?? null,
+ 'search_text' => strtolower($db->name.' keydb '.$db->description),
+ ];
+ })
+ );
+
+ // Dragonfly
+ $databases = $databases->merge(
+ StandaloneDragonfly::ownedByCurrentTeam()
+ ->with(['environment.project'])
+ ->get()
+ ->map(function ($db) {
+ return [
+ 'id' => $db->id,
+ 'name' => $db->name,
+ 'type' => 'database',
+ 'subtype' => 'dragonfly',
+ 'uuid' => $db->uuid,
+ 'description' => $db->description,
+ 'link' => $db->link(),
+ 'project' => $db->environment->project->name ?? null,
+ 'environment' => $db->environment->name ?? null,
+ 'search_text' => strtolower($db->name.' dragonfly '.$db->description),
+ ];
+ })
+ );
+
+ // Clickhouse
+ $databases = $databases->merge(
+ StandaloneClickhouse::ownedByCurrentTeam()
+ ->with(['environment.project'])
+ ->get()
+ ->map(function ($db) {
+ return [
+ 'id' => $db->id,
+ 'name' => $db->name,
+ 'type' => 'database',
+ 'subtype' => 'clickhouse',
+ 'uuid' => $db->uuid,
+ 'description' => $db->description,
+ 'link' => $db->link(),
+ 'project' => $db->environment->project->name ?? null,
+ 'environment' => $db->environment->name ?? null,
+ 'search_text' => strtolower($db->name.' clickhouse '.$db->description),
+ ];
+ })
+ );
+
+ // Get all servers
+ $servers = Server::ownedByCurrentTeam()
+ ->get()
+ ->map(function ($server) {
+ return [
+ 'id' => $server->id,
+ 'name' => $server->name,
+ 'type' => 'server',
+ 'uuid' => $server->uuid,
+ 'description' => $server->description,
+ 'link' => $server->url(),
+ 'project' => null,
+ 'environment' => null,
+ 'search_text' => strtolower($server->name.' '.$server->ip.' '.$server->description),
+ ];
+ });
+
+ // Merge all collections
+ $items = $items->merge($applications)
+ ->merge($services)
+ ->merge($databases)
+ ->merge($servers);
+
+ return $items->toArray();
+ });
+ }
+
+ private function search()
+ {
+ if (strlen($this->searchQuery) < 2) {
+ $this->searchResults = [];
+
+ return;
+ }
+
+ $query = strtolower($this->searchQuery);
+
+ // Case-insensitive search in the items
+ $this->searchResults = collect($this->allSearchableItems)
+ ->filter(function ($item) use ($query) {
+ return str_contains($item['search_text'], $query);
+ })
+ ->take(20)
+ ->values()
+ ->toArray();
+ }
+
+ public function render()
+ {
+ return view('livewire.global-search');
+ }
+}
diff --git a/app/Livewire/Project/Application/DeploymentNavbar.php b/app/Livewire/Project/Application/DeploymentNavbar.php
index 66f387fcf..dccd1e499 100644
--- a/app/Livewire/Project/Application/DeploymentNavbar.php
+++ b/app/Livewire/Project/Application/DeploymentNavbar.php
@@ -52,15 +52,24 @@ class DeploymentNavbar extends Component
public function cancel()
{
- $kill_command = "docker rm -f {$this->application_deployment_queue->deployment_uuid}";
+ $deployment_uuid = $this->application_deployment_queue->deployment_uuid;
+ $kill_command = "docker rm -f {$deployment_uuid}";
$build_server_id = $this->application_deployment_queue->build_server_id ?? $this->application->destination->server_id;
$server_id = $this->application_deployment_queue->server_id ?? $this->application->destination->server_id;
+
+ // First, mark the deployment as cancelled to prevent further processing
+ $this->application_deployment_queue->update([
+ 'status' => ApplicationDeploymentStatus::CANCELLED_BY_USER->value,
+ ]);
+
try {
if ($this->application->settings->is_build_server_enabled) {
$server = Server::ownedByCurrentTeam()->find($build_server_id);
} else {
$server = Server::ownedByCurrentTeam()->find($server_id);
}
+
+ // Add cancellation log entry
if ($this->application_deployment_queue->logs) {
$previous_logs = json_decode($this->application_deployment_queue->logs, associative: true, flags: JSON_THROW_ON_ERROR);
@@ -77,13 +86,35 @@ class DeploymentNavbar extends Component
'logs' => json_encode($previous_logs, flags: JSON_THROW_ON_ERROR),
]);
}
- instant_remote_process([$kill_command], $server);
+
+ // Try to stop the helper container if it exists
+ // Check if container exists first
+ $checkCommand = "docker ps -a --filter name={$deployment_uuid} --format '{{.Names}}'";
+ $containerExists = instant_remote_process([$checkCommand], $server);
+
+ if ($containerExists && str($containerExists)->trim()->isNotEmpty()) {
+ // Container exists, kill it
+ instant_remote_process([$kill_command], $server);
+ } else {
+ // Container hasn't started yet
+ $this->application_deployment_queue->addLogEntry('Helper container not yet started. Deployment will be cancelled when job checks status.');
+ }
+
+ // Also try to kill any running process if we have a process ID
+ if ($this->application_deployment_queue->current_process_id) {
+ try {
+ $processKillCommand = "kill -9 {$this->application_deployment_queue->current_process_id}";
+ instant_remote_process([$processKillCommand], $server);
+ } catch (\Throwable $e) {
+ // Process might already be gone, that's ok
+ }
+ }
} catch (\Throwable $e) {
+ // Still mark as cancelled even if cleanup fails
return handleError($e, $this);
} finally {
$this->application_deployment_queue->update([
'current_process_id' => null,
- 'status' => ApplicationDeploymentStatus::CANCELLED_BY_USER->value,
]);
next_after_cancel($server);
}
diff --git a/app/Livewire/Project/Application/General.php b/app/Livewire/Project/Application/General.php
index c77d050cb..2ade83038 100644
--- a/app/Livewire/Project/Application/General.php
+++ b/app/Livewire/Project/Application/General.php
@@ -547,9 +547,10 @@ class General extends Component
$this->application->fqdn = str($this->application->fqdn)->replaceEnd(',', '')->trim();
$this->application->fqdn = str($this->application->fqdn)->replaceStart(',', '')->trim();
$this->application->fqdn = str($this->application->fqdn)->trim()->explode(',')->map(function ($domain) {
+ $domain = trim($domain);
Url::fromString($domain, ['http', 'https']);
- return str($domain)->trim()->lower();
+ return str($domain)->lower();
});
$this->application->fqdn = $this->application->fqdn->unique()->implode(',');
diff --git a/app/Livewire/Project/CloneMe.php b/app/Livewire/Project/CloneMe.php
index a4f50ee06..3b3e42619 100644
--- a/app/Livewire/Project/CloneMe.php
+++ b/app/Livewire/Project/CloneMe.php
@@ -127,7 +127,7 @@ class CloneMe extends Component
$databases = $this->environment->databases();
$services = $this->environment->services;
foreach ($applications as $application) {
- $selectedDestination = $this->servers->flatMap(fn ($server) => $server->destinations)->where('id', $this->selectedDestination)->first();
+ $selectedDestination = $this->servers->flatMap(fn ($server) => $server->destinations())->where('id', $this->selectedDestination)->first();
clone_application($application, $selectedDestination, [
'environment_id' => $environment->id,
], $this->cloneVolumeData);
diff --git a/app/Livewire/Project/New/GithubPrivateRepository.php b/app/Livewire/Project/New/GithubPrivateRepository.php
index 0f496e6db..a2071931e 100644
--- a/app/Livewire/Project/New/GithubPrivateRepository.php
+++ b/app/Livewire/Project/New/GithubPrivateRepository.php
@@ -143,7 +143,13 @@ class GithubPrivateRepository extends Component
protected function loadBranchByPage()
{
- $response = Http::withToken($this->token)->get("{$this->github_app->api_url}/repos/{$this->selected_repository_owner}/{$this->selected_repository_repo}/branches?per_page=100&page={$this->page}");
+ $response = Http::GitHub($this->github_app->api_url, $this->token)
+ ->timeout(20)
+ ->retry(3, 200, throw: false)
+ ->get("/repos/{$this->selected_repository_owner}/{$this->selected_repository_repo}/branches", [
+ 'per_page' => 100,
+ 'page' => $this->page,
+ ]);
$json = $response->json();
if ($response->status() !== 200) {
return $this->dispatch('error', $json['message']);
diff --git a/app/Livewire/Project/Service/EditDomain.php b/app/Livewire/Project/Service/EditDomain.php
index 5ce170b99..7c718393d 100644
--- a/app/Livewire/Project/Service/EditDomain.php
+++ b/app/Livewire/Project/Service/EditDomain.php
@@ -41,9 +41,10 @@ class EditDomain extends Component
$this->application->fqdn = str($this->application->fqdn)->replaceEnd(',', '')->trim();
$this->application->fqdn = str($this->application->fqdn)->replaceStart(',', '')->trim();
$this->application->fqdn = str($this->application->fqdn)->trim()->explode(',')->map(function ($domain) {
+ $domain = trim($domain);
Url::fromString($domain, ['http', 'https']);
- return str($domain)->trim()->lower();
+ return str($domain)->lower();
