* chore(version): update coolify-realtime to version 1.0.9 in docker-compose and versions files * feat(migration): add is_sentinel_enabled column to server_settings with default true * fix(migration): update default value handling for is_sentinel_enabled column in server_settings * feat(seeder): dispatch StartProxy action for each server in ProductionSeeder * feat(seeder): add CheckAndStartSentinelJob dispatch for each server in ProductionSeeder * fix(seeder): conditionally dispatch CheckAndStartSentinelJob based on server's sentinel status * feat(seeder): conditionally dispatch StartProxy action based on proxy check result * refactor(ui): terminal * refactor(ui): remove terminal header from execute-container-command view * refactor(ui): remove unnecessary padding from deployment, backup, and logs sections * fix(service): disable healthcheck logging for Gotenberg (#6005) * fix(service): Joplin volume name (#5930) * chore(version): update coolify version to 4.0.0-beta.420 and nightly version to 4.0.0-beta.421 * fix(server): update sentinelUpdatedAt assignment to use server's sentinel_updated_at property * feat(service): update Changedetection template (#5937) * chore(service): changedetection remove unused code * fix(service): audiobookshelf healthcheck command (#5993) * refactor(service): update Hoarder to their new name karakeep (#5964) * fix(service): downgrade Evolution API phone version (#5977) * feat(service): add Miniflux service (#5843) * refactor(service): karakeep naming and formatting * refactor(service): improve miniflux - improve DB url - add depends_on - formatting, naming & order * feat(service): add Pingvin Share service (#5969) * fix(service): pingvinshare-with-clamav - add platform to make clamav work - formatting * feat(auth): Add Discord OAuth Provider (#5552) * feat(auth): Add Clerk OAuth Provider (#5553) * feat(auth): add Zitadel OAuth Provider (#5490) * Update composer.lock * fix(ssh): scp requires square brackets for ipv6 (#6001) * refactor(core): rename API rate limit ENV * refactor(ui): simplify container selection form in execute-container-command view * chore(service): Update Evolution API image to the official one (#6031) * chore(versions): bump coolify versions to v4.0.0-beta.420 and v4.0.0-beta.421 * fix(github): changing github app breaks the webhook. it does not anymore * feat(service): enhance service status handling and UI updates * fix(parser): improve FQDN generation and update environment variable handling * fix(ui): enhance status refresh buttons with loading indicators * fix(ui): update confirmation button text for stopping database and service * fix(routes): update middleware for deploy route to use 'api.ability:deploy' * fix(ui): refine API token creation form and update helper text for clarity * fix(ui): adjust layout of deployments section for improved alignment * chore(dependencies): update composer dependencies to latest versions including resend-laravel to ^0.19.0 and aws-sdk-php to 3.347.0 * refactor(email): streamline SMTP and resend settings logic for improved clarity * fix(ui): adjust project grid layout and refine server border styling for better visibility * fix(ui): update border styling for consistency across components and enhance loading indicators * feat(cleanup): add functionality to delete teams with no members or servers in CleanupStuckedResources command * refactor(invitation): rename methods for consistency and enhance invitation deletion logic * refactor(user): streamline user deletion process and enhance team management logic * fix(ui): add padding to section headers in settings views for improved spacing * fix(ui): reduce gap between input fields in email settings for better alignment * fix(docker): conditionally enable gzip compression in Traefik labels based on configuration * fix(parser): enable gzip compression conditionally for Pocketbase images and streamline service creation logic * fix(ui): update padding for trademarks policy and enhance spacing in advanced settings section * feat(ui): add heart icon and enhance popup messaging for sponsorship support * feat(settings): add sponsorship popup toggle and corresponding database migration * fix(ui): correct closing tag for sponsorship link in layout popups * fix(ui): refine wording in sponsorship donation prompt in layout popups * fix(ui): update navbar icon color and enhance popup layout for sponsorship support * Update resources/views/livewire/project/shared/health-checks.blade.php Co-authored-by: coderabbitai[bot] <136622811+coderabbitai[bot]@users.noreply.github.com> * Update app/Livewire/Subscription/Index.php Co-authored-by: coderabbitai[bot] <136622811+coderabbitai[bot]@users.noreply.github.com> * fix(ui): add target="_blank" to sponsorship links in layout popups for improved user experience * fix(models): refine comment wording in User model for clarity on user deletion criteria * Update app/Providers/RouteServiceProvider.php Co-authored-by: coderabbitai[bot] <136622811+coderabbitai[bot]@users.noreply.github.com> * fix(models): improve user deletion logic in User model to handle team member roles and prevent deletion if user is alone in root team * fix(ui): update wording in sponsorship prompt for clarity and engagement --------- Co-authored-by: Andras Bacsai <5845193+andrasbacsai@users.noreply.github.com> Co-authored-by: Khiet Tam Nguyen <86177399+nktnet1@users.noreply.github.com> Co-authored-by: Carsten <BanditsBacon@users.noreply.github.com> Co-authored-by: Alberto Rizzi <48057685+albertorizzi@users.noreply.github.com> Co-authored-by: Jonas Klesen <deklesen@gmail.com> Co-authored-by: Stew Night. <22344601+stewnight@users.noreply.github.com> Co-authored-by: Jeffer Marcelino <jeffersunde72@gmail.com> Co-authored-by: Lucas Eduardo <lucas59356@gmail.com> Co-authored-by: CrazyTim71 <118295691+CrazyTim71@users.noreply.github.com> Co-authored-by: Yassir Elmarissi <yassir.elmarissi@hm.edu> Co-authored-by: Hauke Schnau <hauke@schnau-lilienthal.de> Co-authored-by: Darren Sisson <74752850+djsisson@users.noreply.github.com> Co-authored-by: Alkesh Das <67038642+smad-bro@users.noreply.github.com> Co-authored-by: coderabbitai[bot] <136622811+coderabbitai[bot]@users.noreply.github.com>
		