});
$this->application->fqdn = $this->application->fqdn->unique()->implode(',');
$warning = sslipDomainWarning($this->application->fqdn);
diff --git a/app/Livewire/Project/Service/ServiceApplicationView.php b/app/Livewire/Project/Service/ServiceApplicationView.php
index 3ac12cfe9..e37b6ad86 100644
--- a/app/Livewire/Project/Service/ServiceApplicationView.php
+++ b/app/Livewire/Project/Service/ServiceApplicationView.php
@@ -149,9 +149,10 @@ class ServiceApplicationView extends Component
$this->application->fqdn = str($this->application->fqdn)->replaceEnd(',', '')->trim();
$this->application->fqdn = str($this->application->fqdn)->replaceStart(',', '')->trim();
$this->application->fqdn = str($this->application->fqdn)->trim()->explode(',')->map(function ($domain) {
+ $domain = trim($domain);
Url::fromString($domain, ['http', 'https']);
- return str($domain)->trim()->lower();
+ return str($domain)->lower();
});
$this->application->fqdn = $this->application->fqdn->unique()->implode(',');
$warning = sslipDomainWarning($this->application->fqdn);
diff --git a/app/Livewire/Project/Shared/ConfigurationChecker.php b/app/Livewire/Project/Shared/ConfigurationChecker.php
index ab9f3785d..ce9ce7780 100644
--- a/app/Livewire/Project/Shared/ConfigurationChecker.php
+++ b/app/Livewire/Project/Shared/ConfigurationChecker.php
@@ -20,7 +20,15 @@ class ConfigurationChecker extends Component
public Application|Service|StandaloneRedis|StandalonePostgresql|StandaloneMongodb|StandaloneMysql|StandaloneMariadb|StandaloneKeydb|StandaloneDragonfly|StandaloneClickhouse $resource;
- protected $listeners = ['configurationChanged'];
+ public function getListeners()
+ {
+ $teamId = auth()->user()->currentTeam()->id;
+
+ return [
+ "echo-private:team.{$teamId},ApplicationConfigurationChanged" => 'configurationChanged',
+ 'configurationChanged' => 'configurationChanged',
+ ];
+ }
public function mount()
{
diff --git a/app/Livewire/Project/Shared/EnvironmentVariable/Add.php b/app/Livewire/Project/Shared/EnvironmentVariable/Add.php
index 9d5a5a39f..5f5e12e0a 100644
--- a/app/Livewire/Project/Shared/EnvironmentVariable/Add.php
+++ b/app/Livewire/Project/Shared/EnvironmentVariable/Add.php
@@ -2,12 +2,13 @@
namespace App\Livewire\Project\Shared\EnvironmentVariable;
+use App\Traits\EnvironmentVariableAnalyzer;
use Illuminate\Foundation\Auth\Access\AuthorizesRequests;
use Livewire\Component;
class Add extends Component
{
- use AuthorizesRequests;
+ use AuthorizesRequests, EnvironmentVariableAnalyzer;
public $parameters;
@@ -23,7 +24,11 @@ class Add extends Component
public bool $is_literal = false;
- public bool $is_buildtime_only = false;
+ public bool $is_runtime = true;
+
+ public bool $is_buildtime = true;
+
+ public array $problematicVariables = [];
protected $listeners = ['clearAddEnv' => 'clear'];
@@ -32,7 +37,8 @@ class Add extends Component
'value' => 'nullable',
'is_multiline' => 'required|boolean',
'is_literal' => 'required|boolean',
- 'is_buildtime_only' => 'required|boolean',
+ 'is_runtime' => 'required|boolean',
+ 'is_buildtime' => 'required|boolean',
];
protected $validationAttributes = [
@@ -40,12 +46,14 @@ class Add extends Component
'value' => 'value',
'is_multiline' => 'multiline',
'is_literal' => 'literal',
- 'is_buildtime_only' => 'buildtime only',
+ 'is_runtime' => 'runtime',
+ 'is_buildtime' => 'buildtime',
];
public function mount()
{
$this->parameters = get_route_parameters();
+ $this->problematicVariables = self::getProblematicVariablesForFrontend();
}
public function submit()
@@ -56,7 +64,8 @@ class Add extends Component
'value' => $this->value,
'is_multiline' => $this->is_multiline,
'is_literal' => $this->is_literal,
- 'is_buildtime_only' => $this->is_buildtime_only,
+ 'is_runtime' => $this->is_runtime,
+ 'is_buildtime' => $this->is_buildtime,
'is_preview' => $this->is_preview,
]);
$this->clear();
@@ -68,6 +77,7 @@ class Add extends Component
$this->value = '';
$this->is_multiline = false;
$this->is_literal = false;
- $this->is_buildtime_only = false;
+ $this->is_runtime = true;
+ $this->is_buildtime = true;
}
}
diff --git a/app/Livewire/Project/Shared/EnvironmentVariable/All.php b/app/Livewire/Project/Shared/EnvironmentVariable/All.php
index 9429c5f25..639c025c7 100644
--- a/app/Livewire/Project/Shared/EnvironmentVariable/All.php
+++ b/app/Livewire/Project/Shared/EnvironmentVariable/All.php
@@ -25,6 +25,8 @@ class All extends Component
public bool $is_env_sorting_enabled = false;
+ public bool $use_build_secrets = false;
+
protected $listeners = [
'saveKey' => 'submit',
'refreshEnvs',
@@ -34,6 +36,7 @@ class All extends Component
public function mount()
{
$this->is_env_sorting_enabled = data_get($this->resource, 'settings.is_env_sorting_enabled', false);
+ $this->use_build_secrets = data_get($this->resource, 'settings.use_build_secrets', false);
$this->resourceClass = get_class($this->resource);
$resourceWithPreviews = [\App\Models\Application::class];
$simpleDockerfile = filled(data_get($this->resource, 'dockerfile'));
@@ -49,6 +52,7 @@ class All extends Component
$this->authorize('manageEnvironment', $this->resource);
$this->resource->settings->is_env_sorting_enabled = $this->is_env_sorting_enabled;
+ $this->resource->settings->use_build_secrets = $this->use_build_secrets;
$this->resource->settings->save();
$this->getDevView();
$this->dispatch('success', 'Environment variable settings updated.');
@@ -217,7 +221,8 @@ class All extends Component
$environment->value = $data['value'];
$environment->is_multiline = $data['is_multiline'] ?? false;
$environment->is_literal = $data['is_literal'] ?? false;
- $environment->is_buildtime_only = $data['is_buildtime_only'] ?? false;
+ $environment->is_runtime = $data['is_runtime'] ?? true;
+ $environment->is_buildtime = $data['is_buildtime'] ?? true;
$environment->is_preview = $data['is_preview'] ?? false;
$environment->resourceable_id = $this->resource->id;
$environment->resourceable_type = $this->resource->getMorphClass();
diff --git a/app/Livewire/Project/Shared/EnvironmentVariable/Show.php b/app/Livewire/Project/Shared/EnvironmentVariable/Show.php
index ab70b70f4..3b8d244cc 100644
--- a/app/Livewire/Project/Shared/EnvironmentVariable/Show.php
+++ b/app/Livewire/Project/Shared/EnvironmentVariable/Show.php
@@ -4,13 +4,14 @@ namespace App\Livewire\Project\Shared\EnvironmentVariable;
use App\Models\EnvironmentVariable as ModelsEnvironmentVariable;
use App\Models\SharedEnvironmentVariable;
+use App\Traits\EnvironmentVariableAnalyzer;
use App\Traits\EnvironmentVariableProtection;
use Illuminate\Foundation\Auth\Access\AuthorizesRequests;
use Livewire\Component;
class Show extends Component
{
- use AuthorizesRequests, EnvironmentVariableProtection;
+ use AuthorizesRequests, EnvironmentVariableAnalyzer, EnvironmentVariableProtection;
public $parameters;
@@ -38,7 +39,9 @@ class Show extends Component
public bool $is_shown_once = false;
- public bool $is_buildtime_only = false;
+ public bool $is_runtime = true;
+
+ public bool $is_buildtime = true;
public bool $is_required = false;
@@ -46,6 +49,8 @@ class Show extends Component
public bool $is_redis_credential = false;
+ public array $problematicVariables = [];
+
protected $listeners = [
'refreshEnvs' => 'refresh',
'refresh',
@@ -58,7 +63,8 @@ class Show extends Component
'is_multiline' => 'required|boolean',
'is_literal' => 'required|boolean',
'is_shown_once' => 'required|boolean',
- 'is_buildtime_only' => 'required|boolean',
+ 'is_runtime' => 'required|boolean',
+ 'is_buildtime' => 'required|boolean',
'real_value' => 'nullable',
'is_required' => 'required|boolean',
];
@@ -74,6 +80,7 @@ class Show extends Component
if ($this->type === 'standalone-redis' && ($this->env->key === 'REDIS_PASSWORD' || $this->env->key === 'REDIS_USERNAME')) {
$this->is_redis_credential = true;
}
+ $this->problematicVariables = self::getProblematicVariablesForFrontend();
}
public function getResourceProperty()
@@ -102,7 +109,8 @@ class Show extends Component
} else {
$this->validate();
$this->env->is_required = $this->is_required;
- $this->env->is_buildtime_only = $this->is_buildtime_only;
+ $this->env->is_runtime = $this->is_runtime;
+ $this->env->is_buildtime = $this->is_buildtime;
$this->env->is_shared = $this->is_shared;
}
$this->env->key = $this->key;
@@ -117,7 +125,8 @@ class Show extends Component
$this->is_multiline = $this->env->is_multiline;
$this->is_literal = $this->env->is_literal;