			
				
	
	
		
			162 lines
		
	
	
		
			5.5 KiB
		
	
	
	
		
			PHP
		
	
	
	
	
	
			
		
		
	
	
			162 lines
		
	
	
		
			5.5 KiB
		
	
	
	
		
			PHP
		
	
	
	
	
	
<?php
 | 
						|
 | 
						|
namespace App\Http\Controllers;
 | 
						|
 | 
						|
use App\Events\TestEvent;
 | 
						|
use App\Models\TeamInvitation;
 | 
						|
use App\Models\User;
 | 
						|
use App\Providers\RouteServiceProvider;
 | 
						|
use Illuminate\Foundation\Auth\Access\AuthorizesRequests;
 | 
						|
use Illuminate\Foundation\Auth\EmailVerificationRequest;
 | 
						|
use Illuminate\Foundation\Validation\ValidatesRequests;
 | 
						|
use Illuminate\Http\Request;
 | 
						|
use Illuminate\Routing\Controller as BaseController;
 | 
						|
use Illuminate\Support\Facades\Auth;
 | 
						|
use Illuminate\Support\Facades\Crypt;
 | 
						|
use Illuminate\Support\Facades\Hash;
 | 
						|
use Illuminate\Support\Facades\Password;
 | 
						|
use Illuminate\Support\Str;
 | 
						|
use Laravel\Fortify\Contracts\FailedPasswordResetLinkRequestResponse;
 | 
						|
use Laravel\Fortify\Contracts\SuccessfulPasswordResetLinkRequestResponse;
 | 
						|
use Laravel\Fortify\Fortify;
 | 
						|
 | 
						|
class Controller extends BaseController
 | 
						|
{
 | 
						|
    use AuthorizesRequests, ValidatesRequests;
 | 
						|
 | 
						|
    public function realtime_test()
 | 
						|
    {
 | 
						|
        if (auth()->user()?->currentTeam()->id !== 0) {
 | 
						|
            return redirect(RouteServiceProvider::HOME);
 | 
						|
        }
 | 
						|
        TestEvent::dispatch();
 | 
						|
 | 
						|
        return 'Look at your other tab.';
 | 
						|
    }
 | 
						|
 | 
						|
    public function verify()
 | 
						|
    {
 | 
						|
        return view('auth.verify-email');
 | 
						|
    }
 | 
						|
 | 
						|
    public function email_verify(EmailVerificationRequest $request)
 | 
						|
    {
 | 
						|
        $request->fulfill();
 | 
						|
 | 
						|
        return redirect(RouteServiceProvider::HOME);
 | 
						|
    }
 | 
						|
 | 
						|
    public function forgot_password(Request $request)
 | 
						|
    {
 | 
						|
        if (is_transactional_emails_enabled()) {
 | 
						|
            $arrayOfRequest = $request->only(Fortify::email());
 | 
						|
            $request->merge([
 | 
						|
                'email' => Str::lower($arrayOfRequest['email']),
 | 
						|
            ]);
 | 
						|
            $type = set_transanctional_email_settings();
 | 
						|
            if (blank($type)) {
 | 
						|
                return response()->json(['message' => 'Transactional emails are not active'], 400);
 | 
						|
            }
 | 
						|
            $request->validate([Fortify::email() => 'required|email']);
 | 
						|
            $status = Password::broker(config('fortify.passwords'))->sendResetLink(
 | 
						|
                $request->only(Fortify::email())
 | 
						|
            );
 | 
						|
            if ($status == Password::RESET_LINK_SENT) {
 | 
						|
                return app(SuccessfulPasswordResetLinkRequestResponse::class, ['status' => $status]);
 | 
						|
            }
 | 
						|
            if ($status == Password::RESET_THROTTLED) {
 | 
						|
                return response('Already requested a password reset in the past minutes.', 400);
 | 
						|
            }
 | 
						|
 | 
						|
            return app(FailedPasswordResetLinkRequestResponse::class, ['status' => $status]);
 | 
						|
        }
 | 
						|
 | 
						|
        return response()->json(['message' => 'Transactional emails are not active'], 400);
 | 
						|
    }
 | 
						|
 | 
						|
    public function link()
 | 
						|
    {
 | 
						|
        $token = request()->get('token');
 | 
						|
        if ($token) {
 | 
						|