$this->is_shown_once = $this->env->is_shown_once;
- $this->is_buildtime_only = $this->env->is_buildtime_only ?? false;
+ $this->is_runtime = $this->env->is_runtime ?? true;
+ $this->is_buildtime = $this->env->is_buildtime ?? true;
$this->is_required = $this->env->is_required ?? false;
$this->is_really_required = $this->env->is_really_required ?? false;
$this->is_shared = $this->env->is_shared ?? false;
diff --git a/app/Livewire/Project/Shared/Metrics.php b/app/Livewire/Project/Shared/Metrics.php
index fdc35fc0f..e5b87b48c 100644
--- a/app/Livewire/Project/Shared/Metrics.php
+++ b/app/Livewire/Project/Shared/Metrics.php
@@ -8,7 +8,7 @@ class Metrics extends Component
{
public $resource;
- public $chartId = 'container-cpu';
+ public $chartId = 'metrics';
public $data;
diff --git a/app/Livewire/Server/Navbar.php b/app/Livewire/Server/Navbar.php
index 055290580..beefed12a 100644
--- a/app/Livewire/Server/Navbar.php
+++ b/app/Livewire/Server/Navbar.php
@@ -32,7 +32,7 @@ class Navbar extends Component
$teamId = auth()->user()->currentTeam()->id;
return [
- 'refreshServerShow' => '$refresh',
+ 'refreshServerShow' => 'refreshServer',
"echo-private:team.{$teamId},ProxyStatusChangedUI" => 'showNotification',
];
}
@@ -134,6 +134,12 @@ class Navbar extends Component
}
+ public function refreshServer()
+ {
+ $this->server->refresh();
+ $this->server->load('settings');
+ }
+
public function render()
{
return view('livewire.server.navbar');
diff --git a/app/Livewire/Server/PrivateKey/Show.php b/app/Livewire/Server/PrivateKey/Show.php
index 845d568ce..fd55717fa 100644
--- a/app/Livewire/Server/PrivateKey/Show.php
+++ b/app/Livewire/Server/PrivateKey/Show.php
@@ -5,6 +5,7 @@ namespace App\Livewire\Server\PrivateKey;
use App\Models\PrivateKey;
use App\Models\Server;
use Illuminate\Foundation\Auth\Access\AuthorizesRequests;
+use Illuminate\Support\Facades\DB;
use Livewire\Component;
class Show extends Component
@@ -35,19 +36,20 @@ class Show extends Component
return;
}
-
- $originalPrivateKeyId = $this->server->getOriginal('private_key_id');
try {
$this->authorize('update', $this->server);
- $this->server->update(['private_key_id' => $privateKeyId]);
- ['uptime' => $uptime, 'error' => $error] = $this->server->validateConnection(justCheckingNewKey: true);
- if ($uptime) {
- $this->dispatch('success', 'Private key updated successfully.');
- } else {
- throw new \Exception($error);
- }
+ DB::transaction(function () use ($ownedPrivateKey) {
+ $this->server->privateKey()->associate($ownedPrivateKey);
+ $this->server->save();
+ ['uptime' => $uptime, 'error' => $error] = $this->server->validateConnection(justCheckingNewKey: true);
+ if (! $uptime) {
+ throw new \Exception($error);
+ }
+ });
+ $this->dispatch('success', 'Private key updated successfully.');
+ $this->dispatch('refreshServerShow');
} catch (\Exception $e) {
- $this->server->update(['private_key_id' => $originalPrivateKeyId]);
+ $this->server->refresh();
$this->server->validateConnection();
$this->dispatch('error', $e->getMessage());
}
@@ -59,6 +61,7 @@ class Show extends Component
['uptime' => $uptime, 'error' => $error] = $this->server->validateConnection();
if ($uptime) {
$this->dispatch('success', 'Server is reachable.');
+ $this->dispatch('refreshServerShow');
} else {
$this->dispatch('error', 'Server is not reachable.
Check this documentation for further help.
Error: '.$error);
diff --git a/app/Livewire/Server/Proxy.php b/app/Livewire/Server/Proxy.php
index 6ccca644a..5ef559862 100644
--- a/app/Livewire/Server/Proxy.php
+++ b/app/Livewire/Server/Proxy.php
@@ -45,7 +45,7 @@ class Proxy extends Component
public function getConfigurationFilePathProperty()
{
- return $this->server->proxyPath().'/docker-compose.yml';
+ return $this->server->proxyPath().'docker-compose.yml';
}
public function changeProxy()
diff --git a/app/Livewire/Server/Show.php b/app/Livewire/Server/Show.php
index c95cc6122..db4dc9b88 100644
--- a/app/Livewire/Server/Show.php
+++ b/app/Livewire/Server/Show.php
@@ -271,7 +271,7 @@ class Show extends Component
$this->authorize('manageSentinel', $this->server);
$customImage = isDev() ? $this->sentinelCustomDockerImage : null;
$this->server->restartSentinel($customImage);
- $this->dispatch('success', 'Restarting Sentinel.');
+ $this->dispatch('info', 'Restarting Sentinel.');
} catch (\Throwable $e) {
return handleError($e, $this);
}
@@ -298,11 +298,36 @@ class Show extends Component
}
}
+ public function updatedIsBuildServer($value)
+ {
+ try {
+ $this->authorize('update', $this->server);
+ if ($value === true && $this->isSentinelEnabled) {
+ $this->isSentinelEnabled = false;
+ $this->isMetricsEnabled = false;
+ $this->isSentinelDebugEnabled = false;
+ StopSentinel::dispatch($this->server);
+ $this->dispatch('info', 'Sentinel has been disabled as build servers cannot run Sentinel.');
+ }
+ $this->submit();
+ // Dispatch event to refresh the navbar
+ $this->dispatch('refreshServerShow');
+ } catch (\Throwable $e) {
+ return handleError($e, $this);
+ }
+ }
+
public function updatedIsSentinelEnabled($value)
{
try {
$this->authorize('manageSentinel', $this->server);
if ($value === true) {
+ if ($this->isBuildServer) {
+ $this->isSentinelEnabled = false;
+ $this->dispatch('error', 'Sentinel cannot be enabled on build servers.');
+
+ return;
+ }
$customImage = isDev() ? $this->sentinelCustomDockerImage : null;
StartSentinel::run($this->server, true, null, $customImage);
} else {
@@ -330,7 +355,7 @@ class Show extends Component
public function instantSave()
{
try {
- $this->submit();
+ $this->syncData(true);
} catch (\Throwable $e) {
return handleError($e, $this);
}
@@ -340,7 +365,7 @@ class Show extends Component
{
try {
$this->syncData(true);
- $this->dispatch('success', 'Server updated.');
+ $this->dispatch('success', 'Server settings updated.');
} catch (\Throwable $e) {
return handleError($e, $this);
}
diff --git a/app/Models/Application.php b/app/Models/Application.php
index 1f48e0211..094e5c82b 100644
--- a/app/Models/Application.php
+++ b/app/Models/Application.php
@@ -4,6 +4,7 @@ namespace App\Models;
use App\Enums\ApplicationDeploymentStatus;
use App\Services\ConfigurationGenerator;
+use App\Traits\ClearsGlobalSearchCache;
use App\Traits\HasConfiguration;
use App\Traits\HasSafeStringAttribute;
use Illuminate\Database\Eloquent\Casts\Attribute;
@@ -110,7 +111,7 @@ use Visus\Cuid2\Cuid2;
class Application extends BaseModel
{
- use HasConfiguration, HasFactory, HasSafeStringAttribute, SoftDeletes;
+ use ClearsGlobalSearchCache, HasConfiguration, HasFactory, HasSafeStringAttribute, SoftDeletes;
private static $parserVersion = '5';
@@ -123,66 +124,6 @@ class Application extends BaseModel
'http_basic_auth_password' => 'encrypted',
];
- public function customNetworkAliases(): Attribute
- {
- return Attribute::make(
- set: function ($value) {
- if (is_null($value) || $value === '') {
- return null;
- }
-
- // If it's already a JSON string, decode it
- if (is_string($value) && $this->isJson($value)) {
- $value = json_decode($value, true);
- }
-
- // If it's a string but not JSON, treat it as a comma-separated list
- if (is_string($value) && ! is_array($value)) {
- $value = explode(',', $value);
- }
-
- $value = collect($value)
- ->map(function ($alias) {
- if (is_string($alias)) {
- return str_replace(' ', '-', trim($alias));
- }
-
- return null;
- })
- ->filter()
- ->unique() // Remove duplicate values
- ->values()
- ->toArray();
-
- return empty($value) ? null : json_encode($value);
- },
- get: function ($value) {
- if (is_null($value)) {
- return null;
- }
-
- if (is_string($value) && $this->isJson($value)) {
- return json_decode($value, true);
- }
-
- return is_array($value) ? $value : [];
- }
- );
- }
-
- /**
- * Check if a string is a valid JSON
- */
- private function isJson($string)
- {
- if (! is_string($string)) {
- return false;
- }
- json_decode($string);
-
- return json_last_error() === JSON_ERROR_NONE;
- }
-
protected static function booted()
{
static::addGlobalScope('withRelations', function ($builder) {
@@ -250,6 +191,66 @@ class Application extends BaseModel
});
}
+ public function customNetworkAliases(): Attribute
+ {
+ return Attribute::make(
+ set: function ($value) {
+ if (is_null($value) || $value === '') {
+ return null;
+ }
+
+ // If it's already a JSON string, decode it
+ if (is_string($value) && $this->isJson($value)) {
+ $value = json_decode($value, true);
+ }
+
+ // If it's a string but not JSON, treat it as a comma-separated list
+ if (is_string($value) && ! is_array($value)) {
+ $value = explode(',', $value);
+ }
+
+ $value = collect($value)
+ ->map(function ($alias) {
+ if (is_string($alias)) {
+ return str_replace(' ', '-', trim($alias));
+ }
+
+ return null;
+ })
+ ->filter()
+ ->unique() // Remove duplicate values
+ ->values()
+ ->toArray();
+
+ return empty($value) ? null : json_encode($value);
+ },
+ get: function ($value) {
+ if (is_null($value)) {
+ return null;
+ }
+
+ if (is_string($value) && $this->isJson($value)) {
+ return json_decode($value, true);
+ }
+
+ return is_array($value) ? $value : [];
+ }
+ );
+ }
+
+ /**
+ * Check if a string is a valid JSON
+ */
+ private function isJson($string)
+ {
+ if (! is_string($string)) {
+ return false;
+ }
+ json_decode($string);
+
+ return json_last_error() === JSON_ERROR_NONE;
+ }
+
public static function ownedByCurrentTeamAPI(int $teamId)
{
return Application::whereRelation('environment.project.team', 'id', $teamId)->orderBy('name');
@@ -932,11 +933,11 @@ class Application extends BaseModel
public function isConfigurationChanged(bool $save = false)
{
- $newConfigHash = base64_encode($this->fqdn.$this->git_repository.$this->git_branch.$this->git_commit_sha.$this->build_pack.$this->static_image.$this->install_command.$this->build_command.$this->start_command.$this->ports_exposes.$this->ports_mappings.$this->base_directory.$this->publish_directory.$this->dockerfile.$this->dockerfile_location.$this->custom_labels.$this->custom_docker_run_options.$this->dockerfile_target_build.$this->redirect.$this->custom_nginx_configuration.$this->custom_labels);
+ $newConfigHash = base64_encode($this->fqdn.$this->git_repository.$this->git_branch.$this->git_commit_sha.$this->build_pack.$this->static_image.$this->install_command.$this->build_command.$this->start_command.$this->ports_exposes.$this->ports_mappings.$this->base_directory.$this->publish_directory.$this->dockerfile.$this->dockerfile_location.$this->custom_labels.$this->custom_docker_run_options.$this->dockerfile_target_build.$this->redirect.$this->custom_nginx_configuration.$this->custom_labels.$this->settings->use_build_secrets);
if ($this->pull_request_id === 0 || $this->pull_request_id === null) {
- $newConfigHash .= json_encode($this->environment_variables()->get(['value', 'is_multiline', 'is_literal'])->sort());
+ $newConfigHash .= json_encode($this->environment_variables()->get(['value', 'is_multiline', 'is_literal', 'is_buildtime', 'is_runtime'])->sort());
} else {
- $newConfigHash .= json_encode($this->environment_variables_preview->get(['value', 'is_multiline', 'is_literal'])->sort());
+ $newConfigHash .= json_encode($this->environment_variables_preview->get(['value', 'is_multiline', 'is_literal', 'is_buildtime', 'is_runtime'])->sort());
}
$newConfigHash = md5($newConfigHash);
$oldConfigHash = data_get($this, 'config_hash');
diff --git a/app/Models/ApplicationDeploymentQueue.php b/app/Models/ApplicationDeploymentQueue.php
index 2a9bea67a..8df6877ab 100644
--- a/app/Models/ApplicationDeploymentQueue.php
+++ b/app/Models/ApplicationDeploymentQueue.php
@@ -85,6 +85,47 @@ class ApplicationDeploymentQueue extends Model
return str($this->commit_message)->value();
}
+ private function redactSensitiveInfo($text)
+ {
+ $text = remove_iip($text);
+
+ $app = $this->application;
+ if (! $app) {
+ return $text;
+ }
+
+ $lockedVars = collect([]);
+
+ if ($app->environment_variables) {
+ $lockedVars = $lockedVars->merge(
+ $app->environment_variables
+ ->where('is_shown_once', true)
+ ->pluck('real_value', 'key')
+ ->filter()
+ );
+ }
+
+ if ($this->pull_request_id !== 0 && $app->environment_variables_preview) {
+ $lockedVars = $lockedVars->merge(
+ $app->environment_variables_preview
+ ->where('is_shown_once', true)
+ ->pluck('real_value', 'key')
+ ->filter()
+ );
+ }
+
+ foreach ($lockedVars as $key => $value) {
+ $escapedValue = preg_quote($value, '/');
+ $text = preg_replace(
+ '/'.$escapedValue.'/',
+ REDACTED,
+ $text
+ );
+ }
+
+ return $text;
+ }
+
public function addLogEntry(string $message, string $type = 'stdout', bool $hidden = false)
{
if ($type === 'error') {
@@ -96,7 +137,7 @@ class ApplicationDeploymentQueue extends Model
}
$newLogEntry = [
'command' => null,
- 'output' => remove_iip($message),
+ 'output' => $this->redactSensitiveInfo($message),
'type' => $type,
'timestamp' => Carbon::now('UTC'),
'hidden' => $hidden,
diff --git a/app/Models/EnvironmentVariable.php b/app/Models/EnvironmentVariable.php
index 85fcdcecb..80399a16b 100644
--- a/app/Models/EnvironmentVariable.php
+++ b/app/Models/EnvironmentVariable.php
@@ -17,7 +17,8 @@ use OpenApi\Attributes as OA;
'is_literal' => ['type' => 'boolean'],
'is_multiline' => ['type' => 'boolean'],
'is_preview' => ['type' => 'boolean'],
- 'is_buildtime_only' => ['type' => 'boolean'],
+ 'is_runtime' => ['type' => 'boolean'],
+ 'is_buildtime' => ['type' => 'boolean'],
'is_shared' => ['type' => 'boolean'],
'is_shown_once' => ['type' => 'boolean'],
'key' => ['type' => 'string'],
@@ -37,13 +38,14 @@ class EnvironmentVariable extends BaseModel
'value' => 'encrypted',
'is_multiline' => 'boolean',
'is_preview' => 'boolean',
- 'is_buildtime_only' => 'boolean',
+ 'is_runtime' => 'boolean',
+ 'is_buildtime' => 'boolean',
'version' => 'string',
'resourceable_type' => 'string',
'resourceable_id' => 'integer',
];
- protected $appends = ['real_value', 'is_shared', 'is_really_required'];
+ protected $appends = ['real_value', 'is_shared', 'is_really_required', 'is_nixpacks', 'is_coolify'];
protected static function booted()
{
@@ -137,6 +139,32 @@ class EnvironmentVariable extends BaseModel
);
}
+ protected function isNixpacks(): Attribute
+ {
+ return Attribute::make(
+ get: function () {
+ if (str($this->key)->startsWith('NIXPACKS_')) {
+ return true;
+ }
+
+ return false;
+ }
+ );
+ }
+
+ protected function isCoolify(): Attribute
+ {
+ return Attribute::make(
+ get: function () {
+ if (str($this->key)->startsWith('SERVICE_')) {
+ return true;
+ }
+
+ return false;
+ }
+ );
+ }
+
protected function isShared(): Attribute
{
return Attribute::make(
diff --git a/app/Models/ScheduledDatabaseBackup.php b/app/Models/ScheduledDatabaseBackup.php
index 90204d8df..4656457ae 100644
--- a/app/Models/ScheduledDatabaseBackup.php
+++ b/app/Models/ScheduledDatabaseBackup.php
@@ -10,6 +10,21 @@ class ScheduledDatabaseBackup extends BaseModel
{
protected $guarded = [];
+ public static function ownedByCurrentTeam()
+ {
+ return ScheduledDatabaseBackup::whereRelation('team', 'id', currentTeam()->id)->orderBy('name');
+ }
+
+ public static function ownedByCurrentTeamAPI(int $teamId)
+ {
+ return ScheduledDatabaseBackup::whereRelation('team', 'id', $teamId)->orderBy('name');
+ }
+
+ public function team()
+ {
+ return $this->belongsTo(Team::class);
+ }
+
public function database(): MorphTo
{
return $this->morphTo();
diff --git a/app/Models/Server.php b/app/Models/Server.php
index 960091033..829a4b5aa 100644
--- a/app/Models/Server.php
+++ b/app/Models/Server.php
@@ -13,6 +13,7 @@ use App\Jobs\RegenerateSslCertJob;
use App\Notifications\Server\Reachable;
use App\Notifications\Server\Unreachable;
use App\Services\ConfigurationRepository;
+use App\Traits\ClearsGlobalSearchCache;
use App\Traits\HasSafeStringAttribute;
use Illuminate\Database\Eloquent\Builder;
use Illuminate\Database\Eloquent\Casts\Attribute;
@@ -55,7 +56,7 @@ use Visus\Cuid2\Cuid2;
class Server extends BaseModel
{
- use HasFactory, SchemalessAttributesTrait, SoftDeletes;
+ use ClearsGlobalSearchCache, HasFactory, SchemalessAttributesTrait, SoftDeletes;
public static $batch_counter = 0;
@@ -1082,7 +1083,6 @@ $schema://$host {
public function validateConnection(bool $justCheckingNewKey = false)
{
- ray('validateConnection', $this->id);
$this->disableSshMux();
if ($this->skipServer()) {
diff --git a/app/Models/Service.php b/app/Models/Service.php
index dd8d0ac7e..d42d471c6 100644
--- a/app/Models/Service.php
+++ b/app/Models/Service.php
@@ -3,6 +3,7 @@
namespace App\Models;
use App\Enums\ProcessStatus;
+use App\Traits\ClearsGlobalSearchCache;
use App\Traits\HasSafeStringAttribute;
use Illuminate\Database\Eloquent\Casts\Attribute;
use Illuminate\Database\Eloquent\Factories\HasFactory;
@@ -41,7 +42,7 @@ use Visus\Cuid2\Cuid2;
)]
class Service extends BaseModel
{
- use HasFactory, HasSafeStringAttribute, SoftDeletes;
+ use ClearsGlobalSearchCache, HasFactory, HasSafeStringAttribute, SoftDeletes;