            $decrypted = Crypt::decryptString($token);
 | 
						|
            $email = str($decrypted)->before('@@@');
 | 
						|
            $password = str($decrypted)->after('@@@');
 | 
						|
            $user = User::whereEmail($email)->first();
 | 
						|
            if (! $user) {
 | 
						|
                return redirect()->route('login');
 | 
						|
            }
 | 
						|
            if (Hash::check($password, $user->password)) {
 | 
						|
                $invitation = TeamInvitation::whereEmail($email);
 | 
						|
                if ($invitation->exists()) {
 | 
						|
                    $team = $invitation->first()->team;
 | 
						|
                    $user->teams()->attach($team->id, ['role' => $invitation->first()->role]);
 | 
						|
                    $invitation->delete();
 | 
						|
                } else {
 | 
						|
                    $team = $user->teams()->first();
 | 
						|
                }
 | 
						|
                if (is_null(data_get($user, 'email_verified_at'))) {
 | 
						|
                    $user->email_verified_at = now();
 | 
						|
                    $user->save();
 | 
						|
                }
 | 
						|
                Auth::login($user);
 | 
						|
                session(['currentTeam' => $team]);
 | 
						|
 | 
						|
                return redirect()->route('dashboard');
 | 
						|
            }
 | 
						|
        }
 | 
						|
 | 
						|
        return redirect()->route('login')->with('error', 'Invalid credentials.');
 | 
						|
    }
 | 
						|
 | 
						|
    public function acceptInvitation()
 | 
						|
    {
 | 
						|
        $resetPassword = request()->query('reset-password');
 | 
						|
        $invitationUuid = request()->route('uuid');
 | 
						|
 | 
						|
        $invitation = TeamInvitation::whereUuid($invitationUuid)->firstOrFail();
 | 
						|
        $user = User::whereEmail($invitation->email)->firstOrFail();
 | 
						|
 | 
						|
        if (Auth::id() !== $user->id) {
 | 
						|
            abort(400, 'You are not allowed to accept this invitation.');
 | 
						|
        }
 | 
						|
        $invitationValid = $invitation->isValid();
 | 
						|
 | 
						|
        if ($invitationValid) {
 | 
						|
            if ($resetPassword) {
 | 
						|
                $user->update([
 | 
						|
                    'password' => Hash::make($invitationUuid),
 | 
						|
                    'force_password_reset' => true,
 | 
						|
                ]);
 | 
						|
            }
 | 
						|
            if ($user->teams()->where('team_id', $invitation->team->id)->exists()) {
 | 
						|
                $invitation->delete();
 | 
						|
 | 
						|
                return redirect()->route('team.index');
 | 
						|
            }
 | 
						|
            $user->teams()->attach($invitation->team->id, ['role' => $invitation->role]);
 | 
						|
            $invitation->delete();
 | 
						|
 | 
						|
            refreshSession($invitation->team);
 | 
						|
 | 
						|
            return redirect()->route('team.index');
 | 
						|
        } else {
 | 
						|
            abort(400, 'Invitation expired.');
 | 
						|
        }
 | 
						|
    }
 | 
						|
 | 
						|
    public function revokeInvitation()
 | 
						|
    {
 | 
						|
        $invitation = TeamInvitation::whereUuid(request()->route('uuid'))->firstOrFail();
 | 
						|
        $user = User::whereEmail($invitation->email)->firstOrFail();
 | 
						|
        if (is_null(Auth::user())) {
 | 
						|
            return redirect()->route('login');
 | 
						|
        }
 | 
						|
        if (Auth::id() !== $user->id) {
 | 
						|
            abort(401);
 | 
						|
        }
 | 
						|
        $invitation->delete();
 | 
						|
 | 
						|
        return redirect()->route('team.index');
 | 
						|
    }
 | 
						|
}
 |