private static $parserVersion = '5';
diff --git a/app/Models/StandaloneClickhouse.php b/app/Models/StandaloneClickhouse.php
index 87c5c3422..146ee0a2d 100644
--- a/app/Models/StandaloneClickhouse.php
+++ b/app/Models/StandaloneClickhouse.php
@@ -2,6 +2,7 @@
namespace App\Models;
+use App\Traits\ClearsGlobalSearchCache;
use App\Traits\HasSafeStringAttribute;
use Illuminate\Database\Eloquent\Casts\Attribute;
use Illuminate\Database\Eloquent\Factories\HasFactory;
@@ -9,7 +10,7 @@ use Illuminate\Database\Eloquent\SoftDeletes;
class StandaloneClickhouse extends BaseModel
{
- use HasFactory, HasSafeStringAttribute, SoftDeletes;
+ use ClearsGlobalSearchCache, HasFactory, HasSafeStringAttribute, SoftDeletes;
protected $guarded = [];
@@ -43,6 +44,11 @@ class StandaloneClickhouse extends BaseModel
});
}
+ public static function ownedByCurrentTeam()
+ {
+ return StandaloneClickhouse::whereRelation('environment.project.team', 'id', currentTeam()->id)->orderBy('name');
+ }
+
protected function serverStatus(): Attribute
{
return Attribute::make(
diff --git a/app/Models/StandaloneDragonfly.php b/app/Models/StandaloneDragonfly.php
index 118c72726..90e7304f1 100644
--- a/app/Models/StandaloneDragonfly.php
+++ b/app/Models/StandaloneDragonfly.php
@@ -2,6 +2,7 @@
namespace App\Models;
+use App\Traits\ClearsGlobalSearchCache;
use App\Traits\HasSafeStringAttribute;
use Illuminate\Database\Eloquent\Casts\Attribute;
use Illuminate\Database\Eloquent\Factories\HasFactory;
@@ -9,7 +10,7 @@ use Illuminate\Database\Eloquent\SoftDeletes;
class StandaloneDragonfly extends BaseModel
{
- use HasFactory, HasSafeStringAttribute, SoftDeletes;
+ use ClearsGlobalSearchCache, HasFactory, HasSafeStringAttribute, SoftDeletes;
protected $guarded = [];
@@ -43,6 +44,11 @@ class StandaloneDragonfly extends BaseModel
});
}
+ public static function ownedByCurrentTeam()
+ {
+ return StandaloneDragonfly::whereRelation('environment.project.team', 'id', currentTeam()->id)->orderBy('name');
+ }
+
protected function serverStatus(): Attribute
{
return Attribute::make(
diff --git a/app/Models/StandaloneKeydb.php b/app/Models/StandaloneKeydb.php
index 9d674b6c2..ad0cabf7e 100644
--- a/app/Models/StandaloneKeydb.php
+++ b/app/Models/StandaloneKeydb.php
@@ -2,6 +2,7 @@
namespace App\Models;
+use App\Traits\ClearsGlobalSearchCache;
use App\Traits\HasSafeStringAttribute;
use Illuminate\Database\Eloquent\Casts\Attribute;
use Illuminate\Database\Eloquent\Factories\HasFactory;
@@ -9,7 +10,7 @@ use Illuminate\Database\Eloquent\SoftDeletes;
class StandaloneKeydb extends BaseModel
{
- use HasFactory, HasSafeStringAttribute, SoftDeletes;
+ use ClearsGlobalSearchCache, HasFactory, HasSafeStringAttribute, SoftDeletes;
protected $guarded = [];
@@ -43,6 +44,11 @@ class StandaloneKeydb extends BaseModel
});
}
+ public static function ownedByCurrentTeam()
+ {
+ return StandaloneKeydb::whereRelation('environment.project.team', 'id', currentTeam()->id)->orderBy('name');
+ }
+
protected function serverStatus(): Attribute
{
return Attribute::make(
diff --git a/app/Models/StandaloneMariadb.php b/app/Models/StandaloneMariadb.php
index 616d536c1..3d9e38147 100644
--- a/app/Models/StandaloneMariadb.php
+++ b/app/Models/StandaloneMariadb.php
@@ -2,6 +2,7 @@
namespace App\Models;
+use App\Traits\ClearsGlobalSearchCache;
use App\Traits\HasSafeStringAttribute;
use Illuminate\Database\Eloquent\Casts\Attribute;
use Illuminate\Database\Eloquent\Factories\HasFactory;
@@ -10,7 +11,7 @@ use Illuminate\Database\Eloquent\SoftDeletes;
class StandaloneMariadb extends BaseModel
{
- use HasFactory, HasSafeStringAttribute, SoftDeletes;
+ use ClearsGlobalSearchCache, HasFactory, HasSafeStringAttribute, SoftDeletes;
protected $guarded = [];
@@ -44,6 +45,11 @@ class StandaloneMariadb extends BaseModel
});
}
+ public static function ownedByCurrentTeam()
+ {
+ return StandaloneMariadb::whereRelation('environment.project.team', 'id', currentTeam()->id)->orderBy('name');
+ }
+
protected function serverStatus(): Attribute
{
return Attribute::make(
diff --git a/app/Models/StandaloneMongodb.php b/app/Models/StandaloneMongodb.php
index b26b6c967..7cccd332a 100644
--- a/app/Models/StandaloneMongodb.php
+++ b/app/Models/StandaloneMongodb.php
@@ -2,6 +2,7 @@
namespace App\Models;
+use App\Traits\ClearsGlobalSearchCache;
use App\Traits\HasSafeStringAttribute;
use Illuminate\Database\Eloquent\Casts\Attribute;
use Illuminate\Database\Eloquent\Factories\HasFactory;
@@ -9,7 +10,7 @@ use Illuminate\Database\Eloquent\SoftDeletes;
class StandaloneMongodb extends BaseModel
{
- use HasFactory, HasSafeStringAttribute, SoftDeletes;
+ use ClearsGlobalSearchCache, HasFactory, HasSafeStringAttribute, SoftDeletes;
protected $guarded = [];
@@ -46,6 +47,11 @@ class StandaloneMongodb extends BaseModel
});
}
+ public static function ownedByCurrentTeam()
+ {
+ return StandaloneMongodb::whereRelation('environment.project.team', 'id', currentTeam()->id)->orderBy('name');
+ }
+
protected function serverStatus(): Attribute
{
return Attribute::make(
diff --git a/app/Models/StandaloneMysql.php b/app/Models/StandaloneMysql.php
index 7b6f1b94e..80269972f 100644
--- a/app/Models/StandaloneMysql.php
+++ b/app/Models/StandaloneMysql.php
@@ -2,6 +2,7 @@
namespace App\Models;
+use App\Traits\ClearsGlobalSearchCache;
use App\Traits\HasSafeStringAttribute;
use Illuminate\Database\Eloquent\Casts\Attribute;
use Illuminate\Database\Eloquent\Factories\HasFactory;
@@ -9,7 +10,7 @@ use Illuminate\Database\Eloquent\SoftDeletes;
class StandaloneMysql extends BaseModel
{
- use HasFactory, HasSafeStringAttribute, SoftDeletes;
+ use ClearsGlobalSearchCache, HasFactory, HasSafeStringAttribute, SoftDeletes;
protected $guarded = [];
@@ -44,6 +45,11 @@ class StandaloneMysql extends BaseModel
});
}
+ public static function ownedByCurrentTeam()
+ {
+ return StandaloneMysql::whereRelation('environment.project.team', 'id', currentTeam()->id)->orderBy('name');
+ }
+
protected function serverStatus(): Attribute
{
return Attribute::make(
diff --git a/app/Models/StandalonePostgresql.php b/app/Models/StandalonePostgresql.php
index f13e6ffab..acde7a20c 100644
--- a/app/Models/StandalonePostgresql.php
+++ b/app/Models/StandalonePostgresql.php
@@ -2,6 +2,7 @@
namespace App\Models;
+use App\Traits\ClearsGlobalSearchCache;
use App\Traits\HasSafeStringAttribute;
use Illuminate\Database\Eloquent\Casts\Attribute;
use Illuminate\Database\Eloquent\Factories\HasFactory;
@@ -9,7 +10,7 @@ use Illuminate\Database\Eloquent\SoftDeletes;
class StandalonePostgresql extends BaseModel
{
- use HasFactory, HasSafeStringAttribute, SoftDeletes;
+ use ClearsGlobalSearchCache, HasFactory, HasSafeStringAttribute, SoftDeletes;
protected $guarded = [];
@@ -44,6 +45,11 @@ class StandalonePostgresql extends BaseModel
});
}
+ public static function ownedByCurrentTeam()
+ {
+ return StandalonePostgresql::whereRelation('environment.project.team', 'id', currentTeam()->id)->orderBy('name');
+ }
+
public function workdir()
{
return database_configuration_dir()."/{$this->uuid}";
diff --git a/app/Models/StandaloneRedis.php b/app/Models/StandaloneRedis.php
index 9f7c96a08..001ebe36a 100644
--- a/app/Models/StandaloneRedis.php
+++ b/app/Models/StandaloneRedis.php
@@ -2,6 +2,7 @@
namespace App\Models;
+use App\Traits\ClearsGlobalSearchCache;
use App\Traits\HasSafeStringAttribute;
use Illuminate\Database\Eloquent\Casts\Attribute;
use Illuminate\Database\Eloquent\Factories\HasFactory;
@@ -9,7 +10,7 @@ use Illuminate\Database\Eloquent\SoftDeletes;
class StandaloneRedis extends BaseModel
{
- use HasFactory, HasSafeStringAttribute, SoftDeletes;
+ use ClearsGlobalSearchCache, HasFactory, HasSafeStringAttribute, SoftDeletes;
protected $guarded = [];
@@ -45,6 +46,11 @@ class StandaloneRedis extends BaseModel
});
}
+ public static function ownedByCurrentTeam()
+ {
+ return StandaloneRedis::whereRelation('environment.project.team', 'id', currentTeam()->id)->orderBy('name');
+ }
+
protected function serverStatus(): Attribute
{
return Attribute::make(
diff --git a/app/Models/Team.php b/app/Models/Team.php
index 81638e31c..97a7d89d7 100644
--- a/app/Models/Team.php
+++ b/app/Models/Team.php
@@ -193,6 +193,7 @@ class Team extends Model implements SendsDiscord, SendsEmail, SendsPushover, Sen
public function subscriptionEnded()
{
$this->subscription->update([
+ 'stripe_subscription_id' => null,
'stripe_cancel_at_period_end' => false,
'stripe_invoice_paid' => false,
'stripe_trial_already_ended' => false,
diff --git a/app/Rules/ValidGitRepositoryUrl.php b/app/Rules/ValidGitRepositoryUrl.php
index 3cbe9246e..d549961dc 100644
--- a/app/Rules/ValidGitRepositoryUrl.php
+++ b/app/Rules/ValidGitRepositoryUrl.php
@@ -31,7 +31,7 @@ class ValidGitRepositoryUrl implements ValidationRule
$dangerousChars = [
';', '|', '&', '$', '`', '(', ')', '{', '}',
'[', ']', '<', '>', '\n', '\r', '\0', '"', "'",
- '\\', '!', '?', '*', '~', '^', '%', '=', '+',
+ '\\', '!', '?', '*', '^', '%', '=', '+',
'#', // Comment character that could hide commands
];
@@ -85,7 +85,7 @@ class ValidGitRepositoryUrl implements ValidationRule
}
// Validate SSH URL format (git@host:user/repo.git)
- if (! preg_match('/^git@[a-zA-Z0-9\.\-]+:[a-zA-Z0-9\-_\/\.]+$/', $value)) {
+ if (! preg_match('/^git@[a-zA-Z0-9\.\-]+:[a-zA-Z0-9\-_\/\.~]+$/', $value)) {
$fail('The :attribute is not a valid SSH repository URL.');
return;
diff --git a/app/Traits/ClearsGlobalSearchCache.php b/app/Traits/ClearsGlobalSearchCache.php
new file mode 100644
index 000000000..ae587aa87
--- /dev/null
+++ b/app/Traits/ClearsGlobalSearchCache.php
@@ -0,0 +1,86 @@
+hasSearchableChanges()) {
+ $teamId = $model->getTeamIdForCache();
+ if (filled($teamId)) {
+ GlobalSearch::clearTeamCache($teamId);
+ }
+ }
+ });
+
+ static::created(function ($model) {
+ // Always clear cache when model is created
+ $teamId = $model->getTeamIdForCache();
+ if (filled($teamId)) {
+ GlobalSearch::clearTeamCache($teamId);
+ }
+ });
+
+ static::deleted(function ($model) {
+ // Always clear cache when model is deleted
+ $teamId = $model->getTeamIdForCache();
+ if (filled($teamId)) {
+ GlobalSearch::clearTeamCache($teamId);
+ }
+ });
+ }
+
+ private function hasSearchableChanges(): bool
+ {
+ // Define searchable fields based on model type
+ $searchableFields = ['name', 'description'];
+
+ // Add model-specific searchable fields
+ if ($this instanceof \App\Models\Application) {
+ $searchableFields[] = 'fqdn';
+ $searchableFields[] = 'docker_compose_domains';
+ } elseif ($this instanceof \App\Models\Server) {
+ $searchableFields[] = 'ip';
+ } elseif ($this instanceof \App\Models\Service) {
+ // Services don't have direct fqdn, but name and description are covered
+ }
+ // Database models only have name and description as searchable
+
+ // Check if any searchable field is dirty
+ foreach ($searchableFields as $field) {
+ if ($this->isDirty($field)) {
+ return true;
+ }
+ }
+
+ return false;
+ }
+
+ private function getTeamIdForCache()
+ {
+ // For database models, team is accessed through environment.project.team
+ if (method_exists($this, 'team')) {
+ if ($this instanceof \App\Models\Server) {
+ $team = $this->team;
+ } else {
+ $team = $this->team();
+ }
+ if (filled($team)) {
+ return is_object($team) ? $team->id : null;
+ }
+ }
+
+ // For models with direct team_id property
+ if (property_exists($this, 'team_id') || isset($this->team_id)) {
+ return $this->team_id;
+ }
+
+ return null;
+ }
+}
diff --git a/app/Traits/EnvironmentVariableAnalyzer.php b/app/Traits/EnvironmentVariableAnalyzer.php
new file mode 100644
index 000000000..0b452a940
--- /dev/null
+++ b/app/Traits/EnvironmentVariableAnalyzer.php
@@ -0,0 +1,221 @@
+ [
+ 'problematic_values' => ['production', 'prod'],
+ 'affects' => 'Node.js/npm/yarn/bun/pnpm',
+ 'issue' => 'Skips devDependencies installation which are often required for building (webpack, typescript, etc.)',
+ 'recommendation' => 'Uncheck "Available at Buildtime" or use "development" during build',
+ ],
+ 'NPM_CONFIG_PRODUCTION' => [
+ 'problematic_values' => ['true', '1', 'yes'],
+ 'affects' => 'npm/pnpm',
+ 'issue' => 'Forces npm to skip devDependencies',
+ 'recommendation' => 'Remove from build-time variables or set to false',
+ ],
+ 'YARN_PRODUCTION' => [
+ 'problematic_values' => ['true', '1', 'yes'],
+ 'affects' => 'Yarn/pnpm',
+ 'issue' => 'Forces yarn to skip devDependencies',
+ 'recommendation' => 'Remove from build-time variables or set to false',
+ ],
+ 'COMPOSER_NO_DEV' => [
+ 'problematic_values' => ['1', 'true', 'yes'],
+ 'affects' => 'PHP/Composer',
+ 'issue' => 'Skips require-dev packages which may include build tools',
+ 'recommendation' => 'Set as "Runtime only" or remove from build-time variables',
+ ],
+ 'MIX_ENV' => [
+ 'problematic_values' => ['prod', 'production'],
+ 'affects' => 'Elixir/Phoenix',
+ 'issue' => 'Production mode may skip development dependencies needed for compilation',
+ 'recommendation' => 'Use "dev" for build or set as "Runtime only"',
+ ],
+ 'RAILS_ENV' => [
+ 'problematic_values' => ['production'],
+ 'affects' => 'Ruby on Rails',
+ 'issue' => 'May affect asset precompilation and dependency handling',
+ 'recommendation' => 'Consider using "development" for build phase',
+ ],
+ 'RACK_ENV' => [
+ 'problematic_values' => ['production'],
+ 'affects' => 'Ruby/Rack',
+ 'issue' => 'May affect dependency handling and build behavior',
+ 'recommendation' => 'Consider using "development" for build phase',
+ ],
+ 'BUNDLE_WITHOUT' => [
+ 'problematic_values' => ['development', 'test', 'development:test'],
+ 'affects' => 'Ruby/Bundler',
+ 'issue' => 'Excludes gem groups that may contain build dependencies',
+ 'recommendation' => 'Remove from build-time variables or adjust groups',
+ ],
+ 'FLASK_ENV' => [
+ 'problematic_values' => ['production'],
+ 'affects' => 'Python/Flask',
+ 'issue' => 'May affect debug mode and development tools availability',
+ 'recommendation' => 'Usually safe, but consider "development" for complex builds',
+ ],
+ 'DJANGO_SETTINGS_MODULE' => [
+ 'problematic_values' => [], // Check if contains 'production' or 'prod'
+ 'affects' => 'Python/Django',
+ 'issue' => 'Production settings may disable debug tools needed during build',
+ 'recommendation' => 'Use development settings for build phase',
+ 'check_function' => 'checkDjangoSettings',
+ ],
+ 'APP_ENV' => [
+ 'problematic_values' => ['production', 'prod'],
+ 'affects' => 'Laravel/Symfony',
+ 'issue' => 'May affect dependency installation and build optimizations',
+ 'recommendation' => 'Consider using "local" or "development" for build',
+ ],
+ 'ASPNETCORE_ENVIRONMENT' => [
+ 'problematic_values' => ['Production'],
+ 'affects' => '.NET/ASP.NET Core',
+ 'issue' => 'May affect build-time configurations and optimizations',
+ 'recommendation' => 'Usually safe, but verify build requirements',
+ ],
+ 'CI' => [
+ 'problematic_values' => ['true', '1', 'yes'],
+ 'affects' => 'Various tools',
+ 'issue' => 'Changes behavior in many tools (disables interactivity, changes caching)',
+ 'recommendation' => 'Usually beneficial for builds, but be aware of behavior changes',
+ ],
+ ];
+ }
+
+ /**
+ * Analyze an environment variable for potential build issues.
+ * Always returns a warning if the key is in our list, regardless of value.
+ */
+ public static function analyzeBuildVariable(string $key, string $value): ?array
+ {
+ $problematicVars = self::getProblematicBuildVariables();
+
+ // Direct key match
+ if (isset($problematicVars[$key])) {
+ $config = $problematicVars[$key];
+
+ // Check if it has a custom check function
+ if (isset($config['check_function'])) {
+ $method = $config['check_function'];
+ if (method_exists(self::class, $method)) {
+ return self::{$method}($key, $value, $config);
+ }
+ }
+
+ // Always return warning for known problematic variables
+ return [
+ 'variable' => $key,
+ 'value' => $value,
+ 'affects' => $config['affects'],
+ 'issue' => $config['issue'],
+ 'recommendation' => $config['recommendation'],
+ ];
+ }
+
+ return null;
+ }
+
+ /**
+ * Analyze multiple environment variables for potential build issues.
+ */
+ public static function analyzeBuildVariables(array $variables): array
+ {
+ $warnings = [];
+
+ foreach ($variables as $key => $value) {
+ $warning = self::analyzeBuildVariable($key, $value);
+ if ($warning) {
+ $warnings[] = $warning;
+ }
+ }
+
+ return $warnings;
+ }
+
+ /**
+ * Custom check for Django settings module.
+ */
+ protected static function checkDjangoSettings(string $key, string $value, array $config): ?array
+ {
+ // Always return warning for DJANGO_SETTINGS_MODULE when it's set as build-time
+ return [
+ 'variable' => $key,
+ 'value' => $value,
+ 'affects' => $config['affects'],
+ 'issue' => $config['issue'],
+ 'recommendation' => $config['recommendation'],
+ ];
+ }
+
+ /**
+ * Generate a formatted warning message for deployment logs.
+ */
+ public static function formatBuildWarning(array $warning): array
+ {
+ $messages = [
+ "⚠️ Build-time environment variable warning: {$warning['variable']}={$warning['value']}",
+ " Affects: {$warning['affects']}",
+ " Issue: {$warning['issue']}",
+ " Recommendation: {$warning['recommendation']}",
+ ];
+
+ return $messages;
+ }
+
+ /**
+ * Check if a variable should show a warning in the UI.
+ */
+ public static function shouldShowBuildWarning(string $key): bool
+ {
+ return isset(self::getProblematicBuildVariables()[$key]);
+ }
+
+ /**
+ * Get UI warning message for a specific variable.
+ */
+ public static function getUIWarningMessage(string $key): ?string
+ {
+ $problematicVars = self::getProblematicBuildVariables();
+
+ if (! isset($problematicVars[$key])) {
+ return null;
+ }
+
+ $config = $problematicVars[$key];
+ $problematicValuesStr = implode(', ', $config['problematic_values']);
+
+ return "Setting {$key} to {$problematicValuesStr} as a build-time variable may cause issues. {$config['issue']} Consider: {$config['recommendation']}";
+ }
+
+ /**
+ * Get problematic variables configuration for frontend use.
+ */
+ public static function getProblematicVariablesForFrontend(): array
+ {
+ $vars = self::getProblematicBuildVariables();
+ $result = [];
+
+ foreach ($vars as $key => $config) {
+ // Skip the check_function as it's PHP-specific
+ $result[$key] = [
+ 'problematic_values' => $config['problematic_values'],
+ 'affects' => $config['affects'],
+ 'issue' => $config['issue'],
+ 'recommendation' => $config['recommendation'],
+ ];
+ }
+
+ return $result;
+ }
+}
diff --git a/app/Traits/ExecuteRemoteCommand.php b/app/Traits/ExecuteRemoteCommand.php
index 0e7961368..f9df19c16 100644
--- a/app/Traits/ExecuteRemoteCommand.php
+++ b/app/Traits/ExecuteRemoteCommand.php
@@ -17,6 +17,46 @@ trait ExecuteRemoteCommand
public static int $batch_counter = 0;
+ private function redact_sensitive_info($text)
+ {
+ $text = remove_iip($text);
+
+ if (! isset($this->application)) {
+ return $text;
+ }
+
+ $lockedVars = collect([]);
+
+ if (isset($this->application->environment_variables)) {
+ $lockedVars = $lockedVars->merge(
+ $this->application->environment_variables
+ ->where('is_shown_once', true)
+ ->pluck('real_value', 'key')
+ ->filter()
+ );
+ }
+
+ if (isset($this->pull_request_id) && $this->pull_request_id !== 0 && isset($this->application->environment_variables_preview)) {
+ $lockedVars = $lockedVars->merge(
+ $this->application->environment_variables_preview
+ ->where('is_shown_once', true)
+ ->pluck('real_value', 'key')
+ ->filter()
+ );
+ }
+
+ foreach ($lockedVars as $key => $value) {
+ $escapedValue = preg_quote($value, '/');
+ $text = preg_replace(
+ '/'.$escapedValue.'/',
+ REDACTED,
+ $text
+ );
+ }
+
+ return $text;
+ }
+
public function execute_remote_command(...$commands)
{
static::$batch_counter++;
@@ -46,6 +86,14 @@ trait ExecuteRemoteCommand
}
}
+ // Check for cancellation before executing commands
+ if (isset($this->application_deployment_queue)) {
+ $this->application_deployment_queue->refresh();
+ if ($this->application_deployment_queue->status === \App\Enums\ApplicationDeploymentStatus::CANCELLED_BY_USER->value) {
+ throw new \RuntimeException('Deployment cancelled by user', 69420);
+ }
+ }
+
$maxRetries = config('constants.ssh.max_retries');
$attempt = 0;
$lastError = null;
@@ -66,13 +114,19 @@ trait ExecuteRemoteCommand
// Track SSH retry event in Sentry
$this->trackSshRetryEvent($attempt, $maxRetries, $delay, $errorMessage, [
'server' => $this->server->name ?? $this->server->ip ?? 'unknown',
- 'command' => remove_iip($command),
+ 'command' => $this->redact_sensitive_info($command),
'trait' => 'ExecuteRemoteCommand',
]);
// Add log entry for the retry
if (isset($this->application_deployment_queue)) {
$this->addRetryLogEntry($attempt, $maxRetries, $delay, $errorMessage);
+
+ // Check for cancellation during retry wait
+ $this->application_deployment_queue->refresh();
+ if ($this->application_deployment_queue->status === \App\Enums\ApplicationDeploymentStatus::CANCELLED_BY_USER->value) {
+ throw new \RuntimeException('Deployment cancelled by user during retry', 69420);
+ }
}
sleep($delay);
@@ -85,6 +139,11 @@ trait ExecuteRemoteCommand
// If we exhausted all retries and still failed
if (! $commandExecuted && $lastError) {
+ // Now we can set the status to FAILED since all retries have been exhausted
+ if (isset($this->application_deployment_queue)) {
+ $this->application_deployment_queue->status = ApplicationDeploymentStatus::FAILED->value;
+ $this->application_deployment_queue->save();
+ }
throw $lastError;
}
});
@@ -106,8 +165,8 @@ trait ExecuteRemoteCommand
$sanitized_output = sanitize_utf8_text($output);
$new_log_entry = [
- 'command' => remove_iip($command),
- 'output' => remove_iip($sanitized_output),
+ 'command' => $this->redact_sensitive_info($command),
+ 'output' => $this->redact_sensitive_info($sanitized_output),
'type' => $customType ?? $type === 'err' ? 'stderr' : 'stdout',
'timestamp' => Carbon::now('UTC'),
'hidden' => $hidden,
@@ -160,8 +219,8 @@ trait ExecuteRemoteCommand
$process_result = $process->wait();
if ($process_result->exitCode() !== 0) {
if (! $ignore_errors) {
- $this->application_deployment_queue->status = ApplicationDeploymentStatus::FAILED->value;
- $this->application_deployment_queue->save();
+ // Don't immediately set to FAILED - let the retry logic handle it
+ // This prevents premature status changes during retryable SSH errors
throw new \RuntimeException($process_result->errorOutput());
}
}
@@ -175,7 +234,7 @@ trait ExecuteRemoteCommand
$retryMessage = "SSH connection failed. Retrying... (Attempt {$attempt}/{$maxRetries}, waiting {$delay}s)\nError: {$errorMessage}";
$new_log_entry = [
- 'output' => remove_iip($retryMessage),
+ 'output' => $this->redact_sensitive_info($retryMessage),
'type' => 'stdout',
'timestamp' => Carbon::now('UTC'),
'hidden' => false,
diff --git a/bootstrap/helpers/docker.php b/bootstrap/helpers/docker.php
index f61abc806..1491e4712 100644
--- a/bootstrap/helpers/docker.php
+++ b/bootstrap/helpers/docker.php
@@ -1093,11 +1093,11 @@ function getContainerLogs(Server $server, string $container_id, int $lines = 100
{
if ($server->isSwarm()) {
$output = instant_remote_process([
- "docker service logs -n {$lines} {$container_id}",
+ "docker service logs -n {$lines} {$container_id} 2>&1",
], $server);
} else {
$output = instant_remote_process([
- "docker logs -n {$lines} {$container_id}",
+ "docker logs -n {$lines} {$container_id} 2>&1",
], $server);
}
@@ -1105,7 +1105,6 @@ function getContainerLogs(Server $server, string $container_id, int $lines = 100
return $output;
}
-
function escapeEnvVariables($value)
{
$search = ['\\', "\r", "\t", "\x0", '"', "'"];
diff --git a/bootstrap/helpers/github.php b/bootstrap/helpers/github.php
index 0de2f2fd9..3b5f183fb 100644
--- a/bootstrap/helpers/github.php
+++ b/bootstrap/helpers/github.php
@@ -135,7 +135,13 @@ function getPermissionsPath(GithubApp $source)
function loadRepositoryByPage(GithubApp $source, string $token, int $page)
{
- $response = Http::withToken($token)->get("{$source->api_url}/installation/repositories?per_page=100&page={$page}");
+ $response = Http::GitHub($source->api_url, $token)
+ ->timeout(20)
+ ->retry(3, 200, throw: false)
+ ->get('/installation/repositories', [
+ 'per_page' => 100,
+ 'page' => $page,
+ ]);
$json = $response->json();
if ($response->status() !== 200) {
return [
diff --git a/bootstrap/helpers/remoteProcess.php b/bootstrap/helpers/remoteProcess.php
index 56386a55f..3218bf878 100644
--- a/bootstrap/helpers/remoteProcess.php
+++ b/bootstrap/helpers/remoteProcess.php
@@ -84,64 +84,6 @@ function instant_scp(string $source, string $dest, Server $server, $throwError =
);
}
-function transfer_file_to_container(string $content, string $container_path, string $deployment_uuid, Server $server, bool $throwError = true): ?string
-{
- $temp_file = tempnam(sys_get_temp_dir(), 'coolify_env_');
-
- try {
- // Write content to temporary file
- file_put_contents($temp_file, $content);
-
- // Generate unique filename for server transfer
- $server_temp_file = '/tmp/coolify_env_'.uniqid().'_'.$deployment_uuid;
-
- // Transfer file to server
- instant_scp($temp_file, $server_temp_file, $server, $throwError);
-
- // Ensure parent directory exists in container, then copy file
- $parent_dir = dirname($container_path);
- $commands = [];
- if ($parent_dir !== '.' && $parent_dir !== '/') {
- $commands[] = executeInDocker($deployment_uuid, "mkdir -p \"$parent_dir\"");
- }
- $commands[] = "docker cp $server_temp_file $deployment_uuid:$container_path";
- $commands[] = "rm -f $server_temp_file"; // Cleanup server temp file
-
- return instant_remote_process_with_timeout($commands, $server, $throwError);
-
- } finally {
- // Always cleanup local temp file
- if (file_exists($temp_file)) {
- unlink($temp_file);
- }
- }
-}
-
-function transfer_file_to_server(string $content, string $server_path, Server $server, bool $throwError = true): ?string
-{
- $temp_file = tempnam(sys_get_temp_dir(), 'coolify_env_');
-
- try {
- // Write content to temporary file
- file_put_contents($temp_file, $content);
-
- // Ensure parent directory exists on server
- $parent_dir = dirname($server_path);
- if ($parent_dir !== '.' && $parent_dir !== '/') {
- instant_remote_process_with_timeout(["mkdir -p \"$parent_dir\""], $server, $throwError);
- }
-
- // Transfer file directly to server destination
- return instant_scp($temp_file, $server_path, $server, $throwError);
-
- } finally {
- // Always cleanup local temp file
- if (file_exists($temp_file)) {
- unlink($temp_file);
- }
- }
-}
-
function instant_remote_process_with_timeout(Collection|array $command, Server $server, bool $throwError = true, bool $no_sudo = false): ?string
{
$command = $command instanceof Collection ? $command->toArray() : $command;
diff --git a/bootstrap/helpers/shared.php b/bootstrap/helpers/shared.php
index a0ab5a704..656c607bf 100644
--- a/bootstrap/helpers/shared.php
+++ b/bootstrap/helpers/shared.php
@@ -634,10 +634,14 @@ function getTopLevelNetworks(Service|Application $resource)
$definedNetwork = collect([$resource->uuid]);
$services = collect($services)->map(function ($service, $_) use ($topLevelNetworks, $definedNetwork) {
$serviceNetworks = collect(data_get($service, 'networks', []));
- $hasHostNetworkMode = data_get($service, 'network_mode') === 'host' ? true : false;
+ $networkMode = data_get($service, 'network_mode');
- // Only add 'networks' key if 'network_mode' is not 'host'
- if (! $hasHostNetworkMode) {
+ $hasValidNetworkMode =
+ $networkMode === 'host' ||
+ (is_string($networkMode) && (str_starts_with($networkMode, 'service:') || str_starts_with($networkMode, 'container:')));
+
+ // Only add 'networks' key if 'network_mode' is not 'host' or does not start with 'service:' or 'container:'
+ if (! $hasValidNetworkMode) {
// Collect/create/update networks
if ($serviceNetworks->count() > 0) {
foreach ($serviceNetworks as $networkName => $networkDetails) {
@@ -1272,7 +1276,12 @@ function parseDockerComposeFile(Service|Application $resource, bool $isNew = fal
$serviceNetworks = collect(data_get($service, 'networks', []));
$serviceVariables = collect(data_get($service, 'environment', []));
$serviceLabels = collect(data_get($service, 'labels', []));
- $hasHostNetworkMode = data_get($service, 'network_mode') === 'host' ? true : false;
+ $networkMode = data_get($service, 'network_mode');
+
+ $hasValidNetworkMode =
+ $networkMode === 'host' ||
+ (is_string($networkMode) && (str_starts_with($networkMode, 'service:') || str_starts_with($networkMode, 'container:')));
+
if ($serviceLabels->count() > 0) {
$removedLabels = collect([]);
$serviceLabels = $serviceLabels->filter(function ($serviceLabel, $serviceLabelName) use ($removedLabels) {
@@ -1383,7 +1392,7 @@ function parseDockerComposeFile(Service|Application $resource, bool $isNew = fal
$savedService->ports = $collectedPorts->implode(',');
$savedService->save();
- if (! $hasHostNetworkMode) {
+ if (! $hasValidNetworkMode) {
// Add Coolify specific networks
$definedNetworkExists = $topLevelNetworks->contains(function ($value, $_) use ($definedNetwork) {
return $value == $definedNetwork;
diff --git a/config/constants.php b/config/constants.php
index 0f3f928b8..224f2dfb5 100644
--- a/config/constants.php
+++ b/config/constants.php
@@ -2,7 +2,7 @@
return [
'coolify' => [
- 'version' => '4.0.0-beta.428',
+ 'version' => '4.0.0-beta.429',
'helper_version' => '1.0.11',
'realtime_version' => '1.0.10',
'self_hosted' => env('SELF_HOSTED', true),
diff --git a/database/migrations/2025_09_17_081112_add_use_build_secrets_to_application_settings.php b/database/migrations/2025_09_17_081112_add_use_build_secrets_to_application_settings.php
new file mode 100644
index 000000000..b78f391fc
--- /dev/null
+++ b/database/migrations/2025_09_17_081112_add_use_build_secrets_to_application_settings.php
@@ -0,0 +1,28 @@
+boolean('use_build_secrets')->default(false)->after('is_build_server_enabled');
+ });
+ }
+
+ /**
+ * Reverse the migrations.
+ */
+ public function down(): void
+ {
+ Schema::table('application_settings', function (Blueprint $table) {
+ $table->dropColumn('use_build_secrets');
+ });
+ }
+};
diff --git a/database/migrations/2025_09_18_080152_add_runtime_and_buildtime_to_environment_variables_table.php b/database/migrations/2025_09_18_080152_add_runtime_and_buildtime_to_environment_variables_table.php
new file mode 100644
index 000000000..6fd4bfed6
--- /dev/null
+++ b/database/migrations/2025_09_18_080152_add_runtime_and_buildtime_to_environment_variables_table.php
@@ -0,0 +1,67 @@
+boolean('is_runtime')->default(true)->after('is_buildtime_only');
+ $table->boolean('is_buildtime')->default(true)->after('is_runtime');
+ });
+
+ // Migrate existing data from is_buildtime_only to new fields
+ DB::table('environment_variables')
+ ->where('is_buildtime_only', true)
+ ->update([
+ 'is_runtime' => false,
+ 'is_buildtime' => true,
+ ]);
+
+ DB::table('environment_variables')
+ ->where('is_buildtime_only', false)
+ ->update([
+ 'is_runtime' => true,
+ 'is_buildtime' => true,
+ ]);
+
+ // Remove the old is_buildtime_only column
+ Schema::table('environment_variables', function (Blueprint $table) {
+ $table->dropColumn('is_buildtime_only');
+ });
+ }
+
+ /**
+ * Reverse the migrations.
+ */
+ public function down(): void
+ {
+ Schema::table('environment_variables', function (Blueprint $table) {
+ // Re-add the is_buildtime_only column
+ $table->boolean('is_buildtime_only')->default(false)->after('is_preview');
+ });
+
+ // Restore data to is_buildtime_only based on new fields
+ DB::table('environment_variables')
+ ->where('is_runtime', false)
+ ->where('is_buildtime', true)
+ ->update(['is_buildtime_only' => true]);
+
+ DB::table('environment_variables')
+ ->where('is_runtime', true)
+ ->update(['is_buildtime_only' => false]);
+
+ // Remove new columns
+ Schema::table('environment_variables', function (Blueprint $table) {
+ $table->dropColumn(['is_runtime', 'is_buildtime']);
+ });
+ }
+};
diff --git a/openapi.json b/openapi.json
index d5b3b14c4..2b0a81c6e 100644
--- a/openapi.json
+++ b/openapi.json
@@ -8360,7 +8360,10 @@
"is_preview": {
"type": "boolean"
},
- "is_buildtime_only": {
+ "is_runtime": {
+ "type": "boolean"
+ },
+ "is_buildtime": {
"type": "boolean"
},
"is_shared": {
diff --git a/openapi.yaml b/openapi.yaml
index 69848d99a..9529fcf87 100644
--- a/openapi.yaml
+++ b/openapi.yaml
@@ -5411,7 +5411,9 @@ components:
type: boolean
is_preview:
type: boolean
- is_buildtime_only:
+ is_runtime:
+ type: boolean
+ is_buildtime:
type: boolean
is_shared:
type: boolean
diff --git a/resources/css/utilities.css b/resources/css/utilities.css
index d09d7f49c..694ad61a3 100644
--- a/resources/css/utilities.css
+++ b/resources/css/utilities.css
@@ -6,10 +6,31 @@
@apply hidden!;
}
+@utility apexcharts-grid-borders {
+ @apply dark:hidden!;
+}
+
@utility apexcharts-xaxistooltip {
@apply hidden!;
}
+@utility apexcharts-tooltip-custom {
+ @apply bg-white dark:bg-coolgray-100 border border-neutral-200 dark:border-coolgray-300 rounded-lg shadow-lg p-3 text-sm;
+ min-width: 160px;
+}
+
+@utility apexcharts-tooltip-custom-value {
+ @apply text-neutral-700 dark:text-neutral-300 mb-1;
+}
+
+@utility apexcharts-tooltip-value-bold {
+ @apply font-bold text-black dark:text-white;
+}
+
+@utility apexcharts-tooltip-custom-title {
+ @apply text-xs text-neutral-500 dark:text-neutral-400 font-medium;
+}
+
@utility input-sticky {
@apply block py-1.5 w-full text-sm text-black rounded-sm border-0 ring-1 ring-inset dark:bg-coolgray-100 dark:text-white ring-neutral-200 dark:ring-coolgray-300 focus:ring-2 focus:ring-neutral-400 dark:focus:ring-coolgray-300;
}
diff --git a/resources/views/components/environment-variable-warning.blade.php b/resources/views/components/environment-variable-warning.blade.php
new file mode 100644
index 000000000..ab7cab555
--- /dev/null
+++ b/resources/views/components/environment-variable-warning.blade.php
@@ -0,0 +1,32 @@
+@props(['problematicVariables' => []])
+
+
+
Warning
-This operation is permanent and cannot be undone. Please think again before proceeding! +
{!! $warningMessage ?: 'This operation is permanent and cannot be undone. Please think again before proceeding!' !!}